Research Catalog

Proceedings : 1999 International Conference on High Density Packaging and MCMs, April 6-9, 1999, the Adam's Mark Hotel, Denver, Colorado

Title
Proceedings : 1999 International Conference on High Density Packaging and MCMs, April 6-9, 1999, the Adam's Mark Hotel, Denver, Colorado / sponsored by IMAPS ; [assembled and edited by the Technical Program Committee and the IMAPS staff].
Author
International Conference on High Density Packaging and MCMs (1999 : Denver, Colo.)
Publication
Reston, VA : IMAPS ; [Bellingham, Wash.] : [Published in cooperation with SPIE], [1999], ©1999.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextRequest in advance TK7870.15 .I572 1999gOff-site

Holdings

Details

Additional Authors
  • International Microelectronics and Packaging Society.
  • Society of Photo-optical Instrumentation Engineers.
Description
x, 456 pages : illustrations; 28 cm.
Series Statement
SPIE proceedings series ; v. 3830
Uniform Title
Proceedings of SPIE--the International Society for Optical Engineering ; v. 3830.
Alternative Title
  • Proceedings, 1999 International Conference on High Density Packaging and MCMs
  • 1999 International Conference on High Density Packaging and MCMs
  • International Conference on High Density Packaging and MCMs
  • High density packaging and MCMs
Subject
Microelectronic packaging > Congresses
Bibliography (note)
  • Includes bibliographical references and index.
Contents
  • Hardening COTS Software with Generic Software Wrappers / T. Fraser, L. Badger and M. Feldman -- Firmato: A Novel Firewall Management Toolkit / Y. Bartal, A. Mayer and K. Nissim / [et al.] -- Flexible Policy-Directed Code Safety / D. Evans and A. Twyman -- Local Reconfiguration Policies / J. Millen -- A User-Centered, Modular Authorization Service Built on an RBAC Foundation / M. Zurko, R. Simon and T. Sanfilippo -- Secure Communications Processing for Distributed Languages / M. Abadi, C. Fournet and G. Gonthier -- Verification of Control Flow based Security Properties / T. Jensen, D. Le Metayer and T. Thorn -- Twenty Years of Cryptography in the Open Literature / G. Blakley -- 20 Years of Operating Systems Security / V. Gligor -- Twenty Years of Evaluation Criteria and Commercial Technology / S. Lipner -- 20 Years of Covert Channel Modeling and Analysis / J. Millen -- Twenty Years of Formal Methods / J. McLean --
  • Network Security: Then and Now, or, 20 Years in 10 Minutes / S. Kent -- A Data Mining Framework for Building Intrusion Detection Models / W. Lee, S. Stolfo and K. Mok -- Detecting Intrusions using System Calls: Alternative Data Models / C. Warrender, S. Forrest and B. Pearlmutter -- Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST) / U. Lindqvist and P. Porras -- A Multi-Threading Architecture for Multilevel Secure Transaction Processing / H. Isa, W. Shockley and C. Irvine -- Specification and Enforcement of Classification and Inference Constraints / S. Dawson, S. De Capitani di Vimercati and P. Samarati -- A Test for Non-Disclosure in Security Level Translations / D. Rosenthal and F. Fung -- Software Smart Cards via Cryptographic Camouflage / D. Hoover and B. Kausik -- Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer / C. Meadows --
  • How Computers Will Be Used Differently in the Next Twenty Years / M. Weiser -- The Hardware Environment / R. Needham -- Software Technology of the Future / H. Shrobe -- Twenty Year Time Capsule Panel: The Future of Networking / H. Orman -- The Future Is Not Assured - But It Should Be / B. Snow.
ISBN
0930815572
OCLC
ocm42360625
Owning Institutions
Columbia University Libraries