default search action
19. ACSAC 2003: Las Vegas, NV, USA
- 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA. IEEE Computer Society 2003, ISBN 0-7695-2041-3
Distinguished Practitioner
- Clark Weissman:
MLS-PCA: A High Assurance Security Architecture for Future Avionics. 2-12
Intrusion Detection I
- Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur:
Bayesian Event Classification for Intrusion Detection. 14-23 - Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer:
Intrusion Detection: A Bioinformatics Approach. 24-33 - Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers. 34-43
Network Security
- James P. Early, Carla E. Brodley, Catherine Rosenberg:
Behavioral Authentication of Server Flows. 46-55 - Holger Peine, Reinhard Schwarz:
A Multi-View Tool for Checking the Security Semantics of Router Configurations. 56-65 - Danilo Bruschi, A. Ornaghi, Emilia Rosti:
S-ARP: a Secure Address Resolution Protocol. 66-74
Defensive Information Warfare
- Matthew M. Williamson:
Design, Implementation and Test of an Email Virus Throttle. 76-85 - Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs:
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. 86-95 - Zhaole Chen, Moon-Chuen Lee:
An IP Traceback Technique against Denial-of-Service Attacks. 96-104
Forum
- David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro:
Forum Session: Security for Wireless Sensor Networks. 106-107
Applied Cryptography
- Xunhua Wang, Mohammad Hossain Heydari, Hua Lin:
An Intrusion-Tolerant Password Authentication System. 110-118 - Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn:
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. 119-128 - John Viega:
Practical Random Number Generation in Software. 129-140
Recovery and Forensics
- Meng Yu, Peng Liu, Wanyu Zang:
Multi-Version Attack Recovery for Workflow System. 142-150 - Kulesh Shanmugasundaram, Nasir D. Memon:
Automatic Reassembly of Document Fragments via Context Based Statistical Models. 152-159 - Tye Stallard, Karl N. Levitt:
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. 160-167
Invited Essayist Plenary
- Lance Spitzner:
Honeypots: Catching the Insider Threat. 170-179
Software Safety and Program Correctness
- Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. 182-191 - Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti:
How to unwittingly sign non-repudiable documents with Java applications. 192-196 - Hailin Wu, Andrew Burt, Ramki Thurimella:
Making Secure TCP Connections Resistant to Server Failures. 197-206
Classic Papers
- Peter G. Neumann, Richard J. Feiertag:
PSOS Revisited. 208-216 - Eugene H. Spafford:
A Failure to Learn from the Past. 217-231
Event Correlation
- Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi:
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. 234-244 - Nathan Carey, George M. Mohay, Andrew J. Clark:
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. 245-254 - Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe:
Log Correlation for Intrusion Detection: A Proof of Concept. 255-264
Security Engineering & Management
- Giovanni Iachello:
Protecting Personal Data: Can IT Security Management Standards Help? 266-275 - Raj Mohan, Timothy E. Levin, Cynthia E. Irvine:
An Editor for Adaptive XML-Based Policy Management of IPsec. 276-285 - Jeff Jianxin Yan:
Security Design in Online Games. 286-295
Enterprise Security
- Thomas Groß:
Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. 298-307 - Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson:
Scalable and Efficient PKI for Inter-Organizational Communication. 308-318 - Ramaswamy Chandramouli:
A Policy Validation Framework for Enterprise Authorization Specification. 319-328
Forum
- O. Sami Saydjari, Carla Marceau:
Themes and Highlights of the New Security Paradigms Workshop 2003. 330-331
Operating System Security
- Stephen D. Wolthusen:
Goalkeeper: Close-In Interface Protection. 334-341 - Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost:
Poly2 Paradigm: A Secure Network Service Architecture. 342-351 - Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha:
Defending Embedded Systems Against Buffer Overflow via Hardware/Software. 352-361
Intrusion Detection II
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan:
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. 364-373 - Darren Mutz, Giovanni Vigna, Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. 374-383 - Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson:
Synthesizing Test Data for Fraud Detection Systems. 384-394
Access Control
- Patrick M. Widener, Karsten Schwan, Fabián E. Bustamante:
Differential Data Protection for Dynamic Distributed Application. 396-405 - Dirk Balfanz:
Usable Access Control for the World Wide Web. 406-415 - Frédéric Cuppens, Alexandre Miège:
Modelling Contexts in the Or-BAC Model. 416-425
Panel
- Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem G. Brutch:
Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. 428-429
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.