14th Annual Computer Security Applications Conference
The proceedings from the December 1998 conference consists of 35 papers, which have been kept in chronological order as they were presented, and provides practical solutions to real security problems. Day one addresses network intrusion detection, security administration, information infrastructure, and Internet technologies. The second day covers legal liability, electronic commerce, architectures, high-speed networks, cryptography, and intrusion detection. Subjects of the final day are digital signatures, assurance, and secure transactions. No index. Annotation copyrighted by Book News, Inc., Portland, OR.
What people are saying - Write a review
We haven't found any reviews in the usual places.
An Architecture for Intrusion Detection Using Autonomous Agents
A NetworkBased Intrusion Detection Approach
Panel SessionCan Internet Commerce Be Secure?
21 other sections not shown
Other editions - View all
access control administrator agents algorithm allow anomaly detection applet application approach architecture attacks audit authentication browser CanProve certificate authority classified client communication complexity components Computer Security configuration covert channel cryptographic database version deleted described digital signature discrete logarithm distributed computing domain electronic commerce encryption entity environment event example Figure filter firewall IEEE implementation infrastructure input integrity interface Internet intrusion detection system Java key distribution label layer method mobile host monitor MSHN core neural network node operations paper parameters performance phase privilege proposed protocol public key RBAC real-time received request requirements risk role role hierarchy rule scenario scheme security functions security mechanisms security policy security services sequence server server computer session key signalling specific suspicious task timestamp tion transaction trusted updated user's verify Web server