• A
  • ACSAC
  • 2004
  • 20th Annual Computer Security Applications Conference (ACSAC'04)
Advanced Search 
20th Annual Computer Security Applications Conference (ACSAC'04)
Tucson, Arizona
December 06-December 10
ISBN: 0-7695-2252-1
Table of Contents
null
pp. xviii-xviii
Distinguished Practitioner
Track A: Intrusion Detection
Giovanni Vigna, University of California, Santa Barbara
Sumit Gwalani, University of California, Santa Barbara
Kavitha Srinivasan, University of California, Santa Barbara
Elizabeth M. Belding-Royer, University of California, Santa Barbara
Richard A. Kemmerer, University of California, Santa Barbara
pp. 16-27
Shai Rubin, University of Wisconsin, Madison
Somesh Jha, University of Wisconsin, Madison
Barton P. Miller, University of Wisconsin, Madison
pp. 28-38
Yan Zhai, North Carolina State University, Raleigh, NC
Peng Ning, North Carolina State University, Raleigh, NC
Purush Iyer, North Carolina State University, Raleigh, NC
Douglas S. Reeves, North Carolina State University, Raleigh, NC
pp. 39-48
Track B: Start Seeing Security
Zhuowei Li, Nanyang Technological University, Singapore
Amitabha Das, Nanyang Technological University, Singapore
pp. 61-70
J. J. Brennan, The MITRE Corporation
Mindy Rudell, The MITRE Corporation
Don Faatz, The MITRE Corporation
Carson Zimmerman, The MITRE Corporation
pp. 71-79
Track A: Software Safety
Martin Rinard, Massachusetts Institute of Technology, Cambridge, MA
Cristian Cadar, Massachusetts Institute of Technology, Cambridge, MA
Daniel Dumitran, Massachusetts Institute of Technology, Cambridge, MA
Daniel M. Roy, Massachusetts Institute of Technology, Cambridge, MA
Tudor Leu, Massachusetts Institute of Technology, Cambridge, MA
pp. 82-90
Christopher Kruegel, Technical University Vienna
William Robertson, University of California, Santa Barbara
Giovanni Vigna, University of California, Santa Barbara
pp. 91-100
Haizhi Xu, Syracuse University, NY
Wenliang Du, Syracuse University, NY
Steve J. Chapin, Syracuse University, NY
pp. 101-110
Track B: Panel
Track A: Malware
Kalyan S. Perumalla, Georgia Institute of Technology, Atlanta, Georgia
Srikanth Sundaragopalan, Georgia Institute of Technology, Atlanta, Georgia
pp. 126-135
Guofei Gu, Georgia Institute of Technology, Atlanta, GA
Monirul Sharif, Georgia Institute of Technology, Atlanta, GA
Xinzhou Qin, Georgia Institute of Technology, Atlanta, GA
David Dagon, Georgia Institute of Technology, Atlanta, GA
Wenke Lee, Georgia Institute of Technology, Atlanta, GA
George Riley, Georgia Institute of Technology, Atlanta, GA
pp. 136-145
Hisashi Kojima, Fujitsu Laboratories Limited
Ikuya Morikawa, Fujitsu Laboratories Limited
Yuko Nakayama, Fujitsu Laboratories Limited
Yuji Yamaoka, Fujitsu Laboratories Limited
pp. 146-155
Track B: Audit Analysis
Ramkumar Chinchani, State University of New York at Buffalo
Aarthie Muthukrishnan, State University of New York at Buffalo
Madhusudhanan Chandrasekaran, State University of New York at Buffalo
Shambhu Upadhyaya, State University of New York at Buffalo
pp. 189-204
Invited Essayist Plenary
Transparency and Trust in Computational Systems
Plenary: Classic Papers
Track A: Middleware
Ninghui Li, Purdue University, West Lafayette, IN
John C. Mitchell, Stanford University, CA
Derrick Tong, Google Inc., Mountain View CA
pp. 262-271
Track B: Insider Threat
Amit Purohit, Stony Brook University
Vishnu Navda, Stony Brook University
Tzi-cker Chiueh, Stony Brook University
pp. 284-303
John Marchesini, Dartmouth College, Hanover, NH
Sean W. Smith, Dartmouth College, Hanover, NH
Omen Wild, Dartmouth College, Hanover, NH
Josh Stabiner, Dartmouth College, Hanover, NH
Alex Barsamian, Dartmouth College, Hanover, NH
pp. 294-303
Suranjan Pramanik, University at Buffalo, Buffalo NY
Vidyaraman Sankaranarayanan, University at Buffalo, Buffalo NY
Shambhu Upadhyaya, University at Buffalo, Buffalo NY
pp. 304-313
Track A: Network Security
Kulesh Shanmugasundaram, Polytechnic University, Brooklyn, NY
Mehdi Kharrazi, Polytechnic University, Brooklyn, NY
Nasir Memon, Polytechnic University, Brooklyn, NY
pp. 316-325
A. H. Sung, New Mexico Tech, Socorro, New Mexico
J. Xu, New Mexico Tech, Socorro, New Mexico
P. Chavez, New Mexico Tech, Socorro, New Mexico
S. Mukkamala, New Mexico Tech, Socorro, New Mexico
pp. 326-334
Fu-Hau Hsu, State University of New York at Stony Brook
Tzi-cker Chiueh, State University of New York at Stony Brook
pp. 335-344
Track A: Event Correlation
Dingbang Xu, North Carolina State University, Raleigh, NC
Peng Ning, North Carolina State University, Raleigh, NC
pp. 360-369
Xinzhou Qin, Georgia Institute of Technology, Atlanta, GA
Wenke Lee, Georgia Institute of Technology, Atlanta, GA
pp. 370-379
Symmetric Behavior-Based Trust
Property-Based Attestation for Computing Platforms: Caring about Properties not Mechanisms
Support for Multi-Level Security Policies in DRM Architectures
The Role of Suspicion in Model-Based Intrusion Detection
Track A: Access Control Policy
Sye Loong Keoh, Imperial College London, UK
Emil Lupu, Imperial College London, UK
Morris Sloman, Imperial College London, UK
pp. 386-395
Ezedin Barka, University of the United Arab Emirates
Ravi Sandhu, George Mason University, Fairfax, VA, USA
pp. 396-404
Mohammad A. Al-Kahtani, Computer Department of Saudi Air Defense
Ravi Sandhu, George Mason University & NSD Security
pp. 405-415
Track B: Innovative Design
Neil C. Rowe, Cebrowski Institute, U.S. Naval Postgraduate School, Monterey CA
pp. 418-427
Elvis Tombini, France T?l?com, Caen, France
Herv? Debar, France T?l?com, Caen, France
Ludovic M?, Sup?lec, Rennes, France
Mireille Ducass?, IRISA/INSA, Rennes, France
pp. 428-437
Alina Oprea, Carnegie Mellon University, Pittsburgh, PA
Dirk Balfanz, Palo Alto Research Center, Palo Alto, CA
Glenn Durfee, Palo Alto Research Center, Palo Alto, CA
D. K. Smetters, Palo Alto Research Center, Palo Alto, CA
pp. 438-447
Author Index (PDF)
pp. 449-450
Usage of this product signifies your acceptance of the Terms of Use.