USENIX Technical Program - 7th USENIX Security Symposium,
1998
7th USENIX Security Symposium, 1998
January 26-29, 1998
San Antonio, Texas, USA
Wednesday, January 28
- Opening Remarks
- Avi Rubin, AT&T Labs - Research
- Keynote Address - Security Lessons From All Over
- Bill Cheswick, Lucent Technologies, Bell Labs
Architecture
- A Comparison of Methods for Implementing Adaptive Security Policies
- Michael Carney and Brian Loe, Secure Computing Corporation
- The CRISIS Wide Area Security Architecture
- Eshwar Belani and Amin Vahdat, University of California, Berkeley; Thomas Anderson, University of Washington, Seattle; Michael Dahlin, University of Texas, Austin
Intrusion Detection
- Bro: A System for Detecting Network Intruders in Real-Time
- Vern Paxson, Lawrence Berkeley National Laboratory
("Best Paper" award!)
- Cryptographic Support for Secure Logs on Untrusted Machines
- Bruce Schneier and John Kelsey, Counterpane Systems
- StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
- Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve
Beattie, Aaron Grier, Perry Wagle, and Qian Zhang, Oregon Graduate Institute of Science & Technology; Heather Hinton, Ryerson Polytechnic University
- Data Mining Approaches for Intrusion Detection
- Wenke Lee and Salvatore J. Stolfo, Columbia University
Network Security
- Securing 'Classical IP Over ATM Networks'
- Carsten Benecke and Uwe Ellermann, Universität Hamburg
- A Java Beans Component Architecture for Cryptographic Protocols
- Pekka Nikander and Arto Karila, Helsinki University of Technology
- Secure Videoconferencing
- Peter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, and Jim Rees, University of Michigan, Ann Arbor
Thursday, January 29
Distributed Systems
- Unified Support for Heterogeneous Security Policies in Distributed Systems
- Naftaly H. Minsky and Victoria Ungureanu, Rutgers University
- Operating System Protection for Fine-Grained Programs
- Trent Jaeger, Jochen Liedtke, and Nayeem Islam, IBM T.J. Watson Research Center
- Expanding and Extending the Security Features of Java
- Nimisha V. Mehta, The Open Group; Karen R. Sollins, MIT Laboratory for Computer Science
Invited Talk
- Elliptic Curves - Ready for Prime Time
- Alfred Menezes, Auburn University
Slides Paper
World Wide Web Security
- Towards Web Security Using PLASMA
- Annette Krannig, Fraunhofern-Institute for Computer Graphics IGD
- Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies
- Vinod Anupam and Alain Mayer, Bell Laboratories, Lucent Technologies
- Finite-State Analysis of SSL 3.0
- John C. Mitchell, Vitaly Shmatikov, and Ulrich Stern, Stanford University
Cryptography
- Certificate Revocation and Certificate Update
- Moni Naor and Kobbi Nissim, Weizmann Institute of Science
("Best Student Paper" award)
- Attack-Resistant Trust Metrics for Public Key Certification
- Raph Levien and Alex Aiken, University of California, Berkeley
- Software Generation of Practically Strong Random Numbers
- Peter Gutmann, University of Auckland
|