Technical Sessions at-a-Glance
Wednesday, August 25
9:00am-10:30am Joint Session
Opening Remarks and Best Paper Awards
Keynote Address The Next Generation of Security
Invited Talks
11:00am-12:30pm The Burglar Alarm Builder's Toolbox
2:00pm-3:30pm Jikzi A New Framework for Security Policy, Trusted Publishing, and Electronic Commerce
4:00pm-5:30pm
Designing a Secure Multi-Agent Market
Thursday, August 26
8:30am-10:00am
Apples, Oranges and the Public Key Infrastructure (PKI)
10:30am-Noon
Experience Is the Best Teacher
1:30pm-3:00pm
U.S. Crypto Policy: Explaining the Inexplicable
Refereed Papers
11:00am-12:30pm
PDAs The Design and Analysis of Graphical Passwords
Hand-Held Computers Can be Better Smart Cards
Offline Delegation
2:00pm-3:30pm Cages
Vaulted VPN: compatmented Virtual Private Networks on Trusted Operating Systems
Enforcing Well-Formed and Partially-Formed Transactions for UNIX
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
Keys
Building Intrusion Tolerant Applications
Brute Force Attack on UNIX Passwords with SIMD Computer
Antigone: A Flexible Framework for Secure Group Communication
Potpourri
A Secure Station for Network Monitoring and Control
The Flask Security Architecture: System Support for Diverse Security Policies
A Study in Using Neural Networks for Anomaly and Misuse Detection
Security Practicum
Design of a Cryptographic Security Architecture
Why Johnny Can't Encrypt: A Usability Evaluation of PGP
Jonah: Experience Implementing PKIX Reference Freeware
Access Control
Scalable Access Control for Distributed Object Systems
Certificate-based Access Control for Widely Distributed Resources
Digital-Ticket-Controlled Digital Ticket Circulation
3:30pm-5:00pm Joint Session
Works-In-Progress Reports