The Community for Technology Leaders
Network and Distributed System Security, Symposium on (1995)
San Diego, California
Feb. 16, 1995 to Feb. 17, 1995
ISBN: 0-8186-7027-4
TABLE OF CONTENTS

PSRG Members (PDF)

pp. x
Session 1 - Diverse Approaches to Security at the Network Layer: Chair: Stephen T. Kent - Bolt, Beranek and Newman, USA

Multicast-specific security threats and counter-measures (Abstract)

J. Crowcroft , Dept. of Comput. Sci., Univ. Coll. London, UK
T. Ballardie , Dept. of Comput. Sci., Univ. Coll. London, UK
pp. 2

Design of a key agile cryptographic system for OC-12c rate ATM (Abstract)

D. Stevenson , MCNC, Research Triangle Park, NC, USA
Fengmin Gong , MCNC, Research Triangle Park, NC, USA
G. Byrd , MCNC, Research Triangle Park, NC, USA
N. Hillery , MCNC, Research Triangle Park, NC, USA
D. Winkelstein , MCNC, Research Triangle Park, NC, USA
pp. 17

IpAccess-an Internet service access system for firewall installations (Abstract)

S. Stempel , European Inst. for Syst. Security, Karlsruhe Univ., Germany
pp. 31
Session 2 - Panel
Session 3 - Off-Line Object Distribution Security: Chair: Jeffrey I. Schiller - Massachusetts Institute of Technology, USA

Trusted distribution of software over the Internet (Abstract)

A.D. Rubin , Bellcore, Morristown, NJ, USA
pp. 47

Location-independent information object security (Abstract)

J. Lowry , Bolt Beranek & Newman Inc., Cambridge, MA, USA
pp. 54
Session 4 - Internet Payments: Chair: Ravi Ganesan -Bell Atlantic, USA

Electronic cash on the Internet (Abstract)

S. Brands , Centrum voor Wiskunde en Inf., Amsterdam, Netherlands
pp. 64
Session 5 - Security Monitoring Tools: Practice and Experience: Chair: Michael St. Johns -Advanced Research Projects Agency, USA

NERD: Network Event Recording Device: an automated system for network anomaly detection and notification (Abstract)

D.G. Simmons , Network Eng., Los Alamos Nat. Lab., NM, USA
R. Wilkins , Network Eng., Los Alamos Nat. Lab., NM, USA
pp. 87

An overview of SNIF: a tool for Surveying Network Information Flow (Abstract)

J. Alves-Foss , Dept. of Comput. Sci., Idaho Univ., Moscow, ID, USA
pp. 94

Distributed audit trail analysis (Abstract)

D. Zampunieris , Inst. d'Inf., Facultes Univ. Notre-Dame de la Paix, Namur, Belgium
A. Mounji , Inst. d'Inf., Facultes Univ. Notre-Dame de la Paix, Namur, Belgium
N. Habra , Inst. d'Inf., Facultes Univ. Notre-Dame de la Paix, Namur, Belgium
B. Le Charlier , Inst. d'Inf., Facultes Univ. Notre-Dame de la Paix, Namur, Belgium
pp. 102
Session 6 - Authentication and Authorization: Chair: B. Clifford Neuman - Information Sciences Institute, USA

Yaksha: augmenting Kerberos with public key cryptography (Abstract)

R. Ganesan , Center of Excellence for Electron. Commerce, Bell Atlantic, Silver Spring, MD, USA
pp. 132

GSS-API security for ONC RPC (Abstract)

B. Jaspan , OpenVision Technol. Inc., Cambridge, MA, USA
pp. 144
Session 7 - Mechanisms of Identity: The Certificate Infrastructure: Chair: Hilarie Orman - University of Arizona, USA

A Certificate Management System: structure, functions and protocols (Abstract)

N. Kapidzic , Dept. of Comput. & Syst. Sci., Stockholm Univ., Sweden
A. Davidson , Dept. of Comput. & Syst. Sci., Stockholm Univ., Sweden
pp. 153

A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust model (Abstract)

C. Huitema , R&D Center, TS-E3X, Sophia Antipolis, France
S. Mendes , R&D Center, TS-E3X, Sophia Antipolis, France
pp. 172

Author Index (PDF)

pp. 192
96 ms
(Ver 3.1 (10032016))