To become a USENIX Member, please see our Membership Information.
The 8th USENIX Security Symposium
August 23-26, 1999
Washington, D.C., USA
REFEREED PAPERS TRACK
Wednesday, August 25
PDAs
Session Chair: Jim Duncan, Cisco Systems, Inc.
The Design and Analysis of Graphical Passwords
Ian Jermyn, New York University; Alain Mayer, Fabian Monrose, and Michael K. Reiter, Bell Labs, Lucent Technologies; Aviel D. Rubin, AT&T Labs--Research
Hand-Held Computers Can Be Better Smart Cards
Dirk Balfanz and Edward W. Felten, Princeton University
Offline Delegation
Arne Helme and Tage Stabell-Kulø, University of Tromsø, Norway
Cages
Session Chair: Crispin Cowan, Oregon Graduate Institute
Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating Systems
Tse-Huong Choo, Hewlett-Packard Laboratories, Bristol, U.K.
Enforcing Well-Formed and Partially Formed Transactions for UNIX
Dean Povey, Cooperative Research Centre for Enterprise Distributed Systems, Queensland University of Technology
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
R. Sekar and P. Uppuluri, State University of New York at Stony Brook
Keys
Session Chair: Carl Ellison, Intel Corporation
Building Intrusion-Tolerant Applications
Thomas Wu, Michael Malkin, and Dan Boneh, Stanford University
Brute Force Attack on UNIX Passwords with SIMD Computer
Gershon Kedem and Yuriko Ishihara, Duke University
Antigone: A Flexible Framework for Secure Group Communication
Patrick McDaniel, Atul Prakash, and Peter Honeyman, University of Michigan
Thursday, August 26
Potpourri
Session Chair: Trent Jaeger, IBM
A Secure Station for Network Monitoring and Control
Vassilis Prevelakis, Network Management Centre, University of Piraeus
The Flask Security Architecture: System Support for Diverse Security Policies
Ray Spencer, Secure Computing Corporation; Stephen Smalley and Peter Loscocco, National Security Agency; Mike Hibler, Dave Andersen, and Jay Lepreau, University of Utah
A Study in Using Neural Networks for Anomaly and Misuse Detection
Anup K. Ghosh and Aaron Schwartzbard, Reliable Software Technologies
Security Practicum
Session Chair: Wolfgang Ley, Sun Microsystems
The Design of a Cryptographic Security Architecture
Peter Gutmann, University of Auckland
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
Alma Whitten, Carnegie Mellon University; J. D. Tygar, University of California at Berkeley
Jonah: Experience Implementing PKIX Reference Freeware
Mary Ellen Zurko and John Wray, Iris Associates; Ian Morrison, IBM; Mike Shanzer, Iris Associates; Mike Crane, IBM; Pat Booth, Lotus; Ellen McDermott, IBM; Warren Macek, Iris Associates; Ann Graham, Jim Wade, and Tom Sandlin, IBM
Access Control
Session Chair: Christoph Schuba, Sun Microsystems Laboratories
Scalable Access Control for Distributed Object Systems
Daniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, and Pierre X. Pasturel, NAI Labs, Network Associates, Inc.; E. John Sebes, Kroll-O'Gara Information Security Group
Certificate-based Access Control for Widely Distributed Resources
Mary Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, and Abdelilah Essiari, Lawrence Berkeley National Laboratory
Digital-Ticket-Controlled Digital Ticket Circulation
Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, and Jun Sekine, NTT Information Sharing Platform Laboratories