13th Annual Computer Security Applications Conference, San Diego, California, December 8-12, 1997 : proceedings (English)
- New search for: Annual Computer Security Applications Conference
- New search for: Applied Computer Security Associates
- New search for: Association for Computing Machinery
- New search for: Annual Computer Security Applications Conference
- New search for: Applied Computer Security Associates
- New search for: Association for Computing Machinery
2010
- Conference Proceedings / Electronic Resource
-
Title:13th Annual Computer Security Applications Conference, San Diego, California, December 8-12, 1997 : proceedings
-
Additional title:ACSAC'97
Computer Security Applications Conference
Computer Security Applications Conference, 1997, proceedings, 13th Annual
Thirteenth Annual Computer Security Applications Conference
Annual Computer Security Applications Conference, ACSAC'97 -
Contributors:
-
Conference:Annual Computer Security Applications Conference ; 13th
-
Publisher:
- New search for: IEEE Computer Society Press
-
Place of publication:Los Alamitos, Calif
-
Publication date:2010
-
Size:1 Online-Ressource (x, 288 pages)
-
Remarks:illustrations
Includes bibliographical references and index
Use copy Restrictions unspecified star MiAaHDL -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
Micro-Digital Money for Electronic CommerceNguyen, K. / Mu, Y. / Varadharajan, V. / IEEE et al. | 1997
- 9
-
Secure and Efficient Digital CoinsNguyen, K. / Mu, Y. / Varadharajan, V. / IEEE et al. | 1997
- 16
-
The Secure Distribution of Digital ContentsVon Faber, E. / Hammelrath, R. / Heider, F. / IEEE et al. | 1997
- 24
-
Simple Assured Bastion HostsCant, C. / Wiseman, S. / IEEE et al. | 1997
- 34
-
Kernel and Shell-Based Applications Integrity AssuranceMohay, G. / Zellers, J. / IEEE et al. | 1997
- 44
-
Risk Assessment for Large Heterogeneous SystemsFreeman, J. / Darr, T. / Neely, R. / IEEE et al. | 1997
- 54
-
Panel: Product AssuranceAdams, J. et al. | 1997
- 56
-
Evolving The Evaluation ParadigmSchanken, M. et al. | 1997
- 59
-
Securing an Object Relational DatabaseLewis, S. / Wiseman, S. / IEEE et al. | 1997
- 69
-
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object StoresFoley, S. / IEEE et al. | 1997
- 81
-
Incremental Assurance for Multilevel ApplicationsThompson, D. / Denz, M. / IEEE et al. | 1997
- 90
-
An Efficient Message Authentication Scheme for Link State RoutingCheung, S. / IEEE et al. | 1997
- 99
-
Detection and Classification of TCP/IP Network ServicesTan, K. / Collie, B. / IEEE et al. | 1997
- 108
-
Achieving User Privacy in Mobile NetworksAskwith, B. / Merabti, M. / Shi, Q. / Whiteley, K. / IEEE et al. | 1997
- 122
-
Domain and Type Enforcement FirewallsOostendorp, K. / Badger, L. / Vance, C. / Morrison, W. / IEEE et al. | 1997
- 133
-
A Reference Model for Firewall TechnologySchuba, C. / Spafford, E. / IEEE et al. | 1997
- 146
-
Using Type Enforcement to Assure a Configurable GuardGreve, P. / Hoffman, J. / Smith, R. / IEEE et al. | 1997
- 155
-
Assurance Forum: Lessons LearnedAdams, J. et al. | 1997
- 158
-
Implementing RBAC on a Type Enforced SystemHoffman, J. / IEEE et al. | 1997
- 164
-
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj SystemHimdi, T. / Sandhu, R. / IEEE et al. | 1997
- 175
-
Using Kernel Hypervisors to Secure ApplicationsMitchem, T. / Lu, R. / O'Brian, R. / IEEE et al. | 1997
- 183
-
Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security ArchitecturesLowman, T. / Mosier, D. / IEEE et al. | 1997
- 194
-
An Architecture for Multilevel Secure InteroperabilityKang, M. / Froscher, J. / Moskowitz, I. / IEEE et al. | 1997
- 205
-
Using Web Technologies in Two MLS Environments:A Security AnalysisNiemeyer, R. / IEEE et al. | 1997
- 216
-
On the Key Recovery of the Key Escrow SystemLee, Y. / Liah, C. / IEEE et al. | 1997
- 221
-
Threshold and Generalized DSS Signatures without a Trusted PartyWang, C. / Hwang, T. / IEEE et al. | 1997
- 227
-
An Improved E-Mail Security ProtocolSchneier, B. / Hall, C. / IEEE et al. | 1997
- 232
-
Remote Electronic GamblingHall, C. / Schneier, B. / IEEE et al. | 1997
- 239
-
Ethical Responsibilities and Legal Liabilities of Network Security ProfessionalsSmith, F. / IEEE et al. | 1997
- 251
-
PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare DomainBaker, D. / Barnhart, R. / Buss, T. / IEEE et al. | 1997
- 262
-
Tales From The Darkside: A Realistic View Of Protecting An OrganizationWinkler, I. et al. | 1997
- 265
-
Doc, Wyatt, and Virgil: Prototyping Storage Jamming DefensesMcDermott, J. / Gelinas, R. / Ornstein, S. / IEEE et al. | 1997
- 274
-
Protecting Unattended Computers Without SoftwareLandwehr, C. / IEEE et al. | 1997
- 285
-
Protecting LaptopsAbrams, M.D. / Marmor-Squires, A. / Ramsey, B. / Trammel, J. et al. | 1997
- 287
-
Integrated Information Protection OperationsHanson, S. et al. | 1997
- 288
-
Index of authors| 1997
- iii
-
Proceedings 13th Annual Computer Security Applications Conference| 1997