Papers to be presented at the 11th Annual Computer Security Applications Conference

December 11-15, 1995, New Orleans, LA

  • A Network of Firewalls: An Implementation Example, B. McKenney, D. Woycke, W. Lazear, The MITRE Corporation
  • Sidewinder:* Combining Type Enforcement and Unix, D. Thomsen, Secure Computing Corporation
  • Secure Remote Control and Administration of Uninterruptable Power Supply-Systems with SNMP, N. Berg, G. Enste, D. Kraus, DaimlerBenz IT-Security Competence Center, Germany
  • Database Design With Secure DBMS Products, S. Wiseman & S. Lewis, Defense Research Agency, UK
  • A Toolset for Multilevel Database Design, R. Burns, AGCS, Inc. & Y. Koh, Raytheon Corporation
  • Object-Oriented Modeling of Security Semantics, E. Ellmer, G. Pernul, University of Vienna; G. Kappel, University of Linz, Austria
  • Multilevel Security Issues in Real Time Embedded Systems, T. Darr, CTA, Inc.
  • Immediacy in Distributed Trusted Systems, G. Grossman, Cordant, Inc.
  • The Triad System: The Design of a Distributed, Real-Time, Trusted System, E. Sebes, P. Pasturel, T. Vickers Benzel, D. Hollingworth, E. Cohen, P. Wang, Trusted Information Systems, Inc.; M. Barnett, D. Gallon, R. Zacjew, Locus Computing Corporation
  • Lessons Learned During the Life Cycle of an MLS Guard Deployed at Multiple Sites, T. Fiorino, P. Casey, M. Easley, R. Jordan, Intermetrics, Inc.
  • A Solution to the On-Line Image Downgrading Problem, S. Deok Cha, Korea Advanced Institute of Science and Technology, Korea
  • Improving Inter-Enclave Information Flow for a Secure Strike Planning Application, J. Froscher, D. Goldschlag, M. Kang, C. Landwehr, A. Moore, I. Moskowitz, C. Payne, Naval Research Laboratory
  • Monitoring and Controlling Suspicious Activity in Real-time With IP-Watcher, M. Neuman, En Garde Systems
  • Addressing Threats in World Wide Web Technology, K. Meyer, S. Schaefer, The Aerospace Corporation, D. Baker, SAIC
  • A DSS-Model For Attack Detection, D. Karagiannis, R. Teleska, C. Mayr, University of Vienna, Austria
  • A Secure Voting Protocol Using Threshold Schemes, A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, The Centre for Computer Security Research, Australia
  • Blind Multisignature Scheme Based on the Discrete Logarithm Problem, P. Horster, M. Michels, H. Peterson, University of Technology Chemnitz-Zwickau, Germany
  • The Trust Technology Assessment Program And the Benefits To U.S. Evaluations, B. Abramowitz & J. Connolly, The MITRE Corporation
  • Understanding and Managing Risk in Software Systems, S. Fletcher, R. Jansma, J. Lim, M. Murphy, G. Wyss, Sandia National Laboratories
  • A New Perspective on Combining Assurance Evidence, J. Kahn, The MITRE Corporation
  • A Semi-Formal Method for Specification of Interfaces to a C2 System, J. Epstein & G. Grossman, Cordant, Inc.
  • A Practical Tool for Developing Trusted Applications, C. Irvine & D. Volpano, Naval Postgraduate School
  • The Formal VSE Development Method-A Way to Engineer High-Assurance Software, Systems Koob, Ullmann, Wittmann, GISA, Germany
  • Trusted Software, Repositories and Reuse, M. Aldrich, GRC
  • INFOSEC Metrics: Issues and Future Directions, D. Bodeau, The MITRE Corporation
  • LAFS: A Logging and Auditing File System, C. Wee, University of California, Davis
  • RBAC: Features and Motivations, D. Ferraiolo, National Institute for Standards and Technology