ACSAC A

30 papers

YearTitle / Authors
199713th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA
1997A Reference Model for Firewall Technology.
Christoph L. Schuba, Eugene H. Spafford
1997Achieving User Privacy in Mobile Networks.
Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley
1997An Architecture for Multilevel Secure Interoperability.
Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
1997An Efficient Message Authentication Scheme for Link State Routing.
S. Cheung
1997An Improved E-Mail Security Protocol.
Bruce Schneier, Chris Hall
1997Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture.
T. Lowman, D. Mosier
1997Detection and Classification of TCP/IP Network Services.
Kymie M. C. Tan, Blair R. Collie
1997Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses.
John P. McDermott, R. Gelinas, S. Ornstein
1997Domain and Type Enforcement Firewalls.
Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne
1997Ethical Responsibilities and Legal Liabilities of Network Security Professionals.
F. C. Smith
1997Implementing RBAC on a Type Enforced System.
J. Hoffman
1997Incremental Assurance for Multilevel Applications.
Dan Thompson, M. Denz
1997Kernel and Shell-Based Applications Integrity Assurance.
George M. Mohay, J. Zellers
1997Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System.
T. F. Himdi, Ravi S. Sandhu
1997Micro-Digital Money for Electronic Commerce.
Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
1997On the Key Recovery of the Key Escrow System.
Yung-Cheng Lee, Chi-Sung Laih
1997PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain.
Dixie B. Baker, Robert M. Barnhart, T. T. Buss
1997Protecting Unattended Computers Without Software.
Carl E. Landwehr
1997Remote Electronic Gambling.
Chris Hall, Bruce Schneier
1997Risk Assessment for Large Heterogeneous Systems.
James W. Freeman, T. C. Darr, Richard B. Neely
1997Secure and Efficient Digital Coins.
Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
1997Securing an Object Relational Database.
Sharon R. Lewis, Simon R. Wiseman
1997Simple Assured Bastion Hosts.
C. Cant, Simon R. Wiseman
1997Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores.
Simon N. Foley
1997The Secure Distribution of Digital Contents.
Eberhard von Faber, R. Hammelrath, F.-P. Heider
1997Threshold and Generalized DSS Signatures without a Trusted Party.
Chih-Hung Wang, Tzonelih Hwang
1997Using Kernel Hypervisors to Secure Applications.
T. Mitchem, R. Lu, R. O'Brian
1997Using Type Enforcement to Assure a Configurable Guard.
P. Greve, J. Hoffman, R. E. Smith
1997Using Web Technologies in Two MLS Environments: A Security Analysis.
R. E. Niemeyer