The Community for Technology Leaders
Computer Security Applications Conference, Annual (2001)
New Orleans, Lousiana
Dec. 10, 2001 to Dec. 14, 2001
ISBN: 0-7695-1405-7

Reviewers (PDF)

pp. xvii
Distinguished Practitioner

Castles in the Sand (PDF)

B. Blakle , Tivoli Systems, Inc., USA
pp. 0
TRACK A: Intrusion Detection I - Chair: D. Faigin, The Aerospace Corporation, USA

Implementing the Intrusion Detection Exchange Protocol (Abstract)

T. Buchheim , Harvey Mudd College
M. Erlinger , Harvey Mudd College
B. Feinstein , Guardent, Inc.
G. Matthews , Harvey Mudd College
R. Pollock , Harvey Mudd College
J. Betser , The Aerospace Corporation
A. Walther , The Aerospace Corporation
pp. 0032
TRACK B: Security Architecture - Chair: C. Schuba, Sun Microsystems, Germany

Java Security Extensions for a Java Server in a Hostile Environment (Abstract)

D. Wheeler , Intel Corporation
A. Conyers , Intel Corporation
J. Luo , Intel Corporation
A. Xiong , Intel Corporation
pp. 0064

Genoa TIE, Advanced Boundary Controller Experiment (Abstract)

E. Monteith , Network Associates Inc.
pp. 0074
TRACK A: Cryptography - Chair: A. dos Santos, Georgia Tech, USA

A JCA-Based Implementation Framework for Threshold Cryptography (Abstract)

Y. Huang , George Mason University
D. Rine , George Mason University
X. Wang , George Mason University
pp. 0085

The Performance Measurement of Cryptographic Primitives on Palm Devices (Abstract)

D. Wong , Northeastern University
H. Fuentes , Northeastern University
A. Chan , Northeastern University
pp. 0092

Privacy-Preserving Cooperative Statistical Analysis (Abstract)

W. Du , Syracuse University
M. Atallah , Purdue University
pp. 0102
TRACK A: Access Control I - Chair: M. Clifford, The Aerospace Corporation, USA

Engineering of Role/Permission Assignments (Abstract)

P. Epstein , George Mason University Student
R. Sandhu , George Mason University
pp. 0127

Determining Privileges of Mobile Agents (Abstract)

W. Jansen , National Institute of Standards and Technology
pp. 0149
TRACK B: Classic Papers - Chair: D. Thomsen, Secure Computing, USA

Introduction to Classic Papers (PDF)

D. Thomsen , Secure Computing Corporation
pp. 0161

Building Reliable Secure Computing Systems out of Unreliable Insecure Components (Abstract)

J. Dobson , University of Newcastle upon Tyne
B. Randell , University of Newcastle upon Tyne
pp. 0162

A Security Model for Military Message Systems: Retrospective (Abstract)

C. Landwehr , Mitretek Systems, Inc.
C. Heitmeyer , Naval Research Laboratory
J. McLean , Naval Research Laboratory
pp. 0174

An Information Flow Tool for Gypsy (Abstract)

J. McHugh , Carnegie Mellon University
pp. 0191
Invited Essayist Plenary
TRACK A: Intrusion Detection II - Chair: J. Heaney, The MITRE Corporation, USA

Watcher: The Missing Piece of the Security Puzzle (Abstract)

J. Munson , University of Idaho
S. Wimer , Software Systems International, LLC
pp. 0230

Temporal Signatures for Intrusion Detection (Abstract)

A. Jones , University of Virginia
S. Li , University of Massachusetts
pp. 0252
TRACK B: Secure Electronic Commerce - Chair: T. Ehrsam, Oracle, USA

Enabling Hierarchical and Bulk-Distribution for Watermarked Content (Abstract)

G. Caronni , Sun Microsystems, Inc.
C. Schuba , Sun Microsystems, Inc.
pp. 0277

CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59 (Abstract)

A. Levi , Oregon State University
C. Koç , Oregon State University
pp. 0286

Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce (Abstract)

P. Ashley , IBM Software Group
H. Hinton , IBM Software Group
M. Vandenwauver , IBM Software Group
pp. 0296
TRACK A: Access Control II - Chair: R. Sandhu, George Mason University, USA

A Component-Based Architecture for Secure Data Publication (Abstract)

P. Bonatti , Universit? degli Studi di Milano
E. Damiani , Universit? degli Studi di Milano
S. de Capitani , Universit? degli Studi di Brescia
P. Samarati , Universit? degli Studi di Milano
pp. 0309

Architecture and Applications for a Distributed Embedded Firewall (Abstract)

C. Payne , Secure Computing Corporation
T. Markham , Secure Computing Corporation
pp. 0329
TRACK B-Panel - Chair: J. Reynolds, Teknowledge, USA
TRACK A-Forum - Chair: J. Patilla, METASeS, USA
TRACK B: Reality vs. Security - Chair: D. Johnson, The MITRE Corporation, USA

Why Information Security is Hard-An Economic Perspective (Abstract)

R. Anderson , University of Cambridge Computer Laboratory
pp. 0358

Abuse-Case-Based Assurance Arguments (Abstract)

J. McDermott , US Naval Research Laboratory
pp. 0366
TRACK A: PKI - Chair: M. Abrams, The MITRE Corporation, USA

A Regulated Approach to Certificate Management (Abstract)

V. Ungureanu , Rutgers University
pp. 0377
TRACK B: Internet Security - Chair: A. Friedman, NSA, USA

Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing (Abstract)

D. Mankins , BBN Technologies
R. Krishnan , BBN Technologies
C. Boyd , BBN Technologies
J. Zao , BBN Technologies
M. Frentz , BBN Technologies
pp. 0411

Requirements for a General Framework for Response to Distributed Denial-of-Service (Abstract)

D. Gresty , Liverpool John Moores University
Q. Shi , Liverpool John Moores University
M. Merabti , Liverpool John Moores University
pp. 0422
TRACK A: Applications Security - Chair: J. Kahn, The MITRE Corporation, USA

Application Intrusion Detection using Language Library Calls (Abstract)

A. Jones , University of Virginia
Y. Lin , University of Virginia
pp. 0442

Verifiable Identifiers in Middleware Security (Abstract)

U. Lang , University of Cambridge
D. Gollmann , Microsoft Research
R. Schreiner , ObjectSecurity Ltd.
pp. 0450
TRACK B-Panel - Chair: T. Havighurst, NSA, USA

Author Index (PDF)

pp. 0465
Assessment - Chair: B. Jenkins, ACS Defense, USA
PKI - Chair: N. Givans, Booz Allen & Hamilton, USA
Firewalls - Chair: L. Davidson, US Navy, USA
Authentication - Chair: J. Lowry, BBN/Verizon, USA
Defense-in-Depth - Chair: D. Luddy, NSA, USA
Enterprise Protection - Chair: R. Wilson, NSA, USA
85 ms
(Ver 3.3 (11022016))