[ACSAC History]

1993: Complete List of Papers from the Ninth ACSAC



ACSA Distinguished Lecture:
COMPUSEC, A Personal View, H. O. Lubbes

Keynote Speaker: Robert Ayers, Director Center for Information Systems Security


TRACK A
SECURE SYSTEMS INTEGRATION
SESSION CHAIR: J. MCHUGH

Integration of Security Services into the NORAD/USSPACECOM Technical Infrastructure:
A Case Study , D.J. Bodeau and V. Swarup

A Methodology for the Use of Single Level RDBMS Software in a
Multilevel Secured System, M.O. Aldrich

Migrating a Commercial Off-the Shelf Application to a Multilevel Secure Environment , R. Schultz and T. Ehrsam

REQUIREMENTS
SESSION CHAIR: M. SCHAEFER
Operational Requirements for Multilevel Security, B. Tretick

Specification Issues of Secure Systems, M.R. Sweezey
Security Policy in a Complex Logistics Procurement, M.J. Nash and R.J. Kennett


TRACK B
FORUM: THE APPLICATION OF TRUSTED TECHNOLOGY TO
NAVY COMMAND AND CONTROL SYSTEMS
MODERATOR: D. GALIK
Speakers:
S. Brenneman, R. Davis, J. Nall,
J. Overhauser-Duett, and B.R. Poellinger

FORUM: DEVELOPMENT AND ACCREDITATION OF ARMY TRUSTED SYSTEMS
MODERATORS: V. THOMPSON AND M. CAPUTO
Speakers:
M. Aldrich, T. Dimtsios, N. Keselowsky, J. Klemmens, A. Kondi,
T. Medeiros, G. Robison, P. Summerly, S. Wentz, and B. Zomback


TRACK A
CRYPTOGRAPHY
SESSION CHAIR: R. GOVE
Using Logics to Detect Implementation-Dependent Flaws, U. Carlsen

A Second Look at the SNDS Key Management Protocol , W.A. Jansen
Transparent Cosignatures for Electronic Documents, S. Russell

NETWORK SECURITY
SESSION CHAIR: M. ABRAMS
MLS File Service for Network Data Sharing, R.E. Smith

Heterogeneous Workstation to STU-III Prototype, E.M. Kayden and L.J. Schaefer

Transmission Schedules to Prevent Traffic Analysis, B.R. Venkatraman and R.E. Newman-Wolfe

PLENARY PANEL: THE TRUSTED SYSTEM ALPHABET:
P (POLICY) BEFORE A (ARCHITECTURE)?
PANEL MODERATOR: D. GOBUTY
Panelists:
E.P. Chan, J.T. DeMello, and G.O. King

REAL-TIME SYSTEMS
SESSION CHAIR: V. ASHBY
Effects of Multilevel Security on Real-Time Applications, R.K. Clark, D.M. Wells, E.D. Jensen, T.F. Lunt,
P.G. Neuman, I.B. Greenberg, and P.K. Boucher
Real-Time Trust with 'System Build': Lessons Learned, M.M. Bernstein and T.C. Vickers Benzel


TRACK B
PANEL: OBTAINING ASSURANCE VIA SOFTWARE PROCESS CONTROLS
MODERATOR: J. HEANEY
Panelists:
K. Ferraiolo, K. Rowe, and 1. Weiss

SECURITY ENGINEERING TECHNIQUES
SESSION CHAIR: A. MARMOR-SQUIRES
Modeling Constructs for Describing a Complex System-of-Systems, D.J. Bodeau and F.N. Chase

On the Shortest Path to Network Security, J.A. Fitch III and L.J. Hoffman

A Rigorous Approach to Determining Objects, D.P. Faigin, J.J. Donndelinger, and J.R. Jones

CRITERIA
SESSION CHAIR: G. SMITH

The Rationale Behind the Canadian Criteria, E.M. Bacic and A. Robison

Update on the Federal Criteria, E. Troy


TRACK A
PANEL: WHEN SHOULD FORMAL METHODS BE USED FOR TRUSTED APPLICATIONS?
MODERATOR: B. HARTMAN
Panelists:
M. Abrams, T. Haigh, and T. Longstaff

MODELS
SESSION CHAIR: T. BENZEL
Expressive Power of the Single-Object Typed Access Matrix Model, R.S. Sandhu and S. Ganta

Representation of Mental Health Application Access Policy in a Monotonic Model, V. Varadharajan and C. Calvelli

Applying Noninterference to Composition of Systems: A More Practical Approach , J.A. McDermid, Q. Shi, and J.D. Moffett


TRACK B
DATABASE MANAGEMENT SYSTEMS
SESSION CHAIR: R. SANDHU
MultiView Model for Object-Oriented Database, N. Boulahia-Cuppens, F. Cuppens, A. Gabillon, and K. Yazdarnian

Database Design and MLS DBMSs: An Unhappy Alliance?, S. Lewis and S. Wiseman

The Deductive Filter Approach to MLS Database Prototyping, G. Pernul, W. Winiwarter, and A.M. Tjoa

HUMAN-MACHINE INTERFACE ISSUES
SESSION CHAIR: J. HEANEY
User Interface for a High Assurance Windowing System, J. Epstein and R. Pascale

C2 Auditing in the X Display Manager, J. DeMeester

Improved Password Mechanisms Through Expert System Technology, W.G. de Ru and J.H.P. Eloff


Tutorials:

Computer Network Security
Security and the X Window System
Writing and Applying Security Policies
Preliminary Experience with Evolving Standards for Open System Security
Database Security
Perspective on General TCB Subsets
Good Models Don't Come Out Of Boxes: The Theory and Construction of Formal
Security Policy Models