The Community for Technology Leaders
DARPA Information Survivability Conference and Exposition, (2001)
Anaheim, California
June 12, 2001 to June 14, 2001
ISBN: 0-7695-1212-7
Dynamic Coalitions Program

SIMS: A Secure Information Management System for Large-Scale Dynamic Coalitions (Abstract)

Keyu Jiang , Arizona State University
Partha Dasgupta , Arizona State University
pp. 1003

Automatic Management of Network Security Policy (Abstract)

P. Gurung , Telcordia Technologies, Inc.
A.V. Surendran , Telcordia Technologies, Inc.
J. Burns , Telcordia Technologies, Inc.
P. Rao , Telcordia Technologies, Inc.
A. Cheng , Telcordia Technologies, Inc.
D.M. Martin Jr , University of Denver
S. Rajagopalan , Telcordia Technologies, Inc.
D. Rosenbluth , Telcordia Technologies, Inc.
pp. 1012

Mobile Code Security by Java Bytecode Instrumentation (Abstract)

Insik Shin , University of Pennsylvania
Ajay Chander , Stanford University
John C. Mitchell , Stanford University
pp. 1027

Multidimensional Security Policy Management for Dynamic Coalitions (Abstract)

Rajesh Krishnan , BBN Technologies
Luis Sanchez , BBN Technologies
Matthew Condell , BBN Technologies
Geva Patz , BBN Technologies
pp. 1041

Flexibly Constructing Secure Groups in Antigone 2.0. (Abstract)

Sharad Mittal , University of Michigan, Ann Arbor
Thai-Chuin Thuang , University of Michigan, Ann Arbor
Atul Prakash , University of Michigan, Ann Arbor
Patrick McDaniel , University of Michigan, Ann Arbor
Jim Irrer , University of Michigan, Ann Arbor
pp. 55
Fault Tolerant Networks Program

An Experiment in Formal Design Using Meta-Properties (Abstract)

Robert Constable , Cornell-University
Robbert Van Renesse , Cornell-University
Mark Bickford , Cornell-University
Christoph Kreitz , Cornell-University
pp. 1100

Protocol Scrubbing: Network Security through Transparent Flow Modification (Abstract)

David Watson , University of Michigan, Ann Arbor
Matthew Smart , University of Michigan, Ann Arbor
Farnam Jahanian , University of Michigan, Ann Arbor
G. Robert Malan , University of Michigan, Ann Arbor
pp. 1108

Defense-Enabled Applications (Abstract)

Franklin Webber , BBN Technologies
Partha P. Pal , BBN Technologies
Joseph P. Loyall , BBN Technologies
Richard E. Schantz , BBN Technologies
pp. 1119

Persistent Objects in the Fleet System (Abstract)

Daniela Tulone , Lucent Technologies
Elisha Ziskind , Lucent Technologies
Dahlia Malkhi , Hebrew University of Jerusalem
Michael K. Reiter , Lucent Technologies
pp. 1126

A Framework for Managing Faults and Attacks in All-Optical Transport Networks (Abstract)

David H. Su , National Institute of Standards and Technology
Suresh Subramaniam , The George Washington University
Sung U. Kim , National Institute of Standards and Technology
Hyeong-Ah Choi , The George Washington University
Jigesh K. Patel , National Institute of Standards and Technology
pp. 1137

Hardware Support for a Hash-Based IP Traceback (Abstract)

Craig Partridge , BBN Technologies
Walter C. Milliken , BBN Technologies
W. Timothy Strayer , BBN Technologies
Christine E. Jones , BBN Technologies
Alex C. Snoeren , BBN Technologies
Stephen T. Kent , BBN Technologies
Luis A. Sanchez , BBN Technologies
Fabrice Tchakountio , BBN Technologies
pp. 1146

Preventing Traffic Analysis in Packet Radio Networks (Abstract)

Nitin H. Vaidya , Texas A&M University
Shu Jiang , Texas A&M University
Wei Zhao , Texas A&M University
pp. 1153

Preventing Denial of Service Attacks on Quality of Service (Abstract)

Xiaobing Zhang , Ericsson
Zhi Fu , North Carolina State University
S. Felix Wu , University of California at Davis
Douglas S. Reeves , North Carolina State University
Errin Fulp , Wake Forest University
pp. 1159
OASIS Program

Preventing the Execution of Unauthorized Win32 Applications (Abstract)

A.K. Ghosh , Cigital, Inc.
Frank Hill , Cigital, Inc.
J.T. Bloch , Widevine Technologies, Inc.
Matthew Schmid , Cigital, Inc.
pp. 1175

Survivable Storage Systems (Abstract)

Garth R. Goodson , Carnegie Mellon University
Gregory R. Ganger , Carnegie Mellon University
Jay J. Wylie , Carnegie Mellon University
John D. Strunk , Carnegie Mellon University
Vijay Pandurangan , Carnegie Mellon University
Semih Oguz , Carnegie Mellon University
Craig A. N. Soules , Carnegie Mellon University
Pradeep K. Khosla , Carnegie Mellon University
Mehmet Bakkaloglu , Carnegie Mellon University
Michael W. Bigrigg , Carnegie Mellon University
pp. 1184

Project TRANSPROSE: Reconciling Mobile-Code Security with Execution Efficiency (Abstract)

Christian H. Stork , University of California, Irvine
Wolfram Amme , University of California, Irvine
Vivek Haldar , University of California, Irvine
Niall Dalton , University of California, Irvine
Peter H. Fröhlich , University of California, Irvine
Sergiy Zhenochin , University of California, Irvine
Jeffery von Ronne , University of California, Irvine
Michael Franz , University of California, Irvine
Peter S. Housel , University of California, Irvine
pp. 1196

Characterizing Intrusion Tolerant Systems Using A State Transition Model (Abstract)

Rong Wang , Advanced Networking Research Group, MCNC
Feiyi Wang , Advanced Networking Research Group, MCNC
Kalyanaraman Vaidyanathan , Duke University
Balamurugan Muthusamy , Vitesse Corp
Kishor Trivedi , Duke University
Fengmin Gong , Advanced Networking Research Group, MCNC
pp. 1211

Intrusion Tolerant Software Architectures (Abstract)

R. A. Riemenschneider , SRI International
Victoria Stavridou , SRI International
Hassen Säýdi , SRI International
Bruno Dutertre , SRI International
pp. 1230

Intrusion Tolerant Middleware (Abstract)

Farooq Anjum , Telcordia Technologies
Amjad Umar , Telcordia Technologies
Rabih Zbib , Telcordia Technologies
Abhrajit Ghosh , Telcordia Technologies
pp. 1242
Information Assurance Science and Engineering Tools Program

Cyber Ecology: Looking to Ecology for Insights into Information Assurance (Abstract)

Jane Jorgensen , Information Extraction & Transport, Inc.
Philippe Rossignol , Oregon State University
Masami Takikawa , Information Extraction & Transport, Inc.
Daniel Upper , Information Extraction & Transport, Inc.
pp. 1287

Computer-Attack Graph Generation Tool (Abstract)

Laura P. Swiler , Sandia National Laboratories
David Ellis , Sandia National Laboratories
Stefan Chakerian , Sandia National Laboratories
Cynthia Phillips , Sandia National Laboratories
pp. 1307

Information Assurance through Kolmogorov Complexity (Abstract)

Scott Evans , GE Corporate Research and Development
John Hershey , GE Corporate Research and Development
Stephen F. Bush , GE Corporate Research and Development
pp. 1322

Mobile Security Agents for Network Traffic Analysis (Abstract)

Hal Brian , The University of Memphis
Dipankar Dasgupta , The University of Memphis
pp. 1332
99 ms
(Ver 3.1 (10032016))