The Community for Technology Leaders
RSS Icon
Subscribe
Computer Security Applications Conference, Annual (2005)
Tucson, Arizona
Dec. 5, 2005 to Dec. 9, 2005
ISBN: 0-7695-2461-3
TABLE OF CONTENTS
Cover
Introduction
pp. xviii
Distinguished Practitioner
We Need Assurance! (Abstract)
Brian Snow , U. S. National Security Agency
pp. 3-10
Track A: Software Security
Hao Chen , University of California, Berkeley
David Wagner , University of California, Berkeley
Jeremy Lin , University of California, Berkeley
Wei Tu , University of California, Berkeley
Geoff Morrison , University of California, Berkeley
Jacob West , University of California, Berkeley
pp. 13-22
Jonathon T. Giffin , University of Wisconsin
Mihai Christodorescu , University of Wisconsin
Louis Kruger , University of Wisconsin
pp. 23-32
David Wheeler , Institute for Defense Analyses
pp. 33-48
Track B: Network Intrusion Detection
Andrew Clark , Queensland University of Technology, Australia
Stig Andersson , Queensland University of Technology, Australia
Bradley Schatz , Queensland University of Technology, Australia
Jacob Zimmermann , Queensland University of Technology, Australia
pp. 49-58
Joseph Pamula , Center for Secure Information Systems George Mason University
Paul Ammann , ISE Department George Mason University
Ronald Ritchey , Booz Allen & Hamilton
pp. 72-84
Track A: Security Designs
Norman Feske , Technische Universitat Dresden
Christian Helmuth , Technische Universitat Dresden
pp. 85-94
Wu Yongzheng , National University of Singapore
Roland H. C. Yap , National University of Singapore
pp. 95-105
William Enck , Pennsylvania State University
Wesam Lootah , Pennsylvania State University
pp. 106-116
Track B: Protocol Analysis
Adam J. Carlson , University of California, Davis
Matt Bishop , University of California, Davis
pp. 117-126
Danilo Bruschi , Universita degli Studi di Milano
Lorenzo Cavallaro , Universita degli Studi di Milano
Andrea Lanzi , Universita degli Studi di Milano
Mattia Monga , Universita degli Studi di Milano
pp. 127-137
Track A: Vulnerability Assessment
Fanglu Guo , Stony Brook University, NY
Yang Yu , Stony Brook University, NY
Tzi-cker Chiueh , Stony Brook University, NY
pp. 150-159
Steven Noel , George Mason University
Sushil Jajodia , George Mason University
pp. 160-169
Ashish Kamra , Purdue University
Evimaria Terzi , University of Helsinki
Elisa Bertino , Purdue University
pp. 170-182
Track B: Hot Topics I
Invited Essayist
Track A: Automation
Corrado Leita , Institut Eurecom Sophia Antipolis, France
Ken Mermoud , Institut Eurecom Sophia Antipolis, France
Marc Dacier , Institut Eurecom Sophia Antipolis, France
pp. 203-214
A. Nur Zincir-Heywood , Dalhousie University, Halifax, Nova Scotia
Malcolm Heywood , Dalhousie University, Halifax, Nova Scotia
pp. 225-234
Track B: Security Analysis
Mohamed Saleh , Concordia University, Montreal, Canada
Chamseddine Talhi , Concordia University, Montreal, Canada
Sami Zhioua , Concordia University, Montreal, Canada
pp. 235-244
John Black , University of Colorado
Martin Ryan Gardner , University of Colorado
pp. 245-253
Wei Wang , Iowa State University
Thomas E. Daniels , Iowa State University
pp. 254-266
Track A: Operating System Security Mechanisms
Paul A. Karger , IBM Thomas J. Watson Research Center
pp. 267-275
Trent Jaeger , IBM T. J. Watson Research Center, Hawthorne, NY
Enriquillo Valdez , IBM T. J. Watson Research Center, Hawthorne, NY
Ramon Caceres , IBM T. J. Watson Research Center, Hawthorne, NY
Ronald Perez , IBM T. J. Watson Research Center, Hawthorne, NY
Stefan Berger , IBM T. J. Watson Research Center, Hawthorne, NY
John Linwood Griffin , IBM T. J. Watson Research Center, Hawthorne, NY
Leendert van Doorn , IBM T. J. Watson Research Center, Hawthorne, NY
pp. 276-285
Track B: Data Integrity
Deepak Chandra , University of California, Irvine, CA
Vivek Haldar , University of California, Irvine, CA
pp. 303-311
Gershon Kedem , Duke University
Fareed Zaffar , Duke University
pp. 322-332
Track C: Hot Topics II
Classic Papers
Myong H. Kang , Naval Research Laboratory Washington, DC
Ira S. Moskowitz , Naval Research Laboratory Washington, DC
Stanley Chincheck , Naval Research Laboratory Washington, DC
pp. 352-360
Track A: Malware
Randy H. Katz , University of California, Berkeley and Hewlett-Packard Laboratories
Weidong Cui , University of California, Berkeley and Hewlett-Packard Laboratories
pp. 361-370
Paul C. van Oorschot , Carleton University, Ottawa, Canada
Evangelos Kranakis , Carleton University, Ottawa, Canada
pp. 371-380
Stealth Breakpoints (Abstract)
Amit Vasudevan , University of Texas at Arlington
pp. 381-392
Track B: Panel
Abe Singer , University of California at San Diego
Michael E. Locasto , Columbia University
Stelios Sidiroglou , Columbia University
Angelos D. Keromytis , Columbia University
John McDermott , Naval Research Laboratory
Julie Thorpe , Carleton University
Paul van Oorschot , Carleton University
Anil Somayaji , Carleton University
Simon Simon Foley , University College Cork
Mark Bush , Florida Institute of Technology
Alex Boulatov , Florida Institute of Technology
pp. 393-396
Track A: Distributed System Security
Jun Li , University of Oregon
Xun Kang , University of Oregon
pp. 397-408
Daniel F. Berger , University of California, Riverside
John P. Jones , University of California, Riverside
pp. 409-418
Track B: Access Control
Tine Verhanneman , Katholieke Universiteit Leuven
Frank Piessens , Katholieke Universiteit Leuven
Bart De Win , Katholieke Universiteit Leuven
Wouter Joosen , Katholieke Universiteit Leuven
pp. 431-440
Terence Sim , National University of Singapore
Rajkumar Janakiraman , National University of Singapore
Sheng Zhang , National University of Singapore
pp. 441-450
Rennie deGraaf , University of Calgary
Michael Jr. Jacobson , University of Calgary
pp. 451-462
Track A: Passwords and Applied Crypto
Ying Zhu , Georgia State University
Xiaoyuan Suo , Georgia State University
pp. 463-472
Jason Waddle , University of California, Berkeley
pp. 483-494
Track B: Defense in Depth/Database Security
Partha Pal , BBN Technologies, Cambridge, MA
Jennifer Chong , BBN Technologies, Cambridge, MA
Paul Rubel , BBN Technologies, Cambridge, MA
Franklin Webber , BBN Technologies, Cambridge, MA
pp. 495-504
Michael Ihde , University of Illinois at Urbana-Champaign
Steven Harp , Adventium Labs, Minneapolis, MN
Charles Payne , Adventium Labs, Minneapolis, MN
pp. 505-514
Meng Yu , Monmouth University
Wanyu Zang , Monmouth University
Peng Liu , Pennsylvania State University
pp. 515-526
Track C: Privacy
Anas Abou el Kalam , LIFO - CNRS / ENSIB, France
pp. 527-536
Dingbang Xu , North Carolina State University
pp. 537-546
Yiru Li , Carleton University
pp. 547-556
Author Index
Author Index (PDF)
pp. 557
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool