Sciweavers

Share
17 search results - page 1 / 4
» acsac 1998
Sort
View
ACSAC
1998
IEEE
10 years 7 months ago
The Solar Trust Model: Authentication Without Limitation
Michael Clifford, C. Lavine, Matt Bishop
ACSAC
2010
IEEE
10 years 20 days ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
ACSAC
1998
IEEE
10 years 7 months ago
A Certified E-Mail Protocol
Protocols to facilitate secure electronic delivery are necessary if the Internet is to achieve its true potential as a business communications tool. We present a protocol for secu...
Bruce Schneier, James Riordan
ACSAC
1998
IEEE
10 years 7 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer
ACSAC
1998
IEEE
10 years 7 months ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang
books