CCS A*

32 papers

YearTitle / Authors
1994"Mainstreaming" Automated Information Systems Security Engineering (a case study in security run amok).
James W. Coyne, Norman C. Kluksdahl
1994A Key Distribution Method for Object-Based Protection.
Warwick Ford, Michael J. Wiener
1994A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss
1994A Temporal Authorization Model.
Elisa Bertino, Claudio Bettini, Pierangela Samarati
1994An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
Paul Ammann, Sushil Jajodia
1994An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis.
Randy Browne
1994Anonymous Credit Cards.
Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk
1994Application Access Control at Network Level.
Refik Molva, Erich Rütsche
1994Authentication Codes That Are
Leonid M. Tombak, Reihaneh Safavi-Naini
1994CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994.
Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu
1994Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini
1994Endorsements, Licensing, and Insurance for Distributed System Services.
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
1994Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500.
Marjan Jurecic, Herbert Bunz
1994How to Break Gifford's Cipher (extended abstract).
Thomas R. Cain, Alan T. Sherman
1994How to Simultaneously Exchange Secrets by General Assumptions.
Tatsuaki Okamoto, Kazuo Ohta
1994Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria.
M. Zhang, Stafford E. Tavares, L. Lorne Campbell
1994Meta-ElGamal Signature Schemes.
Patrick Horster, Holger Petersen, Markus Michels
1994Network Security Probe.
P. Rolin, Laurent Toutain, Sylvain Gombault
1994New Protocols for Third-Party-Based Authentication and Secure Broadcast.
Li Gong
1994On Key Distribution via True Broadcasting.
Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot
1994Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
Paul C. van Oorschot, Michael J. Wiener
1994Prerequisite Confidentiality.
John P. Nestor, E. S. Lee
1994Propagation of Authorizations in Distributed Database Systems.
Pierangela Samarati, Paul Ammann, Sushil Jajodia
1994Protocol Failure in the Escrowed Encryption Standard.
Matt Blaze
1994Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
Michael K. Reiter
1994Secure Wireless LANs.
Vaduvur Bharghavan
1994Security Modelling for Organisations.
Alison Anderson, Dennis Longley, Lam-for Kwok
1994Support for the File System Security Requirements of Computational E-Mail Systems.
Trent Jaeger, Atul Prakash
1994The Compatibility of Policies.
Heather M. Hinton, E. Stewart Lee
1994The Design and Implementation of Tripwire: A File System Integrity Checker.
Gene H. Kim, Eugene H. Spafford
1994The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
Howard M. Heys, Stafford E. Tavares
1994Towards Acceptable Key Escrow Systems.
Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann