Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/acsac2001.bht:"
@inproceedings{DBLP:conf/acsac/Anderson01, author = {Ross J. Anderson}, title = {Why Information Security is Hard-An Economic Perspective}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {358--365}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991552}, doi = {10.1109/ACSAC.2001.991552}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Anderson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AshleyHV01, author = {Paul Ashley and Heather M. Hinton and Mark Vandenwauver}, title = {Wired versus Wireless Security: The Internet, {WAP} and iMode for E-Commerce}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {296--306}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991545}, doi = {10.1109/ACSAC.2001.991545}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AshleyHV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BishopGW01, author = {Matt Bishop and Anup K. Ghosh and James A. Whittaker}, title = {How Useful is Software Fault Injection for Evaluating the Security of {COTS} Products?}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {339--340}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.2001.10009}, doi = {10.1109/ACSAC.2001.10009}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BishopGW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Blobel01, author = {Bernd Blobel}, title = {Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {433--441}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991560}, doi = {10.1109/ACSAC.2001.991560}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Blobel01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BonattiDVS01, author = {Piero A. Bonatti and Ernesto Damiani and Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Component-Based Architecture for Secure Data Publication}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {309--318}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991546}, doi = {10.1109/ACSAC.2001.991546}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BonattiDVS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BuchheimEFMPBW01, author = {Tim Buchheim and Michael Erlinger and Benjamin S. Feinstein and Gregory A. Matthews and Roy Pollock and Joseph Betser and Andy Walther}, title = {Implementing the Intrusion Detection Exchange Protocol}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {32--41}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991519}, doi = {10.1109/ACSAC.2001.991519}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BuchheimEFMPBW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaronniS01, author = {Germano Caronni and Christoph L. Schuba}, title = {Enabling Hierarchical and Bulk-Distribution for Watermarked Content}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {277--285}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991543}, doi = {10.1109/ACSAC.2001.991543}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaronniS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chandramouli01, author = {Ramaswamy Chandramouli}, title = {A Framework for Multiple Authorization Types in a Healthcare Application System}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {137--148}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991530}, doi = {10.1109/ACSAC.2001.991530}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Chandramouli01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Cuppens01, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Managing Alerts in a Multi-Intrusion Detection Environmen}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {22--31}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991518}, doi = {10.1109/ACSAC.2001.991518}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Cuppens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DobsonR01, author = {John E. Dobson and Brian Randell}, title = {Building Reliable Secure Computing Systems out of Unreliable Insecure Components}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {164--173}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991534}, doi = {10.1109/ACSAC.2001.991534}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DobsonR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DuA01, author = {Wenliang Du and Mikhail J. Atallah}, title = {Privacy-Preserving Cooperative Statistical Analysis}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {102--110}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991526}, doi = {10.1109/ACSAC.2001.991526}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DuA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EntrichelBWL01, author = {Anna Entrichel and James Bergman and Jason Willis and Herb Little}, title = {Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless Networking}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {463--464}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991563}, doi = {10.1109/ACSAC.2001.991563}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/EntrichelBWL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EpsteinS01, author = {Pete Epstein and Ravi S. Sandhu}, title = {Engineering of Role/Permission Assignments}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991529}, doi = {10.1109/ACSAC.2001.991529}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EpsteinS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FeinsteinMSW01, author = {Benjamin S. Feinstein and Gregory A. Matthews and Stuart Staniford and Andy Walther}, title = {Experiences Implementing a Common Format for {IDS} Alerts}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {113}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991527}, doi = {10.1109/ACSAC.2001.991527}, timestamp = {Tue, 28 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FeinsteinMSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GrestySM01, author = {D. W. Gresty and Qi Shi and Madjid Merabti}, title = {Requirements for a General Framework for Response to Distributed Denial-of-Service}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {422--429}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991559}, doi = {10.1109/ACSAC.2001.991559}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GrestySM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GulaKKP01, author = {Ron Gula and Gene Kim and Chris Klaus and Paul Proctor}, title = {Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {343}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991550}, doi = {10.1109/ACSAC.2001.991550}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GulaKKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Hayes01, author = {James M. Hayes}, title = {Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {386--390}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991555}, doi = {10.1109/ACSAC.2001.991555}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Hayes01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Herrmann01, author = {Peter Herrmann}, title = {Information Flow Analysis of Component-Structured Applications}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {45--54}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991520}, doi = {10.1109/ACSAC.2001.991520}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Herrmann01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuangRW01, author = {Yih Huang and David Rine and Xunhua Wang}, title = {A JCA-Based Implementation Framework for Threshold Cryptography}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {85--91}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991524}, doi = {10.1109/ACSAC.2001.991524}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuangRW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jansen01, author = {Wayne A. Jansen}, title = {Determining Privileges of Mobile Agents}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {149--158}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991531}, doi = {10.1109/ACSAC.2001.991531}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jansen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JiangSM01, author = {Shan Jiang and Sean W. Smith and Kazuhiro Minami}, title = {Securing Web Servers against Insider Attack}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {265--276}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991542}, doi = {10.1109/ACSAC.2001.991542}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JiangSM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JonesL01, author = {Anita Jones and Song Li}, title = {Temporal Signatures for Intrusion Detection}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {252--261}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991541}, doi = {10.1109/ACSAC.2001.991541}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JonesL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JonesL01a, author = {Anita K. Jones and Yu Lin}, title = {Application Intrusion Detection using Language Library Calls}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {442--449}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991561}, doi = {10.1109/ACSAC.2001.991561}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JonesL01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Julisch01, author = {Klaus Julisch}, title = {Mining Alarm Clusters to Improve Alarm Handling Efficiency}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {12--21}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991517}, doi = {10.1109/ACSAC.2001.991517}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Julisch01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Karjoth01, author = {G{\"{u}}nter Karjoth}, title = {The Authorization Service of Tivoli Policy Director}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {319--328}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991547}, doi = {10.1109/ACSAC.2001.991547}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Karjoth01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LandwehrHM01, author = {Carl E. Landwehr and Constance L. Heitmeyer and John D. McLean}, title = {A Security Model for Military Message Systems: Retrospective}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {174--190}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991535}, doi = {10.1109/ACSAC.2001.991535}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LandwehrHM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LangGS01, author = {Ulrich Lang and Dieter Gollmann and Rudolf Schreiner}, title = {Verifiable Identifiers in Middleware Security}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {450--459}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991562}, doi = {10.1109/ACSAC.2001.991562}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LangGS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeviK01, author = {Albert Levi and {\c{C}}etin Kaya Ko{\c{c}}}, title = {{CONSEPP:} CONvenient and Secure Electronic Payment Protocol Based on {X9.59}}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {286--295}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991544}, doi = {10.1109/ACSAC.2001.991544}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeviK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LindqvistP01, author = {Ulf Lindqvist and Phillip A. Porras}, title = {eXpert-BSM: {A} Host-Based Intrusion Detection Solution for Sun Solaris}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {240--251}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991540}, doi = {10.1109/ACSAC.2001.991540}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LindqvistP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Liu01, author = {Peng Liu}, title = {{DAIS:} {A} Real-Time Data Attack Isolation System for Commercial Database Applications}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {219--229}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991538}, doi = {10.1109/ACSAC.2001.991538}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Liu01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MankinsKBZF01, author = {David Mankins and Rajesh Krishnan and Ceilyn Boyd and John Zao and Michael Frentz}, title = {Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {411--421}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991558}, doi = {10.1109/ACSAC.2001.991558}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MankinsKBZF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermott01, author = {John P. McDermott}, title = {Abuse-Case-Based Assurance Arguments}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {366--374}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991553}, doi = {10.1109/ACSAC.2001.991553}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermott01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McHugh01, author = {John McHugh}, title = {An Information Flow Tool for Gypsy}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {191--201}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991536}, doi = {10.1109/ACSAC.2001.991536}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McHugh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Monteith01, author = {Eric Monteith}, title = {Genoa TIE, Advanced Boundary Controller Experiment}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {74--82}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991523}, doi = {10.1109/ACSAC.2001.991523}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Monteith01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Mraz01, author = {Ronald Mraz}, title = {Secure Blue: An Architecture for a Scalable, Reliable, High Volume {SSL} Internet Server}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {391--398}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991556}, doi = {10.1109/ACSAC.2001.991556}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Mraz01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MunsonW01, author = {John C. Munson and Scott Wimer}, title = {Watcher: The Missing Piece of the Security Puzzle}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {230--239}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991539}, doi = {10.1109/ACSAC.2001.991539}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MunsonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PayneM01, author = {Charles Payne and Tom Markham}, title = {Architecture and Applications for a Distributed Embedded Firewall}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {329--336}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991548}, doi = {10.1109/ACSAC.2001.991548}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PayneM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RazmovS01, author = {Valentin Razmov and Daniel R. Simon}, title = {Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {347--357}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991551}, doi = {10.1109/ACSAC.2001.991551}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RazmovS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Schaad01, author = {Andreas Schaad}, title = {Detecting Conflicts in a Role-Based Delegation Model}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {117--126}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991528}, doi = {10.1109/ACSAC.2001.991528}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Schaad01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Schell01, author = {Roger R. Schell}, title = {Information Security: Science, Pseudoscience, and Flying Pigs}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {205--216}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991537}, doi = {10.1109/ACSAC.2001.991537}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Schell01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Thomsen01, author = {Dan Thomsen}, title = {Introduction to Classic Papers}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {161}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991532}, doi = {10.1109/ACSAC.2001.991532}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Thomsen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Ungureanu01, author = {Victoria Ungureanu}, title = {A Regulated Approach to Certificate Management}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {377--385}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991554}, doi = {10.1109/ACSAC.2001.991554}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Ungureanu01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WanY01, author = {Tao Wan and Xue Dong Yang}, title = {IntruDetector: {A} Software Platform for Testing Network Intrusion Detection Algorithms}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {3--11}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991516}, doi = {10.1109/ACSAC.2001.991516}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WanY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Weiler01, author = {Nathalie Weiler}, title = {Secure Anonymous Group Infrastructure for Common and Future Internet Applications}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {401--410}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991557}, doi = {10.1109/ACSAC.2001.991557}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Weiler01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WheelerCLX01, author = {David M. Wheeler and Adam Conyers and Jane Luo and Alex Xiong}, title = {Java Security Extensions for a Java Server in a Hostile Environment}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {64--73}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991522}, doi = {10.1109/ACSAC.2001.991522}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WheelerCLX01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Wolthusen01, author = {Stephen D. Wolthusen}, title = {Security Policy Enforcement at the File System Level in the Windows {NT} Operating System Family}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {55--63}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991521}, doi = {10.1109/ACSAC.2001.991521}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Wolthusen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WongFC01, author = {Duncan S. Wong and Hector Ho Fuentes and Agnes Hui Chan}, title = {The Performance Measurement of Cryptographic Primitives on Palm Devices}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {92--101}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991525}, doi = {10.1109/ACSAC.2001.991525}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WongFC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2001, title = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://ieeexplore.ieee.org/xpl/conhome/7785/proceeding}, isbn = {0-7695-1405-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.