Workshop on New Security Paradigms C

14 papers

YearTitle / Authors
1998A Graph-based System for Network-vulnerability Analysis.
Cynthia A. Phillips, Laura Painton Swiler
1998A New Model for Availability in the Face of Self-Propagating Attacks.
Meng-Jang Lin, Aleta Ricciardi, Keith Marzullo
1998An Integrated Framework for Security and Dependability.
Erland Jonsson
1998Death, Taxes, and Imperfact Software: Surviving the Inevitable.
Crispin Cowan, Calton Pu
1998Discussion Topic: What is the Old Security Paradigm?
Steven J. Greenwald
1998Evaluating System Integrity.
Simon N. Foley
1998Meta Objects for Access Control: a Formal Model for Role-Based Principals.
Thomas Riechmann, Franz J. Hauck
1998Parsimonious Downgrading and Decision Trees Applied to the Inference Problem.
Liwu Chang, Ira S. Moskowitz
1998Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks.
John P. McDermott
1998Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998
Bob Blakley, Darrell M. Kienzle, Mary Ellen Zurko, Steven J. Greenwald
1998Security Engineering in an Evolutionary Acquisition Environment.
Marshall D. Abrams
1998Server-Assisted Cryptography.
Donald Beaver
1998Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration.
Clifford E. Kahn
1998Toward a Secure System Engineering Methodolgy.
Chris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner