1992: Complete List of Papers from the Eighth ACSAC
ACSA Distinguished Lecture:
Computer Security Myths and Mythtakes or "The REAL Security Problem is...", James
P. Anderson
Keynote Speaker: Daniel J. Ryan
WEDNESDAY, DECEMBER 2
TRACK A
Architecture and Integration
Session Chair: M. Schaefer, CTA
Secure System Architectures and Integration, A. W., E. Anderson, and C. Gavey
Trustable Computing in Next-Generation Avionic Architectures, J.O. Bondi
Security Products (SecurityPro) Transition Analysis Facility (STAF): Pragmatic Concepts
for
MLS Technology Transition , C. Arangio, T. Chen, and S. Neidhard.
Plenary Panel: Security and Software Engineering: Wedlock or Gridlock? Moderator:
J.E. Heaney
Panelists: A. Reedy, J. McHugh, and T. Longstaff
Trusted Systems l
Session Chair: J. Bondi
Integrating Cryptography Into Trusted Systems: A Criteria Approach, W. Brierley
Security Test and Evaluation for Multilevel-Mode Accreditation: Lessons Learned, D.
J. Bodeau, N.R. Brusil, I.N. Chang, and M.J. Reece
An Overview of the AMC WWMCCS Cat Guard, R.A. Vick, HFS /nC.
TRACK B
Risk Analysis
Session Chair: N. McAuliffe, TIS
A Conceptual Model for Computer Security Risk Analysis , D. J. Bodeau
An Application of Qualitative Risk Analysis to Computer Security for the Commercial
Sector , S.P. Bennett and M.P. Kailay
Database Management Systems
Session Chair: G. Smith
Arca Systems, Inc.
Security Constraint Processing During Multilevel Secure Database Design, G. Pernul
University of Vienna
Providing Security in a Phone Book Database Using Triggers, S.R. Lewis S.R. Wiseman
and N.D. Poulter
Trusted RUBIX Architecture and Policy Model Interpretation, C.J. Testa and B.D. Wilner
and V.D. Gligor
THURSDAY, DECEMBER 3
TRACK A
Modeling and Analysis
Session Chair: J. McHugh
University of North Carolina
Security Composition of Systems J.A. McDermid and Q. Shi University of York
Performance Analysis of a Method for High Level Prevention of Traffic Analysis, R.E.
Newman-Wolfe and B.R. Venkatrarnan
Implementing Transaction Control Expressions by Checking for Absence of Access Rights,
P.E. Ammann and R.S. Sandhu
Trusted Systems II
Session Chair: R Kemmerer
University of California
A Comparison of Trusted X Security Policies, Architectures, and Interoperability,
J. Picciotto, J. Epstein
A Cautionary Note on Image Downgrading, C. Kurak and J. McHugh
Access Control and Applications on Trusted Systems, M. V. Joyce The MITRE Corporation
TRACK B
Panel: Trusted Systems and Personal Trust Moderator: M. van Swaay
Panelists: R.B. Vaugl1n , R. Kaplan. and P.F. Sullivan
Panel: Certifcation of Trusted SystemsModerator: B. Tretick BoozáAllen & Hamilton
Panelists: J. McDermott, L C. Pierce, and C. West
Mini Workshop: Do We Need a Trusted Applications Interpretation?
Panel Moderator: T. Korels/y, ORA
FRIDAY, DECEMBER 4
TRACK A
Panel: Building Tomorrow's Security Architectures,
Moderator: B. McKenney
Panelists: J. Weis, D. Gobuty, and J. Kimmins
Networks
Session Chair: R. Sandhu,
SNPP: A Simple Network Payment Protocol., S. Dukach
Dealing with the Dynamics of Security: Flexibility with Utility in an MLS LAN, P.A.
Loscocco and W.R. Kutz, D.M. Johnsonand, R.J. Watron
Standards for Computer Systems Security: An Interoperability Analysis of SDNS SP3
and ISO NLSP
TRACK B
System Issues
Session Chair: M. Abrams, The MlTRE Corporation
Paradigms for Verification of Authorization at Source of Electronic Documents in an
Integrated Environment, S. Russell
A Generic Virus Scanner in C++, S. Kumarand E.H. Spafford
Penetration State Transition AnalysisÑA Rule-Based Intrusion Detection Approach, P.A.
Porras and R.A. Kemmeler
Panel: Trusted System Evaluation Process
Moderator: C. Barker, TIS
Panelists: Lt Col Sheldon, M. Schaefel; C.P. Pfleeger s
Tutorials:
Database Security
Computer Security Models
An Introduction to Trusted Systems
UNIX Security
Trusted Networks: Concepts, Issues, and Examples
An Overview of Non-US Evaluation Criteria
An Overview of the New U.S. Information Protection Criteria