ACSAC A

44 papers

YearTitle / Authors
200319th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA
2003A Failure to Learn from the Past.
Eugene H. Spafford
2003A Multi-View Tool for Checking the Security Semantics of Router Configurations.
Holger Peine, Reinhard Schwarz
2003A Policy Validation Framework for Enterprise Authorization Specification.
Ramaswamy Chandramouli
2003A Stateful Intrusion Detection System for World-Wide Web Servers.
Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer
2003An Editor for Adaptive XML-Based Policy Management of IPsec.
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
2003An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
Darren Mutz, Giovanni Vigna, Richard A. Kemmerer
2003An IP Traceback Technique against Denial-of-Service Attacks.
Zhaole Chen, Moon-Chuen Lee
2003An Intrusion-Tolerant Password Authentication System.
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
2003Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS.
Nathan Carey, George M. Mohay, Andrew J. Clark
2003Automated Analysis for Digital Forensic Science: Semantic Integrity Checking.
Tye Stallard, Karl N. Levitt
2003Automatic Reassembly of Document Fragments via Context Based Statistical Models.
Kulesh Shanmugasundaram, Nasir D. Memon
2003Bayesian Event Classification for Intrusion Detection.
Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
2003Behavioral Authentication of Server Flows.
James P. Early, Carla E. Brodley, Catherine Rosenberg
2003Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS.
Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi
2003Defending Embedded Systems Against Buffer Overflow via Hardware/Software.
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha
2003Design, Implementation and Test of an Email Virus Throttle.
Matthew M. Williamson
2003Differential Data Protection for Dynamic Distributed Application.
Patrick M. Widener, Karsten Schwan, Fabián E. Bustamante
2003Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs.
Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs
2003Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model.
Jacob Zimmermann, Ludovic Mé, Christophe Bidan
2003Forum Session: Security for Wireless Sensor Networks.
David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro
2003Goalkeeper: Close-In Interface Protection.
Stephen D. Wolthusen
2003Honeypots: Catching the Insider Threat.
Lance Spitzner
2003How to unwittingly sign non-repudiable documents with Java applications.
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
2003Intrusion Detection: A Bioinformatics Approach.
Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer
2003Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
2003Log Correlation for Intrusion Detection: A Proof of Concept.
Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe
2003MLS-PCA: A High Assurance Security Architecture for Future Avionics.
Clark Weissman
2003Making Secure TCP Connections Resistant to Server Failures.
Hailin Wu, Andrew Burt, Ramki Thurimella
2003Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem.
Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem G. Brutch
2003Modeling of Multiple Agent based Cryptographic Key Recovery Protocol.
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn
2003Modelling Contexts in the Or-BAC Model.
Frédéric Cuppens, Alexandre Miège
2003Multi-Version Attack Recovery for Workflow System.
Meng Yu, Peng Liu, Wanyu Zang
2003PSOS Revisited.
Peter G. Neumann, Richard J. Feiertag
2003Poly2 Paradigm: A Secure Network Service Architecture.
Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost
2003Practical Random Number Generation in Software.
John Viega
2003Protecting Personal Data: Can IT Security Management Standards Help?
Giovanni Iachello
2003S-ARP: a Secure Address Resolution Protocol.
Danilo Bruschi, A. Ornaghi, Emilia Rosti
2003Scalable and Efficient PKI for Inter-Organizational Communication.
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson
2003Security Analysis of the SAML Single Sign-on Browser/Artifact Profile.
Thomas Groß
2003Security Design in Online Games.
Jeff Jianxin Yan
2003Synthesizing Test Data for Fraud Detection Systems.
Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson
2003Themes and Highlights of the New Security Paradigms Workshop 2003.
O. Sami Saydjari, Carla Marceau
2003Usable Access Control for the World Wide Web.
Dirk Balfanz