The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Applications Conference, Annual (1999)
Phoenix, Arizona
Dec. 6, 1999 to Dec. 10, 1999
ISBN: 0-7695-0346-2
TABLE OF CONTENTS
Reviewers (PDF)
pp. xv
Distinguished Lecture
Track A: Electronic Commerce
Holger Vogt , Darmstadt University of Technology
Henning Pagnia , Darmstadt University of Technology
Felix C. Gärtner , Darmstadt University of Technology
pp. 3
Tim Wilkinson , Defense Evaluation and Research Agency
Dave Hearn , Defense Evaluation and Research Agency
Simon Wiseman , Defense Evaluation and Research Agency
pp. 12
Alexander W. Roehm , University of Essen
Gaby Herrmann , University of Essen
Guenther Pernul , University of Essen
pp. 22
Track B: System Engineering
André L.M. dos Santos , University of California at Santa Barbara
Richard A. Kemmerer , University of California at Santa Barbara
pp. 35
John McDermott , James Madison University
Chris Fox , James Madison University
pp. 55
Track A: Networks
Carsten Benecke , University of Hamburg
pp. 67
Ahmed Bouabdallah , ENST de Bretagne
Christophe Delahaye , ENST de Bretagne
Enrique Areizaga , Fundacion Robotiker
Juàn Manuel Mateos , Inelcom Ingeniera
pp. 84
Track A: Security Analysis
Stephen H. Brackin , Arca Systems / Exodus Communications
pp. 99
James Kirby Jr , Naval Research Laboratory
Myla Archer , Naval Research Laboratory
Constance Heitmeyer , Naval Research Laboratory
pp. 109
Amgad Fayad , The MITRE Corporation
Sushil Jajodia , The MITRE Corporation
Catherine D. McCollum , The MITRE Corporation
pp. 119
Track B: Workflow
Douglas L. Long , Odyssey Research Associates
Julie Baker , Odyssey Research Associates
Francis Fung , Odyssey Research Associates
pp. 129
C. Payne , Secure Computing Corporation
D. Thomsen , Secure Computing Corporation
J. Bogle , Secure Computing Corporation
R. O'Brien , Secure Computing Corporation
pp. 134
Myong H. Kang , Naval Research Laboratory
Brian J. Eppinger , Naval Research Laboratory
Judith N. Froscher , Naval Research Laboratory
pp. 143
Track A: Crypto
Jared Karro , University of North Carolina at Greensboro
Jie Wang , University of North Carolina at Greensboro
pp. 161
Richard E. Newman , University of Florida
Mark V. Hoyt , University of Florida
Tim Swanson , University of Florida
Phillipe Broccard , Raytheon Systems Division
Mark Sanders , Raytheon Systems Division
Joe Winner , Raytheon Systems Division
pp. 170
Track A: Security Services
Cynthia Irvine , Naval Postgraduate School
Tim Levin , Anteon Corporation
pp. 183
Pietro Iglio , Fondazione Ugo Bordoni
pp. 189
Arianna Arona , Universit? degli Studi di Milano
Danilo Bruschi , Universit? degli Studi di Milano
Emilia Rosti , Universit? degli Studi di Milano
pp. 199
Track B: Security Policy
Susan Hinrichs , Cisco Systems
pp. 209
John Hale , University of Tulsa
Pablo Galiasso , University of Tulsa
Mauricio Papa , University of Tulsa
Sujeet Shenoi , University of Tulsa
pp. 219
Ravi Sandhu , George Mason University
Qamar Munawer , George Mason University
pp. 229
Track A: Public Key Infrastructures
Rolf Oppliger , Swiss Federal Strategy Unit for Information Technology FSUIT
Andreas Greulich , Swiss Federal Strategy Unit for Information Technology FSUIT
Peter Trachsel , Swiss Federal Strategy Unit for Information Technology FSUIT
pp. 241
Selwyn Russell , Queensland University of Technology
pp. 249
David A. Cooper , National Institute of Standards and Technology
pp. 256
Track B: Forum
Track A: Public Key Infrastructures
Shabnam Erfani , WatchGuard Technologies
Sekar Chandersekaran , Microsoft Corporation
pp. 269
Track B: Mobile Code
Charlie Lai , Sun Microsystems, Inc.
Li Gong , Sun Microsystems, Inc.
Larry Koved , International Business Machines, Inc.
Anthony Nadalin , International Business Machines, Inc.
pp. 285
Marcus Oestreicher , IBM Research Laboratory Zurich
pp. 291
Track A: Panel Session
Track B: Middleware
Konstantin Beznosov , Baptist Health Systems of South Florida
Yi Deng , Florida International University
Bob Blakley , DASCOM
John Barkley , National Institute of Standards and Technology
pp. 310
Michael Wichert , GMD - German National Research Center for Information Technology
David Ingham , Newcastle University
Steve Caughey , Newcastle University
pp. 320
Track A: Security Architectures
Wenliang Du , Purdue University
Aditya P. Mathur , Purdue University
Praerit Garg , Microsoft Corporation
pp. 331
Track B: Intrusion Detection
Chris Sinclair , University of Texas at Austin
Lyn Pierce , University of Texas at Austin
Sara Matzner , University of Texas at Austin
pp. 371
Nittida Nuansri , Prince of Songkla University
Samar Singh , La Trobe University
Tharam S. Dillon , La Trobe University
pp. 378
Author Index (PDF)
pp. 389
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool