Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/nspw/nspw1998.bht:"
@inproceedings{DBLP:conf/nspw/Abrams98, author = {Marshall D. Abrams}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Security Engineering in an Evolutionary Acquisition Environment}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {11--20}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310902}, doi = {10.1145/310889.310902}, timestamp = {Thu, 09 Sep 2021 18:23:55 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Abrams98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Beaver98, author = {Donald Beaver}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Server-Assisted Cryptography}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {92--106}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310923}, doi = {10.1145/310889.310923}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Beaver98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChangM98, author = {Liwu Chang and Ira S. Moskowitz}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Parsimonious Downgrading and Decision Trees Applied to the Inference Problem}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {82--89}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310921}, doi = {10.1145/310889.310921}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChangM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CowanP98, author = {Crispin Cowan and Calton Pu}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Death, Taxes, and Imperfact Software: Surviving the Inevitable}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {54--70}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310915}, doi = {10.1145/310889.310915}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CowanP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Foley98, author = {Simon N. Foley}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Evaluating System Integrity}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {40--47}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310909}, doi = {10.1145/310889.310909}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Foley98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Greenwald98, author = {Steven J. Greenwald}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Discussion Topic: What is the Old Security Paradigm?}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {107--118}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310925}, doi = {10.1145/310889.310925}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Greenwald98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Jonsson98, author = {Erland Jonsson}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {An Integrated Framework for Security and Dependability}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {22--29}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310903}, doi = {10.1145/310889.310903}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Jonsson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Kahn98, author = {Clifford E. Kahn}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {122--133}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310926}, doi = {10.1145/310889.310926}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Kahn98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LinRM98, author = {Meng{-}Jang Lin and Aleta Ricciardi and Keith Marzullo}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {A New Model for Availability in the Face of Self-Propagating Attacks}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {134--137}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310928}, doi = {10.1145/310889.310928}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LinRM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermott98, author = {John P. McDermott}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {48--51}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310911}, doi = {10.1145/310889.310911}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McDermott98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PhillipsS98, author = {Cynthia A. Phillips and Laura Painton Swiler}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {A Graph-based System for Network-vulnerability Analysis}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {71--79}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310919}, doi = {10.1145/310889.310919}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PhillipsS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RiechmannH98, author = {Thomas Riechmann and Franz J. Hauck}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Meta Objects for Access Control: a Formal Model for Role-Based Principals}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {30--38}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310906}, doi = {10.1145/310889.310906}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RiechmannH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SlaterSSW98, author = {Chris Slater and O. Sami Saydjari and Bruce Schneier and Jim Wallner}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Toward a Secure System Engineering Methodolgy}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {2--10}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310900}, doi = {10.1145/310889.310900}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SlaterSSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1998, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889}, doi = {10.1145/310889}, isbn = {1-58113-168-2}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.