default search action
12. ACSAC 1996: San Diego, California, USA
- 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA. IEEE Computer Society 1996
Security Engineering
- Andreas Sterbenz:
An Evaluation of the Java Security Model. 2-14 - M. Nash, R. J. Kennett:
Implementing Security Policy in a Large Defense Procurement. 15-23 - John Kelsey, Bruce Schneier, Chris Hall:
An Authenticated Camera. 24-30
Secure Links
- Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese:
A Case Study Of Two Nrl Pump Prototypes. 32-43 - John A. Davidson:
Asymmetric Isolation. 44-54 - Mark S. Anderson, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John D. Yesberg, Kenneth Kwok-Hei Yiu:
Starlight: Interactive Link. 55-63
Forum: Alternate Assurance Working Group
- Herve Hosy, Mary Schanken:
Common Criteria Activities and Alternative Assurance. 65
Forum: SSE-CMM Pilot Results
- Mary Schanken:
SSE-CMM Pilot Results. 67
Electronic Payment
- Manfred Holzbach:
Security Measures For The Austrian "Paychip" Electronic Purse Application. 69-77 - Vijay Varadharajan, Yi Mu:
On The Design Of Secure Electronic Payment Schemes For Internet. 78-87 - Brigitte Althen, Gerd Enste, Brigitte Nebelung:
Innovative Secure Payments On The Internet Using The German Electronic Purse. 88-93
Cryptographic Protocols
- Michael G. Reed, Paul F. Syverson, David M. Goldschlag:
Proxies For Anonymous Routing. 95-104 - Michael Hitchens, Vijay Varadharajan:
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. 105-116 - Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin:
Verifying The Correctness Of Cryptographic Protocols Using "Convince". 117-128 - Ning Zhang, Qi Shi:
Security Issues in an EDI Environment. 129-136
Forum: Security and the National Telecommunications Infrastructure
- Teresa F. Lunt, John Kimmins, Bob McKosky:
Security and the National Telecommunications Infrastructure. 138
Security Architecture
- Jeremy Epstein, Tim Williams:
Using Fortezza For Transparent File Encryption. 140-147 - I-Lung Kao, Randy Chow:
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. 148-157 - E. John Sebes, Terry C. Vickers Benzel:
SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems. 158-168
Firewalls
- Julie L. Connolly:
Operation chain link: the deployment of a firewall at Hanscom Air Force Base. 170-177 - Richard E. Smith:
Mandatory Protection for Internet Server Software. 178-184 - Eric M. Kayden:
Using a Proxy X Server to Facilitate COTS Application Integration. 185-190
Data Base Security
- Rae K. Burns, Yi-Fang Koh:
A Comparison of Multilevel Structured Query Language (SQL) Implementations. 192-202 - Luigi Giuri, Pietro Iglio:
A Role-Based Secure Database Design Tool. 203-212
Assurance
- Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk:
Case-Based Reasoning for Intrusion Detection. 214-223 - Richard A. Kemmerer, Tad Taylor:
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. 224-235 - Pierre Bieber:
Formal Techniques for an ITSEC-E4 Secure Gateway. 236-245
Panel: Major Questions in Applying the SSE-CMM
- Joel E. Sachs:
Major Questions in Applying the SSE-CMM. 247-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.