ACSAC A

29 papers

YearTitle / Authors
199612th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA
1996A Case Study Of Two Nrl Pump Prototypes.
Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese
1996A Comparison of Multilevel Structured Query Language (SQL) Implementations.
Rae K. Burns, Yi-Fang Koh
1996A Modular Covert Channel Analysis Methodology for Trusted DG/UX
Richard A. Kemmerer, Tad Taylor
1996A Role-Based Secure Database Design Tool.
Luigi Giuri, Pietro Iglio
1996An Authenticated Camera.
John Kelsey, Bruce Schneier, Chris Hall
1996An Evaluation of the Java Security Model.
Andreas Sterbenz
1996An Extended Capability Architecture To Enforce Dynamic Access Control Policies.
I-Lung Kao, Randy Chow
1996Asymmetric Isolation.
John A. Davidson
1996Case-Based Reasoning for Intrusion Detection.
Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk
1996Common Criteria Activities and Alternative Assurance.
Herve Hosy, Mary Schanken
1996Formal Techniques for an ITSEC-E4 Secure Gateway.
Pierre Bieber
1996Implementing Security Policy in a Large Defense Procurement.
M. Nash, R. J. Kennett
1996Innovative Secure Payments On The Internet Using The German Electronic Purse.
Brigitte Althen, Gerd Enste, Brigitte Nebelung
1996Major Questions in Applying the SSE-CMM.
Joel E. Sachs
1996Mandatory Protection for Internet Server Software.
Richard E. Smith
1996On The Design Of Secure Electronic Payment Schemes For Internet.
Vijay Varadharajan, Yi Mu
1996Operation chain link: the deployment of a firewall at Hanscom Air Force Base.
Julie L. Connolly
1996Proxies For Anonymous Routing.
Michael G. Reed, Paul F. Syverson, David M. Goldschlag
1996SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems.
E. John Sebes, Terry C. Vickers Benzel
1996SSE-CMM Pilot Results.
Mary Schanken
1996Security Issues in an EDI Environment.
Ning Zhang, Qi Shi
1996Security Measures For The Austrian "Paychip" Electronic Purse Application.
Manfred Holzbach
1996Security and the National Telecommunications Infrastructure.
Teresa F. Lunt, John Kimmins, Bob McKosky
1996Starlight: Interactive Link.
Mark S. Anderson, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John D. Yesberg, Kenneth Kwok-Hei Yiu
1996Using Fortezza For Transparent File Encryption.
Jeremy Epstein, Tim Williams
1996Using a Proxy X Server to Facilitate COTS Application Integration.
Eric M. Kayden
1996Verifying The Correctness Of Cryptographic Protocols Using "Convince".
Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin
1996esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems.
Michael Hitchens, Vijay Varadharajan