The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Applications Conference, Annual (2002)
San Diego California
Dec. 9, 2002 to Dec. 13, 2002
ISBN: 0-7695-1828-1
TABLE OF CONTENTS
pp. xvi
pp. xvii
Reviewers (PDF)
pp. xviii
Reviewers (PDF)
pp. xviii
Distinguished Practitioner
Track A: Network Security I - Chair: C. Schuba, Sun Microsystems, Inc., Germany
Marcel Waldvogel , IBM Research
pp. 5
Giovanni Vigna , University of California Santa Barbara
Fredrik Valeur , University of California Santa Barbara
Jingyu Zhou , University of California Santa Barbara
Richard A. Kemmerer , University of California Santa Barbara
pp. 14
Ronald Ritchey , George Mason University
Brian O?Berry , George Mason University
Steven Noel , George Mason University
pp. 25
Track B: Electronic Commerce - Chair: A. Friedman, National Security Agency, USA
Donghua Xu , Georgia Institute of Technology
Chenghuai Lu , Georgia Institute of Technology
Andre Dos Santos , Georgia Institute of Technology
pp. 51
Track A: Mobile Security - Chair: M. Abrams, The MITRE Corporation, USA
Weijiang Yu , University of Texas at Austin
Aloysius K. Mok , University of Texas at Austin
pp. 69
Tuomas Aura , Microsoft Research
Michael Roe , Microsoft Research
Jari Arkko , Ericsson Research NomadicLab
pp. 78
Track B: Forum - Chair: D. Johnson, The MITRE Corporation, USA
Track A: Classic Papers - Chair: D. Thomsen, Secure Computing Corporation, USA
O. Sami Saydjari , Cyber Defense Agency
pp. 96
Paul A. Karger , IBM Corp., T. J. Watson Research Center
Roger R. Schell , Aesec Corporation
pp. 119
Track B: Security Architecture - Chair: J. Heaney, The MITRE Corporation, USA
Blaise Gassend , Massachusetts Institute of Technology
Dwaine Clarke , Massachusetts Institute of Technology
Marten van Dijk , Massachusetts Institute of Technology
Srinivas Devadas , Massachusetts Institute of Technology
pp. 149
Bogdan C. Popescu , Vrije Universiteit
Maarten van Steen , Vrije Universiteit
Andrew S. Tanenbaum , Vrije Universiteit
pp. 161
John R. Douceur , Microsoft Research
Atul Adya , Microsoft Research
Josh Benaloh , Microsoft Research
William J. Bolosky , Microsoft Research
Gideon Yuval , Microsoft Research
pp. 172
Invited Essayist Plenary
Daniel Geer , @Stake
pp. 185
Track A: Protection against Malicious Software - Chair: J. McHugh, Carnegie Mellon University, USA
Matthew Schmid , Cigital, Inc.
Frank Hill , Cigital, Inc.
pp. 199
Kevin Scott , University of Virginia
Jack Davidson , University of Virginia
pp. 209
F. Buchholz , Purdue University
T. Daniels , Purdue University
J. Early , Purdue University
R. Gopalakrishna , Purdue University
R. Gorman , Purdue University
B. Kuperman , Purdue University
S. Nystrom , Purdue University
A. Schroll , Purdue University
A. Smith , Purdue University
pp. 219
Track B: Access Control - Chair: R. Sandhu, SingleSignOn.Net, Inc. and George Mason University, USA
Andreas Schaad , University of York
Jonathan D. Moffett , University of York
pp. 229
Stefan Probst , Software Competence Center Hagenberg
Wolfgang Essmayr , Software Competence Center Hagenberg
Edgar Weippl , Software Competence Center Hagenberg
pp. 239
Michael J. Covington , Georgia Institute of Technology
Prahlad Fogla , Georgia Institute of Technology
Zhiyuan Zhan , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
pp. 249
Track A: Network Security II - Chair: G. Caronni, Sun Microsystems Laboratories, USA
Roberto Barbieri , Universit? degli Studi di Milano
Danilo Bruschi , Universit? degli Studi di Milano
Emilia Rosti , Universit? degli Studi di Milano
pp. 261
Malcolm Corney , Queensland University of Technology
Olivier de Vel , Defence Science and Technology Organisation
Alison Anderson , Queensland University of Technology
George Mohay , Queensland University of Technology
pp. 282
Track B: Forum - Chair: J. Heaney, The MITRE Corporation, USA
Track A: Forum - Chair: C. Serban, AT&T Labs and O.S. Saydjari, SRI Computer Science Laboratory
Track B: Intrusion Detection - Chair: S. Weinberg, Mitretek Systems, USA
Thomas Toth , Technical University Vienna
Christopher Kruegel , Technical University Vienna
pp. 301
Peng Liu , Pennsylvania State University
pp. 311
Dustin Lee , University of California, Davis
Jeff Rowe , University of California, Davis
Calvin Ko , Network Associates, Inc.
Karl Levitt , University of California, Davis
pp. 321
Track A: Role-Based Access Control - Chair: J. Kahn, The MITRE Corporation, USA
Axel Kern , Systor Security Solutions GmbH
pp. 333
Geetanjali Sampemane , University of Illinois at Urbana-Champaign
Prasad Naldurg , University of Illinois at Urbana-Champaign
Roy H. Campbell , University of Illinois at Urbana-Champaign
pp. 343
Mohammad A. Al-Kahtani , George Mason University
Ravi Sandhu , SingleSignOn.net, Inc. and George Mason University
pp. 353
Track B: Forum - Chair: K. Levitt, University of California, Davis, USA
Karl Levitt , University of California, Davis
pp. 365
Track A: Experience Reports - Chair: K. Eggers, CygnaCom Solutions - an Entrust company, USA
Mary Ellen Zurko , IBM Software Group
Charlie Kaufman , IBM Software Group
Katherine Spanbauer , IBM Software Group
Chuck Bassett , IBM Software Group
pp. 371
Herbert Leitold , Austria A-SIT
Arno Hollosi , Federal CIO Office
Reinhard Posch , Federal CIO Office
pp. 391
Track B: Detection - Chair: J. Epstein, webMethods, Inc., USA
Frank Adelstein , ATC- NY
Matt Stillerman , ATC- NY
Dexter Kozen , Cornell University
pp. 403
John Haggerty , Liverpool John Moores University
Qi Shi , Liverpool John Moores University
Madjid Merabti , Liverpool John Moores University
pp. 413
Michael Weber , Cigital, Inc.
Matthew Schmid , Cigital, Inc.
Michael Schatz , Cigital, Inc.
David Geyer , George Mason University
pp. 423
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool