Search dblp for Publications

export results for "toc:db/conf/acsac/acsac1999.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/Anderson99,
  author       = {Ross J. Anderson},
  title        = {How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering)},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816007},
  doi          = {10.1109/CSAC.1999.816007},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Anderson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AronaBR99,
  author       = {Arianna Arona and
                  Danilo Bruschi and
                  Emilia Rosti},
  title        = {Adding Availability to Log Services of Untrusted Machines},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {199--206},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816028},
  doi          = {10.1109/CSAC.1999.816028},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AronaBR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Benecke99,
  author       = {Carsten Benecke},
  title        = {A Parallel Packet Screen for High Speed Networks},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {67--74},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816014},
  doi          = {10.1109/CSAC.1999.816014},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Benecke99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BeznosovDBBB99,
  author       = {Konstantin Beznosov and
                  Yi Deng and
                  Bob Blakley and
                  Carol C. Burt and
                  John F. Barkley},
  title        = {A Resource Access Decision Service for CORBA-Based Distributed Systems},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {310--319},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816041},
  doi          = {10.1109/CSAC.1999.816041},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BeznosovDBBB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Brackin99,
  author       = {Stephen H. Brackin},
  title        = {Using Checkable Types in Automatic Protocol Analysis},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {99--108},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816017},
  doi          = {10.1109/CSAC.1999.816017},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Brackin99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Brainard99,
  author       = {John G. Brainard},
  title        = {SecurSight: An Architecture for Secure Information Access},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {349--357},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816046},
  doi          = {10.1109/CSAC.1999.816046},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Brainard99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BurnhamIRSV99,
  author       = {Ron Ross and
                  Cynthia E. Irvine and
                  Charles Reynolds and
                  Ravi S. Sandhu and
                  Blaine Burnham and
                  Rayford B. Vaughn},
  title        = {Information Security Education for the Next Millennium: Building the
                  Next Generation of Practitioners (Forum)},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {265},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.1999.10007},
  doi          = {10.1109/ACSAC.1999.10007},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BurnhamIRSV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CharneyPRT99,
  author       = {Arthur D. Friedman and
                  Ellie Padgett and
                  Mark Rasch and
                  Scott Charney and
                  John Thomas},
  title        = {Legal and Technical Responses to Protecting the U. S. Critical Infrastructures
                  (Panel)},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {299--302},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.1999.10004},
  doi          = {10.1109/ACSAC.1999.10004},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CharneyPRT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Cooper99,
  author       = {David A. Cooper},
  title        = {A Model of Certificate Revocation},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {256--264},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816035},
  doi          = {10.1109/CSAC.1999.816035},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Cooper99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DuGM99,
  author       = {Wenliang Du and
                  Praerit Garg and
                  Aditya P. Mathur},
  title        = {Security Relevancy Analysis on the Registry of Windows {NT} 4.0},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {331--338},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816044},
  doi          = {10.1109/CSAC.1999.816044},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DuGM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Epstein99,
  author       = {Jeremy Epstein},
  title        = {Architecture and Concepts of the ARGuE Guard},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {45--54},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816012},
  doi          = {10.1109/CSAC.1999.816012},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Epstein99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ErfaniC99,
  author       = {Shabnam Erfani and
                  C. Sekar Chandersekaran},
  title        = {Generic Support for {PKIX} Certificate Management in {CDSA}},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {269--275},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816036},
  doi          = {10.1109/CSAC.1999.816036},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ErfaniC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FayadJM99,
  author       = {Amgad Fayad and
                  Sushil Jajodia and
                  Catherine D. McCollum},
  title        = {Application-Level Isolation Using Data Inconsistency Detection},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816019},
  doi          = {10.1109/CSAC.1999.816019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FayadJM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HaleGPS99,
  author       = {John Hale and
                  Pablo Galiasso and
                  Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Security Policy Coordination for Heterogeneous Information Systems},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {219--228},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816031},
  doi          = {10.1109/CSAC.1999.816031},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HaleGPS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Hinrichs99,
  author       = {Susan Hinrichs},
  title        = {Policy-Based Management: Bridging the Gap},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {209--218},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816030},
  doi          = {10.1109/CSAC.1999.816030},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Hinrichs99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HintonCDB99,
  author       = {Heather M. Hinton and
                  Crispin Cowan and
                  Lois M. L. Delcambre and
                  Shawn Bowers},
  title        = {{SAM:} Security Adaptation Manager},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {361--370},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816047},
  doi          = {10.1109/CSAC.1999.816047},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HintonCDB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Iglio99,
  author       = {Pietro Iglio},
  title        = {TrustedBox: {A} Kernel-Level Integrity Checker},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {189--198},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816027},
  doi          = {10.1109/CSAC.1999.816027},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Iglio99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/IrvineL99,
  author       = {Cynthia E. Irvine and
                  Timothy E. Levin},
  title        = {Toward a Taxonomy and Costing Method for Security Services},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {183--188},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816026},
  doi          = {10.1109/CSAC.1999.816026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/IrvineL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KangEF99,
  author       = {Myong H. Kang and
                  Brian J. Eppinger and
                  Judith N. Froscher},
  title        = {Tools to Support Secure Enterprise Computing},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {143--152},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816022},
  doi          = {10.1109/CSAC.1999.816022},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KangEF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarroW99,
  author       = {Jared Karro and
                  Jie Wang},
  title        = {Towards a Practical, Secure, and Very Large Scale Online Election},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {161--169},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816024},
  doi          = {10.1109/CSAC.1999.816024},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KarroW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KirbyAH99,
  author       = {James Kirby and
                  Myla Archer and
                  Constance L. Heitmeyer},
  title        = {{SCR:} {A} Practical Approach to Building a High Assurance {COMSEC}
                  System},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {109--118},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816018},
  doi          = {10.1109/CSAC.1999.816018},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KirbyAH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LaiGKNS99,
  author       = {Charlie Lai and
                  Li Gong and
                  Larry Koved and
                  Anthony J. Nadalin and
                  Roland Schemers},
  title        = {User Authentication and Authorization in the Java(tm) Platform},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {285--290},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816038},
  doi          = {10.1109/CSAC.1999.816038},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LaiGKNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LaurentBDLPAM99,
  author       = {Maryline Laurent and
                  Ahmed Bouabdallah and
                  Christophe Delahaye and
                  Herbert Leitold and
                  Reinhard Posch and
                  Enrique Areizaga and
                  Ju{\`{a}}n Manuel Mateos},
  title        = {Secure Communications in {ATM} Networks},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {84--93},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816016},
  doi          = {10.1109/CSAC.1999.816016},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LaurentBDLPAM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LongBF99,
  author       = {Douglas L. Long and
                  Julie Baker and
                  Francis Fung},
  title        = {A Prototype Secure Workflow Server},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {129--133},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816020},
  doi          = {10.1109/CSAC.1999.816020},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LongBF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MatyasR99,
  author       = {Stephen M. Matyas and
                  Allen Roginsky},
  title        = {An Effective Defense Against First Party Attacks in Public-Key Algorithms},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {155--160},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816023},
  doi          = {10.1109/CSAC.1999.816023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MatyasR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottF99,
  author       = {John P. McDermott and
                  Chris Fox},
  title        = {Using Abuse Case Models for Security Requirements Analysis},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816013},
  doi          = {10.1109/CSAC.1999.816013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Neely99,
  author       = {Richard B. Neely},
  title        = {Security Architecture Development and Results for a Distributed Modeling
                  and Simulation System},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {341--348},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816045},
  doi          = {10.1109/CSAC.1999.816045},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Neely99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NewmanHSBSW99,
  author       = {Richard E. Newman and
                  Mark V. Hoyt and
                  Tim Swanson and
                  Phillipe Broccard and
                  Mark Sanders and
                  Joe Winner},
  title        = {Design of LAN-Lock, {A} System for Securing Wireless Networks},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {170--177},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816025},
  doi          = {10.1109/CSAC.1999.816025},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NewmanHSBSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NuansriSD99,
  author       = {Nittida Nuansri and
                  Samar Singh and
                  Tharam S. Dillon},
  title        = {A Process State-Transition Analysis and Its Application to Intrusion
                  Detection},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {378--387},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816050},
  doi          = {10.1109/CSAC.1999.816050},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NuansriSD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Oestreicher99,
  author       = {Marcus Oestreicher},
  title        = {Transactions in Java Card},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {291--298},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816039},
  doi          = {10.1109/CSAC.1999.816039},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Oestreicher99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OppligerGT99,
  author       = {Rolf Oppliger and
                  Andreas Greulich and
                  Peter Trachsel},
  title        = {A Distributed Certificate Management System {(DCMS)} Supporting Group-Based
                  Access Controls},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {241--248},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816033},
  doi          = {10.1109/CSAC.1999.816033},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OppligerGT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PaulLG99,
  author       = {Olivier Paul and
                  Maryline Laurent and
                  Sylvain Gombault},
  title        = {An Asynchronous Distributed Access Control Architecture for {IP} over
                  {ATM} Networks},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {75--83},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816015},
  doi          = {10.1109/CSAC.1999.816015},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PaulLG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PayneTBO99,
  author       = {Charles N. Payne and
                  D. J. Thomsen and
                  J. Bogle and
                  Richard C. O'Brien},
  title        = {Napoleon: {A} Recipe for Workflow},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {134--142},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816021},
  doi          = {10.1109/CSAC.1999.816021},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PayneTBO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Prandini99,
  author       = {Marco Prandini},
  title        = {Efficient Certificate Status Handling Within PKIs: An Application
                  to Public Administration Services},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {276--281},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816037},
  doi          = {10.1109/CSAC.1999.816037},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Prandini99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RohmHP99,
  author       = {Alexander W. R{\"{o}}hm and
                  Gaby Herrmann and
                  G{\"{u}}nther Pernul},
  title        = {A Language for Modeling Secure Business Transactions},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {22--31},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816010},
  doi          = {10.1109/CSAC.1999.816010},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RohmHP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Russell99,
  author       = {Selwyn Russell},
  title        = {Fast Checking of Individual Certificate Revocation on Small Systems},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {249--255},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816034},
  doi          = {10.1109/CSAC.1999.816034},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Russell99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SandhuM99,
  author       = {Ravi S. Sandhu and
                  Qamar Munawer},
  title        = {The {ARBAC99} Model for Administration of Roles},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {229--238},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816032},
  doi          = {10.1109/CSAC.1999.816032},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SandhuM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SantosK99,
  author       = {Andr{\'{e}} L. M. dos Santos and
                  Richard A. Kemmerer},
  title        = {Safe Areas of Computation for Secure Computing with Insecure Applications},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {35--44},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816011},
  doi          = {10.1109/CSAC.1999.816011},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SantosK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SinclairPM99,
  author       = {Chris Sinclair and
                  Lyn Pierce and
                  Sara Matzner},
  title        = {An Application of Machine Learning to Network Intrusion Detection},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {371--377},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816048},
  doi          = {10.1109/CSAC.1999.816048},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SinclairPM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TripunitaraD99,
  author       = {Mahesh V. Tripunitara and
                  Partha Dutta},
  title        = {A Middleware Approach to Asynchronous and Backward Compatible Detection
                  and Prevention of {ARP} Cache Poisoning},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {303--309},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816040},
  doi          = {10.1109/CSAC.1999.816040},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TripunitaraD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VogtPG99,
  author       = {Holger Vogt and
                  Henning Pagnia and
                  Felix C. G{\"{a}}rtner},
  title        = {Modular Fair Exchange Protocols for Electronic Commerce},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {3--11},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816008},
  doi          = {10.1109/CSAC.1999.816008},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VogtPG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WichertIC99,
  author       = {Michael Wichert and
                  David B. Ingham and
                  Steve J. Caughey},
  title        = {Non-repudiation Evidence Generation for {CORBA} using {XML}},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {320--327},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816043},
  doi          = {10.1109/CSAC.1999.816043},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WichertIC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WilkinsonHW99,
  author       = {Tim Wilkinson and
                  Dave Hearn and
                  Simon R. Wiseman},
  title        = {Trustworthy Access Control with Untrustworthy Web Servers},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {12--21},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816009},
  doi          = {10.1109/CSAC.1999.816009},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WilkinsonHW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/1999,
  title        = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6631/proceeding},
  isbn         = {0-7695-0346-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}