COOTS '98 | Execution Patterns in Object-Oriented Visualization | Wim De Pauw, David Lorenz, John Vlissides, Mark Wegman |
COOTS '98 | IBDL: A Language for Interface Behavior Specification and Testing | Sreenivasa Viswanadha, Deepak Kapur |
COOTS '98 | Compile Time Symbolic Derivation with C++ Templates | Joseph Gil, Zvi Gutterman |
USENIX Security '98 | A Comparison of Methods for Implementing Adaptive Security Policies | Michael Carney, Brian Loe |
USENIX Security '98 | The CRISIS Wide Area Security Architecture | Eshwar Belani, Amin Vahdat, Thomas E. Anderson, Michael Dahlin |
USENIX Security '98 | Bro: A System for Detecting Network Intruders in Real-Time | Vern Paxson |
USENIX Security '98 | Cryptographic Support for Secure Logs on Untrusted Machines | Bruce Schneier, John Kelsey |
USENIX Security '98 | StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks | Crispin Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, Heather Hinton |
USENIX Security '98 | Data Mining Approaches for Intrusion Detection | Wenke Lee, Salvatore J. Stolfo |
USENIX Security '98 | Securing Classical IP Over ATM Networks | Carsten Benecke, Uwe Ellermann |
USENIX Security '98 | A Java Beans Component Architecture for Cryptographic Protocols | Pekka Nikander, Arto Karila |
USENIX Security '98 | Secure Videoconferencing | Peter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, Jim Rees |
USENIX Security '98 | Unified Support for Heterogeneous Security Policies in Distributed Systems | Naftaly H. Minsky, Victoria Ungureanu |
USENIX Security '98 | Operating System Protection for Fine-Grained Programs | Trent Jaeger, Jochen Liedtke, Nayeem Islam |
USENIX Security '98 | Expanding and Extending the Security Features of Java | Nimisha V. Mehta, Karen R. Sollins |
USENIX Security '98 | Towards Web Security Using PLASMA | A. Krannig |
USENIX Security '98 | Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies | Vinod Anupam, Alain Mayer |
USENIX Security '98 | Finite-State Analysis of SSL 3.0 | John C. Mitchell, Vitaly Shmatikov, Ulrich Stern |
USENIX Security '98 | Certificate Revocation and Certificate Update | Moni Naor, Kobbi Nissim |
USENIX Security '98 | Attack-Resistant Trust Metrics for Public Key Certification | Raph Levien, Alex Aiken |
USENIX Security '98 | Software Generation of Practically Strong Random Numbers | Peter Gutmann |
USITS '97 | Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web | Balachander Krishnamurthy, Craig E. Wills |
USITS '97 | Exploring the Bounds of Web Latency Reduction from Caching and Prefetching | Thomas M. Kroeger, Darrel D.E. Long, Jeffrey C. Mogul |
USITS '97 | The Measured Access Characteristics of World Wide Web Client Proxy Caches | Bradley M. Duska, David Marwood, Michael J. Feeley |
USITS '97 | A Highly Scalable Electronic Mail Service Using Open Systems | Nick Christenson, Tim Bosserman, David Beckemeyer |