6th UNIX Security Symposium
Focusing on Applications of Cryptography
July 22-25, 1996
Fairmont Hotel, San Jose, CA
If you are responsible for the safety and security of your employer's
computer network, you will want to attend this Symposium. A preliminary
program follows. Complete information will be available by 5/1 at the
USENIX Web site: http://www.veryComputer.com/. Or send email to
TUTORIAL PROGRAM
Monday - Tuesday, July 22-23, 1996
Security on the World Wide Web
Daniel Geer, OpenMarket, Inc., and Jon Rochlis, BBN Planet
Security for Software Developers: How to Write Code that Withstands
Hostile Environments
Marcus J. Ranum,V-ONE Corporation
UNIX Security Tools: Use and Comparison
Matt Bishop, University of California, Davis
Internet Security for System and Network Administrators
Ed DeHart, Computer Emergency Response Team (CERT)
Keys to Successfully Implementing Cryptography
Bruce Schneier, Counterpane Systems
REFEREED PAPERS
Wednesday-Thursday, July 24-25, 1996
A Secure Environment for Untrusted Helper Applications
Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer
University of California, Berkeley
A DNS Filter and Switch for Packet-filtering Gateways
Bill Cheswick, Lucent Technologies and Steven M. Bellovin, AT&T Bell
Laboratories
Confining Root Programs with Domain and Type Enforcement
Kenneth M. Walker, Daniel F. Sterne , M. Lee Badger, Michael
J. Petkac, David L. Sherman, and Karen A. Oostendorp, Trusted
Information Systems
SSH - Secure Login Connections Over the Internet
Tatu Ylonen, Helsinki University of Technology
Dual-workfactor Encrypted Key Exchange: Efficiently Preventing
Password Chaining and Dictionary Attacks
Barry Jaspan, Independent Consultant
Security Mechanism Independence in ONC RPC
Mike Eisler, Roland J. Schemers, and Raj Srinivasan,
Sun Microsystems
Secure Deletion of Data from Magnetic and Solid-State Memory
Peter Gutmann, University of Auckland
Establishing Identity Without Certification Authorities
Carl Ellison, *cash, Inc.
A Revocable Backup System
Dan Boneh and Richard J Lipton, Princeton University
Achieving Atomicity in Electronic Commerce and Its Impact
on Communication Efficiency
Jiawen Su and J.D. Tygar, Carnegie Mellon University
Kerberos on Wall Street
Isaac Hollander, P. Rajaram, and Constantin Tanno
Morgan Stanley, Inc.
A Framework for Building an Electronic Currency System
Lei Tang, Carnegie Mellon University
Chrg-http: A Tool for Micropayments on the World Wide Web
Lei Tang, Carnegie Mellon University; Steve Low
and Nicholas Maxemchuck, AT&T Bell Research
Building Systems That Flexibly Download Executable Content
Trent Jaeger, Univeristy of Michigan, Aviel D. Rubin and Atul Prakash, Bellcore
Enabling Secure Collaboration Over the Internet
Li Gong, SRI International
Public Key Distribution with Secure DNS
James M. Galvin, EIT/VeriFone
Compliance Defects in Public-Key Cryptography
Don Davis, Independent Consultant
Texas A&M University Anarchistic Key Authorization (AKA)
David Safford, David Hess, and Douglas Schales, Texas A & M University
Murphy's Law and Computer Security
Wietse Venema, Eindhoven University of Technology
NetKuang--A Multi-Host Configuration Vulnerability Checker
Dan Zerkle and Karl Levitt, University of California, Davis
Problem Areas for the IP Security Protocols
Steven M Bellovin, AT&T Research
INVITED TALKS
Thursday, July 25
Just another convicted Perl hacker
Randall Schwartz, Stonehenge Consulting Services
Using Technical Means to Protect Individual
Sameer Parekh, Community ConneXion
Firewalls: Are they being used right? Are they cost effective?
Marcus Ranum, V-ONE Corporation
PGP Version 3
Derek Atkins, MIT
UniForum PROGRAM
Wednesday, July 24
Security and Privacy Issues
Chair: Peter Neumann, Principal Scientist, Computer Science Laboratory,
Stanford Research Institute
Panelists: Mary Connors, Computer Professionals for Social Responsibility,
Jose Martinez, Sausalito Associates International,
and Gio Wederhold, Stanford University
Electronic Commerce
Chair: Rik Farrow, Consultant and Author
Panelists: Fred Avolio, Trusted Information Systems, Dan Geer, Open Market,
and Bruce Schneier, Counterpane Systems
Cryptography and the Law
Chair: Daniel Appelman, Attorney , Heller Ehrman White & McAuliffe
Panelists to be announced
Cryptographic Infrastructure
Chair: Fred Avolio, Principal Analyst and Product Manager,
Trusted Information Systems (TIS)
Panelists to be Announced