Special 20th Anniversary Program May 9-12, 1999 The Claremont Resort Berkeley, California |
||
In cooperation with the International Association of Cryptologic Research Symposium Committee: John McLean, General Chair Jonathan Millen, Vice Chair Li Gong, Program Co-Chair Michael Reiter, Program Co-Chair FINAL PROGRAM |
5:00 - 7:00pm | Registration
6:00 - 7:00pm | Reception | |
8:00 - | Registration |
8:45 - 9:00 | Welcome: Chairs |
9:00 - 10:30 | Systems Session Chair: Roger Needham, Microsoft Research Hardening COTS software with generic software wrappers Timothy Fraser, Lee Badger, Mark Feldman TIS Labs at Network Associates, Inc. Firmato: A novel firewall management toolkit Yair Bartal, Alain Mayer, Kobbi Nissim, Avishai Wool Lucent Bell Labs Flexible policy-directed code safety PDF, Gzipped PS, Slides (Slides require JavaScript enabled browser) David Evans, Andrew Twyman MIT |
10:30 - 11:00 | Coffee Break |
11:00 - 12:00 | Policy Session Chair: Ravi Sandhu, George Mason University Local reconfiguration policies Jonathan K. Millen SRI International A modular, user-centered authorization service built on an RBAC foundation Homepage , PDF , Slides (PPT) Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo Iris Associates, EMC, Groove Networks |
12:00 - 2:00 | Lunch |
2:00 - 3:00 | Verification Session Chair: John Mitchell, Stanford University Secure communications processing for distributed languages Martin Abadi, Cedric Fournet, Georges Gonthier Compaq Systems Research Center, Microsoft Research, and INRIA Verification of control flow based security policies T. Jensen, D. Le Metayer, T. Thorn IRISA |
3:00 - 3:30 | Coffee Break |
3:30 - 5:00 | Panel Discussion: Brief History of Twenty Years of Computer Security Research Panel Chair: Teresa Lunt, Xerox PARC Panelists:
|
8:00 - 9:00 | Poster Session |
9:00 - 10:30 | Intrusion Detection Session Chair: Cynthia Irvine, Naval Postgraduate School A data mining framework for building intrusion detection models Wenke Lee, Sal Stolfo, Kui Mok Columbia University Detecting intrusions using system calls: Alternative data models Christina Warrender, Stephanie Forrest, Barak Pearlmutter University of New Mexico Detecting computer and network misuse through the production-based expert system toolset (P-BEST) Ulf Lindqvist, Phillip A. Porras Chalmers University of Technology, SRI International |
10:30 - 11:00 | Coffee Break |
11:00 - 12:30 | Panel Discussion: Near Misses and Hidden Treasures in Early Computer Security Research Panel Chair: Stan Ames, MITRE Panelists:
|
12:30 - 2:00 | Lunch |
2:00 - 3:30 | Information Flow Session Chair: John McHugh, Portland State University A multi-threading architecture for multilevel secure transaction processing HTML publication list, PDF via FTP, Compressed PS via FTP Haruna Isa, William R. Shockley, Cynthia E. Irvine U.S. Navy, Cyberscape Computer Services, and Naval Postgraduate School Specification and enforcement of classification and inference constraints, (Slides) Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati SRI International and University of Milan A test for non-disclosure in security level translations David Rosenthal, Francis Fung Odyssey Research Associates |
3:30 - 4:00 | Coffee Break |
4:00 - 5:30 | Work-In-Progress: 5-Minute Talks (see below for details) Session Chair: Heather Hinton, Ryerson Polytechnic University |
6:00 - 7:00 | IEEE Security and Privacy Technical Committee meeting (open to all conference attendees) |
8:00 - 9:00 | Poster Session |
9:00 - 10:00 | Authentication and Key Exchange Session Chair: Dieter Gollmann, Microsoft Research Software smart cards via cryptographic camouflage , PS of paper , PDF of paper , PS of slides , PDF of slides D. Hoover, B. N. Kausik Arcot Systems Analysis of the internet key exchange protocol using the NRL protocol analyzer PS, PDF Catherine Meadows, Naval Research Laboratory |
10:00 - 10:30 | Coffee Break |
10:30 - 12:15 | Panel Discussion: Time Capsule -- Twenty Years From Now Panel Chair: Jim Anderson Panelists:
|
12:15 | Conference Adjourns |
A continuing feature of the symposium was a session of 5-minute talks. Abstracts of these talks were distributed at the Symposium. Below are the titles for this session.