• A
  • 2001
  • 17th Annual Computer Security Applications Conference (ACSAC'01)
Advanced Search 
17th Annual Computer Security Applications Conference (ACSAC'01)
New Orleans, Lousiana
December 10-December 14
ISBN: 0-7695-1405-7
Table of Contents
Distinguished Practitioner
Castles in the Sand
TRACK A: Intrusion Detection I - Chair: D. Faigin, The Aerospace Corporation, USA
T. Buchheim, Harvey Mudd College
M. Erlinger, Harvey Mudd College
B. Feinstein, Guardent, Inc.
G. Matthews, Harvey Mudd College
R. Pollock, Harvey Mudd College
J. Betser, The Aerospace Corporation
A. Walther, The Aerospace Corporation
pp. 0032
TRACK B: Security Architecture - Chair: C. Schuba, Sun Microsystems, Germany
D. Wheeler, Intel Corporation
A. Conyers, Intel Corporation
J. Luo, Intel Corporation
A. Xiong, Intel Corporation
pp. 0064
TRACK A: Cryptography - Chair: A. dos Santos, Georgia Tech, USA
Y. Huang, George Mason University
D. Rine, George Mason University
X. Wang, George Mason University
pp. 0085
D. Wong, Northeastern University
H. Fuentes, Northeastern University
A. Chan, Northeastern University
pp. 0092
TRACK B-Forum - Chair: M. Erlinger, Harvey Mudd College, USA
TRACK A: Access Control I - Chair: M. Clifford, The Aerospace Corporation, USA
P. Epstein, George Mason University Student
R. Sandhu, George Mason University
pp. 0127
W. Jansen, National Institute of Standards and Technology
pp. 0149
TRACK B: Classic Papers - Chair: D. Thomsen, Secure Computing, USA
D. Thomsen, Secure Computing Corporation
pp. 0161
C. Landwehr, Mitretek Systems, Inc.
C. Heitmeyer, Naval Research Laboratory
J. McLean, Naval Research Laboratory
pp. 0174
Invited Essayist Plenary
TRACK A: Intrusion Detection II - Chair: J. Heaney, The MITRE Corporation, USA
J. Munson, University of Idaho
S. Wimer, Software Systems International, LLC
pp. 0230
A. Jones, University of Virginia
S. Li, University of Massachusetts
pp. 0252
TRACK B: Secure Electronic Commerce - Chair: T. Ehrsam, Oracle, USA
S. Jiang, Dartmouth College
S. Smith, Dartmouth College
K. Minami, Dartmouth College
pp. 0265
TRACK A: Access Control II - Chair: R. Sandhu, George Mason University, USA
P. Bonatti, Universit? degli Studi di Milano
E. Damiani, Universit? degli Studi di Milano
S. de Capitani, Universit? degli Studi di Brescia
P. Samarati, Universit? degli Studi di Milano
pp. 0309
TRACK B-Panel - Chair: J. Reynolds, Teknowledge, USA
TRACK A-Forum - Chair: J. Patilla, METASeS, USA
TRACK B: Reality vs. Security - Chair: D. Johnson, The MITRE Corporation, USA
TRACK A: PKI - Chair: M. Abrams, The MITRE Corporation, USA
TRACK B: Internet Security - Chair: A. Friedman, NSA, USA
D. Mankins, BBN Technologies
R. Krishnan, BBN Technologies
C. Boyd, BBN Technologies
J. Zao, BBN Technologies
M. Frentz, BBN Technologies
pp. 0411
D. Gresty, Liverpool John Moores University
Q. Shi, Liverpool John Moores University
M. Merabti, Liverpool John Moores University
pp. 0422
TRACK A: Applications Security - Chair: J. Kahn, The MITRE Corporation, USA
U. Lang, University of Cambridge
D. Gollmann, Microsoft Research
R. Schreiner, ObjectSecurity Ltd.
pp. 0450
TRACK B-Panel - Chair: T. Havighurst, NSA, USA
Assessment - Chair: B. Jenkins, ACS Defense, USA
Computer Security Expert Assist Team (CSEAT)
PKI - Chair: N. Givans, Booz Allen & Hamilton, USA
A HIPAA Case Study
Firewalls - Chair: L. Davidson, US Navy, USA
Obtaining an ROI with Telecommunication Firewalls
Authentication - Chair: J. Lowry, BBN/Verizon, USA
Smart Cards, Biometrics and Tokens for VLANs/Subnet Access
Defense-in-Depth - Chair: D. Luddy, NSA, USA
Operating System Security
Enterprise Protection - Chair: R. Wilson, NSA, USA
Enabling Efficient, Consistent Certification and Accreditation Enterprise-Wide
Usage of this product signifies your acceptance of the Terms of Use.