


default search action
14. ACSAC 1998: Scottsdale, Arizona, USA
- 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA. IEEE Computer Society 1998, ISBN 0-8186-8789-4
Network Intrusion Detection
- Roland Büschkes, Dogan Kesdogan, Peter Reichl:
How to Increase Security in Mobile Networks by Anomaly Detection. 3-12 - J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
An Architecture for Intrusion Detection Using Autonomous Agents. 13-24 - Giovanni Vigna, Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach. 25-34
Panel Session: Can Internet Commerce Be Secure?
Security Administration
- Ravi S. Sandhu, Qamar Munawer:
The RRA97 Model for Role-Based Administration of Role Hierarchies. 39-49 - D. J. Thomsen, D. O'Brien, J. Bogle:
Role-Based Access Control Framework for Network Enterprises. 50-58 - P. C. Hyland, Ravi S. Sandhu:
Concentric Supervision of Security Applications: A New Security Management Paradigm. 59-68
Panel Session: The Common Criteria and Protection Profiles
Information Infrastructure
- Sushil Jajodia, Peng Liu, Catherine D. McCollum:
Application-Level Isolation to Cope with Malicious Database Users. 73-82 - Quazi N. Ahmed, Susan V. Vrbsky:
Maintaining Security in Firm Real-Time Database Systems. 83-90 - Myong H. Kang, Judith N. Froscher, Brian J. Eppinger:
Towards an Infrastructure for MLS Distributed Computing. 91-100
Internet Technologies
- Jared Karro, Jie Wang:
Protecting Web Servers from Security Holes in Server-Side Includes. 103-111 - Pietro Iglio, Fausto Fraticelli, Luigi Giuri:
Rule-Based Filtering for Java Applets. 112-119 - Vesna Hassler, O. Then:
Controlling Applets' Behavior in a Browser. 120-125
Plenary Panel Session: Computer Security and the Milliennium
- F. C. Smith, D. J. Bailey:
Wachet auf! Computer Security and the Millenium. 129-133
Electronic Commerce
- Lucas C. Ferreira, Ricardo Dahab
:
A Scheme for Analyzing Electronic Payment Systems. 137-146 - Kathrin Schier:
Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model. 147-154 - Alexander W. Röhm, Günther Pernul, Gaby Herrmann:
Modeling Secure and Fair Electronic Commerce. 155-164
Architectures
- Roger Wright, David J. Shifflett, Cynthia E. Irvine:
Security Architecture for a Virtual Heterogeneous Machine. 167-177 - Vijay Varadharajan, Chris Crall, Joe Pato:
Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. 178-189 - Bryony Pomeroy, Simon R. Wiseman:
Private Desktops and Shared Store. 190-200
Panel Session: Opening the Doors, Selectively, to the Big Ten Virtual Library
High-Speed Networks
- Herbert Leitold, Udo Payer, Reinhard Posch:
A Hardware-Independent Encryption Model for ATM Devices. 205-211 - Rajan Shankaran
, Vijay Varadharajan:
Secure Signaling and Access Control for ATM Networks. 212-222 - Reiner Sailer:
Security Services in an Open Service Environment. 223-234
Cryptography
- Yuh-Min Tseng, Jinn-ke Jan:
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. 237-243 - Chang N. Zhang, Ming Y. Deng, Ralph Mason:
Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. 244-249 - M. A. Bahie-Eldin, A. A. Omar:
Complexity Measure of Encryption Keys Used for Securing Computer Networks. 250-255
Intrusion Detection
- Anup K. Ghosh, James Wanken, Frank Charron:
Detecting Anomalous and Unknown Intrusions Against Programs. 259-267 - D. Endler:
Intrusion Detection Applying Machine Learning to Solaris Audit Data. 268-279 - Edward Amoroso, R. Kwapniewski:
Selection Criteria for Intrusion Detection Systems. 280-288
Plenary Panel Session: Protection of Critical Infrastructure
Digital Signatures
- Yi Mu, Vijay Varadharajan:
Anonymous Secure E-Voting Over a Network. 293-299 - Michael Clifford, C. Lavine, Matt Bishop:
The Solar Trust Model: Authentication Without Limitation. 300-307 - Tasneem G. Brutch, Paul C. Brutch:
Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication. 308-317
Assurance
- Mourad Debbabi
, Y. Legaré, Mohamed Mejri:
An Environment for the Specification and Analysis of Cryptoprotocols. 321-332 - George F. Jelen, Jeffrey R. Williams:
A Practical Approach to Measuring Assurance. 333-343
Secure Transactions
- Bruce Schneier, James Riordan:
A Certified E-Mail Protocol. 347-352 - Michiharu Kudo:
Electronic Submission Protocol Based on Temporal Accountability. 353-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.