Private desktops and shared store
Pomeroy, B., Wiseman, S.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Towards an infrastructure for MLS distributed computing
Kang, M.H., Froscher, J.N., Eppinger, B.J.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Security services in an open service environment
Sailer, R.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Protecting Web servers from security holes in server-side includes
Karro, J., Jie Wang
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Security architecture for a virtual heterogeneous machine
Wright, R., Shifflett, D.J., Irvine, C.E.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
A hardware independent encryption model for ATM devices
Leitold, H., Payer, U., Posch, R.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Rule-based filtering for Java applets
Iglio, P., Fraticelli, F., Giuri, L.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Controlling applets' behavior in a browser
Hassler, V., Then, O.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Wachet auf! Computer security and the millennium
Smith, F.C., Bailey, D.J.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding
Secure signaling and access control for ATM networks
Shankaran, R., Varadharajan, V.
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Published in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) (1998)
Get full text
Conference Proceeding