The 8th USENIX Security Symposium, August 23-26, 1999, Washington,
USA:
-
The Design and Analysis of Graphical Passwords. I. Jermyn, A. Mayer, F. Monrose, M. Reiter and A. Rubin
- Hand-Held Computers Can Be Better Smart Cards. D. Balfanz and E. Felten
- Offline Delegation. A. Helme and T. Stabell-Kulx
- Vaulted VPN: Compartmented Virtual Private Networks on Trusted
Operating Systems.
T.-H. Choo
- Enforcing Well-Formed and Partially Formed Transactions for UNIX. D. Povey
- Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level
Specifications.
R. Sekar and P. Uppuluri
- Building Intrusion-Tolerant Applications. T. Wu, M. Malkin and D. Boneh
- Brute Force Attack on UNIX Passwords with SIMD Computer. G. Kedem and Y. Ishihara
- Antigone: A Flexible Framework for Secure Group Communication. P. McDaniel, A. Prakash and P. Honeyman
- A Secure Station for Network Monitoring and Control. V. Prevelakis
- The Flask Security Architecture: System Support for Diverse Security
Policies. R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen and J.
Lepreau
- A Study in Using Neural Networks for Anomaly and Misuse Detection. A. Ghosh and A. Schwartzbard
- The Design of a Cryptographic Security Architecture. P. Gutmann
- Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. A. Whitten and J. Tygar
- Jonah: Experience Implementing PKIX Reference Freeware. M. Zurko, J. Wray, I. Morrison, M. Shanzer, M. Crane, P. Booth,
E. McDermott, W. Macek, A. Graham, J. Wade and T. Sandlin
- Scalable Access Control for Distributed Object Systems. D. Sterne, G. Tally, C. McDonell, D. Sherman, D. Sames, P. Pasturel and
E. John Sebes
- Certificate-based Access Control for Widely Distributed Resources. M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson and A. Essiari
- Digital-Ticket-Controlled Digital Ticket Circulation. K. Fujimura, H. Kuno, M. Terada, K. Matsuyama, Y. Mizuno and J. Sekine
DEXA'99 Workshop on Electronic Commerce and Security, September 2, 1999,
Florence, Italy:
[Security-related papers only]
-
IT/Security in Electronic Commerce: From Cost to Value Driver.
R. Holbein and T. Gaugle
- A Secure Payment System for Electronic Commerce.
I. Mavridis, G. Pangalos and S. Muftic
- Coordination between security levels for Internet architectures.
E. Fernandez
- Batching Proofs of Knowledge and its Applications.
K. Nguyen, V. Varadharajan and Y. Mu
- Efficient Detection of Failure Modes in Electronic Commerce Protocols.
S. Gurgens, J. Lopez-Munoz and R. Peralta
- Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party.
V. Varadharajan
- Non-repudiation in An Agent-Based E-Commerce System.
C.-C. Liew, W.-K. Ng, E.-P. Lim, B.-S. Tan and K.-L. Ong
- Controlling the Dissemination of Electronic Documents.
V. Prevelakis, D. Konstantas and J.-H. Morin
- NIGE Log - A method of protecting logging information which takes
account of its deletion.
T. Takada and H. Koike
New Security Paradigms Workshop 1999, September 22-24, 1999,
Ontario, Canada:
-
Secure Dynamic Adaptive Traffic Masking.
B. Timmerman
- Security Architecture-Based System Design.
E. Schneider
- Survivability --- A New Technical and Business Perspective on Security.
H. Lipson and D. Fisher
- Optimistic Security: A New Access Control Paradigm.
D. Povey
- Security Architecture Development and its Role in the Seat
Management and Total Cost of Ownership Environments.
R. Henning
- Cursory Examination of Market Forces Driving the Use of Protection
Profiles.
K. Olthoff
- Paradigm Shifts in Protocol Analysis.
S. Pancho
- Secure Group Management in Large Distributed Systems.
J. Michael and J. McHugh
- SASI Enforcement of Security Policies: A Retrospective.
U. Erlingsson and F. Schneider
- Security Modeling in the Commercial Off The Shelf Environment.
T. Markham, M. Denz and D. Colby
- On the Functional Relation between Security and Dependability
Impairments.
L. Stromberg, E. Jonsson and S. Lindskog
- Securing Information Transmission by Redundancy.
J. Li, P. Reiher and G. Popek
SAFECOMP'99 - 18th International Conference on Computer Safety,
Reliability and Security,
September 27-29, Toulouse, France:
[Security-related papers only]
-
On Formal Languages for Sequences of Authorization Transformations.
Y. Bai and V. Varadharajan
- Dependability Requirements and Security Architectures for the
Healthcare/Medical Sector.
G. Trouessin
- Three-Pass Hybrid Key Establishment Protocol based on ESIGN Signature.
S. Lee and T. Kim
- Integration of Safety and Security Requirements.
D. Eames and J. Moffett
7th Annual Working Conference on Information Security Management
and Small Systems Security, September 30-October 1, 1999,
Amsterdam, Netherlands:
- A protocol improvement for high-bandwidth encryption using
non-encrypting smart cards.
R. Weis
- Real-time risk analysis on the Internet: a prototype.
H. Venter, L. Labuschagne and J. Eloff
- A practical approach to manage data communication security.
P. Samwel and M. Spruit
- The future of Australian & New Zealand security standard AS/NZ 4444?
M. Warren and B. Hutchison
- The effective utilization of audit logs in information security
management.
W. Olivier and R. von Solms
- An approach to standardizing security analysis methods for virtual
systems.
A. Frisinger and L. Yngstrom
- Information security at top level - Securometer. streamlines management
information.
A. Buren, B. van der Meer, A. Shahim, W. Barnhoorn and E. Lindgreen
- Risk analysis on Internet connection.
P. Samwel and M. Spruit
- A secure station for network monitoring and control.
V. Prevelakis
- Security aspects of a Java-servlet-based web-hosted e-mail system.
E. Hepworth and U. Ultes-Nitsche
- Time and security in smart cards.
V. Cordonnier, S. Nemchenko and A. Watson
- The Intranet authorization paradigm.
M. Vandenwauver, P. Ashley and G. Gaskell
MASCOTS'99 - 7th International Symposium on Modeling, Analysis and
Simulation,
October 24-28, 1999, College Park, Maryland, USA:
[Security-related papers only]
- An Experimental Analysis of Cryptographic Overhead in Embedded Systems.
W. Freeman and E. Miller
- Model Checking the Secure Electronic Transaction (SET) Protocol.
S. Lu and S. Smolka
COMPSAC'99 - 23rd Annual International Computer Software and
Applications Conference,
October 27-29, 1999, Phoenix, Arizona, USA:
[Security-related papers only]
- A Protocol and Simulation for Distributed Communicating Firewalls.
R. Smith and S. Bhattacharya
- Mobile Agents protection in the Internet Environment.
A. Corradi, R. Montanari and C. Stefanelli
- Computer Network Intrusion Detection, Assessment and Prevention Based
on Security Dependency Relation.
S. Yau and X. Zhang
WELCOM'99 - International Workshop on Electronic Commerce
(in
conjunction with the 18th IEEE Symposium on Reliable Distributed
Systems), October 19, 1999, Lausanne, Switzerland:
[Security-related papers only]
-
Approaching a Formal Definition of Fairness in Electronic Commerce.
F. Gartner, H. Pagina and H. Vogt
- Authorization Methods for e-Commerce Applications.
R. Oppliger
- Gateways to Overcome Incompatibilities of Security Mechnisms.
J. Zollner
- Security Mechanisms for Using Mobile Agents in Electronic Commerce.
P. Marques, L. Silva and J. Silva
- Accountable Anonymous Service Usage in Mobile Communication Systems.
L. Buttyan and J.-P. Hubaux
IEEE/IFIP IWQoS '99 - Seventh International Workshop on Quality of
Service,
London, UK, June 1-4, 1999:
[Security-related paper only]
- Securing QoS: Threats to RSVP Messages and Their Countermeasures.
T.-L. Wu, S. Felix Wu, Z. Fu, H. Huang and F. Gong
WISE1 - IFIP WG 11.8 1st World Conference on Information Security
Education,
Stockholm, Sweden, June 17-19, 1999:
- Incorporating Security Issues Throughout the Computer Science
Curriculum.
G. White and W. Marti
- The Reference Monitor Concept as a Unifying Principle in Computer
Security Education.
C. Irvine
- Personnel Training in the Field of Information Security Maintenance.
A. Maljuk and A. Tolstoi
- IT related Ethics Education in Southern Africa -- Now and Then.
L. Drevin
- Data Protection in Healthcare and Welfare - Education of Data Protection
Officials in Germany.
B. Blobel and P. Pharow
- A Mix-Demonstrator for Teaching Security in the Virtual University.
U. Jendricke and K. Rannenberg
- On the Experience of Creating the Electronic Tutorial "Vulnerability and
Protection Methods in the Global Internet Network" in Moscow State
Engineering Physics Institute for Education of IT-Security
Professionals.
N. Miloslavskaia and A. Tolstoi
- Information Security Best Practice Dissemination - The ISA-EUNET
Approach.
D. Spinellis and D. Gritzalis
- IT Security Research and Education in Synergy.
S. Lindskog, U. Lindqvist and E. Johnsson
- Developing and Undergraduate Lab for Information Warfare and Computer
Security.
G. White and R. Sward
- Internet Groupware Use in a Policy-Oriented Education.
R. Baskerville and D. Straub
- Teaching Computer Security - The Art of Practical Application.
H. Fillery-James
- Some Aspects of Cryptology Teaching.
D. Olejar and M. Stanek
- Explaining Cryptographic Systems to the General Public.
T. Bell, H. Thimbley, M. Fellows, I. Witten and N. Koblitz
- Approaching the Concept of IT-Security for young Users.
K. Nackros
- Introducing IT-Security Awareness in Schools: the Greek Case.
A. Bintziou, N. Alexandris and V. Chrissikopoulos
- Hands-on cryptography.
H. Thimberly
- Making Information Security Awareness and Training more Effective.
M. Thomson
- The Value and Assessment of Information Security Education and Training.
L. Yngstrom and F. Bjorck
- The Manual is the Message: An Experiment with Paper-based and
Web-based IT Security Manuals.
S. Kowalski, H. Nassla, J. Karlsson and V. Karlsson
INET'99, San Jose, California, USA, June 22-25, 1999:
[Security-related papers only]
- Copyright Information Management: A Design and Implementation of
a New Protocol Architecture.
Y. Murakami, K. Okawa and J. Murai
- Pequi: A PKIX Implementation for Secure Communication.
A. Silva and M. Stanton
- A Method of Tracing Intruders by Use of Mobile Agents.
M. Asaka, S. Okazawa, A. Taguchi and S. Goto
- Security Assessment of IP-Based Networks: A Holistic Approach.
M. Tripunitara and P. Dutta
CSFW99 - 12th IEEE Computer Security Foundations Workshop,
June 28-30, 1999, Mordano, Italy:
- A Formal Framework and Evaluation Method for Network Denial of Service.
C. Meadows
- I/O Automaton Models and Proofs of Shared-Key Communications Systems.
N. Lynch
- Safe Simplifying Transformations for Security Protocols.
M. Hui and G. Lowe
- Decision procedures for the analysis of cryptographic protocols by
logics of belief.
D. Monniaux
- A meta-notation for protocol analysis.
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell and A. Scedrov
- Mixed Strand Spaces.
F. Fabrega, J. Herzog and J. Guttman
- Honest Functions and their Application to the Analysis.
A. Maneki
- Authentication via localized names.
C. Bodei, P. Degano, R. Focardi and C. Priami
- A Logic for SDSI's Linked Local Name Spaces.
J. Halpern and R. van der Meyden
- Trusted System Construction.
C. O'Halloran
- Secure Composition of Insecure Components.
P. Sewell and J. Vitek
- Security Function Interactions.
P. Bieber
- A Logic-based Knowledge Representation for Authorization with
Delegation.
N. Li, J. Feigenbaum and B. Grosof
- Logical Framework for Reasoning on Data Access Control.
E. Bertino, F. Buccafurri, E. Ferrari and P. Rullo
- Athene, a new automatic checker for analysis of security protocols.
D. Song
- CVS: A Compiler for the Analysis of Cryptographic Protocols.
A. Durante, R. Focardi and R. Gorrieri
- Process Algebra and Non-interference.
P. Ryan and S. Schneider
- What is intransitive noninterference?
A. Roscoe and M. Goldsmith
IWAN'99 - The First International Working Conference on Active Networks,
Berlin, Germany, June 30 - July 2, 1999:
[Security-related papers only]
- A Secure Plan.
M. Hicks and A. Keromytis
- Control on Demand.
G. Hjalmtysson and S. Bhattacharjee
- Agent-based Security for the Active Network Infrastructure.
S. Karnouskos, I. Busse and S. Covaci
LICS'99 - 14th Annual IEEE Symposium on Logic in Computer Science,
Trento, Italy, July 2-5, 1999:
[Security-related papers only]
- Towards a Theory of Bisimulation for Local Names
A. Jeffrey and J. Rathke
- Weak Bounded Arithmetic, the Diffie-Hellman Problem and Constable's Class K
J. Johannsen
- Non-deterministic Games and Program Analysis: An application to
security.
P. Malacaria and C. Hankin
- Proof techniques for Cryptographic Processes.
M. Boreale, R. De Nicola and R. Pugliese
LICS'99 Workshop on Formal Methods and Security Protocols,
Trento, Italy, July 5, 1999:
- CAPSL Intermediate Language.
G. Denker and J. Millen
- Analyzing a Library of Security Protocols using Casper and FDR.
B. Donovan, P. Norris and G. Lowe
- Undecidability of Bounded Security Protocols.
N. Durgin, P. Lincoln, J. Mitchell and A. Scedrov
- Towards the Formal Verification of Ciphers: Logical Cryptanalysis of
DES.
F. Massacci and L. Marraro
- A Necessarily Parallel Attack.
J. Millen
- Efficient Infinite-State Analysis of Security Protocols.
A. Huima
- A Reduction for Automated Verification of Authentication Protocols.
S. Stoller
- Analysis of a Fair Exchange Protocol.
V. Shmatikov and J. Mitchell
CADE-16 - The 16th International Conference on Automated Deduction,
Trento, Italy, July 7-10, 1999:
[Security-related paper only]
- Towards an Automatic Analysis of Security Protocols in First-Order
Logic.
C. Weidenbach
13th Annual IFIP WG 11.3 Working Conference on Database Security,
Seattle, Washington, July 26-28, 1999:
- Intrusion Confinement by Isolation in Information Systems.
P. Liu, S. Jajodia and C. McCollum
- Analyzing the Performance of Program Behavior Profiling for Intrusion
Detection.
A. Ghosh and A. Schwartzbard
- Integrating Data Mining Techniques with Intrusion Detection.
R. Mukkamala, J. Gagon and S. Jajodia
- RBAC on the Web by Secure Cookies.
J. Park, R. Sandhu and S. Ghanta
- eMEDAC: Role-Based Access Control Supporting Discretionary and
Mandatory Features.
I. Mavridis, G. Pangalos and M. Khair
- Agent Approaches to Enforce Role-Based Security in Distributed and
Web-Based Computing.
S. Demurjian, Y. He, T. Ting and M. Saba
- A Secret Splitting Method for the Protection of Privacy and
Confidentiality in Computer Records.
A. Ho
- Refusal is Better than Lying.
J. Biskup
- Extending the BFA Workflow Authorization Model to Express Weighted
Voting.
S. Kandala and R. Sandhu
- A strategy for an MLS workflow management system.
M. Kang, J. Froscher, B. Eppinger and I. Moskowitz
- Impact of Decision-Region Based Classification Mining Algorithms
on Database Security.
T. Johnsten and V. Raghavan
- Protecting Against Data Mining through Samples.
C. Clifton
- Security Administration for Federations, Warehouses and Other Derived
Data.
A. Rosenthal, V. Doshi and E. Sciore
- Enforcing Integrity While Maintaining Secrecy.
D. Marks
- The Effect of Confidentiality on the Structure of Databases.
A. Spalka and A. Cremers
- Temporal Authorization in the Simplified Event Calculus.
S. Barker
- Specifying and Computing Hierarchies of Temporal Authorizations.
E. Bertino, E. Ferrari, P. Bonatti and M. Sapino
- The Security Problem against Inference Attacks on Object-Oriented
Databases.
Y. Ishihara, T. Morita and M. Ito
- A Logical Formalization for Specifying Authorizations in OO Databases.
Y. Bai and V. Varadharajan
- STACS'99- 16th International Symposium on Theoretical Aspects of
Computer Science,
- IEEE INFOCOM'99,
March 21-25, 1999, New York, USA:
[Security-related papers only]
- TACAS'99 - 5th International
Conference on Tools and Algorithms for the Construction and Analysis
of Systems,
March 22-26, 1999, Amsterdam, The Netherlands:
[Security-related paper only]
- ASSET'99 - The Second IEEE Symposium
on Application-Specific Systems and Software Engineering
Technology,
March 24-27, 1999, Richardson, USA:
[Security-related papers only]
- HotOS-VII - The 7th IEEE Workshop on
Hot Topics in Operating Systems,
March 29-30, 1999, Arizona, USA:
[Security-related papers only]
- 1st USENIX Workshop on Intrusion Detection and Network Monitoring,
April 9-12, 1999, Santa Clara, USA:
[Security-related papers only]
- 1st USENIX Workshop on
Smartcard Technology,
May 10-11, 1999, Chicago, USA:
[Security-related papers only]
- WWW8- The Eighth International World
Wide Web Conference,
May 11-14, 1999, Toronto, Canada:
[Security-related papers only]
- ICSE'99 Workshop on Software Engineering over the Internet,
May 17, 1999, Los Angeles, USA:
[Security-related papers only]
- ICSE'99 Workshop on Testing Distributed Component-Based Systems,
May 17, 1999, Los Angeles, USA:
[Security-related paper only]
- IM '99 - Sixth IFIP/IEEE International
Symposium on Integrated Network Management,
May 24-28, 1999, Boston, USA:
[Security-related papers only]
- ICPADS '98 - 1998 International Conference on Parallel and Distributed
Systems ,
December 14-16, Tainan, Taiwan:
[Security-related papers only]
- POPL'99 - 26th ACM Symposium on Principles of Programming Languages,
January 20-22, 1999, San Antonio, Texas, USA:
[Security-related papers only]
- NDSS'99 - 1999 Network and Distributed Security Symposium,
(Conference writeup)
February 3-5, 1999,
San Diego, California, USA:
- IWS99 - Internet Workshop'99
February 18-20, 1999, Osaka, Japan:
[Security-related papers only]
- Financial Cryptography '99, Conference writeup
February 22-25, 1999, Anguilla, BWI
- SAC '99 - 1999 ACM Symposium on Applied Computing
February 28-March 2, 1999, San Antonio, Texas, U.S.A:
[Security-related papers only]
- 2nd International Workshop on Mobile Agents,
Stuttgart, Germany, September 9 - 11, 1998
- ACM Multimedia'98 - The 6th ACM International Multimedia Conference,
Bristol, UK, September 12-16, 1998
- 7th International Conference on Computer Communications
and Networks, Louisiana, USA, October 12-15,1998
- 7th IEEE Symposium on Reliable Distributed Systems, West
Lafayette, IN, USA,
October 21-22, 1998
- 5th ACM Conference on Computer and Communications Security,
San Francisco, USA, November 2-5, 1998.
- Third International Workshop on Enterprise Security,
Stanford, CA, USA, June17-19, 1998.
- INET'98, Geneva, Switzerland, July 21-24, 1998.
- ESORICS'98, Louvain-la-Neuve, Belgium, September 16-18, 1998.
- Workshop on Formal Methods and Security Protocols, June 25, 1998,
Indianapolis, Indiana, USA (following LICS'98).
- ICDCS '98 - The 18th International Conference on Distributed Computing
Systems, Amsterdam, May 26 - 29, 1998, The Netherlands.
- 1998 USENIX Annual Technical Conference, New Orleans, Louisiana, June
15-19, 1998, USA.
- Second International Workshop on Information Hiding, Portland Oregon,
April 14-17, 1998.
- The Internet Society's Network and Distributed System Security Symposium San Diego, California March 11-13, 1998, USA.
- Financial Crypto 1998,February 23-25, 1998,
Anguilla, BWI.
- 1998 IEEE S&P, 1998 IEEE
Symposium on Research in Security and Privacy, Oakland, CA, May 3-6, 1998
- Proceedings of the USENIX Symposium on
Internet Technologies and Systems, Monterey, California, December
1997
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, "Going Beyond
the Sandbox: An Overview of the New Security Architecture in the Java
Development Kit 1.2". pp.103-112.
- 20th National Information Systems Security Conference, October 7-10, 1997,
Baltimore, Maryland: table of contents can now be found on the web via
http://csrc.nist.gov/nissc/1997/proceedings/toc.pdf. In addition,
the table of contents includes links to most of the papers provided in
the conference proceedings. The 1996 proceedings are similarly
available at
http://csrc.nist.gov/nissc/1996
- 13th Annual Computer Security Applications Conference
December 7-11, 1997, San Diego, CA.
[conference
information].
-
IFIP WG11.5 First Working Conference on Integrity and Internal Control in
Information Systems, December 4-5, 1997, Zuerich, Switzerland.
[conference information].
- 7th USENIX UNIX Security Symposium,
San Antonio, TX, January 25-29, 1998.
[conference information].
- Second ACM Workshop on Role-Based Access
Control, Nov. 6-7, 1997, Fairfax, VA.
- 6th International Conference on Computer Communications and Networks,
September 22-25, 1997, Las Vegas, Nevada, security-related papers:
- T.R.N. Rao, "Encryption, Electronic Signatures and Security in
Computer Communications" (keynote)
- Hatefi and Golshani, A New Framework for Secure Network Management
- International Symposium on Information Systems and Technologies for
Network Society, Fukuoka, Japan, 24 Sept. 1997. Security related paper:
Kou Nakayoshi, Nariyoshi Yamai, Toshio Matsuura, Kota Abe, and Koso
Murakami. A Secure Distributed File System for Arbitrary Users
- International Conference on Information
and Communications Security, November 11-13, Beijing, P.R. China.
-
DIMACS Workshop on Design and Formal Verification of Crypto Protocols
New Brunswick, New Jersey, Sept. 3-5, 1997.
Conference information.
- ICCC '97, Int'l Conf. for Computer Communications, November 19-21, 1997,
Cannes, France.
Conference information. Security-related paper:
Intranet packet encryption with minimum overhead. S. Seno (Japan).
- SOSP - 16, 16th ACM Symposium on Operating Systems Principles, Saint-Malo, France, October 5-8, 1997.
Conference information. Security-related papers:
- Extensible Security Architectures for Java.
Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Felten (Princeton University).
- A Decentralized Model for Information Flow Control.
Andrew C. Myers and Barbara Liskov (MIT).
- Third Annual ACM/IEEE Int'l Conf on Mobile Computing and Networking (MobiCom '97), Sept 26-30, 1997, Budapest, Hungary. Conference information.
Security-related papers:
- A Public-Key Based Secure Mobile IP,
John Zao, Stephen Kent, Joshua Gahm, Gregory Troxel, Matt Condell, Pam Helinek, Nina Yuan, and Isidro Castineyra (BBN, USA)
- A Protection Scheme for Mobile Agents on Java,
Daniel Hagimont and Leila Ismail (INRIA, France)
- Ticket Based Service Access for the Mobile User,
Bhrat Patel and Jon Crowcroft (University College London, UK)
- Dealing with Server Corruption in Weakly Consistent, Replicated
Data Systems, Mike Spreitzer, Marvin Theimer, and Karin Petersen (Xerox
PARC, USA); Alan Demers (Oracle Corporation, USA); and Doug Terry
(Xerox PARC, USA)
- SAFECOMP '97, 16th Int'l Conf. on Computer Safety, Reliability, and
Security, York, UK, Sept. 8-10, 1997.
Conference information. Security-related papers:
- Safety and security for and advanced train control system, J. Braband.
- Cryptographic protocols over open distributed systems: a
taxonomy of flaws and related protocol analysis tools,
S. Gritzalis and D. Spinellis.
- Int'l Database Engineering and Applications Symp., IDEAS97,
August 25-27, 1997, Montreal, Canada.
Conference information.
Security-related paper:
Detection of Access Control Flaws in a Distributed Database System with
Local Site Autonomy, Yaowadee Temtanapat and David Spooner (USA).
- CRYPTO '97,
August 18-21, Santa Barbara, CA.
Conference information.
- IFIP WG 11.3 11th Working Conf. on Database Security, Lake Tahoe, CA,
August 11-13, 1997.
Conference information.
- 2nd IEEE High-Assurance Systems Engineering Workshop, Bethesda, MD,
August 11-12, 1997 (in conjunction with COMPSAC'97).
Conference information.
Security related paper:
"Design and assurance strategy for the NRL pump,"
by Myong H Kang, Andrew P. Moore, Ira S. Moskowitz.
- Ninth Int'l Conf. on Scientific and Statistical Database Management,
Olympia, WA, August 11-13, 1997. Security-related paper:
Security problems for statistical databases with general cell suppressions,
Tsan-sheng Hsu and Ming-Yang Kao.
- Third Int'l Workshop on Next Generation Information Technologies and
Systems, Neve Ilan, Israel, 30 June - 3 July 1997. Security-related papers:
- Automated Negotiation in Electronic Commerce, C. Beam and A. Segev, USA
- Persistence and Security Support for Distributed System with Mobile
Software Objects (short paper), B. Lavva, O. Holder and I. Ben-Shaul, Israel
- INET '97, Internet Society 7th Annual Conference, Kuala Lumpur,
Malaysia, June 25-30, 1997.
Security-related papers.
- Tenth IEEE Computer Security Foundations Workshop, Rockport, MA, June 10-12, 1997.
Conference information.
- Software Process Improvement and Capability Determination Symposium
(SPICE '97), June 1-6, 1997, Walnut Creek, CA, Conference information.
Security-related papers:
- A process standard for system security engineering: development
experiences and pilot results. Richard Hefner.
- A survey to determine federal agency needs for a
role-based access control security product. Charles Smith.
- TAPSOFT '97, April 14-18, Lille, France. Security-related paper:
A Type-Based Approach to Program Security. D. Volpano and G. Smith
- COMPASS '97 security-related
papers,
12th Annual IEEE Conference on COMPuter ASSurance (COMPASS), NIST,
Gaithersburg, MD, June 16-19, 1997.Conference information.
- FSE4 -
Fast Software Encryption Workshop '97, Haifa, Israel, January 20-22, 1997.
- Internet Society 1997 Symposium on
Network and Distributed System Security (NDSS '97), San Diego, CA,
10-11 February 1996.
- 1997 IEEE S&P, 1997 IEEE
Symposium on Research in Security and Privacy, Oakland, CA, May 5-7, 1997
[conference information]
- Sixth IFIP Working Conference on Dependable Computing for Critical
Applications, 5-7 March, 1997, Eibsee-Hotel, Grainau (near
Garmisch-Partenkirchen), Germany,
[Conference information]
security-related paper:
"Experimenting Quantitative Evaluation Tools for Monitoring Operational
Security," Rodolphe Ortalo, Yves Deswarte, Mohamed Kaaniche, LAAS-CNRS & INRIA, Toulouse.
- Fourth ACM Conference on Computer and
Communications Security, 1-4 April 1997, Zurich, Switzerland.
Conference information.
- ASIAN '96 -- Asian Computing Science Conference, December 2-5,
Singapore. [Conference web
page]. Security-related papers:
- Broadcasting in Star Graphs with Byzantine Failures
Yukihiro Hamada, Aohan Mei, Feng Bao, Yoshihide Igarashi
- Blind Threshold Signatures Based on Discrete Logarithm
Wen-Shenq Juang, Chin-Laung Lei
- Computation of the k-Error Linear Complexity of Binary Sequences with
Period 2^n
Takayasu Kaida, Satoshi Uehara, Kyoki Imamura
- Symbolic Rights and Vouchers for Access Control in Distributed Object Systems
Vincent Nicomette, Yves Deswarte
- The Heuristics for the Constrained Multicast Routing
Zong-Ben Xu, Bo-Ting Yang
- On Design and Analysis of a New Block Cipher
Xun Yi
- DIMACS Workshop on Trust Management
in Networks, South Plainfield, NJ, September 30 - October 2, 1996.
- 19th National Information Systems
Security Conference, Baltimore, MD, October 21-25, 1996,
[conference information].
12th ACSAC Twelfth Annual
Computer Security Applications Conference, San Diego, December 9-13,1996
[conference information]
- ASIACRYPT '96,
South Korea, November 4-7, 1996,
[conference information]
- HASE '96 (IEEE High-Assurance Systems Engineering Workshop),
Niagara-on-the-Lake,
Canada, October 21-22, 1996,
[conference information]
security-related papers:
- A General Approach to Secure Component Composition
Q. Shi, N. Zhang, Liverpool John Moores University, UK.
- A Framework for MLS Interoperability.
M.H. Kang, J.N. Froscher,
and I.S. Moskowitz, Naval Research Laboratory, USA.
- Multiversion Transaction Scheduler for Centralized MultiLevel Secure
Database Systems.
T.F. Keefe, Penn State U., W.T. Tsai,
U. of Minnesota.
- EDCC-2 (Second European Dependable Computing Conference), Taormina, Italy, October 2-4, 1996.
[conference information]. Security-related paper:
Friends - A Flexible Architecture for Implementing Fault Tolerant and
Secure Distributed Applications.
J.-C. Fabre and T. Prennou (LAAS-CNRS, Toulouse, France)
- CARDIS '96: Second Smart
Card and Advanced Applications Conference, Amsterdam, September 18-20, 1996
[conference information].
- IFIP TC-6 and TC-11 Joint Working
Conference on Communications and Multimedia Security,
University of Essen, Germany, September 23-24, 1996.
[conference information].
- ESORICS-96, European
Symposium on Research in Computer Security, September 25-27, 1996, Rome, Italy.
[conference information].
- New Security Paradigms '96 Workshop
Lake Arrowhead, California, 18-20 September, 1996.
- TPHOLs '96 - The 1996 International Conference on Theorem Proving in
Higher Order Logics, Turku, Finland, 26-30 August, 1996.
[conference information].
Security-related paper:
Deciding cryptographic protocol adequacy with HOL: the implementation.
Stephen H. Brackin (Arca Systems, Inc.)
- Method Engineering'96: Principles For Method Construction And Tool Support,
Atlanta, Georgia, August 25-28, 1996.
[conference information]. Security-related paper:
Structural Artifacts in Method Engineering: The Security Imperative
Richard Baskerville (Denmark, USA [sic])
- CRYPTO '96,
Santa Barbara, California, August 18-22, 1996
- SAC '96: Third Annual Workshop on Selected Areas in Cryptography,
Kingston, Ontario, Canada, August 15-16, 1996.
[conference information].
- 6th USENIX UNIX Security
Symposium, San Jose,CA, July 22-25,1995.
[conference information]
.
- IFIP WG 11.3 Tenth
Working Conference on Database Security,
Lake Como, Italy, July 22-25, 1996
- ADL '96, Forum on Research and Technology Advances in Digital
Libraries, Library of Congress, Washington, D.C., May 13-15, 1996.
[conference information]. Security-related paper:
Authorization in the Digital Library: Secure Access to Services Across
Enterprise Boundaries.
N. Ching, V. Jones and M.Winslett (Univ. of Illinois, Urbana-Champaign)
- COMPASS '96,
11th Annual IEEE Conference on COMPuter ASSurance (COMPASS), NIST,
Gaithersburg, MD, June 17-21, 1996.
[conference information]. Security-related papers:
- An Empirical Model of the Security Intrusion Process.
Erland Jonsson and Tomas Olovsson (Chalmers University of Technology, Sweden)
- Increasing Assurance Through Literate Programming Techniques.
Andrew Moore (Naval Research Laboratory) and
Charles Payne (Secure Computing Corp., USA)
- A Framework for Composition.
Todd Fine (Secure Computing Corporation)
- Composition of a secure system based on trusted components.
Ulf Lindqvist, Tomas Olovsson, Erland Jonsson
(Chalmers University of Technology, Sweden)
- Defining an Adaptive Software Security Metric From a Dynamic Software
Software Fault-Tolerance Measure.
J. Voas (Reliable Software Technologies) and
K. Miller (University of Illinois, Springfield, USA)
- INET '96, 6th Annual Conference of the Internet Society,
June 25-28, Montreal
[conference information]. Security-related papers:
- Securing Radio Spectrum for Wireless Internet Access,
Steve Cisler (Apple Computer, Inc. , USA)
- Electronic Payment Interoperability, Alireza Bahreman
- Efficient Micropayment Systems,
Donald Eastlake (Cybercash, USA)
- The Design of the SECT (Secure Electronic Transactions) Protocol,
Allan M. Schiffman
- Secure DNS, Don Eastlake, (Cybercash, USA)
- IP Security, Jim Hughes
- SIGMOD '96, ACM SIGMOD International Conference on Management of Data,
June 3-6, 1996, Montreal
[conference information]. Security-related paper:
Static Detection of Security Flaws in Object-Oriented Databases,
Keishi Tajima.
- ACM-SIGMOD'96 Workshop on Research Issues on Data Mining and
Knowledge Discovery, June 2, 1996, Montreal
[Workshop information]. Security-related paper:
Security and Privacy Implications of Data Mining.
C. Clifton (MITRE) and D. Marks (US Department of Defense)
- SDNE '96, Third International Workshop on Services in Distributed and
Networked Environments, June 3-4, 1996, Macau:
[Workshop information]; security-related papers:
- Security and Auditing of VPN,
Nora Boukari (Telis S & C, France) and Ali Aljane (Universite Pierre et
Marie Curie, France)
- Information Distribution by FleaMarket System,
Osamu Akashi, Kenji Moriyasu, and Atsushi Terauchi
(NTT Software Laboratories, Japan)
- A Privilege Management System For A Secure Network,
K.J. Maly, A. Gupta, B Kvande, I.B. Levinstein, R. Mukkamala, and M. Olson
(Old Dominion University, USA)
- TACAS '96, Second International Workshop on Tools and Algorithms
for the Construction and Analysis of Systems, March 27-29, 1996, Passau, Germany:
[Workshop information]
- Breaking and Fixing the Needham-Schroeder Public-Key Protocol using
CSP and FDR, G. Lowe (Oxford University, UK)
- Automatic Compositional Verification of Some Security Properties,
R. Focardi and R. Gorrieri (University of Bologna, Italy)
- IEEE INFOCOM '96, The Conference on Computer Communications,
March 24 - 28, San Francisco, CA, USA:
[conference information]
Network Security via Reverse Engineering of TCP Code: Vulnerability
Analysis and Proposed Solutions. B. Guha and B. Mukherjee (UC Davis, USA)
- IEEE IPCCC'96, IEEE International Phoenix Conference on Computers and
Communications, March 27-29, 1996, Phoenix, Arizona, USA:
[conference information]
- Security for Real-Time MPEG Compressed Video in Distributed Multimedia
Applications, G. Spansos and T. Maples (California State University at Long
Beach, USA)
- Distributed Communication Services in the MASIX System,
J. Simon and F. Mevel (Universite Paris VI, France)
- TCP/IP Spoofing Fundamentals, N. Hastings (Iowa State University, USA) and
P. Mclean (Andersen Consulting)
- The Role of Decimated Sequences in Scaling Encryption Speeds Through
Parallelism, E. Witzke (RE/SPEC, Inc.) and L. Pierson (Sandia National
Laboratories, USA)
- ICDE '96, Twelfth International Conference on Data Engineering,
Feb. 26 - March 1, 1996, New Orleans, USA.
[technical program]
Security-related paper:
Secure Mediated Databases, K. S. Canda, Sushil Jajodia, and V. S. Subrahmanian.
- 1996 IEEE S&P, 1996 IEEE
Symposium on Research in Security and Privacy, Oakland, CA, May 6-8, 1996
[conference information]
- IDMS'96, European Workshop on Interactive Distributed Multimedia Systems
and Services, March 4-6, 1996, Berlin, Germany (security-related papers
only):
[conference information]
- A Secure Architecture for Tenet Scheme 2
R. Oppliger (Univ. of Berne, Switzerland), A. Gupta, M. Moran (ICSI, USA),
R. Bettati (Texas A&M Univ., USA)
- The Secure Conferencing User Agent: A Tool to Provide Secure Conferencing
with MBone Multimedia Conferencing Applications
E. Hinsch, A. Jaegermann, L. Wang (GMD TKT, Germany), I.C. Roper (Univ. of
Plymouth, UK)
- ICDP'96, IFIP/IEEE International Conference on Distributed Platforms,
February 27 - March 1, 1996, Dresden, Germany (security-related paper
only):
[conference information]
Security Architecture based on Secret Key and Privilege Attribute
Certificates
Y. Sameshima (Hitachi Software Engineering Co., Japan)
- IEEE COMPCON '96, February 25 - 28, 1996, Santa Clara, CA
(security-related paper only):
[conference information]
Mobile Agent Security and Telescript
J. Tardo and L. Valente (General Magic Inc, USA)
- NETWORKS'96, IASTED International
Conference, January 8-10, 1996, Orlando, Florida, USA
(security-related papers only);
conference information
-
ACSC'96, Nineteenth Australasian Computer Science Conference,
31 January - 2 February 1996, Melbourne, Australia (security-related
papers only):
[conference information http://www.cs.mu.oz.au/conferences96/]
- Analysis of a Key Distribution Protocol for a Secure LAN-SMDS Network
V. Varadharajan, C. Calvelli
- A Combinatorial Pattern Matching Problem with Applications to Cryptography
J. Golic, L. O'Connor
- Smart Card Integration with Kerberos
M. Warner, J. Trinkle, G. Gaskell
- Language Mechanisms for Protecting Persistent Data
M. Hollins, J. Rosenberg, M. Hitchens
- WWW4, Fourth International World
Wide Web Conference, "The Web Revolution", December 11-14, 1995,
Boston, Massachusetts, USA (security-related papers only).
conference information).
- GLOBECOM'95, IEEE 1995 Global
Telecommunications Conference, Westin Stamford & Westin Plaza, Singapore,
November 13-17 1995 (security-related papers only;
conference information).
- Internet Society 1996 Symposium on
Network and Distributed System Security (NDSS '96), San Diego, CA,
22-23 February 1996.
- Twelfth Int. Conf. on Data Engineering (ICDE), New Orleans, LA,
26 Feb. - 1 March 1996, (security related paper only):
Secure mediated databases.
K.S. Candan, Sushil Jajodia and V.S. Subrahmanian.
- Workshop on Formal Methods in Software Practice (FMSP '96), San Diego,
CA, 10-11 January, 1996 (security related paper only):
A framework for specification and verification of information flow security
policies.
R. V. Puri and W. A. Wulf
- Eighteenth National Information System
Security Conference, Baltimore, MD, 13-16 October, 1995.
- Int'l Conf. on
Information Systems and Management of Data (CISMOD) 1995 , 14-17 November,
Bombay, India (security-related paper only):
Maintaining Surrogate Data for Query Acceleration in Multilevel
Secure Database Systems
B. Panda and W. Perrizo
- Fifth IFIP Working Conference on
Dependable Computing for Critical Applications, September 25-27,
Urbana-Champaign, IL (security related papers only).
- Third ACM Conference on Computer and
Communications Security, 14-16 March 1996, New Delhi, India.
For participation information, contact General co-Chairs Ravi Ganesan (BF4GRJC@baplaza.bell-atl.com) or Ravi Sandhu
(sandhu@isse.gmu.edu),
or visit web site.
-
Communications and Multimedia Security (IT - Sicherheit[Security] '95),
Graz, Austria, 20-21 September, 1995.
- New Security Paradigms '95 Workshop
La Jolla, California, 22-25 August, 1995.
- Fourteenth Int'l. Conf. on Object-oriented & Entity Relationship
Modelling, Gold Coast, Queensland, Australia, 13-15 December 1995,
(security-related papers only):
Cryptographic mechanism for object-Instance-based authorization in
object-oriented database systems.
A Baraani-Bastjerdi, J Pieprzyk, R Safavi-Naini, and J Getta.
SEER: Security Enhanced Entity-Relationship Model
for Modeling and Integrating Secure Database
Environments
Y. Oh, B. Navathe (Georgia Institute of Technology, USA)
- 11th ACSAC Eleventh Annual
Computer Security Applications Conference, New Orleans, December 11-15,1995
- 4th International Conference on Computer
Communications and Networks, Las Vegas, September 20-23, 1995
(security-related papers only); full program
and registration info
- IFIP WG 11.3 Ninth
Working Conference on Database Security, Renssalaerville, New York, August 13-16, 1995
- CRYPTO '95,
IACR's US Workshop, Santa Barbara, California, August 27-31, 1995
- 5th USENIX UNIX Security Symposium, Salt Lake City, Utah, June 5-7, 1995
- Eurocrypt '95,
IACR's European workshop, St. Malo, France, May 22-25, 1995
- COMPASS '95,
10th Annual IEEE Conference on COMPuter ASSurance (COMPASS), NIST,
Gaithersburg, MD, June 26-28, 1995.Details.
- INET '95,
Internet Society Fifth Annual Meeting, Honolulu, Hawaii, June 26-30, 1995
- CSFW-8, Eighth
Computer Security Foundations Workshop, Kenmare, County Kerry, Ireland,
June 13-15, 1995
- 1995 IEEE S&P, 1995 IEEE
Symposium on Research in Security and Privacy, Oakland, CA, May 8-10, 1995
- IFIP/SEC '95, Eleventh
International Information Security Conference, 9-12 May, Capetown, South Africa
- ICS '94,
1994 International Computer Symposium (ICS '94), National Chiao Tung
University, Taiwan, Dec 12-15, 1994
- 6th ADC and 18th ACSC,
security-related papers from the 6th Australasian Database Conference and the
18th Australasian Computer Science Conference, Adelaide, Australia,
Jan 30-Feb. 3, 1995
- ISOC-95, Internet
Society 1995 Symposium on Network and Distributed System Security,
San Diego, CA, February 16-17, 1995
- ACSAC-10, 10th Annual Computer
Security Applications Conference, Orlando, Dec. 5-9, 1994
- ESORICS-94-10, European
Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994
- CCS-2, Second ACM Conference
on Computer and Communications Security, Fairfax, VA, November 2-4, 1994
- IFIP 8th WCDS, Eighth IFIP
Working Group 11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany,
August 23-26, 1994
on Computer and Communications Security, Fairfax, VA, November 2-4, 1994
- CSFW-7, Seventh Computer Security
Foundations Workshop, Franconia, NH, June 14-16, 1994
- 1994 IEEE S&P, 1994 IEEE Symposium
on Research in Security and Privacy, Oakland, CA, May 16-18, 1994