Default Cover Image

Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)

May 9 1999 to May 12 1999

Oakland, California

ISSN: 1540-7993

ISBN: 0-7695-0176-1

Table of Contents

Message from the Program ChairsFreely available from IEEE.pp. ix
Symposium CommitteeFreely available from IEEE.pp. x
Systems
Hardening COTS Software with Generic Software WrappersFull-text access may be available. Sign in or learn about subscription options.pp. 0002
Systems
Firmato: A Novel Firewall Management ToolkitFull-text access may be available. Sign in or learn about subscription options.pp. 0017
Systems
Flexible Policy-Directed Code SafetyFull-text access may be available. Sign in or learn about subscription options.pp. 0032
Policy
Local Reconfiguration PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 0048
Policy
A User-Centered, Modular Authorization Service Built on an RBAC FoundationFull-text access may be available. Sign in or learn about subscription options.pp. 0057
Verification
Secure Communications Processing for Distributed LanguagesFull-text access may be available. Sign in or learn about subscription options.pp. 0074
Verification
Verification of Control Flow Based Security PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 0089
Panel 1: Brief History of Twenty Years of Computer Security Research
Twenty Years of Cryptography in the Open LiteratureFull-text access may be available. Sign in or learn about subscription options.pp. 0106
Panel 1: Brief History of Twenty Years of Computer Security Research
20 Years of Operating Systems SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 0108
Panel 1: Brief History of Twenty Years of Computer Security Research
Twenty Years of Evaluation Criteria and Commercial TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 0111
Panel 1: Brief History of Twenty Years of Computer Security Research
20 Years of Covert Channel Modeling and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 0113
Panel 1: Brief History of Twenty Years of Computer Security Research
Twenty Years of Formal MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 0115
Panel 1: Brief History of Twenty Years of Computer Security Research
Network Security: Then and Now, or, 20 Years in 10 MinutesFull-text access may be available. Sign in or learn about subscription options.pp. 0117
Intrusion Detection
A Data Mining Framework for Building Intrusion Detection ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 0120
Intrusion Detection
Detecting Intrusions using System Calls: Alternative Data ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 0133
Intrusion Detection
Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)Full-text access may be available. Sign in or learn about subscription options.pp. 0146
Panel 2: Near Misses and Hidden Treasures in Early Computer Security Research
Full-text access may be available. Sign in or learn about subscription options.pp. null
Information Flow
A Multi-threading Architecture for Multilevel Secure Transaction ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 0166
Information Flow
Specification and Enforcement of Classification and Inference ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 0181
Information Flow
A Test for Non-Disclosure in Security Level TranslationsFull-text access may be available. Sign in or learn about subscription options.pp. 0196
Authentication and Key Exchange
Software Smart Cards via Cryptographic CamouflageFull-text access may be available. Sign in or learn about subscription options.pp. 0208
Authentication and Key Exchange
Analysis of the Internet Key Exchange Protocol Using the NRL Protocol AnalyzerFull-text access may be available. Sign in or learn about subscription options.pp. 0216
Panel Discussion 3: Time Capsule — Twenty Years from Now
How Computers will be Used Differently in the Next Twenty YearsFull-text access may be available. Sign in or learn about subscription options.pp. 0234
Panel Discussion 3: Time Capsule — Twenty Years from Now
The Hardware EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 0236
Panel Discussion 3: Time Capsule — Twenty Years from Now
Software Technology of the FutureFull-text access may be available. Sign in or learn about subscription options.pp. 0237
Panel Discussion 3: Time Capsule — Twenty Years from Now
Twenty Year Time Capsule Panel The Future of NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 0239
Panel Discussion 3: Time Capsule — Twenty Years from Now
The Future Is Not Assured -- But It Should BeFull-text access may be available. Sign in or learn about subscription options.pp. 0240
Panel Discussion 3: Time Capsule — Twenty Years from Now
Index of AuthorsFreely available from IEEE.pp. 0243
Showing 31 out of 31