• A
  • ACSAC
  • 1999
  • 15th Annual Computer Security Applications Conference (ACSAC '99)
Advanced Search 
15th Annual Computer Security Applications Conference (ACSAC '99)
Phoenix, Arizona
December 06-December 10
ISBN: 0-7695-0346-2
Table of Contents
Distinguished Lecture
Track A: Electronic Commerce
Holger Vogt, Darmstadt University of Technology
Henning Pagnia, Darmstadt University of Technology
Felix C. Gärtner, Darmstadt University of Technology
pp. 3
Tim Wilkinson, Defense Evaluation and Research Agency
Dave Hearn, Defense Evaluation and Research Agency
Simon Wiseman, Defense Evaluation and Research Agency
pp. 12
Track B: System Engineering
Track A: Networks
Track A: Security Analysis
Track B: Workflow
Douglas L. Long, Odyssey Research Associates
Julie Baker, Odyssey Research Associates
Francis Fung, Odyssey Research Associates
pp. 129
C. Payne, Secure Computing Corporation
D. Thomsen, Secure Computing Corporation
J. Bogle, Secure Computing Corporation
R. O'Brien, Secure Computing Corporation
pp. 134
Myong H. Kang, Naval Research Laboratory
Brian J. Eppinger, Naval Research Laboratory
Judith N. Froscher, Naval Research Laboratory
pp. 143
Track A: Crypto
Jared Karro, University of North Carolina at Greensboro
Jie Wang, University of North Carolina at Greensboro
pp. 161
Richard E. Newman, University of Florida
Mark V. Hoyt, University of Florida
Tim Swanson, University of Florida
Phillipe Broccard, Raytheon Systems Division
Mark Sanders, Raytheon Systems Division
Joe Winner, Raytheon Systems Division
pp. 170
Track A: Security Services
Arianna Arona, Universit? degli Studi di Milano
Danilo Bruschi, Universit? degli Studi di Milano
Emilia Rosti, Universit? degli Studi di Milano
pp. 199
Track B: Security Policy
Track A: Public Key Infrastructures
Rolf Oppliger, Swiss Federal Strategy Unit for Information Technology FSUIT
Andreas Greulich, Swiss Federal Strategy Unit for Information Technology FSUIT
Peter Trachsel, Swiss Federal Strategy Unit for Information Technology FSUIT
pp. 241
David A. Cooper, National Institute of Standards and Technology
pp. 256
Track B: Forum
Track B: Mobile Code
Charlie Lai, Sun Microsystems, Inc.
Li Gong, Sun Microsystems, Inc.
Larry Koved, International Business Machines, Inc.
Anthony Nadalin, International Business Machines, Inc.
pp. 285
Track A: Panel Session
Track B: Middleware
Konstantin Beznosov, Baptist Health Systems of South Florida
Yi Deng, Florida International University
Bob Blakley, DASCOM
John Barkley, National Institute of Standards and Technology
pp. 310
Michael Wichert, GMD - German National Research Center for Information Technology
David Ingham, Newcastle University
Steve Caughey, Newcastle University
pp. 320
Track A: Security Architectures
Track B: Intrusion Detection
Chris Sinclair, University of Texas at Austin
Lyn Pierce, University of Texas at Austin
Sara Matzner, University of Texas at Austin
pp. 371
Usage of this product signifies your acceptance of the Terms of Use.