Search results

    COOTS '98Execution Patterns in Object-Oriented VisualizationWim De Pauw, David Lorenz, John Vlissides, Mark Wegman
    COOTS '98IBDL: A Language for Interface Behavior Specification and TestingSreenivasa Viswanadha, Deepak Kapur
    COOTS '98Compile Time Symbolic Derivation with C++ TemplatesJoseph Gil, Zvi Gutterman
    USENIX Security '98A Comparison of Methods for Implementing Adaptive Security PoliciesMichael Carney, Brian Loe
    USENIX Security '98The CRISIS Wide Area Security ArchitectureEshwar Belani, Amin Vahdat, Thomas E. Anderson, Michael Dahlin
    USENIX Security '98Bro: A System for Detecting Network Intruders in Real-TimeVern Paxson
    USENIX Security '98Cryptographic Support for Secure Logs on Untrusted MachinesBruce Schneier, John Kelsey
    USENIX Security '98StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow AttacksCrispin Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, Heather Hinton
    USENIX Security '98Data Mining Approaches for Intrusion DetectionWenke Lee, Salvatore J. Stolfo
    USENIX Security '98Securing Classical IP Over ATM NetworksCarsten Benecke, Uwe Ellermann
    USENIX Security '98A Java Beans Component Architecture for Cryptographic ProtocolsPekka Nikander, Arto Karila
    USENIX Security '98Secure VideoconferencingPeter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, Jim Rees
    USENIX Security '98Unified Support for Heterogeneous Security Policies in Distributed SystemsNaftaly H. Minsky, Victoria Ungureanu
    USENIX Security '98Operating System Protection for Fine-Grained ProgramsTrent Jaeger, Jochen Liedtke, Nayeem Islam
    USENIX Security '98Expanding and Extending the Security Features of JavaNimisha V. Mehta, Karen R. Sollins
    USENIX Security '98Towards Web Security Using PLASMAA. Krannig
    USENIX Security '98Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and RemediesVinod Anupam, Alain Mayer
    USENIX Security '98Finite-State Analysis of SSL 3.0John C. Mitchell, Vitaly Shmatikov, Ulrich Stern
    USENIX Security '98Certificate Revocation and Certificate UpdateMoni Naor, Kobbi Nissim
    USENIX Security '98Attack-Resistant Trust Metrics for Public Key CertificationRaph Levien, Alex Aiken
    USENIX Security '98Software Generation of Practically Strong Random NumbersPeter Gutmann
    USITS '97Study of Piggyback Cache Validation for Proxy Caches in the World Wide WebBalachander Krishnamurthy, Craig E. Wills
    USITS '97Exploring the Bounds of Web Latency Reduction from Caching and PrefetchingThomas M. Kroeger, Darrel D.E. Long, Jeffrey C. Mogul
    USITS '97The Measured Access Characteristics of World Wide Web Client Proxy CachesBradley M. Duska, David Marwood, Michael J. Feeley
    USITS '97A Highly Scalable Electronic Mail Service Using Open SystemsNick Christenson, Tim Bosserman, David Beckemeyer