Capacity is the Wrong Paradigm (English)
- New search for: Moskowitz, I. S.
- New search for: Chang, L. W.
- New search for: Newman, R. E.
- New search for: Moskowitz, I. S.
- New search for: Chang, L. W.
- New search for: Newman, R. E.
- New search for: Raskin, V.
- New search for: Hempelmann, C. F.
In:
New security paradigms workshop
;
114-126
;
2002
-
ISBN:
- Conference paper / Print
-
Title:Capacity is the Wrong Paradigm
-
Contributors:Moskowitz, I. S. ( author ) / Chang, L. W. ( author ) / Newman, R. E. ( author ) / Raskin, V. / Hempelmann, C. F.
-
Conference:New security paradigms workshop ; 2002 ; Virginia Beach, VA
-
Published in:New security paradigms workshop ; 114-126NEW SECURITY PARADIGMS WORKSHOP ; 114-126
-
Publisher:
- New search for: ACM
-
Place of publication:New York
-
Publication date:2002-01-01
-
Size:13 pages
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
MET: An Experimental System for Malicious Email TrackingBhattacharyya, M. / Hershkop, S. / Eskin, E. / Stolfo, S. J. et al. | 2002
- 11
-
Predators: Good Will Codes Combat against Computer VirusesToyoizumi, H. / Kara, A. et al. | 2002
- 18
-
An Empirical Analysis of NATE - Network Analysis of Anomalous Traffic EventsTaylor, C. / Alves-Foss, J. et al. | 2002
- 28
-
Small Worlds in Security Systems: An Analysis of the PGP Certificate GraphCapkun, S. / Buttyan, L. / Hubaux, J.-P. et al. | 2002
- 36
-
Breaking the Barriers: High Performance Security for High Performance ComputingConnelly, K. / Chien, A. A. et al. | 2002
- 43
-
From Privacy Promises to Privacy ManagementAshley, P. / Powers, C. / Schunter, M. et al. | 2002
- 52
-
Anomaly Intrusion Detection in Dynamic Execution EnvironmentsInoue, H. / Forrest, S. et al. | 2002
- 61
-
Empowering Mobile Code: Using Expressive Security PoliciesVenkatakrishnan, V. N. / Peri, R. / Sekar, R. et al. | 2002
- 69
-
The Source is the ProofHaldar, V. / Stork, C. H. / Franz, M. et al. | 2002
- 75
-
An Approach to Usable Security Based on Event Monitoring and VisualizationDourish, P. / Redmiles, D. et al. | 2002
- 82
-
Moving from the Desing of Usable Security Technologies to the Design of Useful Secure ApplicationsSmetters, D. K. / Grinter, R. E. et al. | 2002
- 91
-
Assurance in Life/Nation Critical EndeavorsGreenwald, S. J. / Schaefer, M. et al. | 2002
- 97
-
BIOMETRICS or... BIOHAZARDS?Williams, J. M. et al. | 2002
- 108
-
An Evolutionary Approach to Cyber SecurityMarceau, C. et al. | 2002
- 110
-
Assuring Critical SystemsBlakley, B. et al. | 2002
- 114
-
Capacity is the Wrong ParadigmMoskowitz, I. S. / Chang, L. W. / Newman, R. E. et al. | 2002
- 127
-
A Practical Approach to Solve Secure Multi-party Computation ProblemsDu, W. / Zhan, Z. et al. | 2002
- 136
-
Guarding the Next Internet Frontier: Countering Denial of Information AttacksAhamad, M. / Lee, W. / Liu, L. / Mark, L. / Omicienski, E. / Pu, C. / dos Santos, A. et al. | 2002