1993: Complete List of Papers from the Ninth ACSAC
ACSA Distinguished Lecture:
COMPUSEC, A Personal View, H. O. Lubbes
Keynote Speaker: Robert Ayers, Director Center for Information Systems Security
TRACK A
SECURE SYSTEMS INTEGRATION
SESSION CHAIR: J. MCHUGH
Integration of Security Services into the NORAD/USSPACECOM Technical Infrastructure:
A Case Study , D.J. Bodeau and V. Swarup
A Methodology for the Use of Single Level RDBMS Software in a
Multilevel Secured System, M.O. Aldrich
Migrating a Commercial Off-the Shelf Application to a Multilevel Secure Environment
, R. Schultz and T. Ehrsam
REQUIREMENTS
SESSION CHAIR: M. SCHAEFER
Operational Requirements for Multilevel Security, B. Tretick
Specification Issues of Secure Systems, M.R. Sweezey
Security Policy in a Complex Logistics Procurement, M.J. Nash and R.J. Kennett
TRACK B
FORUM: THE APPLICATION OF TRUSTED TECHNOLOGY TO
NAVY COMMAND AND CONTROL SYSTEMS
MODERATOR: D. GALIK
Speakers:
S. Brenneman, R. Davis, J. Nall,
J. Overhauser-Duett, and B.R. Poellinger
FORUM: DEVELOPMENT AND ACCREDITATION OF ARMY TRUSTED SYSTEMS
MODERATORS: V. THOMPSON AND M. CAPUTO
Speakers:
M. Aldrich, T. Dimtsios, N. Keselowsky, J. Klemmens, A. Kondi,
T. Medeiros, G. Robison, P. Summerly, S. Wentz, and B. Zomback
TRACK A
CRYPTOGRAPHY
SESSION CHAIR: R. GOVE
Using Logics to Detect Implementation-Dependent Flaws, U. Carlsen
A Second Look at the SNDS Key Management Protocol , W.A. Jansen
Transparent Cosignatures for Electronic Documents, S. Russell
NETWORK SECURITY
SESSION CHAIR: M. ABRAMS
MLS File Service for Network Data Sharing, R.E. Smith
Heterogeneous Workstation to STU-III Prototype, E.M. Kayden and L.J. Schaefer
Transmission Schedules to Prevent Traffic Analysis, B.R. Venkatraman and R.E. Newman-Wolfe
PLENARY PANEL: THE TRUSTED SYSTEM ALPHABET:
P (POLICY) BEFORE A (ARCHITECTURE)?
PANEL MODERATOR: D. GOBUTY
Panelists:
E.P. Chan, J.T. DeMello, and G.O. King
REAL-TIME SYSTEMS
SESSION CHAIR: V. ASHBY
Effects of Multilevel Security on Real-Time Applications, R.K. Clark, D.M. Wells,
E.D. Jensen, T.F. Lunt,
P.G. Neuman, I.B. Greenberg, and P.K. Boucher
Real-Time Trust with 'System Build': Lessons Learned, M.M. Bernstein and T.C. Vickers
Benzel
TRACK B
PANEL: OBTAINING ASSURANCE VIA SOFTWARE PROCESS CONTROLS
MODERATOR: J. HEANEY
Panelists:
K. Ferraiolo, K. Rowe, and 1. Weiss
SECURITY ENGINEERING TECHNIQUES
SESSION CHAIR: A. MARMOR-SQUIRES
Modeling Constructs for Describing a Complex System-of-Systems, D.J. Bodeau and F.N.
Chase
On the Shortest Path to Network Security, J.A. Fitch III and L.J. Hoffman
A Rigorous Approach to Determining Objects, D.P. Faigin, J.J. Donndelinger, and J.R.
Jones
CRITERIA
SESSION CHAIR: G. SMITH
The Rationale Behind the Canadian Criteria, E.M. Bacic and A. Robison
Update on the Federal Criteria, E. Troy
TRACK A
PANEL: WHEN SHOULD FORMAL METHODS BE USED FOR TRUSTED APPLICATIONS?
MODERATOR: B. HARTMAN
Panelists:
M. Abrams, T. Haigh, and T. Longstaff
MODELS
SESSION CHAIR: T. BENZEL
Expressive Power of the Single-Object Typed Access Matrix Model, R.S. Sandhu and S.
Ganta
Representation of Mental Health Application Access Policy in a Monotonic Model, V.
Varadharajan and C. Calvelli
Applying Noninterference to Composition of Systems: A More Practical Approach , J.A.
McDermid, Q. Shi, and J.D. Moffett
TRACK B
DATABASE MANAGEMENT SYSTEMS
SESSION CHAIR: R. SANDHU
MultiView Model for Object-Oriented Database, N. Boulahia-Cuppens, F. Cuppens, A.
Gabillon, and K. Yazdarnian
Database Design and MLS DBMSs: An Unhappy Alliance?, S. Lewis and S. Wiseman
The Deductive Filter Approach to MLS Database Prototyping, G. Pernul, W. Winiwarter,
and A.M. Tjoa
HUMAN-MACHINE INTERFACE ISSUES
SESSION CHAIR: J. HEANEY
User Interface for a High Assurance Windowing System, J. Epstein and R. Pascale
C2 Auditing in the X Display Manager, J. DeMeester
Improved Password Mechanisms Through Expert System Technology, W.G. de Ru and J.H.P.
Eloff
Tutorials:
Computer Network Security
Security and the X Window System
Writing and Applying Security Policies
Preliminary Experience with Evolving Standards for Open System Security
Database Security
Perspective on General TCB Subsets
Good Models Don't Come Out Of Boxes: The Theory and Construction of Formal
Security Policy Models