6th USENIX UNIX Security Symposium

6th USENIX UNIX Security Symposium

Post by Carolyn Ca » Wed, 24 Apr 1996 04:00:00

6th UNIX Security Symposium
Focusing on Applications of Cryptography
July  22-25, 1996
Fairmont Hotel, San Jose, CA

If you are responsible for the safety and security of your employer's
computer network, you will want to attend this Symposium. A preliminary
program follows.  Complete information will be available by 5/1 at the
USENIX Web site:  http://www.veryComputer.com/.  Or send email to

Monday - Tuesday, July 22-23, 1996

Security on the World Wide Web
Daniel Geer, OpenMarket, Inc., and Jon Rochlis, BBN Planet

Security for Software Developers: How to Write  Code that Withstands
Hostile Environments
Marcus J. Ranum,V-ONE Corporation

UNIX Security Tools: Use and Comparison
Matt Bishop, University of California, Davis

Internet Security for System and Network Administrators
Ed DeHart, Computer Emergency Response Team (CERT)

Keys to Successfully Implementing Cryptography
Bruce Schneier, Counterpane Systems

Wednesday-Thursday, July 24-25, 1996

A Secure Environment for Untrusted Helper Applications
Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer
University of California,  Berkeley

A DNS Filter and Switch for Packet-filtering Gateways
Bill Cheswick, Lucent Technologies and  Steven M. Bellovin, AT&T Bell

Confining Root Programs with Domain and Type Enforcement
Kenneth M. Walker,  Daniel F. Sterne , M. Lee Badger,  Michael
J. Petkac,  David L. Sherman, and  Karen A. Oostendorp, Trusted
Information Systems

SSH - Secure Login Connections Over the Internet
Tatu Ylonen, Helsinki University of Technology

Dual-workfactor Encrypted Key Exchange: Efficiently Preventing
Password Chaining and Dictionary Attacks
Barry Jaspan, Independent Consultant

Security Mechanism Independence in ONC RPC
Mike Eisler,  Roland J. Schemers, and  Raj Srinivasan,
Sun Microsystems

Secure Deletion of Data from Magnetic and Solid-State Memory
Peter Gutmann, University of Auckland

Establishing Identity Without Certification Authorities
Carl Ellison, *cash, Inc.

A  Revocable Backup System
Dan Boneh and Richard J Lipton, Princeton University

Achieving Atomicity in Electronic Commerce and Its Impact
on Communication Efficiency
Jiawen Su and  J.D. Tygar, Carnegie Mellon University

Kerberos on Wall Street
Isaac Hollander,  P. Rajaram, and  Constantin Tanno
Morgan Stanley, Inc.

A Framework for Building an Electronic Currency System
Lei Tang, Carnegie Mellon University

Chrg-http: A Tool for Micropayments on the World Wide Web
Lei Tang, Carnegie Mellon University; Steve Low
and Nicholas Maxemchuck, AT&T Bell Research

Building Systems That Flexibly Download Executable Content
Trent Jaeger, Univeristy of Michigan,  Aviel D. Rubin and Atul Prakash, Bellcore

Enabling Secure Collaboration Over the Internet
Li Gong, SRI International

Public Key Distribution with Secure DNS
James M. Galvin, EIT/VeriFone

Compliance Defects in Public-Key Cryptography
Don Davis, Independent Consultant

Texas A&M University Anarchistic Key Authorization (AKA)
David Safford, David Hess, and  Douglas Schales, Texas A & M University

Murphy's Law and Computer Security
Wietse Venema, Eindhoven University of Technology

NetKuang--A Multi-Host Configuration Vulnerability Checker
Dan Zerkle and  Karl Levitt, University of California, Davis

Problem Areas for the IP Security Protocols
Steven M Bellovin, AT&T Research

Thursday, July 25

Just another convicted Perl hacker
Randall Schwartz, Stonehenge Consulting Services

Using Technical Means to Protect Individual
Sameer Parekh, Community ConneXion

Firewalls: Are they being used right? Are they cost effective?
Marcus Ranum, V-ONE Corporation

PGP Version 3
Derek Atkins, MIT

Wednesday, July 24

Security and Privacy Issues
 Chair: Peter Neumann, Principal Scientist, Computer Science  Laboratory,
Stanford Research Institute

Panelists:  Mary Connors, Computer Professionals for Social Responsibility,
Jose Martinez, Sausalito Associates International,
and Gio Wederhold, Stanford University

Electronic Commerce
Chair: Rik Farrow, Consultant and Author

Panelists: Fred Avolio, Trusted Information Systems, Dan Geer, Open Market,
and Bruce Schneier, Counterpane Systems

Cryptography and the Law
Chair: Daniel Appelman, Attorney , Heller Ehrman White & McAuliffe
Panelists to be announced

Cryptographic Infrastructure
Chair: Fred Avolio, Principal Analyst and Product Manager,
Trusted Information Systems (TIS)
Panelists to be Announced