15th Annual Computer Security Applications Conference
December 6-10, 1999
Phoenix, Arizona

Technical Program

Thursday, December 9, 1999

8:30 Crypto
Chair: Dan Gambel, Mitretek Systems, USA

  • An Effective Defense Against First Party Attacks In Public-Key Algorithms, Stephen Matyas, Jr. & Allen Roginsky, IBM, USA
  • Towards A Practical, Secure, And Very Large Scale Online Election, Jared Karro & Jie Wang, Univ. of North Carolina at Greensboro, USA
  • Design of LAN-Lock, a System for Securing Wireless Networks, Richard Newman, Mark Hoyt, Phillipe Broccard, Tim Swanson, & Mark Sanders, Univ. of Florida, USA
  • Panel: Composition Problems of Component TOEs - Entrust, Oracle, and Windows NT/2000
    Chair: L. Ambuel, TRW, USA

  • M. Lai, Microsoft, USA
  • M. LaRoche, ENTRUST, USA
  • D. Harris, ORACLE, USA
  • J. Straw, Syntegra, USA
  • M. Donaldson, CESG, USA
  • Virtual Private Networks
    Chair: Stan Johnson, Motorola

  • ATM Security VPN Case Study, Dan Winkelstein, Celotek Corp., USA
  • VPN Case Study: Kansas Bureau of Investigation, Mark Elliott, Check Point Software, USA, Gary Fish, Fishnet Consulting, USA
  • Independent Policy Oriented Layering of Security Services, Herbert Leitold, Graz Univ. of Technology, Austria
  • 10:00 BREAK
    10:30 Security Services
    Chair: Jody Heaney, MITRE Corp., USA

  • Toward a Taxonomy and Costing Method for Security Services, Cynthia Irvine, Naval Postgraduate School, & Tim Levin, Anteon, USA
  • Trustedbox: A Kernel-Level Integrity Checker, Pietro Iglio, Fondazione Ugo Bordoni, Italy
  • Adding Availability To Log Services Of Untrusted Machines, Arianna Arona, Danilo Bruschi, & Emilia Rosti, Universita` di Milano, Italy
  • Security Policy
    Chair: Marshall Abrams, MITRE Corp., USA

  • Policy-Based Management: Bridging the Gap, Susan Hinrichs, Cisco Systems, USA
  • Security Policy Coordination for Heterogeneous Information Systems, John Hale, Univ. of Tulsa; Pablo Galiasso, Mauricio Papa, & Sujeet Shenoi, Washington State Univ., USA
  • The ARBAC99 Model for Administration of Roles, Qamar Munawer & Ravi Sandhu, George Mason Univ., USA
  • PKI
    Chair: Jim Gerretson, ACS Defense Inc., USA

  • An Introduction to PKI, Judy Furlong , GTE Interworking - CyberTrust Solutions, USA
  • ABN AMRO Bank’s Corporate Cryptographic Infrastructure, Lisa Pretty, Baltimore Technologies, USA
  • Drilling Down the DoD PKI Roadmap, Jandria Alexander, Science Applications International Corp., USA
  • 12:00 LUNCH
    1:00 Public Key Infrastructures
    Chair: Frank Sledge, TRW, USA
  • A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls, Rolf Oppliger, Andreas Greulich, & Peter Trachsel, Swiss Federal Office of Information Technology & Systems (BFI), Switzerland
  • Fast Checking of Individual Certificate Revocation on Small Systems, Selwyn Russell, Queensland Univ. of Technology, Australia
  • A Model of Certificate Revocation, David A. Cooper, National Institute of Standards and Technology, USA
  • Panel: Information Security Education for the Next Millennium: Building the Next Generation of Practitioners
    Chair: Ron Ross, NIST, USA

  • Rayford Vaughn, Mississippi State Univ., USA
  • Ravi Sandhu, George Mason Univ., USA
  • Charles Reynolds, James Madison University, USA
  • Dr. Cynthia Irvine, Naval Postgraduate School, USA
  • Dr. Blaine Burnham, Georgia Institute of Technology, USA
  • Electronic Commerce
    Chair: Ken Heist, IIT Research Institute, USA

  • Internet Based EC/EDI Solution, Mark Glass, ACS, USA
  • Securing Your Insecurities on the Web, Deepak Taneja, Netegrity, Inc., USA
  • High Assurance Trusted E-commerce Servers, Paul McNabb, Argus Systems Group Inc.
  • 2:30 BREAK
    3:00 Public Key Infrastructures
    Chair: Klaus Keus, GISA/BSI, Germany

  • Generic Support for PKIX Certificate Management in CDSA, Shabnam Erfani, WatchGuard Technologies & Sekar Chandersekaran, Microsoft Corp., USA
  • Efficient Certificate Status Handling Within PKIs: An Application To Public Administration Services, Marco Prandini, Università di Bologna, Italy
  • Mobile Code
    Chair: Dan Thomson, Secure Computing Corp., USA

  • User Authentication And Authorization In The JavaTM Platform, Charlie Lai & Li Gong, Sun Microsystems; Larry Koved & Anthony Nadalin, IBM Corp.; Roland Schemers, onebox.com; USA
  • Transactions in Java Card, Marcus Oestreicher, IBM Research Division, Switzerland
  • Protocols
    Chair: Steve LaFountain, NSA, USA

  • Achieving Fair Document Exchange among Multi-Parties, N. Zhang, Manchester Metropolitan Univ., UK
  • Protecting the Enterprise to Assure eBusiness Success, Chris Inskeep, Compaq, USA
  • 4:00 ADJOURN
    ¡OLE! Corona Ranch Mexican Fiesta and Rodeo

    The dinner is included in the conference registration fee.
    Guest tickets can be ordered on the pre-registration form for $50.00.
    See below for event details.

    [ Wednesday ] [ Friday ]


    Buses will depart hotel at 4:30pm

    Ay, carrumba – Get ready for an exciting evening at the Corona Ranch set against the backdrop of South Mountain Park. We will depart promptly from the hotel at 4:30, arriving at the Corona Ranch in time to enjoy appetizers and drinks amidst a fiery Arizona sunset. Following the reception we move to the grandstand for a Mexican Charreada. A “charreada”, or rodeo, consists of several feats of horsemanship including riding, roping, accuracy, courage, and style. The exciting entertainment will be followed by a delicious Mexican Fiesta served under a canopy of white lights and amid festive decorations.

    We will be outside for a significant portion of the evening and suggest you bring a light jacket as the December evenings can become cool. Should the weather be uncooperative, an equally exciting alternative indoor entertainment venue has been planned for us.

    Attendance will be limited, so please have your Conference Dinner ticket validated at the registration desk by noon on Wednesday December 8th in order to confirm your seat. Additional tickets for guests may be purchased at the registration desk for $50.00.

    More details on Corona Ranch are available at web site www.coronaranch.com