1990: Complete List of Papers from the Sixth ACSAC
Distinguished Lecturer
The Data Encryption Standard
Fifteen Years of Public Scrutiny, D.E. Denning
TRACK A
Network Security
Chair: M. Bishop
A Solution to the Cascade Problem for Dynamic Networks, E.S. Maiwald
An Example Application of the Trusted Network Interpretation, P.W. Mallett
A Security Analysis of the NTP Protocol Version 2, M. Bishop
Cryptography
Chair: S. Kawamoto
Formal Specification and Verification of Control
Software for Cryptographic Equipment, D.R. Kuhn and J.F. Dray
Hierarchical Group Oriented Key Management Method: HGK, H. Nakamura, K Takagi, K.
Okada, and Y. Matsushita
Integrating Cryptography in the Trusted Computing Base, M. Roe and T. Casey
Formal Methods
Chair: T. Korelsky
On Models for a Trusted Application System, C.N. Payne, J.N. Froscher, and J.P. McDermott
A Multilevel Security Model for a Distributed Object-Oriented System, V. Varadharajan
and S. Black
Trusted DBMS Research
Chair: S. Jajodia
Entropy as a Measure of Database Information, E.A. Unger, L. Harn, and V. Kumar
Secure Query Processing in Distributed Database
Management Systems - Design and Performance Studies, B. Thuraisingham and A. Kamon
Update Semantics for Multilevel Relations, S. Jajodia, R. Sandhu and E. Sibley
Panel: Trusted Subject-Based DBMS
Moderator: R. Graubart
Trusted DBMS Research
Chair: B. Thuraisingham
Natural Change in Dynamic Databases as a Deterrent to
Compromise by Trackers, E. Unger, S. McNulty, and P. Connelly
Architecture for an Embedded Secure Data Base Management System, C.E. Irvine, R.R.
Schell, and L.L. Vetter
Single-Level Multiversion Schedulers for Multilevel Secure Database Systems, W.T.
Maimone and LB. Greenberg
Multilevel Security for Knowledge-Based Systems, T.D. Garvey and T.F. Lunt
International Standards
Chair: W. Ford
ODA and POSIX: Label Liaisons, K.V. Murphy and G. Soberg
Network Management Security, R. Ward and P. Skeffington
The Lowdown on Lower Layer Security Protocols, P.A. Lambert
The Canadian Trusted Computer Product Evaluation Criteria, E.M. Bacic
Panel: Present and Future Directions of Open Systems Standards
Moderator: E.J. Humphreys
Open Systems Security Standards, E.J. Humphreys
International Activities ISO/IEC and CClTT, W. Ford
European Activities Part I - An Overview CEN/CENELEC, ETSI,
EWOS, ECMA, and Collaborative Research, E.J. Humphreys
European Activities Part II - ECMA: Open Systems Security Framework,
Alice and Beyond, K. Presttun
U.S. Activities: NIST OlW Security Work, J. Galvin
TRACK B
Trusted User Interface Issues
Chair: J. McHugh
MLS and Trust Issues at the User Interface in MLS AISs, W. Wilson, J. Sachs, D. Wichers,
and P. Boucher
An Advanced Process Model's Application to Trusted
X Window System Development, B.P. Danner and A.B. Marmor-Squires
A Prototype for Trusted X Labeling Policies, J.J. Epstein
Security Engineering - Risk Assessment
Chair: D. Snow
An Evaluation System for the Physical Security of Computing Systems, S.H. Weingart,
S.R. White, W.C. Amold, and G.P. Double
A Brief Comparison of Two Different Environmental Guidelines for
Determining Levels of Trust, F.L. Mayer
CERTS. A Comparative Evaluation Method for Risk Management
Methodologies and Tools, W.M. Garrabrants, A.W. Ellis, III, L.J. Hoffman and M Karnel
Security Engineering Audit
Chair: I. Gilbert
Is Your Computer Being Misused? A Survey of Current
Intrusion Detection System Technology, N. McAuliffe, D. Wolcott, L. Schaefer, N. Kelem,
B. Hubbard, and T. Haley
IDES: A Progress Report, T.F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan,
P.G. Neumann, and C. Jalali
Probabilistic Measure on Aggregations, T.Y. Lin
Panel: Software Safety
Moderator: C. Levine
Integrity
Chair: H. O. Lubbes
Software Checking with the Auditor's Aid, R. Davis
A Comparison of Type Enforcement and Unix Setuid Implementation of
Well-Formed Transactions, D.J. Thomsen and J.T. Haigh
Software Safety and Security, A. McKinley, IV
Design and Architecture
Chair: J. Bondi
A Comparison of Secure UNIX Operating Systems, R.M. Wong
Process Execution Controls: Revisited, E.M. Bacic
Extending the Creation Operation in the Schematic Protection Model, P.E. Ammann and
R.S. Sandhu
Security Pipellne Interface (SPI), L.J. Hoffman and R.J. Davis
Panel: Developing Trusted Systems
Moderator: M. Schaefer
Panel: Trusted Network Applications
Moderator: C. Weisman
TRACK C
Panel: COMPUSEC Labs In Government
Moderator: A. Friedman
New Developments in Computer Security at NIST, D.K. Branstad and S.W. Katzke
The Center for Information Security Technology, K.D. Streetman
U.S. Secret Service: Electronic Crimes Branch, S.R. Purdy
Panel: Education and Ethics
Moderator: C.D. Schou
Can Rules and Fences Be the Solution?, M. van Swaay
Ethics Comes in LastÑWhy?, C.D. Schou
Ethics and Computer Security, J. Kilpatrick
The Opening of Pandora's Box or Computers, Ethics, and Privacy, K.A. Kievit
Panel: Computer Crime
Moderator: W. Cerow
Panel: Maintaining Trust In Operational Systems
Moderator: M. Schaefer
Applications: Non-DOD Systems
Chair: D. Smoot-Wood
An Authorization Plan for Commercial Service Systems, C.F.Yu
An N-grid Model for Group Authorization, W.G. Shieh, B. Weems, and KM. Kavi
Model of Access Control Policy for Civil Agencies, K.C. Rogers
Applications: DOD Applications
Chair: M. Dyer
A Multilevel-Mode System for Space Applications: Lessons Learned , D.J. Bodeau and
M.J. Reece
Successful Acquisition of Certifiable Application Systems (or: How Not to
Shake Hands with the Tar Baby) , J.N. Froscher, J.P. McDermott, C.N. Payne, and H.O.
Lubbes
Informal Top-Level Specifications for Trusted Applications Systems, JP. McDermott,
J.N. Froscher, C.N. Payne, and H.O. Lubbes
Rehosting Existing Command and Control Systems into a
Multilevel Secure Environment, S. Doncaster, M. Endsley, and G. Factor
Panel: Certification of COMPUSEC Professionals
Moderator: L. McNulty
ICCP Systems Security Specialty Exam, R.T. Vitter
Professional Certification for Computer Security Professionals, L. McNulty
Professional Certification for Security Practitioners, H. Tipton
Informal Top-Level Specifications for Trusted Applications Systems, JP. McDermott,
J.N. Froscher, C.N. Payne, and H.O. Lubbes
Rehosting Existing Command and Control Systems into a
Multilevel Secure Environment, S. Doncaster, M. Endsley, and G. Factor
Panel: Certification of COMPUSEC Professionals
Moderator: L. McNulty
ICCP Systems Security Specialty Exam, R.T. Vitter
Professional Certification for Computer Security Professionals, L. McNulty
Professional Certification for Security Practitioners, H. Tipton
Tutorials:
Introduction to Trusted Computer Systems
Distributed System Security
Software Safety
Risk Management
Database Security
Penetration Testing