Papers to be presented at the 11th Annual Computer Security Applications
Conference
December 11-15, 1995, New Orleans, LA
A Network of Firewalls: An Implementation Example,
B. McKenney, D. Woycke, W. Lazear, The MITRE Corporation
Sidewinder:* Combining Type Enforcement and Unix,
D. Thomsen, Secure Computing Corporation
Secure Remote Control and Administration of Uninterruptable Power
Supply-Systems with SNMP,
N. Berg, G. Enste, D. Kraus, DaimlerBenz IT-Security Competence Center,
Germany
Database Design With Secure DBMS Products,
S. Wiseman & S. Lewis, Defense Research Agency, UK
A Toolset for Multilevel Database Design,
R. Burns, AGCS, Inc. & Y. Koh, Raytheon Corporation
Object-Oriented Modeling of Security Semantics,
E. Ellmer, G. Pernul, University of Vienna; G. Kappel, University of Linz,
Austria
Multilevel Security Issues in Real Time Embedded Systems,
T. Darr, CTA, Inc.
Immediacy in Distributed Trusted Systems,
G. Grossman, Cordant, Inc.
The Triad System: The Design of a Distributed, Real-Time, Trusted System,
E. Sebes, P. Pasturel, T. Vickers Benzel, D. Hollingworth, E. Cohen, P.
Wang,
Trusted Information Systems, Inc.; M. Barnett, D. Gallon, R. Zacjew, Locus
Computing Corporation
Lessons Learned During the Life Cycle of an MLS Guard Deployed at
Multiple Sites,
T. Fiorino, P. Casey, M. Easley, R. Jordan, Intermetrics, Inc.
A Solution to the On-Line Image Downgrading Problem,
S. Deok Cha, Korea Advanced Institute of Science and Technology, Korea
Improving Inter-Enclave Information Flow for a Secure Strike Planning
Application,
J. Froscher, D. Goldschlag, M. Kang, C. Landwehr, A. Moore, I. Moskowitz, C.
Payne, Naval Research Laboratory
Monitoring and Controlling Suspicious Activity in Real-time With IP-Watcher,
M. Neuman, En Garde Systems
Addressing Threats in World Wide Web Technology,
K. Meyer, S. Schaefer, The Aerospace Corporation, D. Baker, SAIC
A DSS-Model For Attack Detection,
D. Karagiannis, R. Teleska, C. Mayr, University of Vienna, Austria
A Secure Voting Protocol Using Threshold Schemes,
A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, The Centre for Computer
Security Research, Australia
Blind Multisignature Scheme Based on the Discrete Logarithm Problem,
P. Horster, M. Michels, H. Peterson, University of Technology
Chemnitz-Zwickau, Germany
The Trust Technology Assessment Program And the Benefits To U.S. Evaluations,
B. Abramowitz & J. Connolly, The MITRE Corporation
Understanding and Managing Risk in Software Systems,
S. Fletcher, R. Jansma, J. Lim, M. Murphy, G. Wyss, Sandia National
Laboratories
A New Perspective on Combining Assurance Evidence,
J. Kahn, The MITRE Corporation
A Semi-Formal Method for Specification of Interfaces to a C2 System,
J. Epstein & G. Grossman, Cordant, Inc.
A Practical Tool for Developing Trusted Applications,
C. Irvine & D. Volpano, Naval Postgraduate School
The Formal VSE Development Method-A Way to Engineer High-Assurance Software,
Systems
Koob, Ullmann, Wittmann, GISA, Germany
Trusted Software, Repositories and Reuse,
M. Aldrich, GRC
INFOSEC Metrics: Issues and Future Directions,
D. Bodeau, The MITRE Corporation
LAFS: A Logging and Auditing File System,
C. Wee, University of California, Davis
RBAC: Features and Motivations,
D. Ferraiolo, National Institute for Standards and Technology