ACSAC A

43 papers

YearTitle / Authors
200016th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA
2000A Flexible Access Control Service for Java Mobile Code.
Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman
2000A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux.
Thomas E. Daniels, Eugene H. Spafford
2000A Novel Approach to On-Line Status Authentication of Public-Key Certificates.
Eugenio Faldella, Marco Prandini
2000A Policy-based Access Control Mechanism for the Corporate Web.
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
2000A Reliable, Scalable General-Purpose Certificate Store.
Peter Gutmann
2000A Self-Extension Monitoring for Security Management.
Heejin Jang, Sangwook Kim
2000An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor.
Murat Aydos, Tugrul Yanik, Çetin Kaya Koç
2000Applications in Health Care using Public-Key Certificates and Attribute Certificates.
Petra Wohlmacher, Peter Pharow
2000Binding Identities and Attributes using Digitally Signed Certificates.
Joon S. Park, Ravi S. Sandhu
2000Calculating Costs for Quality of Security Service.
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine
2000Denial of Service Protection - The Nozzle.
E. Strother
2000Dynamic Access Control through Petri Net Workflows.
Konstantin Knorr
2000Efficient Commerce Protocols based on One-Time Pads.
Michael A. Schneider, Edward W. Felten
2000Enabling Secure On-Line DNS Dynamic Update.
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine
2000Experience with Software Watermarking.
Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang
2000Extending Java for Package based Access Control.
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
2000Fair On-line Gambling.
Weiliang Zhao, Vijay Varadharajan, Yi Mu
2000Framework for Role-based Delegation Models.
Ezedin Barka, Ravi S. Sandhu
2000History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control.
Reiner Sailer, Matthias Kabatnik
2000ITS4: A Static Vulnerability Scanner for C and C++ Code.
John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
2000Implementing Security Policies using the Safe Areas of Computation Approach.
André L. M. dos Santos, Richard A. Kemmerer
2000Introducing Decryption Authority into PKI.
Feng Bao
2000Layering Boundary Protections: An Experiment in Information Assurance.
Dale M. Johnson, Lee A. Benzinger
2000Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness.
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
2000On Computer Viral Infection and the Effect of Immunization.
Chenxi Wang, John C. Knight, Matthew C. Elder
2000Personal Security Environment on Palm PDA.
Margus Freudenthal, Sven Heiberg, Jan Willemson
2000Policy Mediation for Multi-Enterprise Environments.
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
2000Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure.
Jeff Hayes
2000Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Kai Rannenberg, Giovanni Iachello
2000Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI).
Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta
2000Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture.
P. C. Clark, M. C. Meissner, K. O. Vance
2000Secure Smart Homes using Jini and UIUC SESAME.
Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell
2000Security Against Compelled Disclosure.
Ian Brown, B. Laurie
2000Security Agility in Response to Intrusion Detection.
Michael J. Petkac, Lee Badger
2000Security Architecture for Federated Cooperative Information Systems.
Pierre Bieber, D. Raujol, Pierre Siron
2000Security Architectures for Controlled Digital Information Dissemination.
Jaehong Park, Ravi S. Sandhu, J. Schifalacqua
2000The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip.
Johann Großschädl
2000Two State-based Approaches to Program-based Anomaly Detection.
Christoph C. Michael, Anup K. Ghosh
2000Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet.
Uwe Jendricke, Daniela Gerd tom Markotten
2000Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications.
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean
2000Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls.
Jeremy Epstein, Linda Thomas, Eric Monteith
2000Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking.
Germano Caronni, Sandeep Kumar, Christoph L. Schuba, Glenn Scott