Daniel F. Sterne

According to our database1, Daniel F. Sterne authored at least 20 papers between 1985 and 2005.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2005
A General Cooperative Intrusion Detection Architecture for MANETs.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

2004
Cyber defense technology networking and evaluation.
Commun. ACM, 2004

2002
Active Network Based DDoS Defense.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

IBAN: Intrusion Blocker Based on Active Networks.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

2001
Autonomic Response to Distributed Denial of Service Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

1999
Scalable Access Control for Distributed Object Systems.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

1997
An MBone Proxy for an Application Gateway Firewall.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Domain and Type Enforcement Firewalls.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
A Domain and Type Enforcement UNIX Prototype.
Comput. Syst., 1996

Confining Root Programs with Domain and Type Enforcement.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996

1995
A Domain and Type Enforcement UNIX Prototype.
Proceedings of the 5th USENIX Security Symposium, 1995

Practical Domain and Type Enforcement for UNIX.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

1994
Redrawing the Security Perimeter of a Trusted System.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

Panel: Reconsidering the Role fo the Reference Monitor.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1991
On the Buzzword "Security Policy".
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

1989
Auditing: a relevant contribution to trusted database management systems.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

Evaluation issues for an integrated 'INFOSEC' product.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

A risk driven process model for the development of trusted systems.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1988
A simplified graphic notation for Ada programs.
Proceedings of the Conference on TRI-Ada 1988, 1988

1985
Use of Ada for shipboard embedded applications.
Proceedings of the Second Annual Washington Ada Symposium on Ada, 1985


  Loading...