ACSAC A

36 papers

YearTitle / Authors
199814th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA
1998A Certified E-Mail Protocol.
Bruce Schneier, James Riordan
1998A Hardware-Independent Encryption Model for ATM Devices.
Herbert Leitold, Udo Payer, Reinhard Posch
1998A Practical Approach to Measuring Assurance.
George F. Jelen, Jeffrey R. Williams
1998A Scheme for Analyzing Electronic Payment Systems.
Lucas C. Ferreira, Ricardo Dahab
1998An Architecture for Intrusion Detection Using Autonomous Agents.
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni
1998An Environment for the Specification and Analysis of Cryptoprotocols.
Mourad Debbabi, Y. Legaré, Mohamed Mejri
1998Anonymous Secure E-Voting Over a Network.
Yi Mu, Vijay Varadharajan
1998Application-Level Isolation to Cope with Malicious Database Users.
Sushil Jajodia, Peng Liu, Catherine D. McCollum
1998Authorization in Enterprise-Wide Distributed System: A Practical Design and Application.
Vijay Varadharajan, Chris Crall, Joe Pato
1998Complexity Measure of Encryption Keys Used for Securing Computer Networks.
M. A. Bahie-Eldin, A. A. Omar
1998Concentric Supervision of Security Applications: A New Security Management Paradigm.
P. C. Hyland, Ravi S. Sandhu
1998Controlling Applets' Behavior in a Browser.
Vesna Hassler, O. Then
1998Detecting Anomalous and Unknown Intrusions Against Programs.
Anup K. Ghosh, James Wanken, Frank Charron
1998Electronic Submission Protocol Based on Temporal Accountability.
Michiharu Kudo
1998How to Increase Security in Mobile Networks by Anomaly Detection.
Roland Büschkes, Dogan Kesdogan, Peter Reichl
1998ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System.
Yuh-Min Tseng, Jinn-ke Jan
1998Intrusion Detection Applying Machine Learning to Solaris Audit Data.
D. Endler
1998Maintaining Security in Firm Real-Time Database Systems.
Quazi N. Ahmed, Susan V. Vrbsky
1998Modeling Secure and Fair Electronic Commerce.
Alexander W. Röhm, Günther Pernul, Gaby Herrmann
1998Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model.
Kathrin Schier
1998Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication.
Tasneem G. Brutch, Paul C. Brutch
1998NetSTAT: A Network-Based Intrusion Detection Approach.
Giovanni Vigna, Richard A. Kemmerer
1998Private Desktops and Shared Store.
Bryony Pomeroy, Simon R. Wiseman
1998Protecting Web Servers from Security Holes in Server-Side Includes.
Jared Karro, Jie Wang
1998Role-Based Access Control Framework for Network Enterprises.
D. J. Thomsen, D. O'Brien, J. Bogle
1998Rule-Based Filtering for Java Applets.
Pietro Iglio, Fausto Fraticelli, Luigi Giuri
1998Secure Signaling and Access Control for ATM Networks.
Rajan Shankaran, Vijay Varadharajan
1998Security Architecture for a Virtual Heterogeneous Machine.
Roger Wright, David J. Shifflett, Cynthia E. Irvine
1998Security Services in an Open Service Environment.
Reiner Sailer
1998Selection Criteria for Intrusion Detection Systems.
Edward Amoroso, R. Kwapniewski
1998The RRA97 Model for Role-Based Administration of Role Hierarchies.
Ravi S. Sandhu, Qamar Munawer
1998The Solar Trust Model: Authentication Without Limitation.
Michael Clifford, C. Lavine, Matt Bishop
1998Towards an Infrastructure for MLS Distributed Computing.
Myong H. Kang, Judith N. Froscher, Brian J. Eppinger
1998Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata.
Chang N. Zhang, Ming Y. Deng, Ralph Mason
1998Wachet auf! Computer Security and the Millenium.
F. C. Smith, D. J. Bailey