[ACSAC-Dec 9-13, 1996-SAN DIEGO]

Technical Program Features and Organization

We continue to add diversity to the manner in which computer security applications are discussed at the conference. Paper sessions include refereed papers that describe the latest in implementations and applications-oriented research. The conference includes two types of sessions designed to allow significant time for interaction with the audience: panel sessions are designed to provoke discussion on a controversial topic; forum sessions report on the results of implementation activities.

Vendor presentations proved to be valuable the last two years and are included again this year. The Vendor presentations allow providers of products and/or services an opportunity to describe the innovative ways in which their products or services are being used to implement secure systems. On Thursday and Friday, the Vendor Track will include vendor presentations on capabilities and applications of INFOSEC products to realistic civil, defense, and commercial problems. The Vendor Track will feature systems integrators, designers, and architects from the government and private sector. Displays will also be open on Wednesday during the evening reception and on Thursday between the sessions and breaks.


Technical Program

WEDNESDAY, DECEMBER 11, 1996

GENERAL SESSION

7:30 Registration
8:30 Opening Remarks Dr. Gary Smith

Conference Chair,

SAIC

8:35 Welcome to San Diego Hotel Manager
8:40 Keynote Speaker Jim Flyzik

Dept. of Treasury

9:10 Distinguished Lecture Dr. Roger Schell

Novell, Inc.

9:50 Student Paper Award Dr. Matt Bishop

UC, Davis

9:55 Technical Program Introduction Dr. Ravi Sandhu

Program Chair

George Mason University

10:00 Break


Program Splits Into Tracks A and B

TRACK ATRACK B
10:30 Security Engineering

Chair: Jody Heaney, The MITRE Corporation

An Evaluation of the JAVA Security Model

Andreas Sterbenz, University of Graz, Austria

Implementing Security Policy in a Large Defense Procurement

Michael Nash, Gamma Secure Systems, UK; Ronald Kennett, Royal Air

Force, UK

An Authenticated Camera

John Kelsey, Bruce Schneier and Chris Hall, Counterpane Systems

10:30 Forum: SSE-CMM Pilot Results

Moderator: M. Schanken, National Security Agency

Speakers: Warren Monroe, Hughes Aircraft; Robert Schwartz, TRW; Jan Filsinger, TIS

12:00 LUNCH 12:00 LUNCH
1:30 Secure Links

Chair: Terry Vickers-Benzel, Trusted Information Systems

A Case Study of Two NRL Pump Prototypes

Myong Kang, Ira Moskowitz, Bruce Montrose and James Parsonese, Naval

Research Laboratory

Asymmetric Isolation

John Davidson, Norex

Starlight: Interactive Link

M. Anderson, C. North, J. Griffin, R. Milner, J. Yesberg and K. Yiu,

Defense Science and Technology Organization, Australia

1:30 Electronic Payment

Chair: Dan Thomsen, Secure Computing Corporation

Security Measures for the Austrian "PAYCHIP" Electronic Purse Application

Manfred Holzbach, STUZZA, Austria

Design of a Secure Electronic Payment System for the Internet

Vijay Varadharajan, University of Western Sydney, Australia, and Micheal

Hitchens, Sydney University, Australia

Innovative Secure Payments on the Internet Using the German Electronic Purse

Brigitte Althen, Brigitte Nebelung and Gerd Enste, debis Systemhaus GEI

3:00 BREAK3:00 BREAK
3:30 Forum: Alternate Assurance Working Group

Moderator: Klaus Keus, BSI, Germany

Speakers: Herve Hosy, SCSSI, France; Deitra Kimpton, CSE, Canada; Mary

Schanken, NSA; and Gene Troy, NIST

3:30 Cryptographic Protocols

Chair: Eugene Bacic, Texar, Canada

Proxies for Anonymous Routing

Michael Reed, Paul Syverson and David Goldschlag, Naval Research Laboratory

Design Choices for Symmetric Key Based Inter-Domain Protocols for Distributed Systems

Vijay Varadharajan, University of West Sydney, Australia and Micheal

Hitchens, Sydney University, Australia

Verifying the Correctness of Cryptographic Protocols Using "Convince"

Randall Lichota, Hughes Technical Services; Steve Brackin, Arca Systems;

Grace Hammonds, AGCS

Security Issues in an EDI Environment

N. Zhang, Manchester Metro University; Q. Shi, Liverpool J.M. University

5:30 RECEPTION 5:30 RECEPTION


Wednesday Reception

starting promptly at 5:30 PM

The reception provides an opportunity for informal conversation and renewal of acquaintances. Continuing an innovation from last year, vendor displays will be available to provide product and service information.


[ FORWARD TO THURSDAY PROGRAM ]


[ACSAC HOME PAGE] [ GENERAL INFORMATION] [ PROGRAM OVERVIEW]
[ TECHNICAL PROGRAM] [ TUTORIALS] [ REGISTRATION/LOGISTICS] [MAIL ACSAC WEBMASTER]