


default search action
23rd S&P 2002: Berkeley, California, USA
- 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002. IEEE Computer Society 2002, ISBN 0-7695-1543-6
Session 1
- Markus G. Kuhn:
Optical Time-Domain Eavesdropping Risks of CRT Displays. 3-18 - Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu:
Statistical Identification of Encrypted Web Browsing Traffic. 19-30 - Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely:
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. 31-41
Session 2
- John F. Canny:
Collaborative Filtering with Privacy. 45-57 - Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan:
P5: A Protocol for Scalable Anonymous Communication. 58-70
Session 3
- Patrick D. McDaniel, Atul Prakash
:
Methods and Limitations of Security Policy Reconciliation. 73-87 - Heiko Mantel:
On the Composition of Secure Systems. 88-101
Session 4
- John DeTreville:
Binder, a Logic-Based Security Language. 105-113 - Ninghui Li, John C. Mitchell, William H. Winsborough:
Design of a Role-Based Trust-Management Framework. 114-130 - Olav L. Bandmann, Babak Sadighi Firozabadi, Mads Dam:
Constrained Delegation. 131-140
Session 5
- Ken Ashcraft, Dawson R. Engler:
Using Programmer-Written Compiler Extensions to Catch Security Holes. 143-159 - Brian Chess:
Improving Computer Security Using Extended Static Checking. 160-173
Session 6
- Calvin Ko, Timothy Redmond:
Noninterference and Intrusion Detection. 177-187 - Kymie M. C. Tan, Roy A. Maxion:
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. 188-201 - Frédéric Cuppens, Alexandre Miège:
Alert Correlation in a Cooperative Intrusion Detection Framework. 202-215 - Bruno Dutertre, Valentin Crettaz, Victoria Stavridou:
Intrusion-Tolerant Enclaves. 216-224
Session 7
- Jung-Min Park, Edwin K. P. Chong, Howard Jay Siegel:
Efficient Multicast Packet Authentication Using Signature Amortization. 227-240 - Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean:
Self-Healing Key Distribution with Revocation. 241-257 - Dawn Xiaodong Song, J. D. Tygar, David Zuckerman:
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. 258-270
Session 8
- Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
Automated Generation and Analysis of Attack Graphs. 273-284 - Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks. 285-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.