Papers to be presented at the 12th Annual Computer Security Applications
Conference
December 9-13, 1996, San Diego, CA
- Keynote Speaker, Jim Flyzik, Dept. of Treasury
- Distinguished Lecture, Dr. Roger Schell, Novell, Inc.
-
An Evaluation of the JAVA Security Model,
Andreas Sterbenz, University of Graz, Austria
-
Implementing Security Policy in a Large Defense Procurement,
Michael Nash, Gamma Secure Systems, UK; Ronald Kennett, Royal Air
Force, UK
-
An Authenticated Camera,
John Kelsey, Bruce Schneier and Chris Hall, Counterpane Systems 10:30 Forum: SSE-CMM
-
A Case Study of Two NRL Pump Prototypes,
Myong Kang, Ira Moskowitz, Bruce Montrose and James Parsonese, Naval
Research Laboratory
-
Asymmetric Isolation,
John Davidson, Norex
-
Starlight: Interactive Link,
M. Anderson, C. North, J. Griffin, R. Milner, J. Yesberg and K. Yiu,
-
Security Measures for the Austrian "PAYCHIP" Electronic Purse Application,
Manfred Holzbach, STUZZA, Austria
-
Design of a Secure Electronic Payment System for the Internet,
Vijay Varadharajan, University of Western Sydney, Australia, and Micheal
Hitchens, Sydney University, Australia
-
Innovative Secure Payments on the Internet Using the German Electronic Purse,
Brigitte Althen, Brigitte Nebelung and Gerd Enste, debis Systemhaus GEI
-
Proxies for Anonymous Routing,
Michael Reed, Paul Syverson and David Goldschlag, Naval Research Laboratory
-
Design Choices for Symmetric Key Based Inter-Domain Protocols for
Distributed Systems,
Vijay Varadharajan, University of West Sydney, Australia and Micheal
Hitchens, Sydney University, Australia
-
Verifying the Correctness of Cryptographic Protocols Using "Convince",
Randall Lichota, Hughes Technical Services; Steve Brackin, Arca Systems;
Grace Hammonds, AGCS
-
Security Issues in an EDI Environment,
N. Zhang, Manchester Metro University; Q. Shi, Liverpool J.M. University
-
Using FORTEZZA for Transparent File Encryption,
Jeremy Epstein, Cordant; Tim Williams, General Kinetics
-
An Extended Capabilities Architecture to Enforce Dynamic Access Control Policies,I-Lung Kao, IBM; Randy Chow, University of Florida
-
Sigma: Security for Distributed Object Interoperability between Trusted and Untrusted Systems,
John Sebes and Terry Vickers-Benzel, Trusted Information Systems
-
Operation Chain Link,
Julie Connolly, The MITRE Corporation
-
Mandatory Protection for Internet Server Software,
Richard Smith, Secure Computing Corporation
-
Using a Proxy X Server to Facilitate COTS Application Integration,
Eric Kaydan, The MITRE Corporation 1:30 Web Technologies
-
A Comparison of Multilevel Structured Query language (SQL) Implementations,
Rae Burns, AGCS; Yi-Fang Koh, Raytheon
-
A Role-Based Secure Database Design Tool,
Luigi Giuri and Pietro Iglio, Fondazione Ugo Bordoni, Italy
-
Case-Based Reasoning for Intrusion Detection,
Mansour Esmaili, Bala Balachandran, Rei Safavi-Naini and Josef Pieprzyk,
University of Wollongong, Australia
-
A Modular Covert Channel Analysis Methodology for Trusted DG/UX,
Richard Kemmerer, University of California, Santa Barbara; Charlie Martin
and Tad Taylor, Data General
-
Formal Techniques for an ITSEC-E4 Secure Gateway,
Pierre Bieber, CERT-ONERA, France