default search action
NSPW 2000: Ballycotton, Co. Cork, Ireland
- Mary Ellen Zurko, Steven J. Greenwald:
Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000. ACM 2000, ISBN 1-58113-260-3
Session 1: Modeling for Attacks
- James P. McDermott:
Attack net penetration testing. 15-21 - Gregg Schudel, Bradley Wood:
Adversary work factor as a metric for information assurance. 23-30 - Steven J. Templeton, Karl E. Levitt:
A requires/provides model for computer attacks. 31-38
Session 2: Information Hiding
- Ira S. Moskowitz, Garth E. Longdon, Liwu Chang:
A new paradigm hidden in steganography. 41-50 - Mikhail J. Atallah, Craig J. McDonough, Victor Raskin, Sergei Nirenburg:
Natural language processing for information assurance and security: an overview and implementations. 51-65
Session 3: Active Defense
- Danilo Bruschi, Emilia Rosti:
Disarming offense to facilitate defense. 69-75 - Alec Yasinsac:
Dynamic analysis of security protocols. 77-87
Session 4: Customizing Security
- Cynthia E. Irvine, Timothy E. Levin:
Quality of security service. 91-99 - Carla Marceau:
Characterizing the behavior of a program using multiple-length N-grams. 101-110 - Kenneth G. Olthoff:
Reflections on ratings. 111-116
Session 5: Discussion Papers
- Thomas E. Daniels, Eugene H. Spafford:
Network traffic tracking systems: folly in the large? 119-124 - Clifford E. Kahn:
Incentives to help stop floods. 127-132 - Tom Perrine, Abe Singer:
New paradigms in incident management. 133-138
Session 6: Getting Personal
- Simon N. Foley:
Conduit cascades and secure synchronization. 141-150 - Kai Rannenberg:
Multilateral security a concept and examples for balanced security. 151-162
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.