20. ACSAC 2004:
Tucson,
Arizona,
USA
 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA.
 IEEE Computer Society 2004, ISBN 0-7695-2252-1  
  
  
  
  
 
Distinguished Practitioner
 
- Steven B. Lipner:
 The Trustworthy Computing Security Development Lifecycle.
2-13
             
Intrusion Detection
 
Start Seeing Security
 
Software Safety
 
Panel
 
- Marshall D. Abrams:
 The Relationship of System & Product Specifications and Evaluations.
112-113
             
Malware
 
- Ajay K. Gupta, Daniel C. DuVarney:
 Using Predators to Combat Worms and Viruses: A Simulation-Based Study.
116-125
             
- Kalyan S. Perumalla, Srikanth Sundaragopalan:
 High-Fidelity Modeling of Computer Network Worms.
126-135
             
- Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley:
 Worm Detection, Early Warning and Response Based on Local Victim Information.
136-145
             
- Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka:
 Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets.
146-155
             
Audit Analysis
 
Classic Papers
 
- Marvin Schaefer:
 If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria.
204-228
             
- Steven M. Bellovin:
 A Look Back at "Security Problems in the TCP/IP Protocol Suite".
229-249
             
Middleware
 
Insider Threat
 
Network Security
 
Panel
 
Event Correlation
 
Panel
 
Access Control Policy
 
Innovative Design
 
Copyright © Fri Mar 12 17:05:40 2010
 by Michael Ley (ley@uni-trier.de)