• D
  • DISCEX
  • 2000
  • DARPA Information Survivability Conference & Exposition - Volume 1
Advanced Search 
DARPA Information Survivability Conference & Exposition - Volume 1
Hilton Head, South Carolina
January 25-January 27
ISBN: 0-7695-0490-6
Table of Contents
High Confidence Networking
Sandra L. Murphy, Network Associates, Inc.
Olafur Gudmundsson, Network Associates, Inc.
Russ Mundy, Network Associates, Inc.
Brian Wellington, Network Associates, Inc.
pp. 0003
P. Syverson, Paul F. Syverson, Michael G. Reed, and David M. Goldschlag Naval Research Laboratory
M. Reed, Paul F. Syverson, Michael G. Reed, and David M. Goldschlag Naval Research Laboratory
D. Goldschlag, Paul F. Syverson, Michael G. Reed, and David M. Goldschlag Naval Research Laboratory
pp. 0034
John Zao, GTE - BBN Technologies Inc.
Luis Sanchez, GTE - BBN Technologies Inc.
Matthew Condell, GTE - BBN Technologies Inc.
Charles Lynn, GTE - BBN Technologies Inc.
Matthew Fredette, GTE - BBN Technologies Inc.
Pamela Helinek, GTE - BBN Technologies Inc.
Pajesh Krishnan, GTE - BBN Technologies Inc.
Alden Jackson, GTE - BBN Technologies Inc.
David Mankins, GTE - BBN Technologies Inc.
Marla Shepard, GTE - BBN Technologies Inc.
Stephen Kent, GTE - BBN Technologies Inc.
pp. 0041
Peter T. Kirstein, University College London
Ian Brown, University College London
Edmund Whelan, University College London
pp. 0054
Peter T. Dinsmore, Network Associates, Inc.
David M. Balenson, Network Associates, Inc.
Michael Heyman, Network Associates, Inc.
Peter S. Kruus, Network Associates, Inc.
Caroline D. Scace, Network Associates, Inc.
Alan T. Sherman, Network Associates, Inc.
pp. 0064
Michael Malkin, Stanford University
Thomas Wu, Stanford University
Dan Boneh, Stanford University
pp. 0074
William H. Winsborough, IBM Transarc Lab
Kent E. Seamons, IBM Transarc Lab
Vicki E. Jones, North Carolina State University at Raleigh
pp. 0088
Jamison M. Adcock, Network Associates, Inc.
David M. Balenson, Network Associates, Inc.
David W. Carman, Network Associates, Inc.
Michael Heyman, Network Associates, Inc.
Alan T. Sherman, Network Associates, Inc.
pp. 0127
Chong Xu, Duke University
Frank Jou, MCNC
S. Felix Wu, North Carolina State University
Zhi Fu, North Carolina State University
He Huang, North Carolina State University
pp. 0162
Zhaoyu Liu, University of Illinois at Urbana-Champaign
Prasad Naldurg, University of Illinois at Urbana-Champaign
Seung Yi, University of Illinois at Urbana-Champaign
Tin Qian, University of Illinois at Urbana-Champaign
Roy H. Campbell, University of Illinois at Urbana-Champaign
M. Dennis Mickunas, University of Illinois at Urbana-Champaign
pp. 0187
High Confidence Computing
P. M. Melliar-Smith, University of California at Santa Barbara
L. E. Moser, University of California at Santa Barbara
V. Kalogeraki, University of California at Santa Barbara
P. Narasimhan, University of California at Santa Barbara
pp. 0281
Terry Vickers Benzel, Network Associates, Inc.
Pierre X. Pasturel, Network Associates, Inc.
Deborah Shands, Network Associates, Inc.
Daniel F. Sterne, Network Associates, Inc.
Gregg W. Tally, Network Associates, Inc.
E. John Sebes, Kroll-O'Gara Information Security Group
pp. 0308
Karen A. Oostendorp, Trusted Information Systems, Inc.
Lee Badger, Trusted Information Systems, Inc.
Christopher D. Vance, Trusted Information Systems, Inc.
Wayne G. Morrison, Trusted Information Systems, Inc.
Michael J. Petkac, Trusted Information Systems, Inc.
David L. Sherman, Trusted Information Systems, Inc.
Daniel F. Sterne, Trusted Information Systems, Inc.
pp. 0351
Raju Pandey, University of California at Davis
Brant Hashii, University of California at Davis
Manoj Lal, University of California at Davis
pp. 0362
Mike Petkac, Network Associates Inc.
Lee Badger, Network Associates Inc.
Wayne Morrison, Network Associates Inc.
pp. 0377
Karl Crary, Carnegie Mellon University
Robert Harper, Carnegie Mellon University
Peter Lee, Carnegie Mellon University
Frank Pfenning, Carnegie Mellon University
pp. 0406
Usage of this product signifies your acceptance of the Terms of Use.