Technical Program Features and OrganizationWe continue to add diversity to the manner in which computer security applications are discussed at the conference. Paper sessions include refereed papers that describe the latest in implementations and applications-oriented research.
The conference includes two types of sessions designed to allow significant time for interaction with the audience: panel sessions are designed to provoke discussion on a controversial topic; forum sessions may report on the results of implementation activities or provide different perspectives on a single topic of interest.
Vendor presentations allow providers of products and/or services an opportunity to describe the innovative ways in which their products or services are being used to implement secure systems.
The Vendor Track will include vendor presentations on capabilities and applications of INFOSEC products to realistic civil, defense, and commercial problems. The Vendor Track will feature systems integrators, designers, and architects from the government and private sector. Displays will also be open on Wednesday during the evening reception and on Thursday during breaks between the sessions.
|9:00||Opening Remarks||Dr. Gary Smith, Conference Chair
|9:05||Welcome to San Diego||Hotel Manager|
Click here for slides
|Marcus J. Ranum, V-ONE, Inc.|
|9:50||Student Paper Award||Dr. Matt Bishop, Student Chair
|9:55||Technical Program Introduction||Dr. Ron Ross, Program Chair
|TRACK A||TRACK B||TRACK C|
Chair: K. Keus, German Information Systems Agency
Micro-digital Money for Electronic Comerce, K. Nguyen, V. Varadharajan, Y. Mu, University of Western Sydney
An Efficient Off-Line Anonymous Cash Scheme, K. Nguyen, V. Varadharajan, Y. Mu, University of Western Sydney
The Secure Distribution of Digital Contents, E. von Faber, R. Hammelrath, F Heider, Debis IT Security Services
|Forum: Evolving the Evaluation Paradigm
Chair: M. Schanken, NSA
Chair: S. Reichert, NSA
A New Multilevel Secure AT Encryption System, G. Cohen, GTE
The Need for User Encryption Key Recovery in Security-Based Applications, R. Thompson, TIS, Inc.
NetFortress, P. Johannessom, DSN Technology
Chair: J. Adams, TIS, Inc.
Simple Assured Bastion Hosts, C. Cant, S. Wiseman, Defense Evaluation and Research Agency
Kernel and Shell-Based Applications Integrity Assurance, G. Mohay, J. Zellers, Queensland University of Technology
Risk Assessment for Large Heterogeneous Systems, J. Freeman, T. Darr, R. Neely, CTA Incorporated
Chair: L. Notargiacomo, Oracle Corp.
Securing an Object Relational Database, S. Lewis, S. Wiseman, Defense Evaluation and Research Agency
click for text . . Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores, S. Foley, University College Cork
Incremental Assurance for Multilevel Applications, D. Thompson, Secure Computing Corp., M. Denz, Air Force Research Laboratory
Chair: N. Kunes, Motorola
Which Security Solution is Correct for My System?, J. Luchko, Telos
VISART, A Risk Analysis Tool, D. Peeples, NSA
Quantifiable Risk Management, G. Adams, Trident Data Systems
|3:30||Forum: Product Assurance
Chair: J. Adams, TIS, Inc.
Chair: S. LaFountain, NSA
An Efficient Message Authentication Scheme for Link State Routing, S. Cheung, UC, Davis
Detection and Classification of TCP/IP Network Services, K. Tan, B. Collie, Australian Federal Police
Achieving User Privacy in Mobile Networks, B. Askwith, M. Merabti, Q. Shi, K. Whiteley, Distributed Multimedia Systems Group
Chair: M. Landesburg, GTE
Enterprise Security, E. Kaufman, CISCO
Integrated Network Monitoring Approach, J. Johnson, Internet Security, Inc.
Intrusion Management, P. Stephenson, Versalink
Wednesday Reception starts promptly at 5:30 pm. The reception provides an opportunity for informal conversation and renewal of acquaintances. Vendor displays will be available to provide product and service information.
[ HOW TO REGISTER ]
[ ACSAC HOME PAGE ] [ GENERAL INFORMATION ] [ MAIL ACSAC WEBMASTER ]