Search dblp for Publications

export results for "toc:db/conf/acsac/acsac2000.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/Al-MuhtadiAMC00,
  author       = {Jalal Al{-}Muhtadi and
                  Manish Anand and
                  M. Dennis Mickunas and
                  Roy H. Campbell},
  title        = {Secure Smart Homes using Jini and {UIUC} {SESAME}},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {77},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898860},
  doi          = {10.1109/ACSAC.2000.898860},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Al-MuhtadiAMC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AydosYK00,
  author       = {Murat Aydos and
                  Tugrul Yanik and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {An High-Speed ECC-based Wireless Authentication Protocol on an {ARM}
                  Microprocessor},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {401--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898895},
  doi          = {10.1109/ACSAC.2000.898895},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AydosYK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Bao00,
  author       = {Feng Bao},
  title        = {Introducing Decryption Authority into {PKI}},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {288},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898883},
  doi          = {10.1109/ACSAC.2000.898883},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Bao00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BarkaS00,
  author       = {Ezedin Barka and
                  Ravi S. Sandhu},
  title        = {Framework for Role-based Delegation Models},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {168},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898870},
  doi          = {10.1109/ACSAC.2000.898870},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BarkaS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BieberRS00,
  author       = {Pierre Bieber and
                  D. Raujol and
                  Pierre Siron},
  title        = {Security Architecture for Federated Cooperative Information Systems},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {208--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898875},
  doi          = {10.1109/ACSAC.2000.898875},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BieberRS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BrownL00,
  author       = {Ian Brown and
                  B. Laurie},
  title        = {Security Against Compelled Disclosure},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {2--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898852},
  doi          = {10.1109/ACSAC.2000.898852},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BrownL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BruschiCR00,
  author       = {Danilo Bruschi and
                  Lorenzo Cavallaro and
                  Emilia Rosti},
  title        = {Less Harm, Less Worry or How to Improve Network Security by Bounding
                  System Offensiveness},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {188--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898872},
  doi          = {10.1109/ACSAC.2000.898872},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BruschiCR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaroniKSS00,
  author       = {Germano Caronni and
                  Sandeep Kumar and
                  Christoph L. Schuba and
                  Glenn Scott},
  title        = {Virtual Enterprise Networks: The Next Generation of Secure Enterprise
                  Networking},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {42--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898856},
  doi          = {10.1109/ACSAC.2000.898856},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaroniKSS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ClarkMV00,
  author       = {P. C. Clark and
                  M. C. Meissner and
                  K. O. Vance},
  title        = {Secure Compartmented Data Access over an Untrusted Network using a
                  COTS-based Architecture},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {217--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898876},
  doi          = {10.1109/ACSAC.2000.898876},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ClarkMV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CorradiMSLS00,
  author       = {Antonio Corradi and
                  Rebecca Montanari and
                  Cesare Stefanelli and
                  Emil Lupu and
                  Morris Sloman},
  title        = {A Flexible Access Control Service for Java Mobile Code},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {356--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898890},
  doi          = {10.1109/ACSAC.2000.898890},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CorradiMSLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DanielsS00,
  author       = {Thomas E. Daniels and
                  Eugene H. Spafford},
  title        = {A Network Audit System for Host-based Intrusion Detection {(NASHID)}
                  in Linux},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {178--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898871},
  doi          = {10.1109/ACSAC.2000.898871},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DanielsS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DoshiFJM00,
  author       = {Vinti Doshi and
                  Amgad Fayad and
                  Sushil Jajodia and
                  Roswitha MacLean},
  title        = {Using Attribute Certificates with Mobile Policies in Electronic Commerce
                  Applications},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {298--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898884},
  doi          = {10.1109/ACSAC.2000.898884},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DoshiFJM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EpsteinTM00,
  author       = {Jeremy Epstein and
                  L. Thomas and
                  Eric Monteith},
  title        = {Using Operating System Wrappers to Increase the Resiliency to Commercial
                  Firewalls},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {236--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898878},
  doi          = {10.1109/ACSAC.2000.898878},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EpsteinTM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FaldellaP00,
  author       = {Eugenio Faldella and
                  Marco Prandini},
  title        = {A Novel Approach to On-Line Status Authentication of Public-Key Certificates},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {270--277},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898881},
  doi          = {10.1109/ACSAC.2000.898881},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FaldellaP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FreudenthalHW00,
  author       = {Margus Freudenthal and
                  Sven Heiberg and
                  Jan Willemson},
  title        = {Personal Security Environment on Palm {PDA}},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {366--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898891},
  doi          = {10.1109/ACSAC.2000.898891},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FreudenthalHW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaliassoBHSFH00,
  author       = {Pablo Galiasso and
                  Oliver Bremer and
                  John Hale and
                  Sujeet Shenoi and
                  David F. Ferraiolo and
                  Vincent C. Hu},
  title        = {Policy Mediation for Multi-Enterprise Environments},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {100--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898863},
  doi          = {10.1109/ACSAC.2000.898863},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaliassoBHSFH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Grossschadl00,
  author       = {Johann Gro{\ss}sch{\"{a}}dl},
  title        = {The Chinese Remainder Theorem and its Application in a High-Speed
                  {RSA} Crypto Chip},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {384--393},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898893},
  doi          = {10.1109/ACSAC.2000.898893},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Grossschadl00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Gutmann00,
  author       = {Peter Gutmann},
  title        = {A Reliable, Scalable General-Purpose Certificate Store},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {278--287},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898882},
  doi          = {10.1109/ACSAC.2000.898882},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Gutmann00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HalePBCS00,
  author       = {John Hale and
                  Mauricio Papa and
                  Oliver Bremer and
                  Rodrigo Chandia and
                  Sujeet Shenoi},
  title        = {Extending Java for Package based Access Control},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {67--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898859},
  doi          = {10.1109/ACSAC.2000.898859},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HalePBCS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Hayes00,
  author       = {Jeff Hayes},
  title        = {Policy-based Authentication and Authorization: Secure Access to the
                  Network Infrastructure},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {328--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898887},
  doi          = {10.1109/ACSAC.2000.898887},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Hayes00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuangRWD00,
  author       = {Xunhua Wang and
                  Yih Huang and
                  Yvo Desmedt and
                  David Rine},
  title        = {Enabling Secure On-Line {DNS} Dynamic Update},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {52},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898857},
  doi          = {10.1109/ACSAC.2000.898857},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuangRWD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JangK00,
  author       = {Heejin Jang and
                  Sangwook Kim},
  title        = {A Self-Extension Monitoring for Security Management},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {196},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898873},
  doi          = {10.1109/ACSAC.2000.898873},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JangK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JendrickeM00,
  author       = {Uwe Jendricke and
                  Daniela Gerd tom Markotten},
  title        = {Usability Meets Security -The Identity-Manager as Your Personal Security
                  Assistant for the Internet},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {344},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898889},
  doi          = {10.1109/ACSAC.2000.898889},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JendrickeM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JohnsonB00,
  author       = {Dale M. Johnson and
                  Lee A. Benzinger},
  title        = {Layering Boundary Protections: An Experiment in Information Assurance},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {60--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898858},
  doi          = {10.1109/ACSAC.2000.898858},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JohnsonB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Knorr00,
  author       = {Konstantin Knorr},
  title        = {Dynamic Access Control through Petri Net Workflows},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {159--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898869},
  doi          = {10.1109/ACSAC.2000.898869},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Knorr00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MichaelG00,
  author       = {Christoph C. Michael and
                  Anup K. Ghosh},
  title        = {Two State-based Approaches to Program-based Anomaly Detection},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {21},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898854},
  doi          = {10.1109/ACSAC.2000.898854},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MichaelG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PalsbergKKMSZ00,
  author       = {Jens Palsberg and
                  S. Krishnaswamy and
                  Minseok Kwon and
                  Di Ma and
                  Qiuyun Shao and
                  Y. Zhang},
  title        = {Experience with Software Watermarking},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {308--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898885},
  doi          = {10.1109/ACSAC.2000.898885},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PalsbergKKMSZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkS00,
  author       = {Joon S. Park and
                  Ravi S. Sandhu},
  title        = {Binding Identities and Attributes using Digitally Signed Certificates},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {120--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898865},
  doi          = {10.1109/ACSAC.2000.898865},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkSS00,
  author       = {Jaehong Park and
                  Ravi S. Sandhu and
                  J. Schifalacqua},
  title        = {Security Architectures for Controlled Digital Information Dissemination},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {224},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898877},
  doi          = {10.1109/ACSAC.2000.898877},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkSS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PetkacB00,
  author       = {Michael J. Petkac and
                  Lee Badger},
  title        = {Security Agility in Response to Intrusion Detection},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898853},
  doi          = {10.1109/ACSAC.2000.898853},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PetkacB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PrasadPABLD00,
  author       = {Vishwa Prasad and
                  Sreenivasa Potakamuri and
                  Michael Ahern and
                  Igor Balabine and
                  Michah Lerner and
                  Partha Dutta},
  title        = {Scalable Policy Driven and General Purpose Public Key Infrastructure
                  {(PKI)}},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {138},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898867},
  doi          = {10.1109/ACSAC.2000.898867},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PrasadPABLD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RannenbergI00,
  author       = {Kai Rannenberg and
                  Giovanni Iachello},
  title        = {Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria
                  Help?},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {107},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898864},
  doi          = {10.1109/ACSAC.2000.898864},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RannenbergI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SailerK00,
  author       = {Reiner Sailer and
                  Matthias Kabatnik},
  title        = {History-based Distributed Filtering - {A} Tagging Approach to Network-Level
                  Access Control},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {373},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898892},
  doi          = {10.1109/ACSAC.2000.898892},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SailerK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SantosK00,
  author       = {Andr{\'{e}} L. M. dos Santos and
                  Richard A. Kemmerer},
  title        = {Implementing Security Policies using the Safe Areas of Computation
                  Approach},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {90--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898862},
  doi          = {10.1109/ACSAC.2000.898862},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SantosK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchneiderF00,
  author       = {Michael A. Schneider and
                  Edward W. Felten},
  title        = {Efficient Commerce Protocols based on One-Time Pads},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {317},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898886},
  doi          = {10.1109/ACSAC.2000.898886},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchneiderF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SpyropoulouLI00,
  author       = {E. Spyropoulou and
                  Timothy E. Levin and
                  Cynthia E. Irvine},
  title        = {Calculating Costs for Quality of Security Service},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {334--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898888},
  doi          = {10.1109/ACSAC.2000.898888},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SpyropoulouLI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Strother00,
  author       = {E. Strother},
  title        = {Denial of Service Protection - The Nozzle},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {32--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898855},
  doi          = {10.1109/ACSAC.2000.898855},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Strother00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UngureanuVM00,
  author       = {Victoria Ungureanu and
                  F. Vesuna and
                  Naftaly H. Minsky},
  title        = {A Policy-based Access Control Mechanism for the Corporate Web},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {150--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898868},
  doi          = {10.1109/ACSAC.2000.898868},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/UngureanuVM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ViegaBKM00,
  author       = {John Viega and
                  J. T. Bloch and
                  Y. Kohno and
                  Gary McGraw},
  title        = {{ITS4:} {A} Static Vulnerability Scanner for {C} and {C++} Code},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {257},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898880},
  doi          = {10.1109/ACSAC.2000.898880},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ViegaBKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangKE00,
  author       = {Chenxi Wang and
                  John C. Knight and
                  Matthew C. Elder},
  title        = {On Computer Viral Infection and the Effect of Immunization},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {246--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898879},
  doi          = {10.1109/ACSAC.2000.898879},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangKE00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WohlmacherP00,
  author       = {Petra Wohlmacher and
                  Peter Pharow},
  title        = {Applications in Health Care using Public-Key Certificates and Attribute
                  Certificates},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {128--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898866},
  doi          = {10.1109/ACSAC.2000.898866},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WohlmacherP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhaoVM00,
  author       = {Weiliang Zhao and
                  Vijay Varadharajan and
                  Yi Mu},
  title        = {Fair On-line Gambling},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {394--400},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898894},
  doi          = {10.1109/ACSAC.2000.898894},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhaoVM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2000,
  title        = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7224/proceeding},
  isbn         = {0-7695-0859-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics