The Community for Technology Leaders
RSS Icon
Subscribe
2012 IEEE Symposium on Security and Privacy (1999)
Oakland, California
May 9, 1999 to May 12, 1999
ISBN: 0-7695-0176-1
TABLE OF CONTENTS
Systems
David Evans , Massachusetts Institute of Technology
pp. 0032
Policy
Mary Ellen Zurko , Iris Associates
Rich Simon , EMC Corporation
Tom Sanfilippo , Groove Networks
pp. 0057
Verification
Panel 1: Brief History of Twenty Years of Computer Security Research
G. R. Blakley , Texas A&M University
pp. 0106
Virgil D. Gligor , University of Maryland at College Park
pp. 0108
Jonathan Millen , SRI International
pp. 0113
John McLean , Naval Research Laboratory
pp. 0115
Intrusion Detection
Salvatore J. Stolfo , Columbia University
Wenke Lee , Columbia University
pp. 0120
Panel 2: Near Misses and Hidden Treasures in Early Computer Security Research
Information Flow
Haruna R. Isa , United States Navy
William R. Shockley , Cyberscape Computer Services
Cynthia E. Irvine , Naval Postgraduate School
pp. 0166
Authentication and Key Exchange
D.N. Hoover , Arcot Systems, Inc.
pp. 0208
Panel Discussion 3: Time Capsule — Twenty Years from Now
Howard Shrobe , Massachusetts Institute of Technology
pp. 0237
Brian D. Snow , National Security Agency
pp. 0240
pp. 0243
48 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool