


default search action
8th USENIX Security Symposium 1999: Washington, DC, USA
- G. Winfield Treese:

Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999. USENIX Association 1999 - Daniel F. Sterne, Gregg Tally, C. Durward McDonell, David L. Sherman, David Sames, Pierre X. Pasturel, E. John Sebes:

Scalable Access Control for Distributed Object Systems. - Mary R. Thompson, William E. Johnston, Srilekha Mudumbai, Gary Hoo, Keith R. Jackson, Abdelilah Essiari:

Certificate-based Access Control for Widely Distributed Resources. - Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine:

Digital-Ticket-Controlled Digital Ticket Circulation. - Peter Gutmann:

The Design of a Cryptographic Security Architecture. - Alma Whitten, J. Doug Tygar:

Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. - Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin:

Jonah: Experience Implementing PKIX Reference Freeware. - Vassilis Prevelakis:

A Secure Station for Network Monitoring and Control. - Ray Spencer, Stephen Smalley, Peter A. Loscocco, Mike Hibler, Dave G. Andersen, Jay Lepreau:

The Flask Security Architecture: System Support for Diverse Security Policies. - Anup K. Ghosh, Aaron Schwartzbard:

A Study in Using Neural Networks for Anomaly and Misuse Detection. - Thomas D. Wu, Michael Malkin, Dan Boneh:

Building Intrusion-Tolerant Applications. - Gershon Kedem, Yuriko Ishihara:

Brute Force Attack on UNIX Passwords with SIMD Computer. - Patrick D. McDaniel, Atul Prakash

, Peter Honeyman:
Antigone: A Flexible Framework for Secure Group Communication. - Tse Huong Choo:

Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories. - Dean Povey:

Enforcing Well-Formed and Partially-Formed Transactions for UNIX. - R. Sekar, Prem Uppuluri:

Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. - Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:

The Design and Analysis of Graphical Passwords. - Dirk Balfanz, Edward W. Felten:

Hand-Held Computers Can Be Better Smart Cards. - Arne Helme, Tage Stabell-Kulø:

Offline Delegation.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














