The Community for Technology Leaders
Computer Security Applications Conference, Annual (1997)
San Diego, CA
Dec. 8, 1997 to Dec. 12, 1997
ISBN: 0-8186-8274-4
TABLE OF CONTENTS

Micro-digital money for electronic commerce (Abstract)

Khanh Quoc Nguyen , Sch. of Comput. & IT, Univ. of Western Sydney, Kingswood, NSW, Australia
Yi Mu , Sch. of Comput. & IT, Univ. of Western Sydney, Kingswood, NSW, Australia
V. Varadharajan , Sch. of Comput. & IT, Univ. of Western Sydney, Kingswood, NSW, Australia
pp. 2

Secure and efficient digital coins (Abstract)

Khanh Quoc Nguyen , Sch. of Comput., Univ. of Western Sydney, Kingswood, NSW, Australia
Yi Mu , Sch. of Comput., Univ. of Western Sydney, Kingswood, NSW, Australia
V. Varadharajan , Sch. of Comput., Univ. of Western Sydney, Kingswood, NSW, Australia
pp. 9

The secure distribution of digital contents (Abstract)

E. von Faber , debis IT Security Services, Bonn, Germany
R. Hammelrath , debis IT Security Services, Bonn, Germany
F.-P. Heider , debis IT Security Services, Bonn, Germany
pp. 16

Simple assured bastion hosts (Abstract)

C. Cant , Defence Evaluation & Res. Agency, Malvern, UK
S. Wiseman , Defence Evaluation & Res. Agency, Malvern, UK
pp. 24

Kernel and shell based applications integrity assurance (Abstract)

G. Mohay , Fac. of Inf. Technol., Queensland Univ. of Technol., Brisbane, Qld., Australia
J. Zellers , Fac. of Inf. Technol., Queensland Univ. of Technol., Brisbane, Qld., Australia
pp. 34

Risk assessment for large heterogeneous systems (Abstract)

J.W. Freeman , Inf. Syst. Security Group, CTA Inc., Colorado Springs, CO, USA
T.C. Darr , Inf. Syst. Security Group, CTA Inc., Colorado Springs, CO, USA
R.B. Neely , Inf. Syst. Security Group, CTA Inc., Colorado Springs, CO, USA
pp. 44

Securing an object relational database (Abstract)

S. Lewis , Defence Evaluation & Res. Agency, Malvern, UK
S. Wiseman , Defence Evaluation & Res. Agency, Malvern, UK
pp. 59

Supporting secure canonical upgrade policies in multilevel secure object stores (Abstract)

S.N. Foley , Dept. of Comput. Sci., Univ. Coll. Cork, Ireland
pp. 69

Incremental assurance for multilevel applications (Abstract)

D. Thomsen , Secure Comput. Corp., Roseville, MN, USA
M. Denz , Secure Comput. Corp., Roseville, MN, USA
pp. 81

An efficient message authentication scheme for link state routing (Abstract)

S. Cheung , Dept. of Comput. Sci., California Univ., Davis, CA, USA
pp. 90

Detection and classification of TCP/IP network services (Abstract)

K.M.C. Tan , Dept. of Comput. Sci., Melbourne Univ., Parkville, Vic., Australia
B.S. Collie , Dept. of Comput. Sci., Melbourne Univ., Parkville, Vic., Australia
pp. 99

Achieving user privacy in mobile networks (Abstract)

B. Askwith , Distr. Multimedia Syst. Group, Liverpool John Moores Univ., UK
M. Merabti , Distr. Multimedia Syst. Group, Liverpool John Moores Univ., UK
Qi Shi , Distr. Multimedia Syst. Group, Liverpool John Moores Univ., UK
K. Whiteley , Distr. Multimedia Syst. Group, Liverpool John Moores Univ., UK
pp. 108

Domain and type enforcement firewalls (Abstract)

K.A. Oostendorp , Trusted Inf. Syst. Inc., Glenwood, MD, USA
L. Badger , Trusted Inf. Syst. Inc., Glenwood, MD, USA
C.D. Vance , Trusted Inf. Syst. Inc., Glenwood, MD, USA
W.G. Morrison , Trusted Inf. Syst. Inc., Glenwood, MD, USA
M.J. Petkac , Trusted Inf. Syst. Inc., Glenwood, MD, USA
D.L. Sherman , Trusted Inf. Syst. Inc., Glenwood, MD, USA
D.F. Sterne , Trusted Inf. Syst. Inc., Glenwood, MD, USA
pp. 122

A reference model for firewall technology (Abstract)

C.L. Schuba , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
E.H. Spafford , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
pp. 133

Using type enforcement to assure a configurable guard (Abstract)

P. Greve , Secure Comput. Corp., Roseville, MN, USA
J. Hoffman , Secure Comput. Corp., Roseville, MN, USA
R.E. Smith , Secure Comput. Corp., Roseville, MN, USA
pp. 146

Implementing RBAC on a type enforced system (Abstract)

J. Hoffman , Secure Comput. Corp., Roseville, MN, USA
pp. 158

Lattice-based models for controlled sharing of confidential information in the Saudi Hajj system (Abstract)

T.F. Himdi , Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA
R.S. Sandhu , Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA
pp. 164

Using kernel hypervisors to secure applications (Abstract)

T. Mitchem , Secure Comput. Corp., Roseville, MN, USA
R. Lu , Secure Comput. Corp., Roseville, MN, USA
R. O'Brien , Secure Comput. Corp., Roseville, MN, USA
pp. 175

An architecture for multilevel secure interoperability (Abstract)

M.H. Kang , Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
J.N. Froscher , Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
I.S. Moskowitz , Div. of Inf. Technol., Naval Res. Lab., Washington, DC, USA
pp. 194

On the key recovery of the Key Escrow System (Abstract)

Yung-Cheng Lee , Dept. of Electr. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan
Chi-Sung Laih , Dept. of Electr. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan
pp. 216

Threshold and Generalized DSS Signatures Without a Trusted Party (Abstract)

Chih-Hung Wang , Inst. of Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan
Tzonelih Hwang , Inst. of Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan
pp. 221

An improved e-mail security protocol (Abstract)

B. Schneier , Counterpane Syst., Minneapolis, MN, USA
C. Hall , Counterpane Syst., Minneapolis, MN, USA
pp. 227

Remote electronic gambling (Abstract)

C. Hall , Counterpane Syst., Minneapolis, MN, USA
B. Schneier , Counterpane Syst., Minneapolis, MN, USA
pp. 232

Ethical responsibilities and legal liabilities of network security professionals (Abstract)

F.C. Smith , Rose, Kohl & Davenport Ltd., Santa Fe, NM, USA
pp. 239

PCASSO: applying and extending state-of-the-art security in the healthcare domain (Abstract)

D.B. Baker , Sci. Applications Int. Corp., USA
R.M. Barnhart , Sci. Applications Int. Corp., USA
T.T. Buss , Sci. Applications Int. Corp., USA
pp. 251

Doc, Wyatt, and Virgil: prototyping storage jamming defenses (Abstract)

J. McDermott , Center for High-Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
R. Gelinas , Center for High-Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
S. Ornstein , Center for High-Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
pp. 265

Protecting unattended computers without software (Abstract)

C.E. Landwehr , Naval Res. Lab., Washington, DC, USA
pp. 274

Index Of Authors (PDF)

pp. 288
98 ms
(Ver )