The Community for Technology Leaders
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186) (1998)
Oakland, California
May 3, 1998 to May 6, 1998
ISSN: 1540-7993
ISBN: 0-8186-8386-4
TABLE OF CONTENTS

Committees (PDF)

pp. ix
Session I: Access Control

Access Control in an Open Distributed Environment (Abstract)

R.J. Hayton , APM Ltd
J.M. Bacon , University of Cambridge
K. Moody , University of Cambridge
pp. 0003

Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE (Abstract)

Timothy Fraser , Trusted Information Systems
Lee Badger , Trusted Information Systems
pp. 0015
Session II: Java Security

Secure Execution of Java Applets using a Remote Playground (Abstract)

Dahlia Malkhi , AT&T Labs Research
Michael K. Reiter , AT&T Labs Research
Aviel D. Rubin , AT&T Labs Research
pp. 0040

Understanding Java Stack InS&Pection (Abstract)

Dan S. Wallach , Princeton University
Edward W. Felten , Princeton University
pp. 0052
Session III: Cryptography I

Efficient and Practical Fair Exchange Protocols with Off-line TTP (Abstract)

Feng Bao , Kent Ridge Digital Labs
Robert H. Deng , Kent Ridge Digital Labs
Wenbo Mao , Hewlett-Packard Laboratories
pp. 0077
Session IV: Architectures

An Automated Approach for Identifying Potential Vulnerabilities in Software (Abstract)

Anup K. Ghosh , Reliable Software Technologies
Tom O'Connor , Reliable Software Technologies
Gary McGraw , Reliable Software Technologies
pp. 0104

Detecting Disruptive Routers: A Distributed Network Monitoring Approach (Abstract)

Kirk A. Bradley , University of California at Davis
Steven Cheung , University of California at Davis
Nick Puketza , University of California at Davis
Biswanath Mukherjee , University of California at Davis
Ronald A. Olsson , University of California at Davis
pp. 0115
Session V: Database Security and Biometrics

Partial Security Policies to Support Timeliness in Secure Real-Time Databases (Abstract)

Sang H. Son , University of Virginia
Craig Chaney , University of Virginia
Norris Thomlinson , University of Virginia
pp. 0136

On Enabling Secure Applications Through Off-Line Biometric Identification (Abstract)

George I. Davida , University of Wisconsin-Milwaukee,
Yair Frankel , CertCo LLC
Brian J. Matt , Sandia National Laboratories
pp. 0148
Session VI: Formal Methods I

Strand S&Paces: Why is a Security Protocol Correct? (Abstract)

F. Javier THAYER Fabrega , The MITRE Corporation
Jonathan C. Herzog , The MITRE Corporation
Joshua D. Guttman , The MITRE Corporation
pp. 0160
Session VII: Formal Methods II

Stack and Queue Integrity on Hostile Platforms (Abstract)

Premkumar T. Devanbu , University of California at Davis
Stuart G. Stubblebine , AT&T Laboratories
pp. 0198
Session VIII: Cryptography II

Towards Mobile Cryptography (Abstract)

Tomas Sander , International Computer Science Institute
Christian F. Tschudin , International Computer Science Institute
pp. 0215

Author Index (PDF)

pp. null
88 ms
(Ver 3.3 (11022016))