[ACSAC History]

1987: And Then There Were Three

The conference committee was now on a roll. Buoyed by the success of the first two conferences, the committee began more ambitious planning for the third conference. The key committee members continued as in the second conference with Joel Levy, then of ORI, Inc. as the General Chairman and Steve Walker of Trusted Information Systems as the Technical Program Chairman. The sponsors were AIAA, ASIS, and the IEEE Computer Society (who had re-joined the sponsors) and ACSA. The conference committee selected Orlando, Florida as a venue for a variety of reasons. First, a warmer climate would be more conducive to a December meeting. Second, ASIS, one of our sponsors, has had a number of successful meetings there. And third, there are a great many ancillary attractions for attendees and their families. The dates selected were December 7 - 11 1987 and the conference was formally titled: AIAA/AISS/IEEE Third Aerospace Computer Security Conference: Applying Technology to Systems.

The conference was expanded to four and one half days; a format that we have continued to the present. This included two days of tutorials and two and one half days of technical papers and panel sessions.

In numbers alone, this conference was a great success. Over 185 people were in attendance, despite a delay of nearly one month in mailing the advance program. The conference again included one day of classified sessions. The unclassified program had 26 papers covering a wide range of subjects, although few dealt directly with aerospace interests.

AIAA/ASIS/DODCI Third Aerospace Computer Security Conference
December 7 - 11, 1987
  • Toward a Multilevel Document System, M. Carlson et. Al.
  • The SDOS Project - Verifying Hook-UP Security, D. Weber and B. Lubarsky
  • Active vs. Passive Security Models: The Key to Real Systems, J. McHugh
  • m-EVES: A System for Verifying Software, D. Craigen
  • Trusted MACH Design Issues, M. Branstead et. Al.
  • An Expert System to Classify and Sanitize Text, T. Lunt
  • From B2 to CMW: Building a Compartmented Mode Workstation on a Secure Xenix Base, M. Carson, et. Al.
  • Evaluating Security Services Under Part II of the Trusted Network Interpretation, M. Abrams
  • Developments in Guidance for Trusted Computer Networks: The Trusted Network Interpretation, A. Arsenault
  • Interconnection of Accredited Systems, J. Millen
  • A Guide to Effective Risk Management, S. Migues
  • M2Rx: Model-Based Risk Assessment Expert, H. Mayerfield et. Al.
  • A Summary for Engineering Systems for Embedded Multilevel Secure Applications: Lessons Learned from the Regency Net Program, G. Griffiths
  • On Network Covert Channel Analysis, A. Jeng and M. Abrams
  • Space Station Program Threat and Vulnerability Analysis, S. Van Meter and J. Veatch
  • Access Control for a Safety Critical Distribution System Interface Set, S. LeGrand
  • Issues in Secure System Acquisition, J. Vasak
  • Integrating Security into a Total Systems Architecture, P. Rougeau
  • Criteria Extensions for Distributed Systems, S. Albert
  • Using the Computer Security Subsystem Interpretation, M. Hale and J. Inglis
  • TCB Subsets for Incremental Evaluation, W. Shockley and R. Schell
  • A Network of Trusted Systems, W. Shockley et. Al.
  • SP4; A Transport Encapsulation Security Protocol, D. Branstad et. Al.
  • A Mission Driven Process for the Risk Management of ADP Systems, D. Snow and R. Aguiler
  • The Hack Attack: Increasing Computer System Awareness of Vulnerability Threats, P. Belford and J. Quann
  • Protecting Sensitive Systems and Data in an Open Agency, D. Hunt and F. Tompkins