My Account Log in

2 options

15th Annual Computer Security Applications Conference. ACSAC '99 : December 6-10, 1999, Phoenix, Arizona : proceedings / sponsored by Applied Computer Security Associates, in cooperation with ACM Special Interest Group on Security, Audit, and Control.

Online

Available online

View online

IEEE Xplore (IEEE/IET Electronic Library - IEL) Available online

View online
Format:
Book
Conference/Event
Contributor:
IEEE Xplore (Online service)
Applied Computer Security Associates.
Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
Conference Name:
Annual Computer Security Applications Conference (15th : 1999 : Phoenix, Ariz.)
Language:
English
Subjects (All):
Computer security--Congresses.
Computer security.
Genre:
Conference papers and proceedings.
Physical Description:
xxvii, 390 pages : illustrations
Other Title:
ACSAC '99
Computer Security Applications Conference
Fifteenth Annual Computer Security Applications Conference
Computer Security Applications Conference, 1999, (ACSAC '99), proceedings, 15th Annual.
Place of Publication:
Los Alamitos, Calif. : IEEE Computer Society Press, [1999]
System Details:
Mode of access: World Wide Web.
text file
Contents:
Keynote Speech / Lieutenant General Michael V. Hayden
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering) / Dr. Ross Anderson xix
Track A Electronic Commerce / Ravi Sandhu
Modular Fair Exchange Protocols for Electronic Commerce / H. Vogt, H. Pagnia, F. C. Gartner 3
Trustworthy Access Control with Untrustworthy Web Servers / T. Wilkinson, D. Hearn, S. Wiseman 12
A Language for Modelling Secure Business Transactions / A. W. Rohm, G. Herrmann, G. Pernul 22
Track B System Engineering / Jan Filsinger
Safe Areas of Computation for Secure Computing with Insecure Applications / A. L. M. dos Santos, R. A. Kemmerer 35
Architecture and Concepts of the ARGuE Guard / J. Epstein 45
Using Abuse Case Models for Security Requirements Analysis / J. McDermott, C. Fox 55
Track A Networks / Christoph Schuba
A Parallel Packet Screen for High Speed Networks / C. Benecke 67
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks / O. Paul, M. Laurent, S. Gombault 75
Secure Communications in ATM Networks / M. Laurent, A. Bouabdallah, C. Delahaye, H. Leitold, R. Posch, E. Areizaga, J. M. Mateos 84
Track B Panel Session
The Collection and Use of Meaningful Red Team Metrics / J. L. Connolly, Chris McBride, Ed Schneider, Mike Skroh, Greg Whitlow
Track A Security Analysis / John McDermott
Using Checkable Types in Automatic Protocol Analysis / S. H. Brackin 99
SCR: A Practical Approach to Building a High Assurance COMSEC System / J. Kirby, Jr., M. Archer, C. Heitmeyer 109
Application-Level Isolation Using Data Inconsistency Detection / A. Fayad, S. Jajodia, C. D. McCollum 119
Track B Workflow / LouAnna Notargiacomo
A Prototype Secure Workflow Server / D. L. Long, J. Baker, F. Fung 129
Napoleon: A Recipe for Workflow / C. Payne, D. Thomsen, J. Bogle, R. O'Brien 134
Tools to Support Secure Enterprise Computing / M. H. Kang, B. J. Eppinger, J. N. Froscher 143
Track A Crypto / Dan Gambel
An Effective Defense Against First Party Attacks in Public-Key Algorithms / S. M. Matyas, Jr., A. Roginsky 155
Towards a Practical, Secure, and Very Large Scale Online Election / J. Karro, J. Wang 161
Design of LAN-Lock, A System for Securing Wireless Networks / R. E. Newman, M. V. Hoyt, T. Swanson, P. Broccard, M. Sanders, J. Winner 170
Composition Problems of Component TOEs - Entrust, Oracle, and Windows NT/2000 / L. Ambuel, M. Donaldson, D. Harris, M. Lai, M. LaRoche, J. Straw
Track A Security Services / Jody Heaney
Toward a Taxonomy and Costing Method for Security Services / C. Irvine, T. Levin 183
TrustedBox: A Kernel-Level Integrity Checker / P. Iglio 189
Adding Availability to Log Services of Untrusted Machines / A. Arona, D. Bruschi, E. Rosti 199
Track B Security Policy / Marshall Abrams
Policy-Based Management: Bridging the Gap / S. Hinrichs 209
Security Policy Coordination for Heterogeneous Information Systems / J. Hale, P. Galiasso, M. Papa, S. Shenoi 219
The ARBAC99 Model for Administration of Roles / R. Sandhu, Q. Munawer 229
Track A Public Key Infrastructures / Frank Sledge
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls / R. Oppliger, A. Greulich, P. Trachsel 241
Fast Checking of Individual Certificate Revocation on Small Systems / S. Russell 249
A Model of Certificate Revocation / D. A. Cooper 256
Track B Forum
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners / Ron Ross, Blaine Burnham, Cynthia Irvine, Charles Reynolds, Ravi Sandhu, Rayford Vaughn 265
Track A Public Key Infrastructures / Klaus Keus
Generic Support for PKIX Certificate Management in CDSA / S. Erfani, S. Chandersekaran 269
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services / M. Prandini 276
Track B Mobile Code / Dan Thomson
User Authentication and Authorization in the Java Platform / C. Lai, L. Gong, L. Koved, A. Nadalin, R. Schemers 285
Transactions in Java Card / M. Oestreicher 291
Track A Panel Session
Legal and Technical Responses to Protecting the U.S. Critical Infrastructures / Art Friedman, Scott Charney, Ellie Padgett, Mark Rasch, John Thomas 299
Track B Middleware / Vince Reed
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning / M. V. Tripunitara, P. Dutta 303
A Resource Access Decision Service for CORBA-Based Distributed Systems / K. Beznosov, Y. Deng, B. Blakley, C. Burt, J. Barkley 310
Non-repudiation Evidence Generation for CORBA using XML / M. Wichert, D. Ingham, S. Caughey 320
Track A Security Architectures / Daniel P. Faigin
Security Relevancy Analysis on the Registry of Windows NT 4.0 / W. Du, P. Garg, A. P. Mathur 331
Security Architecture Development and Results for a Distributed Modeling and Simulation System / R. B. Neely 341
SecurSight: An Architecture for Secure Information Access / J. G. Brainard 349
Track B Intrusion Detection / Jeremy Epstein
SAM: Security Adaptation Manager / H. Hinton, C. Cowan, L. Delcambre, S. Bowers 361
An Application of Machine Learning to Network Intrusion Detection / C. Sinclair, L. Pierce, S. Matzner 371
A Process State-Transition Analysis and Its Application to Intrusion Detection / N. Nuansri, S. Singh, T. S. Dillon 378.
Notes:
"IEEE Computer Society Press order number PR00346"--T.p. verso.
"IEEE order plan catalog number PR00346"--P. [4] of cover.
Includes bibliographical references and index.
ISBN:
0769503462
9780769503462
OCLC:
43352671
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account