Papers presented at
6TH USENIX UNIX SECURITY SYMPOSIUM
July 24-25, 1996, San Jose, California.
Conference information.
- Keynote Address: A Simple Distributed Security Infrastructure
Ronald L. Rivest, MIT Laboratory for Computer Science
- A Secure Environment for Untrusted Helper Applications
Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer,
University of California, Berkeley
-
A DNS filter and Switch for Packet-filtering Gateways
Bill Cheswick, Lucent Technologies; Steven M. Bellovin, AT&T Research
-
Confining Root Programs with Domain and Type Enforcement
Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp, Trusted Information Systems, Inc.
- SSH - Secure Login Connections Over the Internet
Tatu Ylonen, Helsinki University of Technology
-
Dual-workfactor Encrypted Key Exchange: Efficiently Preventing
Password Chaining and Dictionary Attacks
Barry Jaspan, Consultant
-
Security Mechanism Independence in ONC RPC
Mike Eisler, Roland J. Schemers and Raj Srinivasan, SunSoft, Inc.
-
Establishing Identity Without Certification Authorities
Carl Ellison, Cybercash, Inc.
-
Secure Deletion of Data from Magnetic and Solid-State Memory
Peter Gutmann, University of Auckland
-
A revocable backup system
Dan Boneh and Richard J. Lipton, Princeton University
-
Achieving Atomicity in Electronic Commerce and Its Impact
on Communication Efficiency
Jiawen Su and J.D. Tygar, Carnegie Mellon University
-
Kerberos on Wall Street
Isaac Hollander, P. Rajaram and Constantin Tanno
Morgan Stanley & Co.
-
A Framework for Building an Electronic Currency System
Lei Tang, Carnegie Mellon University
-
Invited Talk: "Just another convicted Perl hacker"
Randal Schwartz, Stonehenge Consulting Services
-
Chrg-http: A Tool for Micropayments on the World Wide Web
Lei Tang, Carnegie Mellon University; Steve Low, AT&T Research
-
Building Systems That Flexibly Download Executable Content
Trent Jaeger and Atul Prakash, University of Michigan; Avi Rubin,
Bellcore
-
Enabling Secure Collaboration over the Internet
Li Gong, SRI International
-
Invited Talk: Using Technical Means to Protect Individual Privacy:
The C2.NET Privacy Model
Sameer Parekh, Community ConneXion
-
Public Key Distribution with Secure DNS
James M. Galvin, EIT/VeriFone
-
Compliance Defects in Public Key Cryptography
Don Davis, Independent Consultant
-
Texas A&M University Anarchistic Key Authorization (AKA)
David Safford, Douglas Schales and David Hess, Texas A&M University
-
Invited Talk: "Firewalls: Are they being used right? Are they
cost-effective?"
Marcus Ranum, V-ONE Corporation
-
Murphy's law and computer security
Wietse Venema, Eindhoven University of Technology
-
NetKuang--A Multi-Host Configuration Vulnerability Checker
Dan Zerkle and Karl Levitt, University of California, Davis
-
Problem Areas for the IP Security Protocols
Steven M. Bellovin, AT&T Research
-
Invited Talk: PGP Library API
Derek Atkins, Sun Microsystems, Inc.