Wednesday, January 28 - Thursday, January 29 Symposium Speakers | |
Technical Program Thursday, January 29, 1998 |
---|
8:30am - 10:00am | ||
REFEREED PAPERS TRACK
Distributed Systems Session Chair: Hilarie Orman, DARPA/ITO
Unified Support for Heterogeneous Security Policies in Distributed Systems
Operating System Protection for Fine-Grained Programs
Expanding and Extending the Security Features of Java
|
INVITED TALKS TRACK
Elliptic Curves - Ready for Prime Time Alfred Menezes, Auburn University In this talk I will give a quick introduction to elliptic curve cryptosystems, discuss their advantages, mention recent work done on studying their security, and some of the implementations being done.
| |
10:00am - 10:30am Break
| ||
10:30am - Noon | ||
REFEREED PAPERS TRACK
World Wide Web Security Session Chair: Diane Coe, Concept5 Technologies
Towards Web Security Using PLASMA
Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies
Finite-State Analysis of SSL 3.0
|
INVITED TALKS TRACK
Securing Electronic Commerce: Applied Computer Security or Just Common Sense Clifford Neuman, University of Southern California Internet commerce has made security critical and organizations finally recognize the need to provide security. Because electronic commerce often involves access to privileged data by customers, it is harder to secure these applications than traditional ones. Authentication, authorization, and encryption can be used to secure computers and communication channels, but there will always be vulnerabilities at the end points; attackers will break into the service provider's and end user's systems to steal or modify data. Once these basic security techniques have been applied, the greatest improvements in security can be obtained through the common sense technique of partitioning protected data so that authoritative and highly sensitive data is stored on computers that aren't directly connected to the internet. In this talk Dr. Neuman will describe the application of distributed system security techniques and data partitioning to the development electronic commerce applications.
| |
Noon - 1:30pm Lunch (on your own)
| ||
1:30pm - 3:00pm | ||
REFEREED PAPERS TRACK
Cryptography Session Chair: Carlisle Adams, Nortel
Certificate Revocation and Certificate Update
Attack-Resistant Trust Metrics for Public Key Certification
Software Generation of Practically Strong Random Numbers
|
INVITED TALKS TRACK
Real World Security Practices JoAnn Perry, Independent Consultant, and Shabbir Safdar, Goldman, Sachs & Co. You have completed testing and are ready to recommend the implementation of a near-perfect technical solution to a control issue in your company. How confident are you that your management will allocate the dollars and manpower for your project? Will management support the implementation with the end users? Effective security controls must meet business objectives. We will discuss how we have successfully achieved this. You will learn ways to form a close alliance with management and key people to assure that security objectives are met and supported.
| |
3:00pm - 3:30pm Break
|
3:30pm - 5:00pm |
JOINT SESSION
Work-In-Progress Reports (WIPs) The Works-In-Progress session will consist of five minute presentations. Speakers should submit a one or two paragraph abstract to sec98wips@usenix.org by January 15. Please include your name, affiliation, and the title of your talk. Please note this is a change from the original instructions in the Call for Papers. A schedule of presentations will be posted at the conference by Noon on January 29. Experience at other conferences has shown that most submissions are usually accepted. The five minute time limit will be strictly enforced.
|
Wednesday, January 28 - Thursday, January 29 Symposium Speakers |
| ||
|
Symposium Index Events Calendar USENIX home |