Check out the new USENIX Web site. Security '98 Symposium
 
Wednesday, January 28 - Thursday, January 29    Symposium Speakers

Technical Program   Thursday, January 29, 1998
 
8:30am - 10:00am
REFEREED PAPERS TRACK
Distributed Systems
Session Chair: Hilarie Orman, DARPA/ITO

Unified Support for Heterogeneous Security Policies in Distributed Systems
Victoria Ungureanu and Naftaly H. Minsky, Rutgers University

Operating System Protection for Fine-Grained Programs
Trent Jaeger, Jochen Liedtke, and Nayeem Islam, IBM T.J. Watson Research Center

Expanding and Extending the Security Features of Java
Karen R. Sollins and Nimisha V. Mehta, MIT Laboratory for Computer Science

  INVITED TALKS TRACK
Elliptic Curves - Ready for Prime Time
Alfred Menezes, Auburn University

In this talk I will give a quick introduction to elliptic curve cryptosystems, discuss their advantages, mention recent work done on studying their security, and some of the implementations being done.


10:00am - 10:30am     Break


10:30am - Noon
REFEREED PAPERS TRACK
World Wide Web Security
Session Chair: Diane Coe, Concept5 Technologies

Towards Web Security Using PLASMA
A. Krannig, Fraunhofer-Institute for Computer Graphics IGD

Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies
Vinod Anupam and Alain Mayer, Bell Labs, Lucent Technologies

Finite-State Analysis of SSL 3.0
John C. Mitchell, Vitaly Shmatikov, and Ulrich Stern, Stanford University

  INVITED TALKS TRACK
Securing Electronic Commerce: Applied Computer Security or Just Common Sense
Clifford Neuman, University of Southern California

Internet commerce has made security critical and organizations finally recognize the need to provide security. Because electronic commerce often involves access to privileged data by customers, it is harder to secure these applications than traditional ones. Authentication, authorization, and encryption can be used to secure computers and communication channels, but there will always be vulnerabilities at the end points; attackers will break into the service provider's and end user's systems to steal or modify data. Once these basic security techniques have been applied, the greatest improvements in security can be obtained through the common sense technique of partitioning protected data so that authoritative and highly sensitive data is stored on computers that aren't directly connected to the internet. In this talk Dr. Neuman will describe the application of distributed system security techniques and data partitioning to the development electronic commerce applications.


Noon - 1:30pm     Lunch (on your own)


1:30pm - 3:00pm
REFEREED PAPERS TRACK
Cryptography
Session Chair: Carlisle Adams, Nortel

Certificate Revocation and Certificate Update
Kobbi Nissim and Moni Naor, Weizmann Institute of Science

Attack-Resistant Trust Metrics for Public Key Certification
Raph Levien and Alex Aiken, University of California at Berkeley

Software Generation of Practically Strong Random Numbers
Peter Gutmann, University of Auckland

  INVITED TALKS TRACK
Real World Security Practices
JoAnn Perry, Independent Consultant, and Shabbir Safdar, Goldman, Sachs & Co.

You have completed testing and are ready to recommend the implementation of a near-perfect technical solution to a control issue in your company. How confident are you that your management will allocate the dollars and manpower for your project? Will management support the implementation with the end users? Effective security controls must meet business objectives. We will discuss how we have successfully achieved this. You will learn ways to form a close alliance with management and key people to assure that security objectives are met and supported.


3:00pm - 3:30pm     Break


 3:30pm - 5:00pm JOINT SESSION
Work-In-Progress Reports (WIPs)
The Works-In-Progress session will consist of five minute presentations. Speakers should submit a one or two paragraph abstract to sec98wips@usenix.org by January 15. Please include your name, affiliation, and the title of your talk. Please note this is a change from the original instructions in the Call for Papers. A schedule of presentations will be posted at the conference by Noon on January 29. Experience at other conferences has shown that most submissions are usually accepted. The five minute time limit will be strictly enforced.

Wednesday, January 28 - Thursday, January 29    Symposium Speakers
 


Symposium at-a-Glance - Tutorials - Technical Program - Registration -
About Symposium Speakers - Symposium Info - Hotel & Travel Info - Security 98 brochure HOME
Symposium Index
Events Calendar
USENIX home