Search dblp for Publications

export results for "toc:db/conf/acsac/acsac2001.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/Anderson01,
  author       = {Ross J. Anderson},
  title        = {Why Information Security is Hard-An Economic Perspective},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {358--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991552},
  doi          = {10.1109/ACSAC.2001.991552},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Anderson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AshleyHV01,
  author       = {Paul Ashley and
                  Heather M. Hinton and
                  Mark Vandenwauver},
  title        = {Wired versus Wireless Security: The Internet, {WAP} and iMode for
                  E-Commerce},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {296--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991545},
  doi          = {10.1109/ACSAC.2001.991545},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AshleyHV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BishopGW01,
  author       = {Matt Bishop and
                  Anup K. Ghosh and
                  James A. Whittaker},
  title        = {How Useful is Software Fault Injection for Evaluating the Security
                  of {COTS} Products?},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {339--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.2001.10009},
  doi          = {10.1109/ACSAC.2001.10009},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BishopGW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Blobel01,
  author       = {Bernd Blobel},
  title        = {Trustworthiness in Distributed Electronic Healthcare Records-Basis
                  for Shared Care},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {433--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991560},
  doi          = {10.1109/ACSAC.2001.991560},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Blobel01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BonattiDVS01,
  author       = {Piero A. Bonatti and
                  Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Component-Based Architecture for Secure Data Publication},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {309--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991546},
  doi          = {10.1109/ACSAC.2001.991546},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BonattiDVS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BuchheimEFMPBW01,
  author       = {Tim Buchheim and
                  Michael Erlinger and
                  Benjamin S. Feinstein and
                  Gregory A. Matthews and
                  Roy Pollock and
                  Joseph Betser and
                  Andy Walther},
  title        = {Implementing the Intrusion Detection Exchange Protocol},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {32--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991519},
  doi          = {10.1109/ACSAC.2001.991519},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BuchheimEFMPBW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaronniS01,
  author       = {Germano Caronni and
                  Christoph L. Schuba},
  title        = {Enabling Hierarchical and Bulk-Distribution for Watermarked Content},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {277--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991543},
  doi          = {10.1109/ACSAC.2001.991543},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaronniS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chandramouli01,
  author       = {Ramaswamy Chandramouli},
  title        = {A Framework for Multiple Authorization Types in a Healthcare Application
                  System},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {137--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991530},
  doi          = {10.1109/ACSAC.2001.991530},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Chandramouli01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Cuppens01,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Managing Alerts in a Multi-Intrusion Detection Environmen},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {22--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991518},
  doi          = {10.1109/ACSAC.2001.991518},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Cuppens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DobsonR01,
  author       = {John E. Dobson and
                  Brian Randell},
  title        = {Building Reliable Secure Computing Systems out of Unreliable Insecure
                  Components},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {164--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991534},
  doi          = {10.1109/ACSAC.2001.991534},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DobsonR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DuA01,
  author       = {Wenliang Du and
                  Mikhail J. Atallah},
  title        = {Privacy-Preserving Cooperative Statistical Analysis},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {102--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991526},
  doi          = {10.1109/ACSAC.2001.991526},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DuA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EntrichelBWL01,
  author       = {Anna Entrichel and
                  James Bergman and
                  Jason Willis and
                  Herb Little},
  title        = {Computing Without Wires (Or Even a Net): The Pitfalls, Potentials,
                  and Practicality of Wireless Networking},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {463--464},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991563},
  doi          = {10.1109/ACSAC.2001.991563},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/EntrichelBWL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EpsteinS01,
  author       = {Pete Epstein and
                  Ravi S. Sandhu},
  title        = {Engineering of Role/Permission Assignments},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991529},
  doi          = {10.1109/ACSAC.2001.991529},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EpsteinS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FeinsteinMSW01,
  author       = {Benjamin S. Feinstein and
                  Gregory A. Matthews and
                  Stuart Staniford and
                  Andy Walther},
  title        = {Experiences Implementing a Common Format for {IDS} Alerts},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {113},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991527},
  doi          = {10.1109/ACSAC.2001.991527},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FeinsteinMSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GrestySM01,
  author       = {D. W. Gresty and
                  Qi Shi and
                  Madjid Merabti},
  title        = {Requirements for a General Framework for Response to Distributed Denial-of-Service},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {422--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991559},
  doi          = {10.1109/ACSAC.2001.991559},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GrestySM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GulaKKP01,
  author       = {Ron Gula and
                  Gene Kim and
                  Chris Klaus and
                  Paul Proctor},
  title        = {Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {343},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991550},
  doi          = {10.1109/ACSAC.2001.991550},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GulaKKP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Hayes01,
  author       = {James M. Hayes},
  title        = {Restricting Access with Certificate Attributes in Multiple Root Environments-A
                  Recipe for Certificate Masquerading},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {386--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991555},
  doi          = {10.1109/ACSAC.2001.991555},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Hayes01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Herrmann01,
  author       = {Peter Herrmann},
  title        = {Information Flow Analysis of Component-Structured Applications},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {45--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991520},
  doi          = {10.1109/ACSAC.2001.991520},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Herrmann01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuangRW01,
  author       = {Yih Huang and
                  David Rine and
                  Xunhua Wang},
  title        = {A JCA-Based Implementation Framework for Threshold Cryptography},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {85--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991524},
  doi          = {10.1109/ACSAC.2001.991524},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuangRW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jansen01,
  author       = {Wayne A. Jansen},
  title        = {Determining Privileges of Mobile Agents},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {149--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991531},
  doi          = {10.1109/ACSAC.2001.991531},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jansen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JiangSM01,
  author       = {Shan Jiang and
                  Sean W. Smith and
                  Kazuhiro Minami},
  title        = {Securing Web Servers against Insider Attack},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {265--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991542},
  doi          = {10.1109/ACSAC.2001.991542},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JiangSM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JonesL01,
  author       = {Anita Jones and
                  Song Li},
  title        = {Temporal Signatures for Intrusion Detection},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {252--261},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991541},
  doi          = {10.1109/ACSAC.2001.991541},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JonesL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JonesL01a,
  author       = {Anita K. Jones and
                  Yu Lin},
  title        = {Application Intrusion Detection using Language Library Calls},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {442--449},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991561},
  doi          = {10.1109/ACSAC.2001.991561},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JonesL01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Julisch01,
  author       = {Klaus Julisch},
  title        = {Mining Alarm Clusters to Improve Alarm Handling Efficiency},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {12--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991517},
  doi          = {10.1109/ACSAC.2001.991517},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Julisch01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Karjoth01,
  author       = {G{\"{u}}nter Karjoth},
  title        = {The Authorization Service of Tivoli Policy Director},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {319--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991547},
  doi          = {10.1109/ACSAC.2001.991547},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Karjoth01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LandwehrHM01,
  author       = {Carl E. Landwehr and
                  Constance L. Heitmeyer and
                  John D. McLean},
  title        = {A Security Model for Military Message Systems: Retrospective},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {174--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991535},
  doi          = {10.1109/ACSAC.2001.991535},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LandwehrHM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LangGS01,
  author       = {Ulrich Lang and
                  Dieter Gollmann and
                  Rudolf Schreiner},
  title        = {Verifiable Identifiers in Middleware Security},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {450--459},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991562},
  doi          = {10.1109/ACSAC.2001.991562},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LangGS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeviK01,
  author       = {Albert Levi and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {{CONSEPP:} CONvenient and Secure Electronic Payment Protocol Based
                  on {X9.59}},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {286--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991544},
  doi          = {10.1109/ACSAC.2001.991544},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeviK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LindqvistP01,
  author       = {Ulf Lindqvist and
                  Phillip A. Porras},
  title        = {eXpert-BSM: {A} Host-Based Intrusion Detection Solution for Sun Solaris},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {240--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991540},
  doi          = {10.1109/ACSAC.2001.991540},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LindqvistP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Liu01,
  author       = {Peng Liu},
  title        = {{DAIS:} {A} Real-Time Data Attack Isolation System for Commercial
                  Database Applications},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {219--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991538},
  doi          = {10.1109/ACSAC.2001.991538},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Liu01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MankinsKBZF01,
  author       = {David Mankins and
                  Rajesh Krishnan and
                  Ceilyn Boyd and
                  John Zao and
                  Michael Frentz},
  title        = {Mitigating Distributed Denial of Service Attacks with Dynamic Resource
                  Pricing},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {411--421},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991558},
  doi          = {10.1109/ACSAC.2001.991558},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MankinsKBZF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermott01,
  author       = {John P. McDermott},
  title        = {Abuse-Case-Based Assurance Arguments},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {366--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991553},
  doi          = {10.1109/ACSAC.2001.991553},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermott01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McHugh01,
  author       = {John McHugh},
  title        = {An Information Flow Tool for Gypsy},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {191--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991536},
  doi          = {10.1109/ACSAC.2001.991536},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McHugh01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Monteith01,
  author       = {Eric Monteith},
  title        = {Genoa TIE, Advanced Boundary Controller Experiment},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {74--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991523},
  doi          = {10.1109/ACSAC.2001.991523},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Monteith01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Mraz01,
  author       = {Ronald Mraz},
  title        = {Secure Blue: An Architecture for a Scalable, Reliable, High Volume
                  {SSL} Internet Server},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {391--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991556},
  doi          = {10.1109/ACSAC.2001.991556},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Mraz01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MunsonW01,
  author       = {John C. Munson and
                  Scott Wimer},
  title        = {Watcher: The Missing Piece of the Security Puzzle},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {230--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991539},
  doi          = {10.1109/ACSAC.2001.991539},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MunsonW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PayneM01,
  author       = {Charles Payne and
                  Tom Markham},
  title        = {Architecture and Applications for a Distributed Embedded Firewall},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {329--336},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991548},
  doi          = {10.1109/ACSAC.2001.991548},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PayneM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RazmovS01,
  author       = {Valentin Razmov and
                  Daniel R. Simon},
  title        = {Practical Automated Filter Generation to Explicitly Enforce Implicit
                  Input Assumptions},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {347--357},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991551},
  doi          = {10.1109/ACSAC.2001.991551},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RazmovS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Schaad01,
  author       = {Andreas Schaad},
  title        = {Detecting Conflicts in a Role-Based Delegation Model},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {117--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991528},
  doi          = {10.1109/ACSAC.2001.991528},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Schaad01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Schell01,
  author       = {Roger R. Schell},
  title        = {Information Security: Science, Pseudoscience, and Flying Pigs},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {205--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991537},
  doi          = {10.1109/ACSAC.2001.991537},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Schell01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Thomsen01,
  author       = {Dan Thomsen},
  title        = {Introduction to Classic Papers},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {161},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991532},
  doi          = {10.1109/ACSAC.2001.991532},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Thomsen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Ungureanu01,
  author       = {Victoria Ungureanu},
  title        = {A Regulated Approach to Certificate Management},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {377--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991554},
  doi          = {10.1109/ACSAC.2001.991554},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Ungureanu01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WanY01,
  author       = {Tao Wan and
                  Xue Dong Yang},
  title        = {IntruDetector: {A} Software Platform for Testing Network Intrusion
                  Detection Algorithms},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {3--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991516},
  doi          = {10.1109/ACSAC.2001.991516},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WanY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Weiler01,
  author       = {Nathalie Weiler},
  title        = {Secure Anonymous Group Infrastructure for Common and Future Internet
                  Applications},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {401--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991557},
  doi          = {10.1109/ACSAC.2001.991557},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Weiler01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WheelerCLX01,
  author       = {David M. Wheeler and
                  Adam Conyers and
                  Jane Luo and
                  Alex Xiong},
  title        = {Java Security Extensions for a Java Server in a Hostile Environment},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {64--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991522},
  doi          = {10.1109/ACSAC.2001.991522},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WheelerCLX01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Wolthusen01,
  author       = {Stephen D. Wolthusen},
  title        = {Security Policy Enforcement at the File System Level in the Windows
                  {NT} Operating System Family},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {55--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991521},
  doi          = {10.1109/ACSAC.2001.991521},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Wolthusen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WongFC01,
  author       = {Duncan S. Wong and
                  Hector Ho Fuentes and
                  Agnes Hui Chan},
  title        = {The Performance Measurement of Cryptographic Primitives on Palm Devices},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {92--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991525},
  doi          = {10.1109/ACSAC.2001.991525},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WongFC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2001,
  title        = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7785/proceeding},
  isbn         = {0-7695-1405-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics