ACSAC A

42 papers

YearTitle / Authors
200218th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA
2002A Context-Aware Security Architecture for Emerging Applications.
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad
2002A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard.
Andrew D. Marshall
2002A Framework for Organisational Control Principles.
Andreas Schaad, Jonathan D. Moffett
2002A Model for Attribute-Based User-Role Assignment.
Mohammad A. Al-Kahtani, Ravi S. Sandhu
2002A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later.
Richard A. Kemmerer
2002A Secure Directory Service based on Exclusive Encryption.
John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval
2002A Security Architecture for Object-Based Distributed Systems.
Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum
2002A Toolkit for Detecting and Analyzing Malicious Software.
Michael Weber, Matthew Schmid, Michael Schatz, David Geyer
2002Access Control for Active Spaces.
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell
2002Advanced Features for Enterprise-Wide Role-Based Access Control.
Axel Kern
2002Architectures for Intrusion Tolerant Database Systems.
Peng Liu
2002Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks.
John Haggerty, Qi Shi, Madjid Merabti
2002Composable Tools For Network Discovery and Security Analysis.
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer
2002Controlled Physical Random Functions.
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
2002Detecting and Defending against Web-Server Fingerprinting.
Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
2002Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision.
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett
2002Digging For Worms, Fishing For Answers.
Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith
2002Enforcing Resource Bound Safety for Mobile SNMP Agents.
Weijiang Yu, Aloysius K. Mok
2002Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA Patterns.
Duane Hybertson, A. Reedy, S. Chapin, M. Kirwan Jr.
2002Evaluating the Impact of Automated Intrusion Response Mechanisms.
Thomas Toth, Christopher Krügel
2002GOSSIB vs. IP Traceback Rumors.
Marcel Waldvogel
2002Gender-Preferential Text Mining of E-mail Discourse.
Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay
2002Intrusion Detection: Current Capabilities and Future Directions.
Karl N. Levitt
2002LOCK : An Historical Perspective.
O. Sami Saydjari
2002Malicious Code Detection for Open Firmware.
Frank Adelstein, Matthew Stillerman, Dexter Kozen
2002Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network.
Michael Clifford
2002Penetration Testing: A Duet.
Daniel E. Geer Jr., John Harthorne
2002Protecting Data from Malicious Software.
Matthew Schmid, Frank Hill, Anup K. Ghosh
2002Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption.
Donghua Xu, Chenghuai Lu, André L. M. dos Santos
2002Regulating E-Commerce through Certified Contracts.
Victoria Ungureanu
2002Representing TCP/IP Connectivity For Topological Analysis of Network Security.
Ronald W. Ritchey, Brian O'Berry, Steven Noel
2002Reusable Components for Developing Security-Aware Application.
Stefan Probst, Wolfgang Eßmayr, Edgar R. Weippl
2002Safe Virtual Execution Using Software Dynamic Translation.
Kevin Scott, Jack W. Davidson
2002Security Architecture of the Austrian Citizen Card Concept.
Herbert Leitold, Arno Hollosi, Reinhard Posch
2002Security of Internet Location Management.
Tuomas Aura, Michael Roe, Jari Arkko
2002Themes and Highlights of the New Security Paradigms Workshop 2002.
Cristina Serban, O. Sami Saydjari
2002Thirty Years Later: Lessons from the Multics Security Evaluation.
Paul A. Karger, Roger R. Schell
2002Throttling Viruses: Restricting propagation to defeat malicious mobile code.
Matthew M. Williamson
2002Voice over IPsec: Analysis and Solutions.
Roberto Barbieri, Danilo Bruschi, Emilia Rosti
2002Wireless Security: Vulnerabilities and Countermeasures.
Dale M. Johnson
2002With Gaming Technology towards Secure User Interfaces.
Hanno Langweg