18th Annual Computer Security Applications Conference
December 9-13, 2002
Las Vegas, Nevada

Technical Program

Friday, December 13, 2002

8:30 Role-Based Access Control
Chair: Jay Kahn, The MITRE Corporation, USA

  • Advanced Features for Enterprise-Wide Role-Based Access Control§, Axel Kern, Systor Security Solutions GmbH, GERMANY
  • Access Control for Active Spaces§, Geetanjali Sampemane, Prasad Naldurg, Roy Campbell, University of Illinois at Urbana-Champaign, USA
  • A Model for Attribute-Based User-Role Assignment§, Mohammad Al-Kahtani, George Mason University, USA, Ravi Sandhu, SingleSignOn.net, Inc. and George Mason University, USA
  • FORUM - Intrusion Detection: Current Capabilities and Future Directions
    Chair: Karl Levitt, University of California, Davis, USA

  • Josh Haines, MIT Lincoln Laboratory, USA
  • Phil Porras, SRI International, USA
  • Jeff Rowe, Unversity of California, Davis, USA
  • Stuart Stanifor, Silicon Defense, USA
  • Johannes Ullrich, The SANS Institute, USA
  • 10:00 BREAK
    10:30 Experience Reports
    Chair: Ken Eggers, Entrust, USA

  • Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision§, Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, and Chuck Bassett, IBM Software Group, USA
  • A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard§, Andrew Marshall, TD Bank Financial Group, CANADA
  • Security Architecture of the Austrian Citizen Card Concept§, Herbert Leitold, Center for Secure Information Technology, AUSTRIA, Arno Hollosi and Reinhard Posch, Federal Chief Information Office, AUSTRIA
  • Detection
    Chair: Jeremy Epstein, webMethods, Inc., USA

  • Malicious Code Detection for Open Firmware§, Frank Adelstein and Matt Stillerman, ATC-NY, USA, Dexter Kozen, Cornell University, USA
  • Beyond the Perimeter: The Need for Early Detection of Denial of Service Attacks§, John Haggerty, Qi Shi, Madjid Merabti, Liverpool John Moores University, UK
  • A Toolkit for Detecting and Analyzing Malicious Software§, Michael Weber, Matthew Schmid, Michael Schatz, and David Geyer, Cigital, Inc., USA
  • 12:00 ADJOURN

    A Trip to the Hoover Dam
    (box lunch included)
    Registration required; cost is $35.

    The Hoover Dam is recognized by the American Society of Civil Engineers as one of seven modern American civil engineering wonders! The Dam is located in Black Canyon on the Colorado River about 30 miles southeast of Las Vegas on the Nevada-Arizona border. The tour will take about 5 hours.

    § This symbol indicates papers that were anonymously peer reviewed by four or more reviewers before acceptance.

    [ Wednesday ] [ Thursday ]