USENIX Security Symposium A*

19 papers

YearTitle / Authors
1999A Secure Station for Network Monitoring and Control.
Vassilis Prevelakis
1999A Study in Using Neural Networks for Anomaly and Misuse Detection.
Anup K. Ghosh, Aaron Schwartzbard
1999Antigone: A Flexible Framework for Secure Group Communication.
Patrick D. McDaniel, Atul Prakash, Peter Honeyman
1999Brute Force Attack on UNIX Passwords with SIMD Computer.
Gershon Kedem, Yuriko Ishihara
1999Building Intrusion-Tolerant Applications.
Thomas D. Wu, Michael Malkin, Dan Boneh
1999Certificate-based Access Control for Widely Distributed Resources.
Mary R. Thompson, William E. Johnston, Srilekha Mudumbai, Gary Hoo, Keith R. Jackson, Abdelilah Essiari
1999Digital-Ticket-Controlled Digital Ticket Circulation.
Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine
1999Enforcing Well-Formed and Partially-Formed Transactions for UNIX.
Dean Povey
1999Hand-Held Computers Can Be Better Smart Cards.
Dirk Balfanz, Edward W. Felten
1999Jonah: Experience Implementing PKIX Reference Freeware.
Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin
1999Offline Delegation.
Arne Helme, Tage Stabell-Kulø
1999Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999
G. Winfield Treese
1999Scalable Access Control for Distributed Object Systems.
Daniel F. Sterne, Gregg Tally, C. Durward McDonell, David L. Sherman, David Sames, Pierre X. Pasturel, E. John Sebes
1999Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications.
R. Sekar, Prem Uppuluri
1999The Design and Analysis of Graphical Passwords.
Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin
1999The Design of a Cryptographic Security Architecture.
Peter Gutmann
1999The Flask Security Architecture: System Support for Diverse Security Policies.
Ray Spencer, Stephen Smalley, Peter A. Loscocco, Mike Hibler, Dave G. Andersen, Jay Lepreau
1999Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories.
Tse Huong Choo
1999Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0.
Alma Whitten, J. Doug Tygar