The Community for Technology Leaders
DARPA Information Survivability Conference and Exposition, (2000)
Hilton Head, South Carolina
Jan. 25, 2000 to Jan. 27, 2000
ISBN: 0-7695-0490-6
TABLE OF CONTENTS
High Confidence Networking

Retrofitting Security into Internet Infrastructure Protocols (Abstract)

Sandra L. Murphy , Network Associates, Inc.
Olafur Gudmundsson , Network Associates, Inc.
Russ Mundy , Network Associates, Inc.
Brian Wellington , Network Associates, Inc.
pp. 0003

Design and Analysis of the Secure Border Gateway Protocol (S-BGP) (Abstract)

Stephen Kent , BBN Technologies
Charles Lynn , BBN Technologies
Karen Seo , BBN Technologies
pp. 0018

Onion Routing Access Configurations (Abstract)

P. Syverson , Paul F. Syverson, Michael G. Reed, and David M. Goldschlag Naval Research Laboratory
M. Reed , Paul F. Syverson, Michael G. Reed, and David M. Goldschlag Naval Research Laboratory
D. Goldschlag , Paul F. Syverson, Michael G. Reed, and David M. Goldschlag Naval Research Laboratory
pp. 0034

Domain Based Internet Security Policy Management (Abstract)

John Zao , GTE - BBN Technologies Inc.
Luis Sanchez , GTE - BBN Technologies Inc.
Matthew Condell , GTE - BBN Technologies Inc.
Charles Lynn , GTE - BBN Technologies Inc.
Matthew Fredette , GTE - BBN Technologies Inc.
Pamela Helinek , GTE - BBN Technologies Inc.
Pajesh Krishnan , GTE - BBN Technologies Inc.
Alden Jackson , GTE - BBN Technologies Inc.
David Mankins , GTE - BBN Technologies Inc.
Marla Shepard , GTE - BBN Technologies Inc.
Stephen Kent , GTE - BBN Technologies Inc.
pp. 0041

Secure Multicast Conferencing (Abstract)

Peter T. Kirstein , University College London
Ian Brown , University College London
Edmund Whelan , University College London
pp. 0054

Policy-Based Security Management for Large Dynamic Groups: An Overview of the DCCM Project (Abstract)

Peter T. Dinsmore , Network Associates, Inc.
David M. Balenson , Network Associates, Inc.
Michael Heyman , Network Associates, Inc.
Peter S. Kruus , Network Associates, Inc.
Caroline D. Scace , Network Associates, Inc.
Alan T. Sherman , Network Associates, Inc.
pp. 0064

Building Intrusion Tolerant Applications (Abstract)

Michael Malkin , Stanford University
Thomas Wu , Stanford University
Dan Boneh , Stanford University
pp. 0074

Automated Trust Negotiation (Abstract)

William H. Winsborough , IBM Transarc Lab
Kent E. Seamons , IBM Transarc Lab
Vicki E. Jones , North Carolina State University at Raleigh
pp. 0088

Policy-Based Cryptographic Key Management: Experience with the KRP Project (Abstract)

Dennis K. Branstad , Network Associates, Inc.
David M. Balenson , Network Associates, Inc.
pp. 0103

Experience with the ACSA Project (Abstract)

Jamison M. Adcock , Network Associates, Inc.
David M. Balenson , Network Associates, Inc.
David W. Carman , Network Associates, Inc.
Michael Heyman , Network Associates, Inc.
Alan T. Sherman , Network Associates, Inc.
pp. 0127

Advanced Security Proxies: An Architecture and Implementation for High-Performance Network Firewalls (Abstract)

Roger Knobbe , Network Associates Inc.
Andrew Purtell , Network Associates Inc.
Stephen Schwab , Network Associates Inc.
pp. 0140

Celestial Security Management System (Abstract)

Chong Xu , Duke University
Frank Jou , MCNC
S. Felix Wu , North Carolina State University
Zhi Fu , North Carolina State University
He Huang , North Carolina State University
pp. 0162

An Agent Based Architecture for Supporting Application Level Security (Abstract)

Zhaoyu Liu , University of Illinois at Urbana-Champaign
Prasad Naldurg , University of Illinois at Urbana-Champaign
Seung Yi , University of Illinois at Urbana-Champaign
Tin Qian , University of Illinois at Urbana-Champaign
Roy H. Campbell , University of Illinois at Urbana-Champaign
M. Dennis Mickunas , University of Illinois at Urbana-Champaign
pp. 0187

CAPSL Integrated Protocol Environment (Abstract)

G. Denker , SRI International
J. Millen , SRI International
pp. 0207

Protecting Privacy in a Decentralized Environment (Abstract)

Andrew C. Myers , Cornell University
Barbara Liskov , Massachusetts Institute of Technology
pp. 0266
High Confidence Computing

Realize: Resource Management for Soft Real-Time Distributed Systems (Abstract)

P. M. Melliar-Smith , University of California at Santa Barbara
L. E. Moser , University of California at Santa Barbara
V. Kalogeraki , University of California at Santa Barbara
P. Narasimhan , University of California at Santa Barbara
pp. 0281

Survivability through Customization and Adaptability: The Cactus Approach (Abstract)

Matti A. Hiltunen , University of Arizona
Richard D. Schlichting , University of Arizona
Carlos A. Ugarte , University of Arizona
Gary T. Wong , University of Arizona
pp. 0294

Sigma: Security and Interoperability for Heterogeneous Distributed Systems (Abstract)

Terry Vickers Benzel , Network Associates, Inc.
Pierre X. Pasturel , Network Associates, Inc.
Deborah Shands , Network Associates, Inc.
Daniel F. Sterne , Network Associates, Inc.
Gregg W. Tally , Network Associates, Inc.
E. John Sebes , Kroll-O'Gara Information Security Group
pp. 0308

Security Policy Realization in an Extensible Operating System (Abstract)

Dennis Hollingworth , Network Associates Inc.
Timothy Redmond , Network Associates Inc.
Robert Rice , Network Associates Inc.
pp. 0320

Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies (Abstract)

Deborah Shands , Network Associates Inc.
Richard Yee , Network Associates Inc.
Jay Jacobs , Network Associates Inc.
E. John Sebes , Kroll-O'Gara
pp. 0335

Domain and Type Enforcement Firewalls (Abstract)

Karen A. Oostendorp , Trusted Information Systems, Inc.
Lee Badger , Trusted Information Systems, Inc.
Christopher D. Vance , Trusted Information Systems, Inc.
Wayne G. Morrison , Trusted Information Systems, Inc.
Michael J. Petkac , Trusted Information Systems, Inc.
David L. Sherman , Trusted Information Systems, Inc.
Daniel F. Sterne , Trusted Information Systems, Inc.
pp. 0351

Secure Execution of Mobile Programs (Abstract)

Raju Pandey , University of California at Davis
Brant Hashii , University of California at Davis
Manoj Lal , University of California at Davis
pp. 0362

Security Agility for Dynamic Execution Environments (Abstract)

Mike Petkac , Network Associates Inc.
Lee Badger , Network Associates Inc.
Wayne Morrison , Network Associates Inc.
pp. 0377

Software Architecture and Logic for Secure Applications (Abstract)

Myong H. Kang , Naval Research Laboratory
Judith N. Froscher , Naval Research Laboratory
pp. 0391

Automated Techniques for Provably Safe Mobile Code (Abstract)

Karl Crary , Carnegie Mellon University
Robert Harper , Carnegie Mellon University
Peter Lee , Carnegie Mellon University
Frank Pfenning , Carnegie Mellon University
pp. 0406
107 ms
(Ver 3.1 (10032016))