default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2002
- Frank Adelstein, Matthew Stillerman, Dexter Kozen:
Malicious Code Detection for Open Firmware. ACSAC 2002: 403-412 - Mohammad A. Al-Kahtani, Ravi S. Sandhu:
A Model for Attribute-Based User-Role Assignment. ACSAC 2002: 353-362 - Tuomas Aura, Michael Roe, Jari Arkko:
Security of Internet Location Management. ACSAC 2002: 78-87 - Roberto Barbieri, Danilo Bruschi, Emilia Rosti:
Voice over IPsec: Analysis and Solutions. ACSAC 2002: 261-270 - Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith:
Digging For Worms, Fishing For Answers. ACSAC 2002: 219-226 - Michael Clifford:
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network. ACSAC 2002: 271-281 - Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay:
Gender-Preferential Text Mining of E-mail Discourse. ACSAC 2002: 282-289 - Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad:
A Context-Aware Security Architecture for Emerging Applications. ACSAC 2002: 249-258 - John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval:
A Secure Directory Service based on Exclusive Encryption. ACSAC 2002: 172-182 - Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
Controlled Physical Random Functions. ACSAC 2002: 149-160 - Daniel E. Geer Jr., John Harthorne:
Penetration Testing: A Duet. ACSAC 2002: 185-195 - John Haggerty, Qi Shi, Madjid Merabti:
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. ACSAC 2002: 413-422 - Duane Hybertson, A. Reedy, S. Chapin, M. Kirwan Jr.:
Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA Patterns. ACSAC 2002: 293-296 - Dale M. Johnson:
Wireless Security: Vulnerabilities and Countermeasures. ACSAC 2002: 91 - Paul A. Karger, Roger R. Schell:
Thirty Years Later: Lessons from the Multics Security Evaluation. ACSAC 2002: 119-126 - Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. ACSAC 2002: 109-118 - Axel Kern:
Advanced Features for Enterprise-Wide Role-Based Access Control. ACSAC 2002: 333-342 - Hanno Langweg:
With Gaming Technology towards Secure User Interfaces. ACSAC 2002: 44-50 - Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting. ACSAC 2002: 321-330 - Herbert Leitold, Arno Hollosi, Reinhard Posch:
Security Architecture of the Austrian Citizen Card Concept. ACSAC 2002: 391-400 - Karl N. Levitt:
Intrusion Detection: Current Capabilities and Future Directions. ACSAC 2002: 365-367 - Peng Liu:
Architectures for Intrusion Tolerant Database Systems. ACSAC 2002: 311-320 - Andrew D. Marshall:
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. ACSAC 2002: 382-390 - Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum:
A Security Architecture for Object-Based Distributed Systems. ACSAC 2002: 161-171 - Stefan Probst, Wolfgang Eßmayr, Edgar R. Weippl:
Reusable Components for Developing Security-Aware Application. ACSAC 2002: 239-248 - Ronald W. Ritchey, Brian O'Berry, Steven Noel:
Representing TCP/IP Connectivity For Topological Analysis of Network Security. ACSAC 2002: 25-31 - Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell:
Access Control for Active Spaces. ACSAC 2002: 343-352 - O. Sami Saydjari:
LOCK : An Historical Perspective. ACSAC 2002: 96-108 - Andreas Schaad, Jonathan D. Moffett:
A Framework for Organisational Control Principles. ACSAC 2002: 229-238 - Matthew Schmid, Frank Hill, Anup K. Ghosh:
Protecting Data from Malicious Software. ACSAC 2002: 199-208
skipping 12 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-21 06:51 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint