20. ACSAC 2004:
Tucson,
Arizona,
USA
20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA.
IEEE Computer Society 2004, ISBN 0-7695-2252-1
Distinguished Practitioner
- Steven B. Lipner:
The Trustworthy Computing Security Development Lifecycle.
2-13
Intrusion Detection
Start Seeing Security
Software Safety
Panel
- Marshall D. Abrams:
The Relationship of System & Product Specifications and Evaluations.
112-113
Malware
- Ajay K. Gupta, Daniel C. DuVarney:
Using Predators to Combat Worms and Viruses: A Simulation-Based Study.
116-125
- Kalyan S. Perumalla, Srikanth Sundaragopalan:
High-Fidelity Modeling of Computer Network Worms.
126-135
- Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley:
Worm Detection, Early Warning and Response Based on Local Victim Information.
136-145
- Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka:
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets.
146-155
Audit Analysis
Classic Papers
- Marvin Schaefer:
If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria.
204-228
- Steven M. Bellovin:
A Look Back at "Security Problems in the TCP/IP Protocol Suite".
229-249
Middleware
Insider Threat
Network Security
Panel
Event Correlation
Panel
Access Control Policy
Innovative Design
Copyright © Fri Mar 12 17:05:40 2010
by Michael Ley (ley@uni-trier.de)