Proceedings Now Available - 6th USENIX Security Symposium

Proceedings Now Available - 6th USENIX Security Symposium

Post by Toni Vegl » Thu, 08 Aug 1996 04:00:00



If you couldn't join us at the 6th USENIX Security Symposium
in San Jose on July 22-25, you can now purchase the symposium
proceedings.  The price is $27 for USENIX members, and $35 for
non-members, and includes domestic and Canadian postage.  Please
add $11 for overseas postage (air printed matter).

You can place your order by fax, phone, or email using VISA,
Mastercard, or American Express, or you can mail a check or
company purchase order to:

USENIX Association        
2560 Ninth Street, Suite 215        
Berkeley, CA  94710
Phone:  510/528-8649
Fax 510/548-5738

Abstracts of the papers below will soon appear in the USENIX
Resource Center on the World Wide Web, URL: http://www.veryComputer.com/.  
Full papers will also be available there to current USENIX members.

-The USENIX Association Staff
****************************************************************

            Sixth USENIX Security Symposium:
        Focusing on Applications of Crytography

            July 22-25, 1996, San Jose, CA

Wednesday, July 24
==================
SESSION 1: "He who controls the area controls the religion"-Latin
Session Chair: Brent Chapman, Great Circle Associates

A Secure Environment for Untrusted Helper Applications
  Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer,
  University of California, Berkeley

A DNS Filter and Switch for Packet-filtering Gateways
  Bill Cheswick, Lucent Technologies; Steven M. Bellovin, AT&T Research

Confining Root Programs with Domain and Type Enforcement
  Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac,
  David L. Sherman, Karen A. Oostendorp, Trusted Information Systems, Inc.

SESSION 2: "The secret whispers of each other's watch" -W.S.
Session Chair: Avi Rubin, Bellcore

SSH - Secure Login Connections Over the Internet
  Tatu Ylonen, SSH Comunications Security, Ltd., Finland

Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password
Chaining and Dictionary Attacks
  Barry Jaspan, Independent Consultant

Security Mechanism Independence in ONC RPC
  Mike Eisler, Roland J. Schemers and Raj Srinivasan, SunSoft, Inc.

SESSION 3: "There are more things in heaven and earth"-W.S.
Session Chair: Steven M. Bellovin, AT&T Research

Establishing Identity Without Certification Authorities
  Carl Ellison, *cash, Inc.

Secure Deletion of Data from Magnetic and Solid-State Memory
  Peter Gutmann, University of Auckland

A Revocable Backup System
  Dan Boneh and Richard J. Lipton, Princeton University

Thursday, July 25
=================
SESSION 4: "to promote commerce, and not betray it"-Pepys
Session Chair: Clifford Neuman, University of Southern California

Building Blocks for Atomicity in Electronic Commerce
  Jiawen Su and J.D. Tygar, Carnegie Mellon University

Kerberos on Wall Street
  Isaac Hollander, P. Rajaram and Constantin Tanno, Morgan Stanley & Co.

A Framework for Building an Electronic Currency System
  Lei Tang, Carnegie Mellon University

SESSION 5: "In middle of her Web, which spreadeth wide"-Davies
Session Chair: Kathy Fithen, CERT

Chrg-http: A Tool for Micropayments on the World Wide Web
  Lei Tang, Carnegie Mellon University; Steve Low, AT&T Research

Building Systems That Flexibly Download Executable Content
  Trent Jaeger and Atul Prakash, University of Michigan; Avi Rubin,
  Bellcore

Enclaves: Enabling Secure Collaboration over the Internet
  Li Gong, SRI International

SESSION 6: "Two massy keys he bore"-Milton
Session Chair: Diane Coe, The MITRE Corporation

Public Key Distribution with Secure DNS
  James M. Galvin, EIT/VeriFone

Compliance Defects in Public Key Cryptography
  Don Davis, Independent Consultant

Texas A&M University Anarchistic Key Authorization (AKA)
  David Safford, Douglas Schales and David Hess, Texas A&M University

SESSION 7: "... tangled in amorous nets"-Mil
Session Chair: Fred Avolio, Trusted Information Systems, Inc.

Murphy's Law and Computer Security
  Wietse Venema, Eindhoven University of Technology

NetKuang--A Multi-Host Configuration Vulnerability Checker
  Dan Zerkle and Karl Levitt, University of California, Davis

Problem Areas for the IP Security Protocols
  Steven M. Bellovin, AT&T Research