default search action
19th S&P 1998: Oakland, California, USA
- Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings. IEEE Computer Society 1998, ISBN 0-8186-8386-4
Access Control
- Richard Hayton, Jean Bacon, Ken Moody:
Access Control in an Open Distributed Environment. 3-14 - Timothy Fraser, Lee Badger:
Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE. 15-26 - Heather M. Hinton:
Composing Partially-Specified Systems. 27-37
Java Security
- Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin:
Secure Execution of Java Applets using a Remote Playground. 40-51 - Dan S. Wallach, Edward W. Felten:
Understanding Java Stack Inspection. 52-63
Cryptography I
- Chris Carroll, Yair Frankel, Yiannis Tsiounis:
Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems. 66-76 - Feng Bao, Robert H. Deng, Wenbo Mao:
Efficient and Practical Fair Exchange Protocols with Off-Line TTP. 77-85 - N. Asokan, Victor Shoup, Michael Waidner:
Asynchronous Protocols for Optimistic Fair Exchange. 86-99
Architectures
- Anup K. Ghosh, Tom O'Connor, Gary McGraw:
An Automated Approach for Identifying Potential Vulnerabilities in Software. 104-114 - Kirk A. Bradley, Steven Cheung, Nicholas J. Puketza, Biswanath Mukherjee, Ronald A. Olsson:
Detecting Disruptive Routers: A Distributed Network Monitoring Approach. 115-124 - Jonathan T. Trostle:
Timing Attacks Against Trusted Path. 125-134
Database Security and Biometrics
- Sang Hyuk Son, Craig Chaney, Norris P. Thomlinson:
Partial Security Policies to Support Timeliness in Secure Real-Time Databases. 136-147 - George I. Davida, Yair Frankel, Brian J. Matt:
On Enabling Secure Applications Through Off-Line Biometric Identification. 148-157
Formal Methods I
- F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
Strand Spaces: Why is a Security Protocol Correct? 160-171 - Virgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo:
On the Formal Definition of Separation-of-Duty Policies and their Composition. 172-183
Formal Methods II
- Andrew C. Myers, Barbara Liskov:
Complete, Safe Information Flow with Decentralized Labels. 186-197 - Premkumar T. Devanbu, Stuart G. Stubblebine:
Stack and Queue Integrity on Hostile Platforms. 198-206
Cryptography II
- Wenbo Mao:
Necessity and Realization of Universally Verifiable Secret Sharing. 208-214 - Tomas Sander, Christian F. Tschudin:
Towards Mobile Cryptography. 215-224
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.