The Community for Technology Leaders
Computer Security Applications Conference, Annual (2000)
New Orleans, Louisiana
Dec. 11, 2000 to Dec. 15, 2000
ISSN: 1063-9527
ISBN: 0-7695-0859-6
TABLE OF CONTENTS

Reviewers (PDF)

pp. xviii
Track A: Intrusion Detection

Security against compelled disclosure (Abstract)

B. Laurie , Hidden Footprints Ltd., London, UK
I. Brown , Hidden Footprints Ltd., London, UK
pp. 2

Security agility in response to intrusion detection (Abstract)

L. Badger , NAI Labs., USA
M. Petkac , NAI Labs., USA
pp. 11

Two state-based approaches to program-based anomaly detection (Abstract)

C.C. Michael , RST Res. Labs., USA
A. Ghosh , RST Res. Labs., USA
pp. 21
Track B: Distributed/Network Security

Denial of service protection the nozzle (Abstract)

E. Strother , North Carolina State Univ., Raleigh, NC, USA
pp. 32

Virtual enterprise networks: the next generation of secure enterprise networking (Abstract)

C. Schuba , Sun Microsyst. Labs., Palo Alto, CA, USA
S. Kumar , Sun Microsyst. Labs., Palo Alto, CA, USA
G. Scott , Sun Microsyst. Labs., Palo Alto, CA, USA
G. Caronni , Sun Microsyst. Labs., Palo Alto, CA, USA
pp. 42

Enabling secure on-line DNS dynamic update (Abstract)

D. Rine , Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
Yih Huang , Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
Xunhua Wang , Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
Y. Desmedt , Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
pp. 52
Track A: Engineering and Analysis

Extending Java for package based access control (Abstract)

M. Papa , Center for Inf. Security, Tulsa Univ., OK, USA
S. Shenoi , Center for Inf. Security, Tulsa Univ., OK, USA
J. Hale , Center for Inf. Security, Tulsa Univ., OK, USA
R. Chandia , Center for Inf. Security, Tulsa Univ., OK, USA
O. Bremer , Center for Inf. Security, Tulsa Univ., OK, USA
pp. 67

Secure smart homes using Jini and UIUC SESAME (Abstract)

M. Anand , Dept. of Comput. Sci., Illinois Univ., Urbana, IL, USA
J. Al-Muhtadi , Dept. of Comput. Sci., Illinois Univ., Urbana, IL, USA
M.D. Mickunas , Dept. of Comput. Sci., Illinois Univ., Urbana, IL, USA
R. Campbell , Dept. of Comput. Sci., Illinois Univ., Urbana, IL, USA
pp. 77
Track B: Defining, Computing, and Interpreting Trust
Track A: Security Policy

Implementing security policies using the Safe Areas of Computation approach (Abstract)

R.A. Kemmerer , Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
A.L.M. dos Santos , Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
pp. 90

Policy mediation for multi-enterprise environments (Abstract)

O. Bremer , Center for Inf. Security, Tulsa Univ., OK, USA
J. Hale , Center for Inf. Security, Tulsa Univ., OK, USA
D. Ferraiola , Center for Inf. Security, Tulsa Univ., OK, USA
V. Hu , Center for Inf. Security, Tulsa Univ., OK, USA
P. Galiasso , Center for Inf. Security, Tulsa Univ., OK, USA
S. Shenoi , Center for Inf. Security, Tulsa Univ., OK, USA
pp. 100

Protection profiles for remailer mixes - Do the new evaluation criteria help? (Abstract)

G. Iachello , Microsoft Res., Cambridge, UK
K. Rannenberg , Microsoft Res., Cambridge, UK
pp. 107
Track B: Public Key Infrastructure I

Binding identities and attributes using digitally signed certificates (Abstract)

J.S. Park , Lab. for Inf. Security Technol., George Mason Univ., Fairfax, VA, USA
R. Sandhu , Lab. for Inf. Security Technol., George Mason Univ., Fairfax, VA, USA
pp. 120

Applications in health care using public-key certificates and attribute certificates (Abstract)

P. Pharow , Syst. Security Group, Klagenfurt Univ., Austria
P. Wohlmacher , Syst. Security Group, Klagenfurt Univ., Austria
pp. 128

Scalable policy driven and general purpose public key infrastructure (PKI) (Abstract)

I. Balabine , AT&T Labs., Lincroft, NJ, USA
M. Lerner , AT&T Labs., Lincroft, NJ, USA
V. Prasad , AT&T Labs., Lincroft, NJ, USA
M. Ahern , AT&T Labs., Lincroft, NJ, USA
P. Dutta , AT&T Labs., Lincroft, NJ, USA
S. Potakamuri , AT&T Labs., Lincroft, NJ, USA
pp. 138
Track A: Access Control I

A policy-based access control mechanism for the corporate Web (Abstract)

F. Vesuma , MSIS Dept., Rutgers Univ., Newark, NJ, USA
V. Ungureanu , MSIS Dept., Rutgers Univ., Newark, NJ, USA
N.H. Minsky , MSIS Dept., Rutgers Univ., Newark, NJ, USA
pp. 150

Dynamic access control through Petri net workflows (Abstract)

K. Knorr , Dept. of Inf. Technol., Zurich Univ., Switzerland
pp. 159

Framework for role-based delegation models (Abstract)

R. Sandhu , Dept. of Inf. Syst. & Syst. Eng., George Mason Univ., Fairfax, VA, USA
E. Barka , Dept. of Inf. Syst. & Syst. Eng., George Mason Univ., Fairfax, VA, USA
pp. 168
Track B: Intrusion Detection II

A network audit system for host-based intrusion detection (NASHID) in Linux (Abstract)

T.E. Daniels , CERIAS, Purdue Univ., West Lafayette, IN, USA
E.H. Spafford , CERIAS, Purdue Univ., West Lafayette, IN, USA
pp. 178

Less harm, less worry or how to improve network security by bounding system offensiveness (Abstract)

E. Rosti , Dipt. di Sci. dell'Inf., Univ. degli Studi di Milano, Italy
L. Cavallaro , Dipt. di Sci. dell'Inf., Univ. degli Studi di Milano, Italy
D. Bruschi , Dipt. di Sci. dell'Inf., Univ. degli Studi di Milano, Italy
pp. 188

A self-extension monitoring for security management (Abstract)

Sangwood Kim , Dept. of Comput. Sci., Kyungpook Nat. Univ., Taegu, South Korea
Heejin Jang , Dept. of Comput. Sci., Kyungpook Nat. Univ., Taegu, South Korea
pp. 196
Track A: Collaboration -Can It Be Done Securely?

Panel Statement (PDF)

D. Cooper , D.C. Associates, USA
W. Dawson , Intelligence Community CIO/IA, USA
J. Ingle , NSA, USA
S. Lipner , Microsoft, USA
pp. 206
Track B: Security Architecture

Security architecture for federated cooperative information systems (Abstract)

D. Raujol , ONERA-CERT, Toulouse, France
P. Siron , ONERA-CERT, Toulouse, France
P. Bieber , ONERA-CERT, Toulouse, France
pp. 208

Secure compartmented data access over an untrusted network using a COTS-based architecture (Abstract)

M.C. Meissner , SecureMethods Inc., Vienna, VA, USA
K.O. Vance , SecureMethods Inc., Vienna, VA, USA
P.C. Clark , SecureMethods Inc., Vienna, VA, USA
pp. 217

Security architectures for controlled digital information dissemination (Abstract)

R. Sandhu , Lab. for Inf. Security Technol., George Mason Univ., Fairfax, VA, USA
Jaehong Park , Lab. for Inf. Security Technol., George Mason Univ., Fairfax, VA, USA
J. Schifalacqua , Lab. for Inf. Security Technol., George Mason Univ., Fairfax, VA, USA
pp. 224
Track A: Engineering and Analysis II

On computer viral infection and the effect of immunization (Abstract)

M.C. Elder , Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
J.C. Knight , Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
Chenxi Wang , Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
pp. 246

ITS4: A static vulnerability scanner for C and C++ code (Abstract)

J. Viega , Reliable Software Technol., Dulles, VA, USA
J.T. Bloch , Reliable Software Technol., Dulles, VA, USA
Y. Kohno , Reliable Software Technol., Dulles, VA, USA
G. McGraw , Reliable Software Technol., Dulles, VA, USA
pp. 257
Track B: Public Key Infrastructure II

A novel approach to on-line status authentication of public-key certificates (Abstract)

E. Faldella , Dept. of Electron., Comput. Sci. & Syst., Bologna Univ., Italy
M. Prandini , Dept. of Electron., Comput. Sci. & Syst., Bologna Univ., Italy
pp. 270

A reliable, scalable general-purpose certificate store (Abstract)

P. Gutmann , IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
pp. 278

Introducing decryption authority into PKI (Abstract)

Feng Bao , Kent Ridge Digital Labs., Singapore
pp. 288
Track A: E-Commerce

Using attribute certificates with mobile policies in electronic commerce applications (Abstract)

S. Jajodia , MITRE Corp., McLean, VA, USA
A. Fayad , MITRE Corp., McLean, VA, USA
R. MacLean , MITRE Corp., McLean, VA, USA
V. Doshi , MITRE Corp., McLean, VA, USA
pp. 298

Experience with software watermarking (Abstract)

Qiuyun Shao , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
Minseok Kwon , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
Y. Zhang , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
J. Palsberg , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
S. Krishnaswamy , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
D. Ma , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
pp. 308

Efficient commerce protocols based on one-time pads (Abstract)

E.W. Felten , Dept. of Comput. Sci., Princeton Univ., NJ, USA
M.A. Schneider , Dept. of Comput. Sci., Princeton Univ., NJ, USA
pp. 317
Track B: Security Management

Calculating costs for quality of security service (Abstract)

T. Levin , Anteon Corp., Monterey, CA, USA
E. Spyropoulou , Anteon Corp., Monterey, CA, USA
C. Irvine , Anteon Corp., Monterey, CA, USA
pp. 334

Usability meets security - the Identity-Manager as your personal security assistant for the Internet (Abstract)

D. Gerd tom Markotten , Inst. for Comput. Sci. & Social Studies, Albert-Ludwigs-Univ., Freiburg, Germany
U. Jendricke , Inst. for Comput. Sci. & Social Studies, Albert-Ludwigs-Univ., Freiburg, Germany
pp. 344
Friday, 10:30 A.M., December 15

A flexible access control service for Java mobile code (Abstract)

E. Lupu , Dipartimento di Elettronica, Inf. e Sistemistica, Bologna Univ., Italy
R. Montanari , Dipartimento di Elettronica, Inf. e Sistemistica, Bologna Univ., Italy
M. Sloman , Dipartimento di Elettronica, Inf. e Sistemistica, Bologna Univ., Italy
C. Stefanelli , Dipartimento di Elettronica, Inf. e Sistemistica, Bologna Univ., Italy
A. Corradi , Dipartimento di Elettronica, Inf. e Sistemistica, Bologna Univ., Italy
pp. 356

Personal security environment on Palm PDA (Abstract)

S. Heiberg , Cybernetica, Tallinn, Estonia
M. Freundenthal , Cybernetica, Tallinn, Estonia
J. Willemson , Cybernetica, Tallinn, Estonia
pp. 366

History based distributed filtering - a tagging approach to network-level access control (Abstract)

R. Sailer , IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
M. Kabatnik , IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
pp. 373
Track B: Cryptography

The Chinese Remainder Theorem and its application in a high-speed RSA crypto chip (Abstract)

J. Groβchadl , Inst. for Appl. Inf. Process. & Commun., Graz Univ. of Technol., Austria
pp. 384

Fair on-line gambling (Abstract)

Weiling Zhao , Sch. of Comput. & Inf. Technol., Univ. of Western Sydney, Kingswood, NSW, Australia
Y. Mu , Sch. of Comput. & Inf. Technol., Univ. of Western Sydney, Kingswood, NSW, Australia
V. Varadharajan , Sch. of Comput. & Inf. Technol., Univ. of Western Sydney, Kingswood, NSW, Australia
pp. 394

A high-speed ECC-based wireless authentication on an ARM microprocessor (Abstract)

T. Yantk , Dept. of Electr. & Comput. Eng., Oregon State Univ., Corvallis, OR, USA
Ç.K. Koç , Dept. of Electr. & Comput. Eng., Oregon State Univ., Corvallis, OR, USA
M. Aydos , Dept. of Electr. & Comput. Eng., Oregon State Univ., Corvallis, OR, USA
pp. 401

Author Index (PDF)

pp. 411
89 ms
(Ver )