21. ACSAC 2005:
Tucson,
Arizona,
USA
21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA.
IEEE Computer Society 2005, ISBN 0-7695-2461-3
Cover
Introduction
- Message from Conference Chair.
- Conference Committee.
- Program Committee.
- Tutorial Committee.
- Reviewers.
- Speaker Biographies.
Distinguished Practitioner
Track A:
Software Security
Track B:
Network Intrusion Detection
Track A:
Security Designs
Track B:
Protocol Analysis
Track A:
Vulnerability Assessment
Track B:
Hot Topics I
- How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI?
183
Invited Essayist
- Mary Ellen Zurko:
User-Centered Security: Stepping Up to the Grand Challenge.
187-202
Track A:
Automation
Track B:
Security Analysis
Track A:
Operating System Security Mechanisms
Track B:
Data Integrity
Track C:
Hot Topics II
- Marla Collier:
How to Develop a Career in Information Assurance and How to Advance in this Field.
333
Classic Papers
Track A:
Malware
Track B:
Panel
- Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
393-396
Track A:
Distributed System Security
Track B:
Access Control
Track A:
Passwords and Applied Crypto
Track B:
Defense in Depth/Database Security
Track C:
Privacy
Copyright © Sun Mar 14 22:54:39 2010
by Michael Ley (ley@uni-trier.de)