default search action
20th S&P 1999: Oakland, California, USA
- 1999 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999. IEEE Computer Society 1999, ISBN 0-7695-0176-1
Systems
- Timothy Fraser, Lee Badger, Mark Feldman:
Hardening COTS Software with Generic Software Wrappers. 2-16 - Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool:
Firmato: A Novel Firewall Management Toolkit. 17-31 - David E. Evans, Andrew Twyman:
Flexible Policy-Directed Code Safety. 32-45
Policy
- Jonathan K. Millen:
Local Reconfiguration Policies. 48-56 - Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo:
A User-Centered, Modular Authorization Service Built on an RBAC Foundation. 57-71
Verification
- Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Communications Processing for Distributed Languages. 74-88 - Thomas P. Jensen, Daniel Le Métayer, Tommy Thorn:
Verification of Control Flow based Security Properties. 89-103
Panel 1: Brief History of Twenty Years of Computer Security Research
- G. R. Blakley:
Twenty Years of Cryptography in the Open Literature. 106-107 - Virgil D. Gligor:
20 Years of Operating Systems Security. 108-110 - Steven B. Lipner:
Twenty Years of Evaluation Criteria and Commercial Technology. 111-112 - Jonathan K. Millen:
20 Years of Covert Channel Modeling and Analysis. 113-114 - John McLean:
Twenty Years of Formal Methods. 115-116 - Stephen T. Kent:
Network Security: Then and Now, or, 20 Years in 10 Minutes. 117
Intrusion Detection
- Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
A Data Mining Framework for Building Intrusion Detection Models. 120-132 - Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
Detecting Intrusions using System Calls: Alternative Data Models. 133-145 - Ulf Lindqvist, Phillip A. Porras:
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). 146-161
Panel 2: Near Misses and Hidden Treasures in Early Computer Security Research
Information Flow
- Haruna R. Isa, William R. Shockley, Cynthia E. Irvine:
A Multi-Threading Architecture for Multilevel Secure Transaction Processing. 166-180 - Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Specification and Enforcement of Classification and Inference Constraints. 181-195 - David Rosenthal, Francis Fung:
A Test for Non-Disclosure in Security Level Translations. 196-206
Authentication and Key Exchange
- Douglas N. Hoover, B. N. Kausik:
Software Smart Cards via Cryptographic Camouflage. 208-215 - Catherine Meadows:
Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. 216-231
Panel Discussion 3: Time Capsule - Twenty Years from Now
- Mark D. Weiser:
How Computers Will Be Used Differently in the Next Twenty Years. 234-235 - Roger M. Needham:
The Hardware Environment. 236 - Howard E. Shrobe:
Software Technology of the Future. 237-238 - Hilarie K. Orman:
Twenty Year Time Capsule Panel: The Future of Networking. 239 - Brian D. Snow:
The Future Is Not Assured - But It Should Be. 240-241
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.