Proceedings of a December 1999 conference, with papers in sections on electronic commerce, system engineering, networks, security analysis, workflow, crypto, composition problems of component TOEs, security policy, and public infrastructures. Other subjects include information security education, mobile code, legal and technical responses to protecting US critical infrastructures, security architectures, middleware, and intrusion detection. Some specific topics are security policy coordination for heterogeneous information systems, user authentication in the Java platform, and relevancy analysis on the registry of Windows NT 4.0. Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, ORFor example, making a cash withdrawal at an ATM machine, placing a call on the telephone, or deleting a file from a file system, are examples of complete interactions with various sorts of systems that would qualify as use cases.
|Title||:||Fifteenth Annual Computer Security Applications Conference|
|Publisher||:||IEEE - 1999-01-01|