ACSAC A

48 papers

YearTitle / Authors
200117th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA
2001A Component-Based Architecture for Secure Data Publication.
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
2001A Framework for Multiple Authorization Types in a Healthcare Application System.
Ramaswamy Chandramouli
2001A JCA-Based Implementation Framework for Threshold Cryptography.
Yih Huang, David Rine, Xunhua Wang
2001A Regulated Approach to Certificate Management.
Victoria Ungureanu
2001A Security Model for Military Message Systems: Retrospective.
Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean
2001Abuse-Case-Based Assurance Arguments.
John P. McDermott
2001An Information Flow Tool for Gypsy.
John McHugh
2001Application Intrusion Detection using Language Library Calls.
Anita K. Jones, Yu Lin
2001Architecture and Applications for a Distributed Embedded Firewall.
Charles Payne, Tom Markham
2001Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
John E. Dobson, Brian Randell
2001CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59.
Albert Levi, Çetin Kaya Koç
2001Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless Networking.
Anna Entrichel, James Bergman, Jason Willis, Herb Little
2001DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications.
Peng Liu
2001Detecting Conflicts in a Role-Based Delegation Model.
Andreas Schaad
2001Determining Privileges of Mobile Agents.
Wayne A. Jansen
2001Enabling Hierarchical and Bulk-Distribution for Watermarked Content.
Germano Caronni, Christoph L. Schuba
2001Engineering of Role/Permission Assignments.
Pete Epstein, Ravi S. Sandhu
2001Experiences Implementing a Common Format for IDS Alerts.
Benjamin S. Feinstein, Gregory A. Matthews, Stuart Staniford, Andy Walther
2001Genoa TIE, Advanced Boundary Controller Experiment.
Eric Monteith
2001How Useful is Software Fault Injection for Evaluating the Security of COTS Products?
Matt Bishop, Anup K. Ghosh, James A. Whittaker
2001Implementing the Intrusion Detection Exchange Protocol.
Tim Buchheim, Michael Erlinger, Benjamin S. Feinstein, Gregory A. Matthews, Roy Pollock, Joseph Betser, Andy Walther
2001Information Flow Analysis of Component-Structured Applications.
Peter Herrmann
2001Information Security: Science, Pseudoscience, and Flying Pigs.
Roger R. Schell
2001Introduction to Classic Papers.
Dan Thomsen
2001IntruDetector: A Software Platform for Testing Network Intrusion Detection Algorithms.
Tao Wan, Xue Dong Yang
2001Java Security Extensions for a Java Server in a Hostile Environment.
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong
2001Managing Alerts in a Multi-Intrusion Detection Environmen.
Frédéric Cuppens
2001Mining Alarm Clusters to Improve Alarm Handling Efficiency.
Klaus Julisch
2001Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing.
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, Michael Frentz
2001Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions.
Valentin Razmov, Daniel R. Simon
2001Privacy-Preserving Cooperative Statistical Analysis.
Wenliang Du, Mikhail J. Atallah
2001Requirements for a General Framework for Response to Distributed Denial-of-Service.
D. W. Gresty, Qi Shi, Madjid Merabti
2001Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading.
James M. Hayes
2001Secure Anonymous Group Infrastructure for Common and Future Internet Applications.
Nathalie Weiler
2001Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server.
Ronald Mraz
2001Securing Web Servers against Insider Attack .
Shan Jiang, Sean W. Smith, Kazuhiro Minami
2001Security Policy Enforcement at the File System Level in the Windows NT Operating System Family.
Stephen D. Wolthusen
2001Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned.
Ron Gula, Gene Kim, Chris Klaus, Paul Proctor
2001Temporal Signatures for Intrusion Detection.
Anita Jones, Song Li
2001The Authorization Service of Tivoli Policy Director.
Günter Karjoth
2001The Performance Measurement of Cryptographic Primitives on Palm Devices.
Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
2001Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care.
Bernd Blobel
2001Verifiable Identifiers in Middleware Security.
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
2001Watcher: The Missing Piece of the Security Puzzle.
John C. Munson, Scott Wimer
2001Why Information Security is Hard-An Economic Perspective.
Ross J. Anderson
2001Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce.
Paul Ashley, Heather M. Hinton, Mark Vandenwauver
2001eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris.
Ulf Lindqvist, Phillip A. Porras