Coverart for item
The Resource 2001 IEEE Symposium on Security and Privacy : S & P 2001 : proceedings : 14-16 May, 2000[sic], Oakland, California, sponsored by IEEE Computer Society Technical Committee on Security and Privacy

2001 IEEE Symposium on Security and Privacy : S & P 2001 : proceedings : 14-16 May, 2000[sic], Oakland, California, sponsored by IEEE Computer Society Technical Committee on Security and Privacy

Label
2001 IEEE Symposium on Security and Privacy : S & P 2001 : proceedings : 14-16 May, 2000[sic], Oakland, California
Title
2001 IEEE Symposium on Security and Privacy
Title remainder
S & P 2001 : proceedings : 14-16 May, 2000[sic], Oakland, California
Statement of responsibility
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
Title variation
  • Security and privacy
  • S & P 2001
Creator
Contributor
Subject
Genre
Language
eng
Related
Member of
Action
digitized
Cataloging source
BUF
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
S377 2001
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2001
http://bibfra.me/vocab/lite/meetingName
IEEE Symposium on Security and Privacy
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
IEEE Computer Society
http://library.link/vocab/subjectName
  • Computers
  • Data protection
  • Privacy, Right of
  • Telecommunication
  • Computers
  • Data protection
  • Privacy, Right of
  • Telecommunication
Label
2001 IEEE Symposium on Security and Privacy : S & P 2001 : proceedings : 14-16 May, 2000[sic], Oakland, California, sponsored by IEEE Computer Society Technical Committee on Security and Privacy
Instantiates
Publication
Copyright
Note
"IEEE Computer Society Order Number PR01046"--Title page verso
Bibliography note
Includes bibliographical references and author index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Protection of Keys against Modification Attack
  • W. Fung, M. Golin, J. Gray
  • 26
  • Session 2
  • Intrusion and Anomaly Detection I
  • Data Mining Methods for Detection of New Malicious Executables
  • M. Schultz, E. Eskin, E. Zadok, S. Stolfo
  • 38
  • Evaluation of Intrusion Detectors: A Decision Theory Approach
  • J. Gaffney, J. Ulvila
  • Session 1
  • 50
  • Session 3
  • Information Flow
  • On Confidentiality and Algorithms
  • J. Agat, D. Sands
  • 64
  • Preserving Information Flow Properties under Refinement
  • H. Mantel
  • 78
  • Session 4
  • Tamper-Resistance and Cryptography
  • Access Control and Trust Management
  • Understanding Trust Management Systems
  • S. Weeks
  • 94
  • SD3: A Trust Management System with Certified Evaluation
  • T. Jim
  • 106
  • Formal Treatment of Certificate Revocation under Communal Access Control
  • X. Ao, N. Minsky, V. Ungureanu
  • 116
  • Cryptographic Security for Mobile Code
  • Session 5
  • Intrusion and Anomaly Detection II
  • Information-Theoretic Measures for Anomaly Detection
  • W. Lee, D. Xiang
  • 130
  • A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
  • R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni
  • 144
  • Intrusion Detection via Static Analysis
  • D. Wagner, D. Dean
  • J. Algesheimer, C. Cachin, J. Camenisch, G. Karjoth
  • 156
  • Session 6
  • Cryptographic Protocols I
  • Performance of Public-Key-Enabled Kerberos Authentication in Large Networks
  • A. Harbitter, D. Menasce
  • 170
  • A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
  • B. Pfitzmann, M. Waidner
  • 184
  • Session 7
  • 2
  • What's Really Different
  • Cryptographic Key Generation from Voice
  • F. Monrose, M. Reiter, Q. Li, S. Wetzel
  • 202
  • A Trend Analysis of Exploitations
  • H. Browne, W. Arbaugh, J. McHugh, W. Fithen
  • 214
  • Reverse Engineering: A Legal Right or Wrong?
  • Pamela Samuelson
  • Session 8
  • Networked Cryptographic Devices Resilient to Capture
  • Cryptographic Protocols II
  • Graph-Based Authentication of Digital Streams
  • S. Miner, J. Staddon
  • 232
  • ELK, A New Protocol for Efficient Large-Group Key Distribution
  • A. Perrig, D. Song, J. Tygar
  • 247
  • P. MacKenzie, M. Reiter
  • 12
Control code
54684231
Dimensions
unknown
Extent
1 online resource (ix, 263 pages)
Form of item
online
Isbn
9780769510484
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)54684231
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Label
2001 IEEE Symposium on Security and Privacy : S & P 2001 : proceedings : 14-16 May, 2000[sic], Oakland, California, sponsored by IEEE Computer Society Technical Committee on Security and Privacy
Publication
Copyright
Note
"IEEE Computer Society Order Number PR01046"--Title page verso
Bibliography note
Includes bibliographical references and author index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Protection of Keys against Modification Attack
  • W. Fung, M. Golin, J. Gray
  • 26
  • Session 2
  • Intrusion and Anomaly Detection I
  • Data Mining Methods for Detection of New Malicious Executables
  • M. Schultz, E. Eskin, E. Zadok, S. Stolfo
  • 38
  • Evaluation of Intrusion Detectors: A Decision Theory Approach
  • J. Gaffney, J. Ulvila
  • Session 1
  • 50
  • Session 3
  • Information Flow
  • On Confidentiality and Algorithms
  • J. Agat, D. Sands
  • 64
  • Preserving Information Flow Properties under Refinement
  • H. Mantel
  • 78
  • Session 4
  • Tamper-Resistance and Cryptography
  • Access Control and Trust Management
  • Understanding Trust Management Systems
  • S. Weeks
  • 94
  • SD3: A Trust Management System with Certified Evaluation
  • T. Jim
  • 106
  • Formal Treatment of Certificate Revocation under Communal Access Control
  • X. Ao, N. Minsky, V. Ungureanu
  • 116
  • Cryptographic Security for Mobile Code
  • Session 5
  • Intrusion and Anomaly Detection II
  • Information-Theoretic Measures for Anomaly Detection
  • W. Lee, D. Xiang
  • 130
  • A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
  • R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni
  • 144
  • Intrusion Detection via Static Analysis
  • D. Wagner, D. Dean
  • J. Algesheimer, C. Cachin, J. Camenisch, G. Karjoth
  • 156
  • Session 6
  • Cryptographic Protocols I
  • Performance of Public-Key-Enabled Kerberos Authentication in Large Networks
  • A. Harbitter, D. Menasce
  • 170
  • A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
  • B. Pfitzmann, M. Waidner
  • 184
  • Session 7
  • 2
  • What's Really Different
  • Cryptographic Key Generation from Voice
  • F. Monrose, M. Reiter, Q. Li, S. Wetzel
  • 202
  • A Trend Analysis of Exploitations
  • H. Browne, W. Arbaugh, J. McHugh, W. Fithen
  • 214
  • Reverse Engineering: A Legal Right or Wrong?
  • Pamela Samuelson
  • Session 8
  • Networked Cryptographic Devices Resilient to Capture
  • Cryptographic Protocols II
  • Graph-Based Authentication of Digital Streams
  • S. Miner, J. Staddon
  • 232
  • ELK, A New Protocol for Efficient Large-Group Key Distribution
  • A. Perrig, D. Song, J. Tygar
  • 247
  • P. MacKenzie, M. Reiter
  • 12
Control code
54684231
Dimensions
unknown
Extent
1 online resource (ix, 263 pages)
Form of item
online
Isbn
9780769510484
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)54684231
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...