ACSAC A

44 papers

YearTitle / Authors
199915th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA
1999A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls.
Rolf Oppliger, Andreas Greulich, Peter Trachsel
1999A Language for Modeling Secure Business Transactions.
Alexander W. Röhm, Gaby Herrmann, Günther Pernul
1999A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.
Mahesh V. Tripunitara, Partha Dutta
1999A Model of Certificate Revocation.
David A. Cooper
1999A Parallel Packet Screen for High Speed Networks.
Carsten Benecke
1999A Process State-Transition Analysis and Its Application to Intrusion Detection.
Nittida Nuansri, Samar Singh, Tharam S. Dillon
1999A Prototype Secure Workflow Server.
Douglas L. Long, Julie Baker, Francis Fung
1999A Resource Access Decision Service for CORBA-Based Distributed Systems.
Konstantin Beznosov, Yi Deng, Bob Blakley, Carol C. Burt, John F. Barkley
1999Adding Availability to Log Services of Untrusted Machines.
Arianna Arona, Danilo Bruschi, Emilia Rosti
1999An Application of Machine Learning to Network Intrusion Detection.
Chris Sinclair, Lyn Pierce, Sara Matzner
1999An Asynchronous Distributed Access Control Architecture for IP over ATM Networks.
Olivier Paul, Maryline Laurent, Sylvain Gombault
1999An Effective Defense Against First Party Attacks in Public-Key Algorithms.
Stephen M. Matyas, Allen Roginsky
1999Application-Level Isolation Using Data Inconsistency Detection.
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
1999Architecture and Concepts of the ARGuE Guard.
Jeremy Epstein
1999Design of LAN-Lock, A System for Securing Wireless Networks.
Richard E. Newman, Mark V. Hoyt, Tim Swanson, Phillipe Broccard, Mark Sanders, Joe Winner
1999Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services.
Marco Prandini
1999Fast Checking of Individual Certificate Revocation on Small Systems.
Selwyn Russell
1999Generic Support for PKIX Certificate Management in CDSA.
Shabnam Erfani, C. Sekar Chandersekaran
1999How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering).
Ross J. Anderson
1999Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
Ron Ross, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Blaine Burnham, Rayford B. Vaughn
1999Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel).
Arthur D. Friedman, Ellie Padgett, Mark Rasch, Scott Charney, John Thomas
1999Modular Fair Exchange Protocols for Electronic Commerce.
Holger Vogt, Henning Pagnia, Felix C. Gärtner
1999Napoleon: A Recipe for Workflow.
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien
1999Non-repudiation Evidence Generation for CORBA using XML.
Michael Wichert, David B. Ingham, Steve J. Caughey
1999Policy-Based Management: Bridging the Gap.
Susan Hinrichs
1999SAM: Security Adaptation Manager .
Heather M. Hinton, Crispin Cowan, Lois M. L. Delcambre, Shawn Bowers
1999SCR: A Practical Approach to Building a High Assurance COMSEC System.
James Kirby, Myla Archer, Constance L. Heitmeyer
1999Safe Areas of Computation for Secure Computing with Insecure Applications.
André L. M. dos Santos, Richard A. Kemmerer
1999SecurSight: An Architecture for Secure Information Access.
John G. Brainard
1999Secure Communications in ATM Networks.
Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos
1999Security Architecture Development and Results for a Distributed Modeling and Simulation System .
Richard B. Neely
1999Security Policy Coordination for Heterogeneous Information Systems.
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
1999Security Relevancy Analysis on the Registry of Windows NT 4.0.
Wenliang Du, Praerit Garg, Aditya P. Mathur
1999The ARBAC99 Model for Administration of Roles.
Ravi S. Sandhu, Qamar Munawer
1999Tools to Support Secure Enterprise Computing.
Myong H. Kang, Brian J. Eppinger, Judith N. Froscher
1999Toward a Taxonomy and Costing Method for Security Services.
Cynthia E. Irvine, Timothy E. Levin
1999Towards a Practical, Secure, and Very Large Scale Online Election.
Jared Karro, Jie Wang
1999Transactions in Java Card.
Marcus Oestreicher
1999TrustedBox: A Kernel-Level Integrity Checker.
Pietro Iglio
1999Trustworthy Access Control with Untrustworthy Web Servers.
Tim Wilkinson, Dave Hearn, Simon R. Wiseman
1999User Authentication and Authorization in the Java(tm) Platform.
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers
1999Using Abuse Case Models for Security Requirements Analysis.
John P. McDermott, Chris Fox
1999Using Checkable Types in Automatic Protocol Analysis.
Stephen H. Brackin