The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Applications Conference, Annual (2004)
Tucson, Arizona
Dec. 6, 2004 to Dec. 10, 2004
ISBN: 0-7695-2252-1
TABLE OF CONTENTS
pp. xviii
Distinguished Practitioner
Steve Lipner , Microsoft Corporation, Redmond, WA
pp. 2-13
Track A: Intrusion Detection
Giovanni Vigna , University of California, Santa Barbara
Sumit Gwalani , University of California, Santa Barbara
Kavitha Srinivasan , University of California, Santa Barbara
Elizabeth M. Belding-Royer , University of California, Santa Barbara
Richard A. Kemmerer , University of California, Santa Barbara
pp. 16-27
Shai Rubin , University of Wisconsin, Madison
Somesh Jha , University of Wisconsin, Madison
Barton P. Miller , University of Wisconsin, Madison
pp. 28-38
Yan Zhai , North Carolina State University, Raleigh, NC
Peng Ning , North Carolina State University, Raleigh, NC
Purush Iyer , North Carolina State University, Raleigh, NC
Douglas S. Reeves , North Carolina State University, Raleigh, NC
pp. 39-48
Track B: Start Seeing Security
Julie Thorpe , Carleton University
P. C. van Oorschot , Carleton University
pp. 50-60
Zhuowei Li , Nanyang Technological University, Singapore
Amitabha Das , Nanyang Technological University, Singapore
pp. 61-70
J. J. Brennan , The MITRE Corporation
Mindy Rudell , The MITRE Corporation
Don Faatz , The MITRE Corporation
Carson Zimmerman , The MITRE Corporation
pp. 71-79
Track A: Software Safety
Martin Rinard , Massachusetts Institute of Technology, Cambridge, MA
Cristian Cadar , Massachusetts Institute of Technology, Cambridge, MA
Daniel Dumitran , Massachusetts Institute of Technology, Cambridge, MA
Daniel M. Roy , Massachusetts Institute of Technology, Cambridge, MA
Tudor Leu , Massachusetts Institute of Technology, Cambridge, MA
pp. 82-90
Christopher Kruegel , Technical University Vienna
William Robertson , University of California, Santa Barbara
Giovanni Vigna , University of California, Santa Barbara
pp. 91-100
Haizhi Xu , Syracuse University, NY
Wenliang Du , Syracuse University, NY
Steve J. Chapin , Syracuse University, NY
pp. 101-110
Track B: Panel
Track A: Malware
Ajay Gupta , Stony Brook University, NY
Daniel C. DuVarney , Stony Brook University, NY
pp. 116-125
Kalyan S. Perumalla , Georgia Institute of Technology, Atlanta, Georgia
Srikanth Sundaragopalan , Georgia Institute of Technology, Atlanta, Georgia
pp. 126-135
Guofei Gu , Georgia Institute of Technology, Atlanta, GA
Monirul Sharif , Georgia Institute of Technology, Atlanta, GA
Xinzhou Qin , Georgia Institute of Technology, Atlanta, GA
David Dagon , Georgia Institute of Technology, Atlanta, GA
Wenke Lee , Georgia Institute of Technology, Atlanta, GA
George Riley , Georgia Institute of Technology, Atlanta, GA
pp. 136-145
Hisashi Kojima , Fujitsu Laboratories Limited
Ikuya Morikawa , Fujitsu Laboratories Limited
Yuko Nakayama , Fujitsu Laboratories Limited
Yuji Yamaoka , Fujitsu Laboratories Limited
pp. 146-155
Track B: Audit Analysis
Emilie Lundin Barse , Chalmers University of Technology, Sweden
Erland Jonsson , Chalmers University of Technology, Sweden
pp. 158-167
Jingyu Zhou , University of California, Santa Barbara
Giovanni Vigna , University of California, Santa Barbara
pp. 168-178
Tzi-cker Chiueh , Rether Networks Inc., Centereach, NY
Dhruv Pilania , Rether Networks Inc., Centereach, NY
pp. 179-188
Ramkumar Chinchani , State University of New York at Buffalo
Aarthie Muthukrishnan , State University of New York at Buffalo
Madhusudhanan Chandrasekaran , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
pp. 189-204
Invited Essayist Plenary
Plenary: Classic Papers
Track A: Middleware
Mudhakar Srivatsa , Georgia Institute of Technology
Ling Liu , Georgia Institute of Technology
pp. 252-261
Ninghui Li , Purdue University, West Lafayette, IN
John C. Mitchell , Stanford University, CA
Derrick Tong , Google Inc., Mountain View CA
pp. 262-271
Nathanael Paul , University of Virginia
David Evans , University of Virginia
pp. 272-281
Track B: Insider Threat
Amit Purohit , Stony Brook University
Vishnu Navda , Stony Brook University
Tzi-cker Chiueh , Stony Brook University
pp. 284-303
John Marchesini , Dartmouth College, Hanover, NH
Sean W. Smith , Dartmouth College, Hanover, NH
Omen Wild , Dartmouth College, Hanover, NH
Josh Stabiner , Dartmouth College, Hanover, NH
Alex Barsamian , Dartmouth College, Hanover, NH
pp. 294-303
Suranjan Pramanik , University at Buffalo, Buffalo NY
Vidyaraman Sankaranarayanan , University at Buffalo, Buffalo NY
Shambhu Upadhyaya , University at Buffalo, Buffalo NY
pp. 304-313
Track A: Network Security
Kulesh Shanmugasundaram , Polytechnic University, Brooklyn, NY
Mehdi Kharrazi , Polytechnic University, Brooklyn, NY
Nasir Memon , Polytechnic University, Brooklyn, NY
pp. 316-325
A. H. Sung , New Mexico Tech, Socorro, New Mexico
J. Xu , New Mexico Tech, Socorro, New Mexico
P. Chavez , New Mexico Tech, Socorro, New Mexico
S. Mukkamala , New Mexico Tech, Socorro, New Mexico
pp. 326-334
Fu-Hau Hsu , State University of New York at Stony Brook
Tzi-cker Chiueh , State University of New York at Stony Brook
pp. 335-344
Track B: Panel
Track A: Event Correlation
Steven Noel , George Mason University
Eric Robertson , George Mason University
Sushil Jajodia , George Mason University
pp. 350-359
Dingbang Xu , North Carolina State University, Raleigh, NC
Peng Ning , North Carolina State University, Raleigh, NC
pp. 360-369
Xinzhou Qin , Georgia Institute of Technology, Atlanta, GA
Wenke Lee , Georgia Institute of Technology, Atlanta, GA
pp. 370-379
Track B: Panel
Track A: Access Control Policy
Sye Loong Keoh , Imperial College London, UK
Emil Lupu , Imperial College London, UK
Morris Sloman , Imperial College London, UK
pp. 386-395
Ezedin Barka , University of the United Arab Emirates
Ravi Sandhu , George Mason University, Fairfax, VA, USA
pp. 396-404
Mohammad A. Al-Kahtani , Computer Department of Saudi Air Defense
Ravi Sandhu , George Mason University & NSD Security
pp. 405-415
Track B: Innovative Design
Neil C. Rowe , Cebrowski Institute, U.S. Naval Postgraduate School, Monterey CA
pp. 418-427
Elvis Tombini , France T?l?com, Caen, France
Herv? Debar , France T?l?com, Caen, France
Ludovic M? , Sup?lec, Rennes, France
Mireille Ducass? , IRISA/INSA, Rennes, France
pp. 428-437
Alina Oprea , Carnegie Mellon University, Pittsburgh, PA
Dirk Balfanz , Palo Alto Research Center, Palo Alto, CA
Glenn Durfee , Palo Alto Research Center, Palo Alto, CA
D. K. Smetters , Palo Alto Research Center, Palo Alto, CA
pp. 438-447
Author Index (PDF)
pp. 449-450
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool