[ACSAC History]

1990: Complete List of Papers from the Sixth ACSAC



Distinguished Lecturer
The Data Encryption Standard
Fifteen Years of Public Scrutiny, D.E. Denning


TRACK A
Network Security
Chair: M. Bishop

A Solution to the Cascade Problem for Dynamic Networks, E.S. Maiwald

An Example Application of the Trusted Network Interpretation, P.W. Mallett

A Security Analysis of the NTP Protocol Version 2, M. Bishop

Cryptography
Chair: S. Kawamoto

Formal Specification and Verification of Control
Software for Cryptographic Equipment, D.R. Kuhn and J.F. Dray

Hierarchical Group Oriented Key Management Method: HGK, H. Nakamura, K Takagi, K. Okada, and Y. Matsushita

Integrating Cryptography in the Trusted Computing Base, M. Roe and T. Casey

Formal Methods
Chair: T. Korelsky

On Models for a Trusted Application System, C.N. Payne, J.N. Froscher, and J.P. McDermott

A Multilevel Security Model for a Distributed Object-Oriented System, V. Varadharajan and S. Black

Trusted DBMS Research
Chair: S. Jajodia

Entropy as a Measure of Database Information, E.A. Unger, L. Harn, and V. Kumar
Secure Query Processing in Distributed Database

Management Systems - Design and Performance Studies, B. Thuraisingham and A. Kamon

Update Semantics for Multilevel Relations, S. Jajodia, R. Sandhu and E. Sibley

Panel: Trusted Subject-Based DBMS
Moderator: R. Graubart

Trusted DBMS Research
Chair: B. Thuraisingham

Natural Change in Dynamic Databases as a Deterrent to
Compromise by Trackers, E. Unger, S. McNulty, and P. Connelly

Architecture for an Embedded Secure Data Base Management System, C.E. Irvine, R.R. Schell, and L.L. Vetter

Single-Level Multiversion Schedulers for Multilevel Secure Database Systems, W.T. Maimone and LB. Greenberg

Multilevel Security for Knowledge-Based Systems, T.D. Garvey and T.F. Lunt

International Standards
Chair: W. Ford

ODA and POSIX: Label Liaisons, K.V. Murphy and G. Soberg

Network Management Security, R. Ward and P. Skeffington

The Lowdown on Lower Layer Security Protocols, P.A. Lambert

The Canadian Trusted Computer Product Evaluation Criteria, E.M. Bacic

Panel: Present and Future Directions of Open Systems Standards
Moderator: E.J. Humphreys

Open Systems Security Standards, E.J. Humphreys

International Activities ISO/IEC and CClTT, W. Ford

European Activities Part I - An Overview CEN/CENELEC, ETSI,
EWOS, ECMA, and Collaborative Research, E.J. Humphreys

European Activities Part II - ECMA: Open Systems Security Framework,
Alice and Beyond, K. Presttun

U.S. Activities: NIST OlW Security Work, J. Galvin


TRACK B

Trusted User Interface Issues
Chair: J. McHugh

MLS and Trust Issues at the User Interface in MLS AISs, W. Wilson, J. Sachs, D. Wichers, and P. Boucher

An Advanced Process Model's Application to Trusted
X Window System Development, B.P. Danner and A.B. Marmor-Squires

A Prototype for Trusted X Labeling Policies, J.J. Epstein

Security Engineering - Risk Assessment
Chair: D. Snow

An Evaluation System for the Physical Security of Computing Systems, S.H. Weingart, S.R. White, W.C. Amold, and G.P. Double

A Brief Comparison of Two Different Environmental Guidelines for
Determining Levels of Trust, F.L. Mayer

CERTS. A Comparative Evaluation Method for Risk Management
Methodologies and Tools, W.M. Garrabrants, A.W. Ellis, III, L.J. Hoffman and M Karnel

Security Engineering Audit
Chair: I. Gilbert

Is Your Computer Being Misused? A Survey of Current
Intrusion Detection System Technology, N. McAuliffe, D. Wolcott, L. Schaefer, N. Kelem,
B. Hubbard, and T. Haley
IDES: A Progress Report, T.F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan,
P.G. Neumann, and C. Jalali
Probabilistic Measure on Aggregations, T.Y. Lin

Panel: Software Safety
Moderator: C. Levine

Integrity
Chair: H. O. Lubbes

Software Checking with the Auditor's Aid, R. Davis

A Comparison of Type Enforcement and Unix Setuid Implementation of
Well-Formed Transactions, D.J. Thomsen and J.T. Haigh

Software Safety and Security, A. McKinley, IV

Design and Architecture
Chair: J. Bondi

A Comparison of Secure UNIX Operating Systems, R.M. Wong

Process Execution Controls: Revisited, E.M. Bacic

Extending the Creation Operation in the Schematic Protection Model, P.E. Ammann and R.S. Sandhu

Security Pipellne Interface (SPI), L.J. Hoffman and R.J. Davis

Panel: Developing Trusted Systems
Moderator: M. Schaefer

Panel: Trusted Network Applications
Moderator: C. Weisman


TRACK C

Panel: COMPUSEC Labs In Government
Moderator: A. Friedman

New Developments in Computer Security at NIST, D.K. Branstad and S.W. Katzke

The Center for Information Security Technology, K.D. Streetman

U.S. Secret Service: Electronic Crimes Branch, S.R. Purdy

Panel: Education and Ethics
Moderator: C.D. Schou

Can Rules and Fences Be the Solution?, M. van Swaay

Ethics Comes in LastÑWhy?, C.D. Schou

Ethics and Computer Security, J. Kilpatrick

The Opening of Pandora's Box or Computers, Ethics, and Privacy, K.A. Kievit

Panel: Computer Crime
Moderator: W. Cerow

Panel: Maintaining Trust In Operational Systems
Moderator: M. Schaefer

Applications: Non-DOD Systems
Chair: D. Smoot-Wood

An Authorization Plan for Commercial Service Systems, C.F.Yu

An N-grid Model for Group Authorization, W.G. Shieh, B. Weems, and KM. Kavi

Model of Access Control Policy for Civil Agencies, K.C. Rogers

Applications: DOD Applications
Chair: M. Dyer

A Multilevel-Mode System for Space Applications: Lessons Learned , D.J. Bodeau and M.J. Reece

Successful Acquisition of Certifiable Application Systems (or: How Not to
Shake Hands with the Tar Baby) , J.N. Froscher, J.P. McDermott, C.N. Payne, and H.O. Lubbes


Informal Top-Level Specifications for Trusted Applications Systems, JP. McDermott, J.N. Froscher, C.N. Payne, and H.O. Lubbes

Rehosting Existing Command and Control Systems into a
Multilevel Secure Environment, S. Doncaster, M. Endsley, and G. Factor

Panel: Certification of COMPUSEC Professionals
Moderator: L. McNulty

ICCP Systems Security Specialty Exam, R.T. Vitter

Professional Certification for Computer Security Professionals, L. McNulty

Professional Certification for Security Practitioners, H. Tipton

Informal Top-Level Specifications for Trusted Applications Systems, JP. McDermott, J.N. Froscher, C.N. Payne, and H.O. Lubbes

Rehosting Existing Command and Control Systems into a
Multilevel Secure Environment, S. Doncaster, M. Endsley, and G. Factor

Panel: Certification of COMPUSEC Professionals
Moderator: L. McNulty

ICCP Systems Security Specialty Exam, R.T. Vitter

Professional Certification for Computer Security Professionals, L. McNulty

Professional Certification for Security Practitioners, H. Tipton


Tutorials:

Introduction to Trusted Computer Systems
Distributed System Security
Software Safety
Risk Management
Database Security
Penetration Testing