The Community for Technology Leaders
Computer Security Applications Conference, Annual (1996)
San Diego California
Dec. 9, 1996 to Dec. 13, 1996
ISSN: 1063-9527
ISBN: 0-8186-7606-X
TABLE OF CONTENTS

Reviewers (PDF)

pp. xx
Security Engineering

An Evaluation of the Java Security Model (Abstract)

A. Sterbenz , Graz Univ. of Technol., Austria
pp. 2

An Authenticated Camera (Abstract)

J. Kelsey , Counterpane Syst., Minneapolis, MN, USA
B. Schneier , Counterpane Syst., Minneapolis, MN, USA
C. Hall , Counterpane Syst., Minneapolis, MN, USA
pp. 24
Secure Links

A Case Study Of Two Nrl Pump Prototypes (Abstract)

J.J. Parsonese , Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
B.E. Montrose , Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
I.S. Moskowitz , Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
M.H. Kang , Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
pp. 32

Asymmetric Isolation (Abstract)

J.A. Davidson , Norex Co., San Diego, CA, USA
pp. 44

Starlight: Interactive Link (Abstract)

R. Milner , Div. of Inf. Technol., Defence Sci. & Technol. Organ., Salisbury, SA, Australia
K. Yiu , Div. of Inf. Technol., Defence Sci. & Technol. Organ., Salisbury, SA, Australia
J. Griffin , Div. of Inf. Technol., Defence Sci. & Technol. Organ., Salisbury, SA, Australia
M. Anderson , Div. of Inf. Technol., Defence Sci. & Technol. Organ., Salisbury, SA, Australia
C. North , Div. of Inf. Technol., Defence Sci. & Technol. Organ., Salisbury, SA, Australia
J. Yesberg , Div. of Inf. Technol., Defence Sci. & Technol. Organ., Salisbury, SA, Australia
pp. 55
Forum: Alternate Assurance Working Group
Forum: SSE-CMM Pilot Results
Electronic Payment

On The Design Of Secure Electronic Payment Schemes For Internet (Abstract)

V. Varadharajan , Distributed Syst. & Network Security Res. Unit, Univ. of W. Sydney, Kingswood, NSW, Australia
Yi Mu , Distributed Syst. & Network Security Res. Unit, Univ. of W. Sydney, Kingswood, NSW, Australia
pp. 78

Innovative Secure Payments On The Internet Using The German Electronic Purse (Abstract)

G. Enste , IT-Security Branch, debis Systemhaus GEI, Bonn, Germany
B. Nebelung , IT-Security Branch, debis Systemhaus GEI, Bonn, Germany
B. Althen , IT-Security Branch, debis Systemhaus GEI, Bonn, Germany
pp. 88
Cryptographic Protocols

Proxies For Anonymous Routing (Abstract)

D.M. Goldschlag , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
M.G. Reed , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
P.F. Syverson , Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 95

Design Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems (Abstract)

V. Varadharajan , Basser Dept. of Comput. Sci., Sydney Univ., NSW, Australia
M. Hitchens , Basser Dept. of Comput. Sci., Sydney Univ., NSW, Australia
pp. 105

Verifying The Correctness Of Cryptographic Protocols Using "Convince" (Abstract)

G.L. Hammonds , Hughes Tech. Services Co., Fullerton, CA, USA
R.W. Lichota , Hughes Tech. Services Co., Fullerton, CA, USA
S.H. Brackin , Hughes Tech. Services Co., Fullerton, CA, USA
pp. 117

Security Issues In An Edi Environment (Abstract)

N. Zhang , Dept. of Comput., Manchester Metropolitan Univ., UK
Q. Shi , Dept. of Comput., Manchester Metropolitan Univ., UK
pp. 129
Forum: Security and the National Telecommunications Infrastructure
Security Architecture

Using Fortezza For Transparent File Encryption (Abstract)

T. Williams , Cordant Inc., Reston, VA, USA
J. Epstein , Cordant Inc., Reston, VA, USA
pp. 140

An Extended Capability Architecture To Enforce Dynamic Access Control Policies (Abstract)

I-Lung Kao , Distributed Syst. Services, IBM Corp., Austin, TX, USA
R. Chow , Distributed Syst. Services, IBM Corp., Austin, TX, USA
pp. 148

SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems (Abstract)

E.J. Sebes , Trusted Inf. Syst. Inc., Mountain View, CA, USA
T.C. Vickers Benzel , Trusted Inf. Syst. Inc., Mountain View, CA, USA
pp. 158
Firewalls

Mandatory Protection for Internet Server Software (Abstract)

R.E. Smith , Secure Comput. Corp., Roseville, MN, USA
pp. 178
Data Base Security

A Role-Based Secure Database Design Tool (Abstract)

P. Iglio , Fondazione Ugo Bordoni, Rome, Italy
L. Giuri , Fondazione Ugo Bordoni, Rome, Italy
pp. 203
Assurance

Case-Based Reasoning for Intrusion Detection (Abstract)

M. Esmaili , Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
R. Safavi-Naini , Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
B. Balachandran , Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
J. Pieprzyk , Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
pp. 214

A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/ (Abstract)

T. Taylor , Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
R.A. Kemmerer , Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
pp. 224

Formal Techniques for an ITSEC-E4 Secure Gateway (Abstract)

P. Bieber , ONERA-CERT, Toulouse, France
pp. 236
Panel: Major Questions in Applying the SSE-CMM

Index of Authors (PDF)

pp. 249
91 ms
(Ver )