default search action
8th USENIX Security Symposium 1999: Washington, DC, USA
- G. Winfield Treese:
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999. USENIX Association 1999 - Daniel F. Sterne, Gregg Tally, C. Durward McDonell, David L. Sherman, David Sames, Pierre X. Pasturel, E. John Sebes:
Scalable Access Control for Distributed Object Systems. - Mary R. Thompson, William E. Johnston, Srilekha Mudumbai, Gary Hoo, Keith R. Jackson, Abdelilah Essiari:
Certificate-based Access Control for Widely Distributed Resources. - Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine:
Digital-Ticket-Controlled Digital Ticket Circulation. - Peter Gutmann:
The Design of a Cryptographic Security Architecture. - Alma Whitten, J. Doug Tygar:
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. - Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin:
Jonah: Experience Implementing PKIX Reference Freeware. - Vassilis Prevelakis:
A Secure Station for Network Monitoring and Control. - Ray Spencer, Stephen Smalley, Peter A. Loscocco, Mike Hibler, Dave G. Andersen, Jay Lepreau:
The Flask Security Architecture: System Support for Diverse Security Policies. - Anup K. Ghosh, Aaron Schwartzbard:
A Study in Using Neural Networks for Anomaly and Misuse Detection. - Thomas D. Wu, Michael Malkin, Dan Boneh:
Building Intrusion-Tolerant Applications. - Gershon Kedem, Yuriko Ishihara:
Brute Force Attack on UNIX Passwords with SIMD Computer. - Patrick D. McDaniel, Atul Prakash, Peter Honeyman:
Antigone: A Flexible Framework for Secure Group Communication. - Tse Huong Choo:
Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories. - Dean Povey:
Enforcing Well-Formed and Partially-Formed Transactions for UNIX. - R. Sekar, Prem Uppuluri:
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. - Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
The Design and Analysis of Graphical Passwords. - Dirk Balfanz, Edward W. Felten:
Hand-Held Computers Can Be Better Smart Cards. - Arne Helme, Tage Stabell-Kulø:
Offline Delegation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.