ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
Latest Publications
TOTAL DOCUMENTS
37
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE Comput. Soc
0818687894
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Towards an infrastructure for MLS distributed computing
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738587
◽
2002
◽
Cited By ~ 5
Author(s):
M.H. Kang
◽
J.N. Froscher
◽
B.J. Eppinger
Keyword(s):
Distributed Computing
Download Full-text
Maintaining security in firm real-time database systems
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738584
◽
2002
◽
Cited By ~ 19
Author(s):
Q.N. Ahmed
◽
S.V. Vrbsky
Keyword(s):
Real Time
◽
Database Systems
◽
Real Time Database
Download Full-text
The Solar Trust Model: authentication without limitation
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738650
◽
2002
◽
Cited By ~ 9
Author(s):
M. Clifford
◽
C. Lavine
◽
M. Bishop
Keyword(s):
Trust Model
Download Full-text
Security architecture for a virtual heterogeneous machine
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738611
◽
2002
◽
Cited By ~ 6
Author(s):
R. Wright
◽
D.J. Shifflett
◽
C.E. Irvine
Keyword(s):
Security Architecture
Download Full-text
Intrusion detection. Applying machine learning to Solaris audit data
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738647
◽
2002
◽
Cited By ~ 35
Author(s):
D. Endler
Keyword(s):
Machine Learning
◽
Intrusion Detection
◽
Audit Data
Download Full-text
ID-based cryptographic schemes using a non-interactive public-key distribution system
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738643
◽
2002
◽
Cited By ~ 4
Author(s):
Yuh-Min Tseng
◽
Jinn-Ke Jan
Keyword(s):
Distribution System
◽
Key Distribution
◽
Public Key
Download Full-text
How to increase security in mobile networks by anomaly detection
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738558
◽
2002
◽
Cited By ~ 15
Author(s):
R. Buschkes
◽
D. Kesdogan
◽
P. Reichl
Keyword(s):
Anomaly Detection
◽
Mobile Networks
Download Full-text
A practical approach to measuring assurance
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738653
◽
2002
◽
Cited By ~ 7
Author(s):
G.F. Jelen
◽
J.R. Williams
Keyword(s):
Practical Approach
Download Full-text
Authorization in enterprise-wide distributed system: a practical design and application
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738614
◽
2002
◽
Cited By ~ 2
Author(s):
V. Vavadharajan
◽
C. Crall
◽
J. Pato
Keyword(s):
Distributed System
◽
System A
◽
Practical Design
◽
Design And Application
Download Full-text
Anonymous secure e-voting over a network
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
◽
10.1109/csac.1998.738649
◽
2002
◽
Cited By ~ 10
Author(s):
Yi Mu
◽
V. Varadharajan
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close