Sciweavers

46 search results - page 2 / 10
» acsac 2000
Sort
View
ACSAC
2000
IEEE
13 years 9 months ago
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha...
ACSAC
2000
IEEE
13 years 9 months ago
Experience with Software Watermarking
Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di M...
ACSAC
2000
IEEE
13 years 9 months ago
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
ACSAC
2003
IEEE
13 years 10 months ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
ACSAC
2000
IEEE
13 years 9 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh