Abstract is missing.
- COSSACK: Coordinated Suppression of Simultaneous AttacksChristos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan. 2-13 [doi]
- Open-Source PKI on SELinux A Technology DescriptionEdward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida. 4-6 [doi]
- Demonstration of COSAK static analysis toolsDan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis. 7-9 [doi]
- MYSEA Technology DemonstrationCynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt. 10-12 [doi]
- The TrustedBSD MAC FrameworkRobert Watson, Brian Feldman, Adam Migus, Chris Vance. 13 [doi]
- NetBouncer: Client-legitimacy-based High-performance DDoS FilteringRoshan Thomas, Brian Mark, Tommy Johnson, James Croall. 14-25 [doi]
- Visualization as an Aid for Assessing the Mission Impact of Information Security BreachesAnita D Amico, Stephen Salas. 18-20 [doi]
- A Controller-Based Autonomic Defense SystemDerek Armstrong, Sam Carter, Gregory Frazier, Tiffany Frazier. 21-23 [doi]
- Scyllarus Intrusion Detection Report Correlator and AnalyzerWalter L. Heimerdinger. 24-26 [doi]
- Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation TechnologiesW. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst. 26 [doi]
- System Health and Intrusion Monitoring: Technology DescriptionCalvin Ko. 27-29 [doi]
- CIRCADIA Demonstration: Active Adaptive DefenseDavid J. Musliner. 30-31 [doi]
- An Integrated Cyber Panel SystemLaura Tinnel, O. Sami Saydjari, Joshua W. Haines. 32-34 [doi]
- Intelligence Preparation of the Information Battlespace (IPIB)J. Ken Williams. 35 [doi]
- Integrated Security Services for Dynamic CoalitionsHimanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras. 38-40 [doi]
- Design and Implementation of the TrustedBSD MAC FrameworkRobert Watson, Brian Feldman, Adam Migus, Chris Vance. 38-49 [doi]
- Key Management for Secure Multicast Group Communication in Mobile NetworksThomas Kostas, Diane Kiwior, Gowri Rajappan, Michel Dalal. 41-43 [doi]
- Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring SystemJim Irrer, Atul Prakash, Patrick McDaniel. 44-46 [doi]
- Federated Security Management for Dynamic CoalitionsSandeep Bhatt, S. Raj Rajagopalan, Prasad Rao. 47-48 [doi]
- TrustBuilder: Negotiating Trust in Dynamic CoalitionsKent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu. 49-51 [doi]
- Dynamic Authorization and Intrusion Response in Distributed SystemsTatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim. 50-61 [doi]
- Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed CoalitionsTimothy J. Smith, Gregory T. Byrd. 52-54 [doi]
- A Toolkit For Building Secure, Fault-Tolerant Virtual Private Networks Technology DescriptionWilliam Stephens, Brian A. Coan, Sanjai Narain, Vikram Kaul, Kirthika Parmeswaran, Thanh Cheng. 55-57 [doi]
- Distributed Data Authenication (System Demonstration)Michael T. Goodrich, Michael Shin, Christian D. Straub, Roberto Tamassia. 58-59 [doi]
- Automated Trust Negotiation Technology with Attribute-based Access ControlWilliam H. Winsborough, Jay Jacobs. 60 [doi]
- Design and Analysis of an IP-Layer Anonymizing InfrastructureH. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Bradner. 62 [doi]
- The Wackamole Approach to Fault Tolerant Networks DemoYair Amir, Ryan Caudy, Ashima Munjal, Theo Schlossnagle, Ciprian Tutu. 64-65 [doi]
- Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA)W. J. Blackert, D. M. Gregg, A. K. Castner, R. L. Hom, R. M. Jokerst, E. M. Kyle. 66-67 [doi]
- NCAC: Network Congestion Analyzer and ControllerHyeong-Ah Choi, Suresh Subramaniam, Hongsik Choi. 68-70 [doi]
- Defcon Capture the Flag: Defending Vulnerable Code from Intense AttackCrispin Cowan. 71-72 [doi]
- DDoS Tolerant NetworksLaura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred. 73-75 [doi]
- Guaranteed Internet Stack Utilization (GINSU) Building BlocksRoger Knobbe, Andrew Purtell. 76-77 [doi]
- ANON: An IP-Layer Anonymizing InfrastructureChen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott Bradner. 78-80 [doi]
- Towards a Rigorous Definition of Information System SurvivabilityJohn C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan. 78-89 [doi]
- Distributed Embedded Firewalls with Virtual Private GroupsTom Markham, Lynn Meredith, Charlie Payne. 81-83 [doi]
- Fault-Tolerant Mesh of Trust Applied to DNS SecurityWes Griffin, Russ Mundy, Sam Weiler, Dan Massey, Naheed Vora. 84-86 [doi]
- Demonstration of Fault Tolerance for CORBA ApplicationsLouise E. Moser, P. M. Melliar-Smith. 87-89 [doi]
- Dynamic Trust-based Resource AllocationTodd Hughes, Mike Junod, Andy Muckelbauer. 90 [doi]
- Intrusion Tolerance Via Network Layer ControlsDick O Brien, Rick Smith, Tammy Kappel, Clint Bitzer. 90-96 [doi]
- Active Network Fault ResponseSandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson. 91-93 [doi]
- COSSACK: Coordinated Suppression of Simultaneous AttacksChristos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan. 94-96 [doi]
- Scalable DDoS Protection Using Route-Based FilteringKihong Park. 97-97 [doi]
- Prophylactic, Treatment and Containment Techniques for Ensuring Active Network SecuritySandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson. 97 [doi]
- Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA)Ranga S. Ramanujan, S. Kudige, T. Nguyen. 98-100 [doi]
- DefCOM: Defensive Cooperative Overlay MeshMax Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher. 101-102 [doi]
- Improving Failure Responsiveness in Jini LeasingScott Rose, Kevin Bowers, Stephen Quirolgico, Kevin Mills. 103-105 [doi]
- SPIE Demonstration: Single Packet TracebackW. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge. 106-107 [doi]
- Onion Routing for Resistance to Traffic AnalysisPaul F. Syverson. 108-110 [doi]
- Lessons Learned in Using Live Red Teams in IA ExperimentsDavid Levin. 110-119 [doi]
- NetBouncer: Client-legitimacy-based High-performance DDoS FilteringRoshan Thomas, Hong Zhu, Tim Huck, Tommy Johnson. 111 [doi]
- TetherNet Anti-NAT - Secure Internet Subnet Rental SystemJoseph D. Touch, Lars Eggert, Yu-Shun Wang. 112 [doi]
- Safe Email, Safe Office, and Safe Web BrowserRobert Balzer. 116 [doi]
- Access Control on the Web Using Proof-carrying AuthorizationLujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel. 117-119 [doi]
- Enterprise Wrappers for Information AssuranceMark Feldman. 120-122 [doi]
- Defcon Capture the Flag: Defending Vulnerable Code from Intense AttackCrispin Cowan, Seth Arnold, Steve Beattie, Chris Wright, John Viega. 120-129 [doi]
- Willow System DemonstrationJohn C. Knight, Jonathan Hill, Philip E. Varner, Premkumar T. Devanbu, Alexander L. Wolf, Dennis Heimbigner. 123-125 [doi]
- Camouflage of Network Traffic to Resist Attack (CONTRA)William Weinstein, Janet Lepanto. 126-127 [doi]
- Dependable Intrusion Tolerance: Technology DemoAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe. 128-130 [doi]
- Surveillance Detection in High Bandwidth EnvironmentsSeth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo. 130 [doi]
- ITDB: An Attack Self-Healing Database System PrototypePeng Liu. 131-133 [doi]
- Intrusion Tolerant Web Servers via Network Layer ControlsD. O Brien. 134 [doi]
- Demonstrating Intrusion Tolerance With ITUAP. Pal. 135-137 [doi]
- VPNshield: Protecing VPN Services from Denial-of-Service (DoS) AttacksRanga S. Ramanujan, Maher Kaddoura, J. Wu, C. Sanders, K. Millikin. 138-139 [doi]
- On-Line Attack Prevention and Continual RecoveryJ. Reynolds. 140-142 [doi]
- Detecting Novel Scans Through Pattern Anomaly DetectionAlfonso Valdes. 140-151 [doi]
- An Aspect-Oriented Security FrameworkViren Shah, Frank Hill. 143-145 [doi]
- OmniVPNJ. Shukla. 146 [doi]
- Efficient Code Certification for Open FirmwareMatthew Stillerman, Dexter Kozen. 147-148 [doi]
- Intrusion Tolerant Distributed Object Systems: Project SummaryGregg Tally, Brent Whitmore, David Sames, Brian Matt, Brian Niebuhr, David E. Bakken. 149-151 [doi]
- SPMA - Java Binary Enhancement ToolTom Van Vleck, Andrew Reisse. 152 [doi]
- Finding the Vocabulary of Program Behavior Data for Anomaly DetectionChristoph C. Michael. 152-163 [doi]
- SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology SummaryFeiyi Wang, Raghu Upppalli. 153 [doi]
- System Detection s Hawkeye PlatformM. Miller. 158 [doi]
- Detecting Spoofed PacketsSteven J. Templeton, Karl E. Levitt. 164 [doi]
- Modeling Security-Enhanced Linux Policy Specifications for AnalysisMyla Archer, Elizabeth I. Leonard, Matteo Pradella. 164-169 [doi]
- Open-Source PKI on SELinuxEdward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida. 170-175 [doi]
- Monterey Security Enhanced Architecture ProjectCynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt. 176-181 [doi]
- The STRONGMAN ArchitectureAngelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith. 178-188 [doi]
- Achieving Principled Assuredly Trustworthy Composable Systems and NetworksPeter G. Neumann. 182-187 [doi]
- Enhancing ReiserFS Security In LinuxHans T. Reiser. 188 [doi]
- Dynamic PKI and Secure Tuplespaces for Distributed CoalitionsTimothy J. Smith, Gregory T. Byrd, Xiaoyong Wu, Hongjie Xin, Krithiga Thangavelu, Rong Wang, Arpan Shah. 189-200 [doi]
- Visualization as an Aid for Assessing the Mission Impact of Information Security BreachesAnita D Amico, Stephen Salas. 190-195 [doi]
- LLSIM: Network Simulation for Correlation and Response TestingJoshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrance G. Champion. 196-201 [doi]
- A Role-based Trust-management FrameworkNinghui Li, John C. Mitchell. 201 [doi]
- System Health and Intrusion Monitoring (SHIM): Project SummaryCalvin Ko, Karl N. Levitt. 202-207 [doi]
- Predicting the Impact of Cyber-Attacks on BMC3 EnterprisesJohn J. Shaw. 208 [doi]
- Understanding BGP Behavior through a Study of DoD PrefixesXiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang. 214-225 [doi]
- A Framework for Automated Negotiation of Access Control PoliciesVijay G. Bharadwaj, John S. Baras. 216-221 [doi]
- Recommendations in Using Group Key Management AlgorithmsWeifeng Chen, Lakshminath R. Dondeti. 222-227 [doi]
- Scaling Secure Group Communication Systems: Beyond Peer-to-PeerYair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik. 226-237 [doi]
- DyCER: A Lightweight Data Sharing System Using ReplicationJeffrey Kay, Steve Crocker. 228-233 [doi]
- A Flexible Architecture for Security Policy EnforcementPatrick McDaniel, Atul Prakash. 234-239 [doi]
- MuCAPSLJonathan K. Millen, Grit Denker. 238 [doi]
- Trust Negotiation in Dynamic CoalitionsKent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu. 240-245 [doi]
- Efficient and Scalable Infrastructure Support for Dynamic CoalitionsMichael T. Goodrich, Roberto Tamassia. 246-251 [doi]
- Automated Trust Negotiation in Attribute-based Access ControlWilliam H. Winsborough, Jay Jacobs. 252 [doi]
- Efficient Alarm Management in Optical NetworksSava Stanic, Suresh Subramaniam, Hongsik Choi, Gokhan Sahin, Hyeong-Ah Choi. 252-260 [doi]
- A Summary of the Autonomic Distributed Firewalls (ADF) ProjectLynn M. Meredith. 260-265 [doi]
- Leader Election Algorithms for Wireless Ad Hoc NetworksSudarshan Vasudevan, Brian DeCleene, Neil Immerman, James F. Kurose, Donald F. Towsley. 261-272 [doi]
- Traceback of Single IP Packets Using SPIEW. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge. 266-270 [doi]
- DynaBone: Dynamic Defense Using Multi-layer Internet OverlaysJoseph D. Touch, Gregory G. Finn, Yu-Shun Wang, Lars Eggert. 271-276 [doi]
- Interactions Between TCP and the IEEE 802.11 MAC ProtocolRui Jiang, Vikram Gupta, Chinya V. Ravishankar. 273 [doi]
- A Summary of Detection of Denial-of-QoS Attacks on DiffServ NetworksXiaoyong Wu, Vinay A. Mahadik, Douglas S. Reeves. 277 [doi]
- Modeling Multistep Cyber Attacks for Scenario RecognitionSteven Cheung, Ulf Lindqvist, Martin W. Fong. 284-292 [doi]
- Engineering a Distributed Intrusion Tolerant Database System Using COTS ComponentsPeng Liu. 284-289 [doi]
- EMT/MET: Systems for Modeling and Detecting Errant EmailSalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern. 290 [doi]
- Cooperative Response Strategies for Large Scale Attack MitigationD. Nojiri, Jeff Rowe, Karl N. Levitt. 293-302 [doi]
- Statistical Approaches to DDoS Attack Detection and ResponseLaura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred. 303 [doi]