default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/acsac1999.bht:"
@inproceedings{DBLP:conf/acsac/Anderson99, author = {Ross J. Anderson}, title = {How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering)}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816007}, doi = {10.1109/CSAC.1999.816007}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Anderson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AronaBR99, author = {Arianna Arona and Danilo Bruschi and Emilia Rosti}, title = {Adding Availability to Log Services of Untrusted Machines}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {199--206}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816028}, doi = {10.1109/CSAC.1999.816028}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AronaBR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Benecke99, author = {Carsten Benecke}, title = {A Parallel Packet Screen for High Speed Networks}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {67--74}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816014}, doi = {10.1109/CSAC.1999.816014}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Benecke99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BeznosovDBBB99, author = {Konstantin Beznosov and Yi Deng and Bob Blakley and Carol C. Burt and John F. Barkley}, title = {A Resource Access Decision Service for CORBA-Based Distributed Systems}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {310--319}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816041}, doi = {10.1109/CSAC.1999.816041}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BeznosovDBBB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Brackin99, author = {Stephen H. Brackin}, title = {Using Checkable Types in Automatic Protocol Analysis}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {99--108}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816017}, doi = {10.1109/CSAC.1999.816017}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Brackin99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Brainard99, author = {John G. Brainard}, title = {SecurSight: An Architecture for Secure Information Access}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {349--357}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816046}, doi = {10.1109/CSAC.1999.816046}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Brainard99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BurnhamIRSV99, author = {Ron Ross and Cynthia E. Irvine and Charles Reynolds and Ravi S. Sandhu and Blaine Burnham and Rayford B. Vaughn}, title = {Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum)}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {265}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.1999.10007}, doi = {10.1109/ACSAC.1999.10007}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BurnhamIRSV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CharneyPRT99, author = {Arthur D. Friedman and Ellie Padgett and Mark Rasch and Scott Charney and John Thomas}, title = {Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel)}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {299--302}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.1999.10004}, doi = {10.1109/ACSAC.1999.10004}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CharneyPRT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Cooper99, author = {David A. Cooper}, title = {A Model of Certificate Revocation}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {256--264}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816035}, doi = {10.1109/CSAC.1999.816035}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Cooper99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DuGM99, author = {Wenliang Du and Praerit Garg and Aditya P. Mathur}, title = {Security Relevancy Analysis on the Registry of Windows {NT} 4.0}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {331--338}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816044}, doi = {10.1109/CSAC.1999.816044}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DuGM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Epstein99, author = {Jeremy Epstein}, title = {Architecture and Concepts of the ARGuE Guard}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {45--54}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816012}, doi = {10.1109/CSAC.1999.816012}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Epstein99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ErfaniC99, author = {Shabnam Erfani and C. Sekar Chandersekaran}, title = {Generic Support for {PKIX} Certificate Management in {CDSA}}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {269--275}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816036}, doi = {10.1109/CSAC.1999.816036}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ErfaniC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FayadJM99, author = {Amgad Fayad and Sushil Jajodia and Catherine D. McCollum}, title = {Application-Level Isolation Using Data Inconsistency Detection}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816019}, doi = {10.1109/CSAC.1999.816019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FayadJM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HaleGPS99, author = {John Hale and Pablo Galiasso and Mauricio Papa and Sujeet Shenoi}, title = {Security Policy Coordination for Heterogeneous Information Systems}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {219--228}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816031}, doi = {10.1109/CSAC.1999.816031}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HaleGPS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Hinrichs99, author = {Susan Hinrichs}, title = {Policy-Based Management: Bridging the Gap}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {209--218}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816030}, doi = {10.1109/CSAC.1999.816030}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Hinrichs99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HintonCDB99, author = {Heather M. Hinton and Crispin Cowan and Lois M. L. Delcambre and Shawn Bowers}, title = {{SAM:} Security Adaptation Manager}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {361--370}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816047}, doi = {10.1109/CSAC.1999.816047}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HintonCDB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Iglio99, author = {Pietro Iglio}, title = {TrustedBox: {A} Kernel-Level Integrity Checker}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {189--198}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816027}, doi = {10.1109/CSAC.1999.816027}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Iglio99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/IrvineL99, author = {Cynthia E. Irvine and Timothy E. Levin}, title = {Toward a Taxonomy and Costing Method for Security Services}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {183--188}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816026}, doi = {10.1109/CSAC.1999.816026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/IrvineL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KangEF99, author = {Myong H. Kang and Brian J. Eppinger and Judith N. Froscher}, title = {Tools to Support Secure Enterprise Computing}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {143--152}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816022}, doi = {10.1109/CSAC.1999.816022}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KangEF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KarroW99, author = {Jared Karro and Jie Wang}, title = {Towards a Practical, Secure, and Very Large Scale Online Election}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {161--169}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816024}, doi = {10.1109/CSAC.1999.816024}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KarroW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KirbyAH99, author = {James Kirby and Myla Archer and Constance L. Heitmeyer}, title = {{SCR:} {A} Practical Approach to Building a High Assurance {COMSEC} System}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {109--118}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816018}, doi = {10.1109/CSAC.1999.816018}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KirbyAH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LaiGKNS99, author = {Charlie Lai and Li Gong and Larry Koved and Anthony J. Nadalin and Roland Schemers}, title = {User Authentication and Authorization in the Java(tm) Platform}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {285--290}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816038}, doi = {10.1109/CSAC.1999.816038}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LaiGKNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LaurentBDLPAM99, author = {Maryline Laurent and Ahmed Bouabdallah and Christophe Delahaye and Herbert Leitold and Reinhard Posch and Enrique Areizaga and Ju{\`{a}}n Manuel Mateos}, title = {Secure Communications in {ATM} Networks}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {84--93}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816016}, doi = {10.1109/CSAC.1999.816016}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LaurentBDLPAM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LongBF99, author = {Douglas L. Long and Julie Baker and Francis Fung}, title = {A Prototype Secure Workflow Server}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {129--133}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816020}, doi = {10.1109/CSAC.1999.816020}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LongBF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MatyasR99, author = {Stephen M. Matyas and Allen Roginsky}, title = {An Effective Defense Against First Party Attacks in Public-Key Algorithms}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {155--160}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816023}, doi = {10.1109/CSAC.1999.816023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MatyasR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottF99, author = {John P. McDermott and Chris Fox}, title = {Using Abuse Case Models for Security Requirements Analysis}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {55--64}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816013}, doi = {10.1109/CSAC.1999.816013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermottF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Neely99, author = {Richard B. Neely}, title = {Security Architecture Development and Results for a Distributed Modeling and Simulation System}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {341--348}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816045}, doi = {10.1109/CSAC.1999.816045}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Neely99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NewmanHSBSW99, author = {Richard E. Newman and Mark V. Hoyt and Tim Swanson and Phillipe Broccard and Mark Sanders and Joe Winner}, title = {Design of LAN-Lock, {A} System for Securing Wireless Networks}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {170--177}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816025}, doi = {10.1109/CSAC.1999.816025}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NewmanHSBSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NuansriSD99, author = {Nittida Nuansri and Samar Singh and Tharam S. Dillon}, title = {A Process State-Transition Analysis and Its Application to Intrusion Detection}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {378--387}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816050}, doi = {10.1109/CSAC.1999.816050}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NuansriSD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Oestreicher99, author = {Marcus Oestreicher}, title = {Transactions in Java Card}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {291--298}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816039}, doi = {10.1109/CSAC.1999.816039}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Oestreicher99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OppligerGT99, author = {Rolf Oppliger and Andreas Greulich and Peter Trachsel}, title = {A Distributed Certificate Management System {(DCMS)} Supporting Group-Based Access Controls}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {241--248}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816033}, doi = {10.1109/CSAC.1999.816033}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OppligerGT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PaulLG99, author = {Olivier Paul and Maryline Laurent and Sylvain Gombault}, title = {An Asynchronous Distributed Access Control Architecture for {IP} over {ATM} Networks}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {75--83}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816015}, doi = {10.1109/CSAC.1999.816015}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PaulLG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PayneTBO99, author = {Charles N. Payne and D. J. Thomsen and J. Bogle and Richard C. O'Brien}, title = {Napoleon: {A} Recipe for Workflow}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {134--142}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816021}, doi = {10.1109/CSAC.1999.816021}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PayneTBO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Prandini99, author = {Marco Prandini}, title = {Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {276--281}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816037}, doi = {10.1109/CSAC.1999.816037}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Prandini99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RohmHP99, author = {Alexander W. R{\"{o}}hm and Gaby Herrmann and G{\"{u}}nther Pernul}, title = {A Language for Modeling Secure Business Transactions}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {22--31}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816010}, doi = {10.1109/CSAC.1999.816010}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RohmHP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Russell99, author = {Selwyn Russell}, title = {Fast Checking of Individual Certificate Revocation on Small Systems}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {249--255}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816034}, doi = {10.1109/CSAC.1999.816034}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Russell99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SandhuM99, author = {Ravi S. Sandhu and Qamar Munawer}, title = {The {ARBAC99} Model for Administration of Roles}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {229--238}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816032}, doi = {10.1109/CSAC.1999.816032}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SandhuM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SantosK99, author = {Andr{\'{e}} L. M. dos Santos and Richard A. Kemmerer}, title = {Safe Areas of Computation for Secure Computing with Insecure Applications}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {35--44}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816011}, doi = {10.1109/CSAC.1999.816011}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SantosK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SinclairPM99, author = {Chris Sinclair and Lyn Pierce and Sara Matzner}, title = {An Application of Machine Learning to Network Intrusion Detection}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {371--377}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816048}, doi = {10.1109/CSAC.1999.816048}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SinclairPM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TripunitaraD99, author = {Mahesh V. Tripunitara and Partha Dutta}, title = {A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of {ARP} Cache Poisoning}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {303--309}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816040}, doi = {10.1109/CSAC.1999.816040}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TripunitaraD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VogtPG99, author = {Holger Vogt and Henning Pagnia and Felix C. G{\"{a}}rtner}, title = {Modular Fair Exchange Protocols for Electronic Commerce}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {3--11}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816008}, doi = {10.1109/CSAC.1999.816008}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VogtPG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WichertIC99, author = {Michael Wichert and David B. Ingham and Steve J. Caughey}, title = {Non-repudiation Evidence Generation for {CORBA} using {XML}}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {320--327}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816043}, doi = {10.1109/CSAC.1999.816043}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WichertIC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WilkinsonHW99, author = {Tim Wilkinson and Dave Hearn and Simon R. Wiseman}, title = {Trustworthy Access Control with Untrustworthy Web Servers}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {12--21}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816009}, doi = {10.1109/CSAC.1999.816009}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WilkinsonHW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/1999, title = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://ieeexplore.ieee.org/xpl/conhome/6631/proceeding}, isbn = {0-7695-0346-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.