The Community for Technology Leaders
Proceedings 2002 IEEE Symposium on Security and Privacy (2002)
Berkeley, California
May 12, 2002 to May 15, 2002
ISSN: 1540-7993
ISBN: 0-7695-1543-6
Session 1

Statistical Identification of Encrypted Web Browsing Traffic (Abstract)

Qixiang Sun , Stanford University
Daniel R. Simon , Microsoft Research
Yi-Min Wang , Microsoft Research
Wilf Russell , Microsoft Research
Venkata N. Padmanabhan , Microsoft Research
Lili Qiu , Microsoft Research
pp. 19

Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards (Abstract)

Josyula R. Rao , IBM Watson Research Center
Pankaj Rohatgi , IBM Watson Research Center
Helmut Scherzer , IBM Watson Research Center
Stephane Tinguely , Swiss Federal Institute of Technology
pp. 31
Session 2

Collaborative Filtering with Privacy (Abstract)

John Canny , U.C. Berkeley
pp. 45

P<sup>5</sup>: A Protocol for Scalable Anonymous Communication (Abstract)

Rob Sherwood , University of Maryland
Bobby Bhattacharjee , University of Maryland
Aravind Srinivasan , University of Maryland
pp. 58
Session 3

Methods and Limitations of Security Policy Reconciliation (Abstract)

Patrick McDaniel , AT&T Research
Atul Prakash , University of Michigan
pp. 73

On the Composition of Secure Systems (Abstract)

Heiko Mantel , German Research Center for Artificial Intelligence
pp. 88
Session 4

Binder, a Logic-Based Security Language (Abstract)

John DeTreville , Microsoft Research
pp. 105

Design of a Role-Based Trust-Management Framework (Abstract)

Ninghui Li , Stanford University
John C. Mitchell , Stanford University
William H. Winsborough , Network Associates, Inc.
pp. 114

Constrained Delegation (Abstract)

Olav Bandmann , Swedish Institute of Computer Science (SICS)
Babak Sadighi Firozabadi , Swedish Institute of Computer Science (SICS)
Mads Dam , Royal Institute of Technology (KTH)
pp. 131
Session 5

Improving Computer Security Using Extended Static Checking (Abstract)

Brian Chess , University of California, Santa Cruz
pp. 160
Session 6

Noninterference and Intrusion Detection (Abstract)

Calvin Ko , Network Associates, Inc.
Timothy Redmond , Network Associates, Inc.
pp. 177

"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector (Abstract)

Kymie M.C. Tan , Carnegie Mellon University
Roy A. Maxion , Carnegie Mellon University
pp. 188

Alert Correlation in a Cooperative Intrusion Detection Framework (Abstract)

Frédéric Cuppens , ONERA Centre de Toulouse
Alexandre Miège , ONERA Centre de Toulouse
pp. 202

Intrusion-Tolerant Enclaves (Abstract)

Bruno Dutertre , SRI International
Valentin Crettaz , SRI International
Victoria Stavridou , SRI International
pp. 216
Session 7

Efficient Multicast Packet Authentication Using Signature Amortization (Abstract)

Jung Min Park , Purdue University
Edwin K. P. Chong , Colorado State University
Howard Jay Siegel , Colorado State University
pp. 227

Self-Healing Key Distribution with Revocation (Abstract)

Jessica Staddon , Palo Alto Research Center
Sara Miner , U.C. San Diego
Matt Franklin , U. C. Davis
Dirk Balfanz , Palo Alto Research Center
Michael Malkin , Stanford University
Drew Dean , SRI International
pp. 241
Session 8

Automated Generation and Analysis of Attack Graphs (Abstract)

Oleg Sheyner , Carnegie Mellon University
Joshua Haines , MIT Lincoln Laboratories
Somesh Jha , University of Wisconsin
Richard Lippmann , MIT Lincoln Laboratories
Jeannette M. Wing , Carnegie Mellon University
pp. 273

Stateful Intrusion Detection for High-Speed Networks (Abstract)

Christopher Kruegel , University California, Santa Barbara
Fredrik Valeur , University California, Santa Barbara
Giovanni Vigna , University California, Santa Barbara
Richard Kemmerer , University California, Santa Barbara
pp. 285

Author Index (Abstract)

pp. 295
91 ms
(Ver 3.3 (11022016))