21. ACSAC 2005:
Tucson,
Arizona,
USA
 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA.
 IEEE Computer Society 2005, ISBN 0-7695-2461-3  
  
  
  
  
 
Cover
 
Introduction
 
- Message from Conference Chair.
             
- Conference Committee.
             
- Program Committee.
             
- Tutorial Committee.
             
- Reviewers.
             
- Speaker Biographies.
             
Distinguished Practitioner
 
Track A:
Software Security
 
Track B:
Network Intrusion Detection
 
Track A:
Security Designs
 
Track B:
Protocol Analysis
 
Track A:
Vulnerability Assessment
 
Track B:
Hot Topics I
 
- How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI?
183
             
Invited Essayist
 
- Mary Ellen Zurko:
 User-Centered Security: Stepping Up to the Grand Challenge.
187-202
             
Track A:
Automation
 
Track B:
Security Analysis
 
Track A:
Operating System Security Mechanisms
 
Track B:
Data Integrity
 
Track C:
Hot Topics II
 
- Marla Collier:
 How to Develop a Career in Information Assurance and How to Advance in this Field.
333
             
Classic Papers
 
Track A:
Malware
 
Track B:
Panel
 
- Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
 Highlights from the 2005 New Security Paradigms Workshop.
393-396
             
Track A:
Distributed System Security
 
Track B:
Access Control
 
Track A:
Passwords and Applied Crypto
 
Track B:
Defense in Depth/Database Security
 
Track C:
Privacy
 
Copyright © Sun Mar 14 22:54:39 2010
 by Michael Ley (ley@uni-trier.de)