Check out the new USENIX Web site.
2004 USENIX Annual Technical Conference, June 27-July 2, 2004, Boston Marriott Copley Place, Boston, MA
USENIX '03 Home  | USENIX Home  | Events  | Publications  | Membership

Register

organizers

sponsors

ataglance

trainingbydaybyinst

plenary

techgeneralfreenixsigsguruwips

Open Sessions

evening

afs

bofs

services

hotel

students

questions

promote

authorinstrux

  SECURITY

Security Icon Calling all Security Researchers and Practitioners:

USENIX '04 offers a variety of programs to meet your needs.

  • Enhance your skills with the in-depth training program.
  • Check out the latest developments in the General and FREENIX tracks.
  • Follow the newest trends and hottest debates in the Security SIG session.
  • Bring your most difficult questions to the experts at the Guru sessions.
Mix and match from the lists of sessions below to design the security-focused conference you need!

Training
S1: Hands-On Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 1)

S4: Network Security Protocols: Theory and Current Standards

M1: Hands-On Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 2)

M4: Network Security Profiles: Protocol Threats, Intrusion Classes, and How Hackers Find Exploits

T1: Network Security Assessments Workshop—Hands-on (Day 1)

T4: Building a Software Security Capability: How to Foster Best Practices in Software Security

T5: System Log Aggregation, Statistics, and Analysis

W1: Network Security Assessments Workshop—Hands-on (Day 2)

R1: Hacking & Securing Web-based Applications—Hands-On (Day 1)

R5: Intrusion Detection and Prevention Systems

F1: Hacking & Securing Web-based Applications—Hands-On (Day 2)

Plenary Sessions
T: Network Complexity: How Do I Manage All of This?

W: Thinking Sensibly About Security in an Uncertain World

Refereed Paper Sessions
T: Secure Services

R: Security

SIG Sessions
W: Panel: The Politicization of Security

W: Panel: Wireless Devices and Consumer Privacy

W: Debate: Is an Operating System Monoculture a Threat to Security?

F: A New Distributed Security Model for Linux Clusters

Guru Sessions
W: How to Talk with a VC

R: Deploying the Lustre Cluster File Systems

F: Practical IPv6 Deployment

?Need help? Use our Contacts page.

Last changed: 20 April 2004 jel