The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1997)
Oakland, CA
May 4, 1997 to May 7, 1997
ISSN: 1540-7993
ISBN: 0-8186-7828-3
TABLE OF CONTENTS
Panel/Debate

Some weaknesses of the TCB model (Abstract)

D.M. Kienzle , Int. Bus. Machines Corp., Austin, TX, USA
B. Blakley , Int. Bus. Machines Corp., Austin, TX, USA
pp. 0003
Authorization and Authentication

Toward acceptable metrics of authentication (Abstract)

M.K. Reiter , Res. Labs., AT&T Bell Labs., Murray Hill, NJ, USA
S.G. Stubblebine , Res. Labs., AT&T Bell Labs., Murray Hill, NJ, USA
pp. 0010

An Authorization Scheme For Distributed Object Systems (Abstract)

V. Nicomette , LAAS-CNRS & INRIA
Y. Deswarte , LAAS-CNRS & INRIA
pp. 0021

A Logical Language for Expressing Authorizations (Abstract)

Pierangela Samarati , Universita di Milano
Sushil Jajodia , George Mason University
V. S. Subrahmanian , University of Maryland
pp. 0031
Applications

Anonymous Connections and Onion Routing (Abstract)

David M. Goldschlag , Naval Research Laboratory
Michael G. Reed , Naval Research Laboratory
Paul F. Syverson , Naval Research Laboratory
pp. 0044

The design and implementation of a multilevel secure log manager (Abstract)

V.R. Pesati , Oracle Corp., Redwood Shores, CA, USA
S. Pal , Oracle Corp., Redwood Shores, CA, USA
T.E. Keefe , Oracle Corp., Redwood Shores, CA, USA
pp. 0055

A secure and reliable bootstrap architecture (Abstract)

J.M. Smith , Distributed Syst. Lab., Pennsylvania Univ., Philadelphia, PA, USA
D.J. Farber , Distributed Syst. Lab., Pennsylvania Univ., Philadelphia, PA, USA
W.A. Arbaugh , Distributed Syst. Lab., Pennsylvania Univ., Philadelphia, PA, USA
pp. 0065

An MBone Proxy for an Application Gateway Firewall (Abstract)

Daniel F. Sterne , Trusted Information Systems, Inc.
Kelly Djahandari , Trusted Information Systems, Inc.
pp. 0072
Security Theory

Secure software architectures (Abstract)

Xiaolei Qian , Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA
Li Gong , Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA
R.A. Riemenschneider , Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA
M. Moriconi , Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA
pp. 0084

A general theory of security properties (Abstract)

E.S. Lee , Comput. Lab., Cambridge Univ., UK
A. Zakinthinos , Comput. Lab., Cambridge Univ., UK
pp. 0094

Analyzing consistency of security policies (Abstract)

L. Cholvy , ONERA-CERT, Toulouse, France
F. Cuppens , ONERA-CERT, Toulouse, France
pp. 0103
Moderator: Marvin Schaefer, Arca Systems

Ensuring assurance in mobile computing (Abstract)

D. Dean , Arca Syst., USA
M. Schaefer , Arca Syst., USA
J. Roskind , Arca Syst., USA
B. Fox , Arca Syst., USA
S. Pinsky , Arca Syst., USA
Li Gong , Arca Syst., USA
pp. 0114
Architectures

Filtering postures: local enforcement for global policies (Abstract)

J.D. Guttman , Mitre Corp., Bedford, MA, US
pp. 0120

Providing flexibility in information flow control for object oriented systems (Abstract)

P. Samarati , Dipartimento di Sci. dell'Inf., Milan Univ., Italy
E. Ferrari , Dipartimento di Sci. dell'Inf., Milan Univ., Italy
E. Bertino , Dipartimento di Sci. dell'Inf., Milan Univ., Italy
S. Jajodia , Dipartimento di Sci. dell'Inf., Milan Univ., Italy
pp. 0130

Automated analysis of cryptographic protocols using Mur/spl phi/ (Abstract)

M. Mitchell , Dept. of Comput. Sci., Stanford Univ., CA, USA
U. Stern , Dept. of Comput. Sci., Stanford Univ., CA, USA
J.C. Mitchell , Dept. of Comput. Sci., Stanford Univ., CA, USA
pp. 0141
Intrusion Detection and Beyond

How to Systematically Classify Computer Security Intrusions (Abstract)

Ulf Lindqvist , Chalmers University of Technology
Erland Jonsson , Chalmers University of Technology
pp. 0154

Surviving information warfare attacks on databases (Abstract)

P. Ammann , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
C.D. McCollum , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
B.T. Blaustein , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
S. Jajodia , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
pp. 0164

Execution monitoring of security-critical programs in distributed systems: a Specification-based approach (Abstract)

K. Levitt , Trusted Inf. Syst. Inc., Mountain View, CA, USA
M. Ruschitzka , Trusted Inf. Syst. Inc., Mountain View, CA, USA
C. Ko , Trusted Inf. Syst. Inc., Mountain View, CA, USA
pp. 0175
Panel: Security in Innovative New Operating Systems

Escort: securing Scout paths (PDF)

O. Spatscheck , Dept. of Comput. Sci., Arizona Univ., Tucson, AZ, USA
L. Peterson , Dept. of Comput. Sci., Arizona Univ., Tucson, AZ, USA
pp. 0206
System Vulnerabilities

Deniable password snatching: on the possibility of evasive electronic espionage (Abstract)

A. Young , Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
Moti Yung , Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
pp. 0224

Number theoretic attacks on secure password schemes (Abstract)

S. Patel , Math. & Cryptography Res. Group, Bellcore, Morristown, NJ, USA
pp. 0236

Author Index (PDF)

pp. 0249
107 ms
(Ver 3.1 (10032016))