The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1999)
Oakland, California
May 9, 1999 to May 12, 1999
ISSN: 1540-7993
ISBN: 0-7695-0176-1
TABLE OF CONTENTS
Systems

Flexible Policy-Directed Code Safety (Abstract)

Andrew Twyman , Massachusetts Institute of Technology
David Evans , Massachusetts Institute of Technology
pp. 0032
Policy
Verification
Panel 1: Brief History of Twenty Years of Computer Security Research

20 Years of Operating Systems Security (Abstract)

Virgil D. Gligor , University of Maryland at College Park
pp. 0108

Twenty Years of Formal Methods (Abstract)

John McLean , Naval Research Laboratory
pp. 0115
Intrusion Detection

A Data Mining Framework for Building Intrusion Detection Models (Abstract)

Kui W. Mok , Columbia University
Salvatore J. Stolfo , Columbia University
Wenke Lee , Columbia University
pp. 0120
Panel 2: Near Misses and Hidden Treasures in Early Computer Security Research
Information Flow

A Multi-threading Architecture for Multilevel Secure Transaction Processing (Abstract)

Haruna R. Isa , United States Navy
Cynthia E. Irvine , Naval Postgraduate School
William R. Shockley , Cyberscape Computer Services
pp. 0166
Authentication and Key Exchange

Software Smart Cards via Cryptographic Camouflage (Abstract)

B.N. Kausik , Arcot Systems, Inc.
D.N. Hoover , Arcot Systems, Inc.
pp. 0208
Panel Discussion 3: Time Capsule — Twenty Years from Now

Software Technology of the Future (Abstract)

Howard Shrobe , Massachusetts Institute of Technology
pp. 0237

The Future Is Not Assured -- But It Should Be (Abstract)

Brian D. Snow , National Security Agency
pp. 0240

Index of Authors (PDF)

pp. 0243
86 ms
(Ver 3.3 (11022016))