• A
  • ACSAC
  • 2003
  • 19th Annual Computer Security Applications Conference (ACSAC '03)
Advanced Search 
19th Annual Computer Security Applications Conference (ACSAC '03)
Las Vegas, Nevada
December 08-December 12
ISBN: 0-7692-2041-3
Table of Contents
null
Reviewers (PDF)
pp. xviii
Distinguished Practitioner
Track A: Intrusion Detection I
null
Christopher Kruegel, University of California, Santa Barbara
Darren Mutz, University of California, Santa Barbara
William Robertson, University of California, Santa Barbara
Fredrik Valeur, University of California, Santa Barbara
pp. 14
Scott Coull, Rensselaer Polytechnic Institute
Joel Branch, Rensselaer Polytechnic Institute
Boleslaw Szymanski, Rensselaer Polytechnic Institute
Eric Breimer, Siena College
pp. 24
Giovanni Vigna, University of California, Santa Barbara
William Robertson, University of California, Santa Barbara
Vishal Kher, University of California, Santa Barbara
Richard A. Kemmerer, University of California, Santa Barbara
pp. 34
Track B: Network Security
null
Holger Peine, Fraunhofer Institute for Experimental Software Engineering, Germany
Reinhard Schwarz, Fraunhofer Institute for Experimental Software Engineering, Germany
pp. 56
D. Bruschi, Universit? degli Studi di Milano, Italy
A. Ornaghi, Universit? degli Studi di Milano, Italy
E. Rosti, Universit? degli Studi di Milano, Italy
pp. 66
Track A: Defensive Information Warfare
null
Steven Noel, George Mason University
Sushil Jajodia, George Mason University
Brian O'Berry, George Mason University
Michael Jacobs, George Mason University
pp. 86
Zhaole Chen, the Chinese University of Hong Kong
Moon-Chuen Lee, the Chinese University of Hong Kong
pp. 96
Track B: Forum
David Carman, Network Associates Laboratories
Daniel Coffin, BBN Technologies
Bruno Dutertre, SRI International
Vipin Swarup, The MITRE Corp.
Ronald Watro, BBN Technologies
pp. 106
Track A: Applied Cryptography
null
Xunhua Wang, James Madison University, Harrisonburg, VA
M. Hossain Heydari, James Madison University, Harrisonburg, VA
Hua Lin, Wachovia Corporation, Rockville, MD
pp. 110
Track B: Recovery and Forensics
null
Meng Yu, Pennsylvania State University
Peng Liu, Pennsylvania State University
Wanyu Zang, Pennsylvania State University
pp. 142
Works in Progress
null
Invited Essayist Plenary
null
Track A: Software Safety and Program Correctness
null
D. Bruschi, Universit? degli Studi di Milano, Italy
D. Fabris, Universit? degli Studi di Milano, Italy
V. Glave, Universit? degli Studi di Milano, Italy
E. Rosti, Universit? degli Studi di Milano, Italy
pp. 192
Hailin Wu, University of Denver, CO
Andrew Burt, University of Denver, CO
Ramki Thurimella, University of Denver, CO
pp. 197
Track B: Classic Papers
null
Track A: Event Correlation
null
Nathan Carey, Queensland University of Technology
George Mohay, Queensland University of Technology
Andrew Clark, Queensland University of Technology
pp. 245
Cristina Abad, University of Illinois at Urbana-Champaign; National Center for Supercomputing Applications (NCSA)
Jed Taylor, University of Illinois at Urbana-Champaign
Cigdem Sengul, University of Illinois at Urbana-Champaign
William Yurcik, National Center for Supercomputing Applications (NCSA)
Yuanyuan Zhou, University of Illinois at Urbana-Champaign
Ken Rowe, Science Applications International Corporation (SAIC)
pp. 255
Track B: Security Engineering & Management
null
Track A: Enterprise Security
null
Arne Ansper, Cybernetica, Tallinn, Estonia
Ahto Buldas, Cybernetica, Tallinn, Estonia; Tartu University, Tartu, Estonia; Tallinn Technical University
Margus Freudenthal, Cybernetica, Tallinn, Estonia
Jan Willemson, Cybernetica, Tallinn, Estonia; Tartu University, Tartu, Estonia
pp. 308
Track A: Operating System Security
null
Eric Bryant, Purdue University
James Early, Purdue University
Rajeev Gopalakrishna, Purdue University
Gregory Roth, Purdue University
Eugene H. Spafford, Purdue University
Keith Watson, Purdue University
Paul Williams, Purdue University
Scott Yost, Purdue University
pp. 342
Zili Shao, University of Texas at Dallas
Qingfeng Zhuge, University of Texas at Dallas
Yi He, University of Texas at Dallas
Edwin H.-M. Sha, University of Texas at Dallas
pp. 352
Track B: Intrusion Detection II
null
Darren Mutz, University of California, Santa Barbara
Giovanni Vigna, University of California, Santa Barbara
Richard Kemmerer, University of California, Santa Barbara
pp. 374
Emilie Lundin Barse, Chalmers University of Technology
H?kan Kvarnstr?, Chalmers University of Technology
Erland Jonsson, Chalmers University of Technology
pp. 384
Track A: Access Control
null
Patrick Widener, Georgia Institute of Technology
Karsten Schwan, Georgia Institute of Technology
Fabian E. Bustamante, Northwestern University
pp. 396
Track B: Panel
Michael Clifford, The Aerospace Corporation
Daniel Faigin, The Aerospace Corporation
Matt Bishop, The University of California at Davis
Tasneem Brutch, Kaiser Permanente
pp. 428
Usage of this product signifies your acceptance of the Terms of Use.