24. ACSAC 2008:
Anaheim,
California,
USA
Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008.
IEEE Computer Society 2008, ISBN 978-0-7695-3447-3
Invited Talk
- O. Sami Saydjari:
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint.
3-10
Forensics and Security Management
- Paul F. Farrell Jr., Simson L. Garfinkel, Douglas White:
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage.
13-22
- Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz:
Systematic Signature Engineering by Re-use of Snort Signatures.
23-32
- Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura:
Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window.
33-42
Operating Systems and Memory Security
- Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger:
New Side Channels Targeted at Passwords.
45-54
- William Enck, Patrick Drew McDaniel, Trent Jaeger:
PinUP: Pinning User Files to Known Applications.
55-64
- William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick Drew McDaniel, Adam Smith:
Defending Against Attacks on Main Memory Persistence.
65-74
Kernel-Level Defensive Techniques
Graphical Passwords and Biometrics
- Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot:
On Purely Automated Attacks and Click-Based Graphical Passwords.
111-120
- Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu:
YAGP: Yet Another Graphical Password Strategy.
121-129
- Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System.
130-139
- Xunhua Wang, Philip D. Huff, Brett C. Tjaden:
Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection.
140-149
Access Control
- Mathias Kohler, Andreas Schaad:
ProActive Access Control for Business Process-Driven Environments.
153-162
- Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu:
Assessing Quality of Policy Properties in Verification of Access Control Policies.
163-172
- Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani:
Please Permit Me: Stateless Delegated Authorization in Mashups.
173-182
- Günter Karjoth, Andreas Schade, Els Van Herreweghen:
Implementing ACL-Based Policies in XACML.
183-192
Network Security
Role-Based Access Control
Intrusion Detection
Malware and Data Protection
Web-Based Applications Security
Anomaly and Misuse Detection
Classic Papers
Authentication
Applied Cryptography
Copyright © Sun Mar 14 22:54:39 2010
by Michael Ley (ley@uni-trier.de)