16th Annual Computer Security Applications Conference (ACSAC '00)


Book Description

Annotation Forty-four papers from the December 2000 conference address challenges in the field of information security. The main areas of discussion are intrusion detection, security policy, public key infrastructure, access control, security architecture, e-commerce, and cryptography. Topics include extending Java for package-based access control, policy mediation for multi-enterprise environments, binding identities and attributes using digitally signed certificates, using operating system wrappers to increase the resiliency to commercial firewalls, calculating costs for quality of security service, and the Chinese Remainder Theorem and its application in a high-speed RSA crypto chip. No subject index. Annotation copyrighted by Book News, Inc., Portland, OR.




National Computer Security Conference, 1993 (16th) Proceedings


Book Description

Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.



















Proceedings of the 32nd Annual Conference on Computer Security Applications


Book Description

2016 Annual Computer Security Applications Conference Dec 05, 2016-Dec 09, 2016 Los Angeles, USA. You can view more information about this proceeding and all of ACM�s other published conference proceedings from the ACM Digital Library: http://www.acm.org/dl.