2 options
15th Annual Computer Security Applications Conference. ACSAC '99 : December 6-10, 1999, Phoenix, Arizona : proceedings / sponsored by Applied Computer Security Associates, in cooperation with ACM Special Interest Group on Security, Audit, and Control.
- Format:
- Book
- Conference/Event
- Conference Name:
- Annual Computer Security Applications Conference (15th : 1999 : Phoenix, Ariz.)
- Language:
- English
- Subjects (All):
- Computer security--Congresses.
- Computer security.
- Genre:
- Conference papers and proceedings.
- Physical Description:
- xxvii, 390 pages : illustrations
- Other Title:
- ACSAC '99
- Computer Security Applications Conference
- Fifteenth Annual Computer Security Applications Conference
- Computer Security Applications Conference, 1999, (ACSAC '99), proceedings, 15th Annual.
- Place of Publication:
- Los Alamitos, Calif. : IEEE Computer Society Press, [1999]
- System Details:
- Mode of access: World Wide Web.
- text file
- Contents:
- Keynote Speech / Lieutenant General Michael V. Hayden
- How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering) / Dr. Ross Anderson xix
- Track A Electronic Commerce / Ravi Sandhu
- Modular Fair Exchange Protocols for Electronic Commerce / H. Vogt, H. Pagnia, F. C. Gartner 3
- Trustworthy Access Control with Untrustworthy Web Servers / T. Wilkinson, D. Hearn, S. Wiseman 12
- A Language for Modelling Secure Business Transactions / A. W. Rohm, G. Herrmann, G. Pernul 22
- Track B System Engineering / Jan Filsinger
- Safe Areas of Computation for Secure Computing with Insecure Applications / A. L. M. dos Santos, R. A. Kemmerer 35
- Architecture and Concepts of the ARGuE Guard / J. Epstein 45
- Using Abuse Case Models for Security Requirements Analysis / J. McDermott, C. Fox 55
- Track A Networks / Christoph Schuba
- A Parallel Packet Screen for High Speed Networks / C. Benecke 67
- An Asynchronous Distributed Access Control Architecture for IP over ATM Networks / O. Paul, M. Laurent, S. Gombault 75
- Secure Communications in ATM Networks / M. Laurent, A. Bouabdallah, C. Delahaye, H. Leitold, R. Posch, E. Areizaga, J. M. Mateos 84
- Track B Panel Session
- The Collection and Use of Meaningful Red Team Metrics / J. L. Connolly, Chris McBride, Ed Schneider, Mike Skroh, Greg Whitlow
- Track A Security Analysis / John McDermott
- Using Checkable Types in Automatic Protocol Analysis / S. H. Brackin 99
- SCR: A Practical Approach to Building a High Assurance COMSEC System / J. Kirby, Jr., M. Archer, C. Heitmeyer 109
- Application-Level Isolation Using Data Inconsistency Detection / A. Fayad, S. Jajodia, C. D. McCollum 119
- Track B Workflow / LouAnna Notargiacomo
- A Prototype Secure Workflow Server / D. L. Long, J. Baker, F. Fung 129
- Napoleon: A Recipe for Workflow / C. Payne, D. Thomsen, J. Bogle, R. O'Brien 134
- Tools to Support Secure Enterprise Computing / M. H. Kang, B. J. Eppinger, J. N. Froscher 143
- Track A Crypto / Dan Gambel
- An Effective Defense Against First Party Attacks in Public-Key Algorithms / S. M. Matyas, Jr., A. Roginsky 155
- Towards a Practical, Secure, and Very Large Scale Online Election / J. Karro, J. Wang 161
- Design of LAN-Lock, A System for Securing Wireless Networks / R. E. Newman, M. V. Hoyt, T. Swanson, P. Broccard, M. Sanders, J. Winner 170
- Composition Problems of Component TOEs - Entrust, Oracle, and Windows NT/2000 / L. Ambuel, M. Donaldson, D. Harris, M. Lai, M. LaRoche, J. Straw
- Track A Security Services / Jody Heaney
- Toward a Taxonomy and Costing Method for Security Services / C. Irvine, T. Levin 183
- TrustedBox: A Kernel-Level Integrity Checker / P. Iglio 189
- Adding Availability to Log Services of Untrusted Machines / A. Arona, D. Bruschi, E. Rosti 199
- Track B Security Policy / Marshall Abrams
- Policy-Based Management: Bridging the Gap / S. Hinrichs 209
- Security Policy Coordination for Heterogeneous Information Systems / J. Hale, P. Galiasso, M. Papa, S. Shenoi 219
- The ARBAC99 Model for Administration of Roles / R. Sandhu, Q. Munawer 229
- Track A Public Key Infrastructures / Frank Sledge
- A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls / R. Oppliger, A. Greulich, P. Trachsel 241
- Fast Checking of Individual Certificate Revocation on Small Systems / S. Russell 249
- A Model of Certificate Revocation / D. A. Cooper 256
- Track B Forum
- Information Security Education for the Next Millennium: Building the Next Generation of Practitioners / Ron Ross, Blaine Burnham, Cynthia Irvine, Charles Reynolds, Ravi Sandhu, Rayford Vaughn 265
- Track A Public Key Infrastructures / Klaus Keus
- Generic Support for PKIX Certificate Management in CDSA / S. Erfani, S. Chandersekaran 269
- Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services / M. Prandini 276
- Track B Mobile Code / Dan Thomson
- User Authentication and Authorization in the Java Platform / C. Lai, L. Gong, L. Koved, A. Nadalin, R. Schemers 285
- Transactions in Java Card / M. Oestreicher 291
- Track A Panel Session
- Legal and Technical Responses to Protecting the U.S. Critical Infrastructures / Art Friedman, Scott Charney, Ellie Padgett, Mark Rasch, John Thomas 299
- Track B Middleware / Vince Reed
- A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning / M. V. Tripunitara, P. Dutta 303
- A Resource Access Decision Service for CORBA-Based Distributed Systems / K. Beznosov, Y. Deng, B. Blakley, C. Burt, J. Barkley 310
- Non-repudiation Evidence Generation for CORBA using XML / M. Wichert, D. Ingham, S. Caughey 320
- Track A Security Architectures / Daniel P. Faigin
- Security Relevancy Analysis on the Registry of Windows NT 4.0 / W. Du, P. Garg, A. P. Mathur 331
- Security Architecture Development and Results for a Distributed Modeling and Simulation System / R. B. Neely 341
- SecurSight: An Architecture for Secure Information Access / J. G. Brainard 349
- Track B Intrusion Detection / Jeremy Epstein
- SAM: Security Adaptation Manager / H. Hinton, C. Cowan, L. Delcambre, S. Bowers 361
- An Application of Machine Learning to Network Intrusion Detection / C. Sinclair, L. Pierce, S. Matzner 371
- A Process State-Transition Analysis and Its Application to Intrusion Detection / N. Nuansri, S. Singh, T. S. Dillon 378.
- Notes:
- "IEEE Computer Society Press order number PR00346"--T.p. verso.
- "IEEE order plan catalog number PR00346"--P. [4] of cover.
- Includes bibliographical references and index.
- ISBN:
- 0769503462
- 9780769503462
- OCLC:
- 43352671
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.