default search action
NSPW 1998: Charlottsville, VA, USA
- Bob Blakley, Darrell M. Kienzle, Mary Ellen Zurko, Steven J. Greenwald:
Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998. ACM 1998, ISBN 1-58113-168-2 - Chris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner:
Toward a Secure System Engineering Methodolgy. 2-10 - Marshall D. Abrams:
Security Engineering in an Evolutionary Acquisition Environment. 11-20 - Erland Jonsson:
An Integrated Framework for Security and Dependability. 22-29 - Thomas Riechmann, Franz J. Hauck:
Meta Objects for Access Control: a Formal Model for Role-Based Principals. 30-38 - Simon N. Foley:
Evaluating System Integrity. 40-47 - John P. McDermott:
Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. 48-51 - Crispin Cowan, Calton Pu:
Death, Taxes, and Imperfact Software: Surviving the Inevitable. 54-70 - Cynthia A. Phillips, Laura Painton Swiler:
A Graph-based System for Network-vulnerability Analysis. 71-79 - Liwu Chang, Ira S. Moskowitz:
Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. 82-89 - Donald Beaver:
Server-Assisted Cryptography. 92-106 - Steven J. Greenwald:
Discussion Topic: What is the Old Security Paradigm? 107-118 - Clifford E. Kahn:
Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration. 122-133 - Meng-Jang Lin, Aleta Ricciardi, Keith Marzullo:
A New Model for Availability in the Face of Self-Propagating Attacks. 134-137
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.