Subscribe
Computer Security Applications Conference, Annual (2003)
Las Vegas, Nevada
Dec. 8, 2003 to Dec. 12, 2003
ISBN: 0-7692-2041-3
TABLE OF CONTENTS
pp. xviii
Distinguished Practitioner
Track A: Intrusion Detection I
pp. null
Christopher Kruegel , University of California, Santa Barbara
Darren Mutz , University of California, Santa Barbara
William Robertson , University of California, Santa Barbara
Fredrik Valeur , University of California, Santa Barbara
pp. 14
Scott Coull , Rensselaer Polytechnic Institute
Boleslaw Szymanski , Rensselaer Polytechnic Institute
Eric Breimer , Siena College
pp. 24
William Robertson , University of California, Santa Barbara
Vishal Kher , University of California, Santa Barbara
Richard A. Kemmerer , University of California, Santa Barbara
pp. 34
Track B: Network Security
pp. null
Carla E. Brodley , Purdue University
James P. Early , Purdue University
pp. 46
Holger Peine , Fraunhofer Institute for Experimental Software Engineering, Germany
Reinhard Schwarz , Fraunhofer Institute for Experimental Software Engineering, Germany
pp. 56
A. Ornaghi , Universit? degli Studi di Milano, Italy
D. Bruschi , Universit? degli Studi di Milano, Italy
pp. 66
Track A: Defensive Information Warfare
pp. null
Sushil Jajodia , George Mason University
Brian O'Berry , George Mason University
Michael Jacobs , George Mason University
pp. 86
Zhaole Chen , the Chinese University of Hong Kong
Moon-Chuen Lee , the Chinese University of Hong Kong
pp. 96
Track B: Forum
David Carman , Network Associates Laboratories
Bruno Dutertre , SRI International
Vipin Swarup , The MITRE Corp.
Ronald Watro , BBN Technologies
pp. 106
Track A: Applied Cryptography
pp. null
M. Hossain Heydari , James Madison University, Harrisonburg, VA
Xunhua Wang , James Madison University, Harrisonburg, VA
pp. 110
Track B: Recovery and Forensics
pp. null
Peng Liu , Pennsylvania State University
Meng Yu , Pennsylvania State University
pp. 142
Kulesh Shanmugasundaram , Polytechnic University, Brooklyn, NY
Nasir Memon , Polytechnic University, Brooklyn, NY
pp. 152
Works in Progress
pp. null
Invited Essayist Plenary
pp. null
Lance Spitzner , Honeypot Technologies Inc
pp. 170
Track A: Software Safety and Program Correctness
pp. null
D. Bruschi , Universit? degli Studi di Milano, Italy
V. Glave , Universit? degli Studi di Milano, Italy
E. Rosti , Universit? degli Studi di Milano, Italy
pp. 192
Andrew Burt , University of Denver, CO
Ramki Thurimella , University of Denver, CO
pp. 197
Track B: Classic Papers
pp. null
Peter G. Neumann , SRI International
Richard J. Feiertag , Cougaar Software, Inc.
pp. 208
Eugene H. Spafford , Purdue University CERIAS
pp. 217
Track A: Event Correlation
pp. null
Nathan Carey , Queensland University of Technology
George Mohay , Queensland University of Technology
Andrew Clark , Queensland University of Technology
pp. 245
Jed Taylor , University of Illinois at Urbana-Champaign
Cigdem Sengul , University of Illinois at Urbana-Champaign
William Yurcik , National Center for Supercomputing Applications (NCSA)
Yuanyuan Zhou , University of Illinois at Urbana-Champaign
Ken Rowe , Science Applications International Corporation (SAIC)
pp. 255
Track B: Security Engineering & Management
pp. null
Jeff Yan , The Chinese University of Hong Kong
pp. 286
Track A: Enterprise Security
pp. null
Arne Ansper , Cybernetica, Tallinn, Estonia
Ahto Buldas , Cybernetica, Tallinn, Estonia; Tartu University, Tartu, Estonia; Tallinn Technical University
Margus Freudenthal , Cybernetica, Tallinn, Estonia
Jan Willemson , Cybernetica, Tallinn, Estonia; Tartu University, Tartu, Estonia
pp. 308
Track B: Forum
Track A: Operating System Security
pp. null
James Early , Purdue University
Rajeev Gopalakrishna , Purdue University
Gregory Roth , Purdue University
Eugene H. Spafford , Purdue University
Keith Watson , Purdue University
Eric Bryant , Purdue University
Scott Yost , Purdue University
pp. 342
Qingfeng Zhuge , University of Texas at Dallas
Zili Shao , University of Texas at Dallas
Edwin H.-M. Sha , University of Texas at Dallas
pp. 352
Track B: Intrusion Detection II
pp. null
Darren Mutz , University of California, Santa Barbara
Richard Kemmerer , University of California, Santa Barbara
pp. 374
H?kan Kvarnstr? , Chalmers University of Technology
Emilie Lundin Barse , Chalmers University of Technology
pp. 384
Track A: Access Control
pp. null
Karsten Schwan , Georgia Institute of Technology
Patrick Widener , Georgia Institute of Technology
pp. 396
Dirk Balfanz , Palo Alto Research Center
pp. 406
Fr?d?ric Cuppens , GET/ENST Bretagne, France
pp. 416
Track B: Panel
Daniel Faigin , The Aerospace Corporation
Michael Clifford , The Aerospace Corporation
Tasneem Brutch , Kaiser Permanente
pp. 428