Check out the new USENIX Web site.

Home About USENIX Events Membership Publications Students
USENIX Technical Program - 7th USENIX Security Symposium, 1998

7th USENIX Security Symposium, 1998
January 26-29, 1998
San Antonio, Texas, USA

Wednesday, January 28

Opening Remarks
Avi Rubin, AT&T Labs - Research

Keynote Address - Security Lessons From All Over
Bill Cheswick, Lucent Technologies, Bell Labs


A Comparison of Methods for Implementing Adaptive Security Policies
Michael Carney and Brian Loe, Secure Computing Corporation

The CRISIS Wide Area Security Architecture
Eshwar Belani and Amin Vahdat, University of California, Berkeley; Thomas Anderson, University of Washington, Seattle; Michael Dahlin, University of Texas, Austin

Intrusion Detection

Bro: A System for Detecting Network Intruders in Real-Time
Vern Paxson, Lawrence Berkeley National Laboratory
("Best Paper" award!)

Cryptographic Support for Secure Logs on Untrusted Machines
Bruce Schneier and John Kelsey, Counterpane Systems

StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang, Oregon Graduate Institute of Science & Technology; Heather Hinton, Ryerson Polytechnic University

Data Mining Approaches for Intrusion Detection
Wenke Lee and Salvatore J. Stolfo, Columbia University

Network Security

Securing 'Classical IP Over ATM Networks'
Carsten Benecke and Uwe Ellermann, Universität Hamburg

A Java Beans Component Architecture for Cryptographic Protocols
Pekka Nikander and Arto Karila, Helsinki University of Technology

Secure Videoconferencing
Peter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, and Jim Rees, University of Michigan, Ann Arbor

Thursday, January 29

Distributed Systems

Unified Support for Heterogeneous Security Policies in Distributed Systems
Naftaly H. Minsky and Victoria Ungureanu, Rutgers University

Operating System Protection for Fine-Grained Programs
Trent Jaeger, Jochen Liedtke, and Nayeem Islam, IBM T.J. Watson Research Center

Expanding and Extending the Security Features of Java
Nimisha V. Mehta, The Open Group; Karen R. Sollins, MIT Laboratory for Computer Science

Invited Talk

Elliptic Curves - Ready for Prime Time
Alfred Menezes, Auburn University
Slides    Paper

World Wide Web Security

Towards Web Security Using PLASMA
Annette Krannig, Fraunhofern-Institute for Computer Graphics IGD

Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies
Vinod Anupam and Alain Mayer, Bell Laboratories, Lucent Technologies

Finite-State Analysis of SSL 3.0
John C. Mitchell, Vitaly Shmatikov, and Ulrich Stern, Stanford University


Certificate Revocation and Certificate Update
Moni Naor and Kobbi Nissim, Weizmann Institute of Science
("Best Student Paper" award)

Attack-Resistant Trust Metrics for Public Key Certification
Raph Levien and Alex Aiken, University of California, Berkeley

Software Generation of Practically Strong Random Numbers
Peter Gutmann, University of Auckland

?Need help? Use our Contacts page.

Last changed: 12 April 2002 aw
Workshop Index
Proceedings Index