Default Cover Image

Computer Security Applications Conference, Annual

Dec. 11 2000 to Dec. 15 2000

New Orleans, Louisiana

ISSN: 1063-9527

ISBN: 0-7695-0859-6

Table of Contents

Defining, computing and interpreting trustFull-text access may be available. Sign in or learn about subscription options.pp. 88-88
Message from the Conference ChairFreely available from IEEE.pp. xiii
Conference CommitteeFreely available from IEEE.pp. xiv
Program CommitteeFreely available from IEEE.pp. xvi
Tutorial CommitteeFreely available from IEEE.pp. xvii
ReviewersFreely available from IEEE.pp. xviii
Speaker BiographiesFull-text access may be available. Sign in or learn about subscription options.pp. xix
Track A: Intrusion Detection
Security against compelled disclosureFull-text access may be available. Sign in or learn about subscription options.pp. 2
Track A: Intrusion Detection
Security agility in response to intrusion detectionFull-text access may be available. Sign in or learn about subscription options.pp. 11
Track A: Intrusion Detection
Two state-based approaches to program-based anomaly detectionFull-text access may be available. Sign in or learn about subscription options.pp. 21
Track B: Distributed/Network Security
Denial of service protection the nozzleFull-text access may be available. Sign in or learn about subscription options.pp. 32
Track B: Distributed/Network Security
Virtual enterprise networks: the next generation of secure enterprise networkingFull-text access may be available. Sign in or learn about subscription options.pp. 42
Track B: Distributed/Network Security
Enabling secure on-line DNS dynamic updateFull-text access may be available. Sign in or learn about subscription options.pp. 52
Track A: Engineering and Analysis
Layering boundary protections: an experiment in information assuranceFull-text access may be available. Sign in or learn about subscription options.pp. 60
Track A: Engineering and Analysis
Extending Java for package based access controlFull-text access may be available. Sign in or learn about subscription options.pp. 67
Track A: Engineering and Analysis
Secure smart homes using Jini and UIUC SESAMEFull-text access may be available. Sign in or learn about subscription options.pp. 77
Track B: Defining, Computing, and Interpreting Trust
Panel StatementFull-text access may be available. Sign in or learn about subscription options.pp. 88
Track A: Security Policy
Implementing security policies using the Safe Areas of Computation approachFull-text access may be available. Sign in or learn about subscription options.pp. 90
Track A: Security Policy
Policy mediation for multi-enterprise environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 100
Track A: Security Policy
Protection profiles for remailer mixes - Do the new evaluation criteria help?Full-text access may be available. Sign in or learn about subscription options.pp. 107
Track B: Public Key Infrastructure I
Binding identities and attributes using digitally signed certificatesFull-text access may be available. Sign in or learn about subscription options.pp. 120
Track B: Public Key Infrastructure I
Applications in health care using public-key certificates and attribute certificatesFull-text access may be available. Sign in or learn about subscription options.pp. 128
Track B: Public Key Infrastructure I
Scalable policy driven and general purpose public key infrastructure (PKI)Full-text access may be available. Sign in or learn about subscription options.pp. 138
Track A: Access Control I
A policy-based access control mechanism for the corporate WebFull-text access may be available. Sign in or learn about subscription options.pp. 150
Track A: Access Control I
Dynamic access control through Petri net workflowsFull-text access may be available. Sign in or learn about subscription options.pp. 159
Track A: Access Control I
Framework for role-based delegation modelsFull-text access may be available. Sign in or learn about subscription options.pp. 168
Track B: Intrusion Detection II
A network audit system for host-based intrusion detection (NASHID) in LinuxFull-text access may be available. Sign in or learn about subscription options.pp. 178
Track B: Intrusion Detection II
Less harm, less worry or how to improve network security by bounding system offensivenessFull-text access may be available. Sign in or learn about subscription options.pp. 188
Track B: Intrusion Detection II
A self-extension monitoring for security managementFull-text access may be available. Sign in or learn about subscription options.pp. 196
Collaboration: can it be done securely?Full-text access may be available. Sign in or learn about subscription options.pp. 206-206
Track B: Security Architecture
Security architecture for federated cooperative information systemsFull-text access may be available. Sign in or learn about subscription options.pp. 208
Track B: Security Architecture
Secure compartmented data access over an untrusted network using a COTS-based architectureFull-text access may be available. Sign in or learn about subscription options.pp. 217
Track B: Security Architecture
Security architectures for controlled digital information disseminationFull-text access may be available. Sign in or learn about subscription options.pp. 224
Track A: Engineering and Analysis II
Using operating system wrappers to increase the resiliency of commercial firewallsFull-text access may be available. Sign in or learn about subscription options.pp. 236
Track A: Engineering and Analysis II
On computer viral infection and the effect of immunizationFull-text access may be available. Sign in or learn about subscription options.pp. 246
Track A: Engineering and Analysis II
ITS4: A static vulnerability scanner for C and C++ codeFull-text access may be available. Sign in or learn about subscription options.pp. 257
Track B: Public Key Infrastructure II
A novel approach to on-line status authentication of public-key certificatesFull-text access may be available. Sign in or learn about subscription options.pp. 270
Track B: Public Key Infrastructure II
A reliable, scalable general-purpose certificate storeFull-text access may be available. Sign in or learn about subscription options.pp. 278
Track B: Public Key Infrastructure II
Introducing decryption authority into PKIFull-text access may be available. Sign in or learn about subscription options.pp. 288
Track A: E-Commerce
Using attribute certificates with mobile policies in electronic commerce applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 298
Track A: E-Commerce
Experience with software watermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 308
Track A: E-Commerce
Efficient commerce protocols based on one-time padsFull-text access may be available. Sign in or learn about subscription options.pp. 317
Track B: Security Management
Policy-based Authentication and Authorization: Secure Access to the Network InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 328
Track B: Security Management
Calculating costs for quality of security serviceFull-text access may be available. Sign in or learn about subscription options.pp. 334
Track B: Security Management
Usability meets security - the Identity-Manager as your personal security assistant for the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 344
Friday, 10:30 A.M., December 15
A flexible access control service for Java mobile codeFull-text access may be available. Sign in or learn about subscription options.pp. 356
Friday, 10:30 A.M., December 15
Personal security environment on Palm PDAFull-text access may be available. Sign in or learn about subscription options.pp. 366
Friday, 10:30 A.M., December 15
History based distributed filtering - a tagging approach to network-level access controlFull-text access may be available. Sign in or learn about subscription options.pp. 373
Track B: Cryptography
The Chinese Remainder Theorem and its application in a high-speed RSA crypto chipFull-text access may be available. Sign in or learn about subscription options.pp. 384
Track B: Cryptography
Fair on-line gamblingFull-text access may be available. Sign in or learn about subscription options.pp. 394
Track B: Cryptography
A high-speed ECC-based wireless authentication on an ARM microprocessorFull-text access may be available. Sign in or learn about subscription options.pp. 401
Track B: Cryptography
Author IndexFreely available from IEEE.pp. 411
Showing 53 out of 53