Search dblp for Publications

export results for "toc:db/conf/nspw/nspw1998.bht:"

 download as .bib file

@inproceedings{DBLP:conf/nspw/Abrams98,
  author       = {Marshall D. Abrams},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Security Engineering in an Evolutionary Acquisition Environment},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310902},
  doi          = {10.1145/310889.310902},
  timestamp    = {Thu, 09 Sep 2021 18:23:55 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Abrams98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Beaver98,
  author       = {Donald Beaver},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Server-Assisted Cryptography},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {92--106},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310923},
  doi          = {10.1145/310889.310923},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Beaver98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChangM98,
  author       = {Liwu Chang and
                  Ira S. Moskowitz},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Parsimonious Downgrading and Decision Trees Applied to the Inference
                  Problem},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {82--89},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310921},
  doi          = {10.1145/310889.310921},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChangM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CowanP98,
  author       = {Crispin Cowan and
                  Calton Pu},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Death, Taxes, and Imperfact Software: Surviving the Inevitable},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {54--70},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310915},
  doi          = {10.1145/310889.310915},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CowanP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Foley98,
  author       = {Simon N. Foley},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Evaluating System Integrity},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {40--47},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310909},
  doi          = {10.1145/310889.310909},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Foley98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Greenwald98,
  author       = {Steven J. Greenwald},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Discussion Topic: What is the Old Security Paradigm?},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {107--118},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310925},
  doi          = {10.1145/310889.310925},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Greenwald98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Jonsson98,
  author       = {Erland Jonsson},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {An Integrated Framework for Security and Dependability},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {22--29},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310903},
  doi          = {10.1145/310889.310903},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Jonsson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Kahn98,
  author       = {Clifford E. Kahn},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Tolerating Penetrations and Insider Attacks by Requiring Independent
                  Corroboration},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {122--133},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310926},
  doi          = {10.1145/310889.310926},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Kahn98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LinRM98,
  author       = {Meng{-}Jang Lin and
                  Aleta Ricciardi and
                  Keith Marzullo},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {A New Model for Availability in the Face of Self-Propagating Attacks},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {134--137},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310928},
  doi          = {10.1145/310889.310928},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LinRM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermott98,
  author       = {John P. McDermott},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity
                  Attacks},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {48--51},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310911},
  doi          = {10.1145/310889.310911},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermott98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PhillipsS98,
  author       = {Cynthia A. Phillips and
                  Laura Painton Swiler},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {A Graph-based System for Network-vulnerability Analysis},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {71--79},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310919},
  doi          = {10.1145/310889.310919},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PhillipsS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RiechmannH98,
  author       = {Thomas Riechmann and
                  Franz J. Hauck},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Meta Objects for Access Control: a Formal Model for Role-Based Principals},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {30--38},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310906},
  doi          = {10.1145/310889.310906},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RiechmannH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SlaterSSW98,
  author       = {Chris Slater and
                  O. Sami Saydjari and
                  Bruce Schneier and
                  Jim Wallner},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Toward a Secure System Engineering Methodolgy},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {2--10},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310900},
  doi          = {10.1145/310889.310900},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SlaterSSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1998,
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889},
  doi          = {10.1145/310889},
  isbn         = {1-58113-168-2},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics