Research Catalog
Proceedings 1999 International Symposium on Microelectronics : October 26-28, 1999, Chicago Hilton & Towers, Chicago, Illinois
- Title
- Proceedings 1999 International Symposium on Microelectronics : October 26-28, 1999, Chicago Hilton & Towers, Chicago, Illinois / sponsored by IMAPS--International Microelectronics and Packaging Society ; [Dick Gehman, IMAPS 1999 symposium technical chair].
- Author
- International Symposium on Microelectronics (1999 : Chicago, Ill.)
- Publication
- Reston, Va., U.S.A. : IMAPS ; [Bellingham, Wash.] : Published in cooperation with SPIE--the International Society for Optical Engineering, [1999], ©1999.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | TK7874 .I59242 1999g | Off-site |
Details
- Additional Authors
- Description
- xix, 806 pages : illustrations; 28 cm.
- Series Statement
- SPIE ; v. 3906
- Uniform Title
- Proceedings of SPIE--the International Society for Optical Engineering ; v. 3906.
- Alternative Title
- 1999 International Symposium on Microelectronics
- International Symposium on Microelectronics
- Microelectronics
- Subjects
- Bibliography (note)
- Includes bibliographical references and index.
- Contents
- Hardening COTS Software with Generic Software Wrappers / T. Fraser, L. Badger and M. Feldman -- Firmato: A Novel Firewall Management Toolkit / Y. Bartal, A. Mayer and K. Nissim / [et al.] -- Flexible Policy-Directed Code Safety / D. Evans and A. Twyman -- Local Reconfiguration Policies / J. Millen -- A User-Centered, Modular Authorization Service Built on an RBAC Foundation / M. Zurko, R. Simon and T. Sanfilippo -- Secure Communications Processing for Distributed Languages / M. Abadi, C. Fournet and G. Gonthier -- Verification of Control Flow based Security Properties / T. Jensen, D. Le Metayer and T. Thorn -- Twenty Years of Cryptography in the Open Literature / G. Blakley -- 20 Years of Operating Systems Security / V. Gligor -- Twenty Years of Evaluation Criteria and Commercial Technology / S. Lipner -- 20 Years of Covert Channel Modeling and Analysis / J. Millen -- Twenty Years of Formal Methods / J. McLean --
- Network Security: Then and Now, or, 20 Years in 10 Minutes / S. Kent -- A Data Mining Framework for Building Intrusion Detection Models / W. Lee, S. Stolfo and K. Mok -- Detecting Intrusions using System Calls: Alternative Data Models / C. Warrender, S. Forrest and B. Pearlmutter -- Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST) / U. Lindqvist and P. Porras -- A Multi-Threading Architecture for Multilevel Secure Transaction Processing / H. Isa, W. Shockley and C. Irvine -- Specification and Enforcement of Classification and Inference Constraints / S. Dawson, S. De Capitani di Vimercati and P. Samarati -- A Test for Non-Disclosure in Security Level Translations / D. Rosenthal and F. Fung -- Software Smart Cards via Cryptographic Camouflage / D. Hoover and B. Kausik -- Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer / C. Meadows --
- How Computers Will Be Used Differently in the Next Twenty Years / M. Weiser -- The Hardware Environment / R. Needham -- Software Technology of the Future / H. Shrobe -- Twenty Year Time Capsule Panel: The Future of Networking / H. Orman -- The Future Is Not Assured - But It Should Be / B. Snow.
- ISBN
- 0930815580
- OCLC
- ocm42911612
- Owning Institutions
- Columbia University Libraries