23. ACSAC 2007:
Miami Beach,
Florida,
USA
23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA.
IEEE Computer Society 2007
Distinguished Practitioner
Operating Systems Security and Trusted Computing
- Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel:
Establishing and Sustaining System Integrity via Root of Trust Installation.
19-29
- Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan:
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
30-39
- Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin:
Toward a Medium-Robustness Separation Kernel Protection Profile.
40-51
Malware and Intrusion Detection
Database Security
Applied Cryptography
Misuse Detection and Forensics
- Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shahank Sahai, Zhenghui Zhu:
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask).
141-150
- Michael Meier, Ulrich Flegel, Sebastian Schmerl:
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection.
151-160
- David Whyte, Paul C. van Oorschot, Evangelos Kranakis:
Tracking Darkports for Network Defense.
161-171
Invited Essayist
- Daniel J. Weitzner:
Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks.
173-175
Classic Paper
Access Control
Wireless and Mobile Systems Security
- Iulia Ion, Boris Dragovic, Bruno Crispo:
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.
233-242
- Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Brian Rivera, Kelvin Marcus, Peter Kruus:
Countering False Accusations and Collusion in the Detection of In-Band Wormholes.
243-256
- Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy:
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks.
257-267
Security Engineering
Security in P2P Systems
Distributed Systems Security
Software and Applications Security
Malware
Assurance
Software Security
Copyright © Sun Mar 14 22:54:39 2010
by Michael Ley (ley@uni-trier.de)