Research Catalog
Proceedings : 1999 International Conference on High Density Packaging and MCMs, April 6-9, 1999, the Adam's Mark Hotel, Denver, Colorado
- Title
- Proceedings : 1999 International Conference on High Density Packaging and MCMs, April 6-9, 1999, the Adam's Mark Hotel, Denver, Colorado / sponsored by IMAPS ; [assembled and edited by the Technical Program Committee and the IMAPS staff].
- Author
- International Conference on High Density Packaging and MCMs (1999 : Denver, Colo.)
- Publication
- Reston, VA : IMAPS ; [Bellingham, Wash.] : [Published in cooperation with SPIE], [1999], ©1999.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | TK7870.15 .I572 1999g | Off-site |
Holdings
Details
- Additional Authors
- Description
- x, 456 pages : illustrations; 28 cm.
- Series Statement
- SPIE proceedings series ; v. 3830
- Uniform Title
- Proceedings of SPIE--the International Society for Optical Engineering ; v. 3830.
- Alternative Title
- Proceedings, 1999 International Conference on High Density Packaging and MCMs
- 1999 International Conference on High Density Packaging and MCMs
- International Conference on High Density Packaging and MCMs
- High density packaging and MCMs
- Subject
- Microelectronic packaging > Congresses
- Bibliography (note)
- Includes bibliographical references and index.
- Contents
- Hardening COTS Software with Generic Software Wrappers / T. Fraser, L. Badger and M. Feldman -- Firmato: A Novel Firewall Management Toolkit / Y. Bartal, A. Mayer and K. Nissim / [et al.] -- Flexible Policy-Directed Code Safety / D. Evans and A. Twyman -- Local Reconfiguration Policies / J. Millen -- A User-Centered, Modular Authorization Service Built on an RBAC Foundation / M. Zurko, R. Simon and T. Sanfilippo -- Secure Communications Processing for Distributed Languages / M. Abadi, C. Fournet and G. Gonthier -- Verification of Control Flow based Security Properties / T. Jensen, D. Le Metayer and T. Thorn -- Twenty Years of Cryptography in the Open Literature / G. Blakley -- 20 Years of Operating Systems Security / V. Gligor -- Twenty Years of Evaluation Criteria and Commercial Technology / S. Lipner -- 20 Years of Covert Channel Modeling and Analysis / J. Millen -- Twenty Years of Formal Methods / J. McLean --
- Network Security: Then and Now, or, 20 Years in 10 Minutes / S. Kent -- A Data Mining Framework for Building Intrusion Detection Models / W. Lee, S. Stolfo and K. Mok -- Detecting Intrusions using System Calls: Alternative Data Models / C. Warrender, S. Forrest and B. Pearlmutter -- Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST) / U. Lindqvist and P. Porras -- A Multi-Threading Architecture for Multilevel Secure Transaction Processing / H. Isa, W. Shockley and C. Irvine -- Specification and Enforcement of Classification and Inference Constraints / S. Dawson, S. De Capitani di Vimercati and P. Samarati -- A Test for Non-Disclosure in Security Level Translations / D. Rosenthal and F. Fung -- Software Smart Cards via Cryptographic Camouflage / D. Hoover and B. Kausik -- Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer / C. Meadows --
- How Computers Will Be Used Differently in the Next Twenty Years / M. Weiser -- The Hardware Environment / R. Needham -- Software Technology of the Future / H. Shrobe -- Twenty Year Time Capsule Panel: The Future of Networking / H. Orman -- The Future Is Not Assured - But It Should Be / B. Snow.
- ISBN
- 0930815572
- OCLC
- ocm42360625
- Owning Institutions
- Columbia University Libraries