The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Applications Conference, Annual (2004)
Tucson, Arizona
Dec. 6, 2004 to Dec. 10, 2004
ISBN: 0-7695-2252-1
TABLE OF CONTENTS
pp. xviii
Distinguished Practitioner
Steve Lipner , Microsoft Corporation, Redmond, WA
pp. 2-13
Track A: Intrusion Detection
Sumit Gwalani , University of California, Santa Barbara
Kavitha Srinivasan , University of California, Santa Barbara
Giovanni Vigna , University of California, Santa Barbara
Richard A. Kemmerer , University of California, Santa Barbara
pp. 16-27
Shai Rubin , University of Wisconsin, Madison
Barton P. Miller , University of Wisconsin, Madison
pp. 28-38
Peng Ning , North Carolina State University, Raleigh, NC
Purush Iyer , North Carolina State University, Raleigh, NC
Douglas S. Reeves , North Carolina State University, Raleigh, NC
pp. 39-48
Track B: Start Seeing Security
Zhuowei Li , Nanyang Technological University, Singapore
pp. 61-70
Mindy Rudell , The MITRE Corporation
Don Faatz , The MITRE Corporation
Carson Zimmerman , The MITRE Corporation
pp. 71-79
Track A: Software Safety
Cristian Cadar , Massachusetts Institute of Technology, Cambridge, MA
Daniel Dumitran , Massachusetts Institute of Technology, Cambridge, MA
Daniel M. Roy , Massachusetts Institute of Technology, Cambridge, MA
Tudor Leu , Massachusetts Institute of Technology, Cambridge, MA
pp. 82-90
William Robertson , University of California, Santa Barbara
Giovanni Vigna , University of California, Santa Barbara
pp. 91-100
Wenliang Du , Syracuse University, NY
Haizhi Xu , Syracuse University, NY
pp. 101-110
Track B: Panel
Track A: Malware
Ajay Gupta , Stony Brook University, NY
pp. 116-125
Kalyan S. Perumalla , Georgia Institute of Technology, Atlanta, Georgia
Srikanth Sundaragopalan , Georgia Institute of Technology, Atlanta, Georgia
pp. 126-135
Monirul Sharif , Georgia Institute of Technology, Atlanta, GA
Xinzhou Qin , Georgia Institute of Technology, Atlanta, GA
David Dagon , Georgia Institute of Technology, Atlanta, GA
Wenke Lee , Georgia Institute of Technology, Atlanta, GA
George Riley , Georgia Institute of Technology, Atlanta, GA
pp. 136-145
Hisashi Kojima , Fujitsu Laboratories Limited
Ikuya Morikawa , Fujitsu Laboratories Limited
Yuko Nakayama , Fujitsu Laboratories Limited
Yuji Yamaoka , Fujitsu Laboratories Limited
pp. 146-155
Track B: Audit Analysis
Jingyu Zhou , University of California, Santa Barbara
Giovanni Vigna , University of California, Santa Barbara
pp. 168-178
Tzi-cker Chiueh , Rether Networks Inc., Centereach, NY
Dhruv Pilania , Rether Networks Inc., Centereach, NY
pp. 179-188
Aarthie Muthukrishnan , State University of New York at Buffalo
Madhusudhanan Chandrasekaran , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
pp. 189-204
Invited Essayist Plenary
Plenary: Classic Papers
Track A: Middleware
John C. Mitchell , Stanford University, CA
Ninghui Li , Purdue University, West Lafayette, IN
pp. 262-271
Nathanael Paul , University of Virginia
pp. 272-281
Track B: Insider Threat
Vishnu Navda , Stony Brook University
Amit Purohit , Stony Brook University
pp. 284-303
Sean W. Smith , Dartmouth College, Hanover, NH
Omen Wild , Dartmouth College, Hanover, NH
John Marchesini , Dartmouth College, Hanover, NH
Alex Barsamian , Dartmouth College, Hanover, NH
pp. 294-303
Vidyaraman Sankaranarayanan , University at Buffalo, Buffalo NY
Suranjan Pramanik , University at Buffalo, Buffalo NY
pp. 304-313
Track A: Network Security
Mehdi Kharrazi , Polytechnic University, Brooklyn, NY
Kulesh Shanmugasundaram , Polytechnic University, Brooklyn, NY
pp. 316-325
A. H. Sung , New Mexico Tech, Socorro, New Mexico
P. Chavez , New Mexico Tech, Socorro, New Mexico
S. Mukkamala , New Mexico Tech, Socorro, New Mexico
pp. 326-334
Fu-Hau Hsu , State University of New York at Stony Brook
pp. 335-344
Track B: Panel
Track A: Event Correlation
Eric Robertson , George Mason University
Sushil Jajodia , George Mason University
pp. 350-359
Dingbang Xu , North Carolina State University, Raleigh, NC
pp. 360-369
Xinzhou Qin , Georgia Institute of Technology, Atlanta, GA
pp. 370-379
Track B: Panel
Track A: Access Control Policy
Sye Loong Keoh , Imperial College London, UK
Morris Sloman , Imperial College London, UK
pp. 386-395
Ezedin Barka , University of the United Arab Emirates
Ravi Sandhu , George Mason University, Fairfax, VA, USA
pp. 396-404
Mohammad A. Al-Kahtani , Computer Department of Saudi Air Defense
Ravi Sandhu , George Mason University & NSD Security
pp. 405-415
Track B: Innovative Design
Neil C. Rowe , Cebrowski Institute, U.S. Naval Postgraduate School, Monterey CA
pp. 418-427
Herv? Debar , France T?l?com, Caen, France
Ludovic M? , Sup?lec, Rennes, France
Mireille Ducass? , IRISA/INSA, Rennes, France
pp. 428-437
Dirk Balfanz , Palo Alto Research Center, Palo Alto, CA
Alina Oprea , Carnegie Mellon University, Pittsburgh, PA
D. K. Smetters , Palo Alto Research Center, Palo Alto, CA
pp. 438-447
Author Index (PDF)
pp. 449-450
9 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool