Sign in
Workshop on New Security Paradigms
1998
1998
1998
Keyphrases
Publications
1998
Meng-Jang Lin
,
Aleta Ricciardi
,
Keith Marzullo
A New Model for Availability in the Face of Self-Propagating Attacks.
Workshop on New Security Paradigms
(1998)
John P. McDermott
Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks.
Workshop on New Security Paradigms
(1998)
Marshall D. Abrams
Security Engineering in an Evolutionary Acquisition Environment.
Workshop on New Security Paradigms
(1998)
Erland Jonsson
An Integrated Framework for Security and Dependability.
Workshop on New Security Paradigms
(1998)
Cynthia A. Phillips
,
Laura Painton Swiler
A Graph-based System for Network-vulnerability Analysis.
Workshop on New Security Paradigms
(1998)
Liwu Chang
,
Ira S. Moskowitz
Parsimonious Downgrading and Decision Trees Applied to the Inference Problem.
Workshop on New Security Paradigms
(1998)
Clifford E. Kahn
Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration.
Workshop on New Security Paradigms
(1998)
Thomas Riechmann
,
Franz J. Hauck
Meta Objects for Access Control: a Formal Model for Role-Based Principals.
Workshop on New Security Paradigms
(1998)
Chris Slater
,
O. Sami Saydjari
,
Bruce Schneier
,
Jim Wallner
Toward a Secure System Engineering Methodolgy.
Workshop on New Security Paradigms
(1998)
Donald Beaver
Server-Assisted Cryptography.
Workshop on New Security Paradigms
(1998)
Simon N. Foley
Evaluating System Integrity.
Workshop on New Security Paradigms
(1998)
Steven J. Greenwald
Discussion Topic: What is the Old Security Paradigm?
Workshop on New Security Paradigms
(1998)
Crispin Cowan
,
Calton Pu
Death, Taxes, and Imperfact Software: Surviving the Inevitable.
Workshop on New Security Paradigms
(1998)