Click for next page ( 280


The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 279
D List of Position Papers Prepared for the Workshops WORKSHOP ~ Earl Boebert Roch Guerin Chrisan Herrod Alan Kirby Radia Perlman Henning Schulzrinne Mark E. Segal Abel Weinrib Martin Abadi Ricky Butler Shiu-Kai Chin Dan Craigen Edward W. Felten Li Gong Constance Heitmeyer "Information Systems Trustworthiness" "Quality of Service and Trustworthiness" "Defense Information Infrastructure (DII): Trust- worthiness, Issues and Enhancements" "Is the NII Trustworthy?" "Information Systems Trustworthiness" "The Impact of Resource Reservation for Real- Time Internet Services" "Trustworthiness in Telecommunications Systems" "QoS, Multicast and Information System Trust- worthiness" WORKSHOP 2 "Formal, Informal, and Null Methods" "Formal Methods: State of the Practice" "Highly Assured Computer Engineering" "A Perspective on Formal Methods" "Research Directions for Java Security" "Mobile Code in Java: Strength and Chal- lenges" "Formal Methods: State of Technology" 279

OCR for page 279
280 APPENDIX D Rohit Khare "Rights Management, Copy Detection, and Access Control" Paul Kocher "Position Statement for Panel 4" Robert Kurshan "Algorithmic Verification" Karl N. Levitt "Intrusion Detection for Large Networks" Leo Marcus "Formal Methods: State of the Practice" John McHugh "Formal Methods for Survivability" John McLean "Formal Methods in Security" Dejan S. Milojicic "Alternatives to Mobile Code" I Strother Moore "Position Statement on the State of Formal Methods Technology" Clifford Neuman "Rights Management, Copy Detection, and Access Control" Elaine Palmer "Research on Secure Coprocessors" John Rushby "Formal Methods: State of Technology" Margo Seltzer "Dealing with Disaster: Surviving Misbehaved Kernal Extensions" Mark Stefik "Security Concepts for Digital Publishing on Trusted Systems" Vipin Swarup "Mobile Code Security" WORKSHOP 3 Thomas Buss Michael Diaz Stephanie Forrest Chengi Jimmy Kuo John Francis Mergen "Building Strong Transactional Systems" "Assessing the Cost of Security and Trustworthi- ness" "Immunology and Intrusion Detection" "Free Macro Antivirus Techniques" "GTE Internetworking"