Title |
Speakers |
Summary |
Topic Types |
The Burglar Alarm Builder'S Toolbox |
Marcus Ranum
|
When you're protecting your site, don't ignore the home court advantage! One of the best ... |
Security
|
Activex Insecurities |
Richard M. Smith
|
Microsoft's ActiveX technology in the Internet Explorer browser is enough to give any person concerned ... |
Security
Access
Browser
|
Keynote Address – Experience Is The Best Teacher |
Peter G. Neumann
|
Everyone involved in information security and overall system survivability can learn more from the historical ... |
Security
Keynote
|
Pdas |
Jim Duncan
|
None |
Security
|
The Design And Analysis Of Graphical Passwords |
Ian Jermyn
,
Alain Mayer
,
Fabian Monrose
|
Michael K. Reiter,Aviel Rubin |
Security
Analysis
|
Hand-Held Computers Can Be Better Smart Cards |
Dirk Balfanz
,
Edward W. Felten
|
None |
Security
|
Offline Delegation |
Arne Helme
,
Tage Stabell-kul
|
None |
Security
|
Vaulted Vpn: Compartmented Virtual Private Networks On Trusted Operating Systems |
Tse-huong Choo
|
None |
Security
|
Enforcing Well-Formed And Partially-Formed Transactions For Unix |
Dean Povey
|
None |
Security
Unix
|
Synthesizing Fast Intrusion Prevention/Detection Systems From High-Level Specifications |
R. Sekar
,
Prem Uppuluri
|
None |
Security
|
Keys |
Carl Ellison
|
None |
Security
|
Building Intrusion-Tolerant Applications |
Thomas Wu
,
Michael Malkin
,
Dan Boneh
|
|
Security
|
Brute Force Attack On Unix Passwords With Simd Computer |
Gershon Kedem
,
Yuriko Ishihara
|
None |
Security
Unix
|
Antigone: A Flexible Framework For Secure Group Communication |
Peter Honeyman
,
Patrick Mcdaniel
,
Atul Prakash
|
None |
Security
|
Apples, Oranges And The Public Key Infrastructure (Pki) |
Paul Oorschot
|
The unprecedented growth of the Internet is surpassed only by the confusion resulting from the ... |
Security
Infrastructure
|
Cryptography And The Internet |
Steven M. Bellovin
|
Slides for this invited talk are now available in PDF format and PostScript. |
Security
Cryptography
|
U.S. Crypto Policy: Explaining The Inexplicable |
Susan Landau
|
The richest, strongest, most electronically vulnerable nation on earth persists in a policy that effectively ... |
Security
Cryptography
|
Potpourri |
Trent Jaeger
|
None |
Security
|
A Secure Station For Network Monitoring And Control |
Vassilis Prevelakis
|
None |
Security
Monitoring
|
The Flask Security Architecture: System Support For Diverse Security Policies |
Ray Spencer
,
Stephen Smalley
,
Peter Loscocco
,
Mike Hibler
,
Dave Andersen
,
Jay Lepreau
|
None |
Security
|
A Study In Using Neural Networks For Anomaly And Misuse Detection |
Anup K. Ghosh
,
Aaron Schwartzbard
|
None |
Security
|
Security Practicum |
Wolfgang Ley
|
None |
Security
|
The Design Of A Cryptographic Security Architecture |
Peter Gutmann
|
None |
Security
|
Why Johnny Can'T Encrypt: A Usability Evaluation Of Pgp 5.0 |
Alma Whitten
,
J. D. Tygar
|
None |
Security
|
Jonah: Experience Implementing Pkix Reference Freeware |
Mary Ellen Zurko
,
John Wray
,
Ian Morrison
,
Mike Shanzer
,
Mike Crane
,
Pat Booth
,
Ellen Mcdermott
,
Warren Macek
,
Ann Graham
,
Jim Wade
,
Tom Sandlin
|
None |
Security
|
Access Control |
Christoph Schuba
|
None |
Security
Access
|
Scalable Access Control For Distributed Object Systems |
Daniel F. Sterne
,
David L. Sherman
,
Gregg W. Tally
,
C. Durward Mcdonell
,
David L. Sames
,
Pierre X. Pasturel
,
E. John Sebes
|
None |
Security
Access
|
Certificate-Based Access Control For Widely Distributed Resources |
Mary R. Thompson
,
William Johnston
,
Srilekha Mudumbai
,
Gary Hoo
,
Keith Jackson
,
Abdelilah Essiari
|
None |
Security
Access
|
Digital-Ticket-Controlled Digital Ticket Circulation |
Ko Fujimura
,
Hiroshi Kuno
,
Masayuki Terada
,
Kazuo Matsuyama
,
Yasunao Mizuno
,
Jun Sekine
|
None |
Security
|
Works-In-Progress Reports |
Greg Rose
|
This session will consist of short presentations from researchers about work-in-progress, new results, or timely ... |
Security
|