If you couldn't join us at the 6th USENIX Security Symposium
in San Jose on July 22-25, you can now purchase the symposium
proceedings. The price is $27 for USENIX members, and $35 for
non-members, and includes domestic and Canadian postage. Please
add $11 for overseas postage (air printed matter).
You can place your order by fax, phone, or email using VISA,
Mastercard, or American Express, or you can mail a check or
company purchase order to:
USENIX Association
2560 Ninth Street, Suite 215
Berkeley, CA 94710
Phone: 510/528-8649
Fax 510/548-5738
Abstracts of the papers below will soon appear in the USENIX
Resource Center on the World Wide Web, URL: http://www.veryComputer.com/.
Full papers will also be available there to current USENIX members.
-The USENIX Association Staff
****************************************************************
Sixth USENIX Security Symposium:
Focusing on Applications of Crytography
July 22-25, 1996, San Jose, CA
Wednesday, July 24
==================
SESSION 1: "He who controls the area controls the religion"-Latin
Session Chair: Brent Chapman, Great Circle Associates
A Secure Environment for Untrusted Helper Applications
Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer,
University of California, Berkeley
A DNS Filter and Switch for Packet-filtering Gateways
Bill Cheswick, Lucent Technologies; Steven M. Bellovin, AT&T Research
Confining Root Programs with Domain and Type Enforcement
Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac,
David L. Sherman, Karen A. Oostendorp, Trusted Information Systems, Inc.
SESSION 2: "The secret whispers of each other's watch" -W.S.
Session Chair: Avi Rubin, Bellcore
SSH - Secure Login Connections Over the Internet
Tatu Ylonen, SSH Comunications Security, Ltd., Finland
Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password
Chaining and Dictionary Attacks
Barry Jaspan, Independent Consultant
Security Mechanism Independence in ONC RPC
Mike Eisler, Roland J. Schemers and Raj Srinivasan, SunSoft, Inc.
SESSION 3: "There are more things in heaven and earth"-W.S.
Session Chair: Steven M. Bellovin, AT&T Research
Establishing Identity Without Certification Authorities
Carl Ellison, *cash, Inc.
Secure Deletion of Data from Magnetic and Solid-State Memory
Peter Gutmann, University of Auckland
A Revocable Backup System
Dan Boneh and Richard J. Lipton, Princeton University
Thursday, July 25
=================
SESSION 4: "to promote commerce, and not betray it"-Pepys
Session Chair: Clifford Neuman, University of Southern California
Building Blocks for Atomicity in Electronic Commerce
Jiawen Su and J.D. Tygar, Carnegie Mellon University
Kerberos on Wall Street
Isaac Hollander, P. Rajaram and Constantin Tanno, Morgan Stanley & Co.
A Framework for Building an Electronic Currency System
Lei Tang, Carnegie Mellon University
SESSION 5: "In middle of her Web, which spreadeth wide"-Davies
Session Chair: Kathy Fithen, CERT
Chrg-http: A Tool for Micropayments on the World Wide Web
Lei Tang, Carnegie Mellon University; Steve Low, AT&T Research
Building Systems That Flexibly Download Executable Content
Trent Jaeger and Atul Prakash, University of Michigan; Avi Rubin,
Bellcore
Enclaves: Enabling Secure Collaboration over the Internet
Li Gong, SRI International
SESSION 6: "Two massy keys he bore"-Milton
Session Chair: Diane Coe, The MITRE Corporation
Public Key Distribution with Secure DNS
James M. Galvin, EIT/VeriFone
Compliance Defects in Public Key Cryptography
Don Davis, Independent Consultant
Texas A&M University Anarchistic Key Authorization (AKA)
David Safford, Douglas Schales and David Hess, Texas A&M University
SESSION 7: "... tangled in amorous nets"-Mil
Session Chair: Fred Avolio, Trusted Information Systems, Inc.
Murphy's Law and Computer Security
Wietse Venema, Eindhoven University of Technology
NetKuang--A Multi-Host Configuration Vulnerability Checker
Dan Zerkle and Karl Levitt, University of California, Davis
Problem Areas for the IP Security Protocols
Steven M. Bellovin, AT&T Research