default search action
NSPW 2002: Virginia Beach, VA, USA
- Cristina Serban, Carla Marceau, Simon N. Foley:
Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002. ACM 2002, ISBN 1-58113-598-X
Intrusion detection and response
- Manasi Bhattacharyya, Shlomo Hershkop, Eleazar Eskin:
MET: an experimental system for Malicious Email Tracking. 3-10 - Hiroshi Toyoizumi, Atsuhi Kara:
Predators: good will mobile codes combat against computer viruses. 11-17 - Carol Taylor, Jim Alves-Foss:
An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events. 18-26
Large systems
- Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:
Small worlds in security systems: an analysis of the PGP certificate graph. 28-35 - Kay Connelly, Andrew A. Chien:
Breaking the barriers: high performance security for high performance computing. 36-42 - Paul Ashley, Calvin Powers, Matthias Schunter:
From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise. 43-50
Mobile code
- Hajime Inoue, Stephanie Forrest:
Anomaly intrusion detection in dynamic execution environments. 52-60 - V. N. Venkatakrishnan, Ram Peri, R. Sekar:
Empowering mobile code using expressive security policies. 61-68 - Vivek Haldar, Christian H. Stork, Michael Franz:
The source is the proof. 69-73
Usability
- Paul Dourish, David F. Redmiles:
An approach to usable security based on event monitoring and visualization. 75-81 - Diana K. Smetters, Rebecca E. Grinter:
Moving from the design of usable security technologies to the design of useful secure applications. 82-89
Assurance in life/nation critical endeavors
- Steven J. Greenwald, Marv Schaefer:
Assurance in life/nation critical endeavors a panel. 91-96 - John Michael Williams:
Biometrics or ... biohazards? 97-107 - Carla Marceau:
An evolutionary approach to cyber security. 108-109 - Bob Blakley:
Assuring critical systems. 110-112
Securing information
- Ira S. Moskowitz, Liwu Chang, Richard E. Newman:
Capacity is the wrong paradigm. 114-126 - Wenliang Du, Justin Zhijun Zhan:
A practical approach to solve Secure Multi-party Computation problems. 127-135 - Mustaque Ahamad, Leo Mark, Wenke Lee, Edward Omicienski, Andre dos Santos, Ling Liu, Calton Pu:
Guarding the next Internet frontier: countering denial of information attacks. 136-143
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.