Check out the new USENIX Web site.

Home About USENIX Events Membership Publications Students
USENIX Technical Program - Security 99

To become a USENIX Member, please see our Membership Information.

The 8th USENIX Security Symposium
August 23-26, 1999
Washington, D.C., USA


Wednesday, August 25

Session Chair: Jim Duncan, Cisco Systems, Inc.

The Design and Analysis of Graphical Passwords
Ian Jermyn, New York University; Alain Mayer, Fabian Monrose, and Michael K. Reiter, Bell Labs, Lucent Technologies; Aviel D. Rubin, AT&T Labs--Research

Hand-Held Computers Can Be Better Smart Cards
Dirk Balfanz and Edward W. Felten, Princeton University

Offline Delegation
Arne Helme and Tage Stabell-Kulø, University of Tromsø, Norway

Session Chair: Crispin Cowan, Oregon Graduate Institute

Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating Systems
Tse-Huong Choo, Hewlett-Packard Laboratories, Bristol, U.K.

Enforcing Well-Formed and Partially Formed Transactions for UNIX
Dean Povey, Cooperative Research Centre for Enterprise Distributed Systems, Queensland University of Technology

Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
R. Sekar and P. Uppuluri, State University of New York at Stony Brook

Session Chair: Carl Ellison, Intel Corporation

Building Intrusion-Tolerant Applications
Thomas Wu, Michael Malkin, and Dan Boneh, Stanford University

Brute Force Attack on UNIX Passwords with SIMD Computer
Gershon Kedem and Yuriko Ishihara, Duke University

Antigone: A Flexible Framework for Secure Group Communication
Patrick McDaniel, Atul Prakash, and Peter Honeyman, University of Michigan

Thursday, August 26

Session Chair: Trent Jaeger, IBM

A Secure Station for Network Monitoring and Control
Vassilis Prevelakis, Network Management Centre, University of Piraeus

The Flask Security Architecture: System Support for Diverse Security Policies
Ray Spencer, Secure Computing Corporation; Stephen Smalley and Peter Loscocco, National Security Agency; Mike Hibler, Dave Andersen, and Jay Lepreau, University of Utah

A Study in Using Neural Networks for Anomaly and Misuse Detection
Anup K. Ghosh and Aaron Schwartzbard, Reliable Software Technologies

Security Practicum
Session Chair: Wolfgang Ley, Sun Microsystems

The Design of a Cryptographic Security Architecture
Peter Gutmann, University of Auckland

Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
Alma Whitten, Carnegie Mellon University; J. D. Tygar, University of California at Berkeley

Jonah: Experience Implementing PKIX Reference Freeware
Mary Ellen Zurko and John Wray, Iris Associates; Ian Morrison, IBM; Mike Shanzer, Iris Associates; Mike Crane, IBM; Pat Booth, Lotus; Ellen McDermott, IBM; Warren Macek, Iris Associates; Ann Graham, Jim Wade, and Tom Sandlin, IBM

Access Control
Session Chair: Christoph Schuba, Sun Microsystems Laboratories

Scalable Access Control for Distributed Object Systems
Daniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, and Pierre X. Pasturel, NAI Labs, Network Associates, Inc.; E. John Sebes, Kroll-O'Gara Information Security Group

Certificate-based Access Control for Widely Distributed Resources
Mary Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, and Abdelilah Essiari, Lawrence Berkeley National Laboratory

Digital-Ticket-Controlled Digital Ticket Circulation
Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, and Jun Sekine, NTT Information Sharing Platform Laboratories

?Need help? Use our Contacts page.

Last changed: 26 Feb 2002 ml
Conference index