5th USENIX UNIX Security Symposium 1995 June 5, 1995 to June 7, 1995, Salt Lake City, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Information Security Technology? Don'T Rely On It. A Case Study In Social Engineering Ira S. Winkler , Brian Dealy Security
A Simple Active Attack Against Tcp Laurent Joncheray Security
Wan-Hacking With Autohack: Auditing Security Behind The Firewall Alec Muffet Security Firewall Auditing
Kerberos Security With Clocks Adrift Don Davis Security
Design And Implementation Of Modular Key Management Protocol And Ip Secure Tunnel On Aix Pau-chen Cheng , Juan A. Garay , Amir Krawczyk Security
Network Randomization Protocol: A Proactive Pseudo-Random Generator Chee-seng Herzberg Security
Implementing A Secure Rlogin Environment: A Case Study Of Using A Secure Network Layer Protocol Gene H. Kim , Hilarie O'malley Security
Stel: Secure Telnet David Vincenzetti , Stefano Bolognesi Security
Session-Layer Encryption Matt Bellovin Security
Safe Use Of X Window System Protocol Across A Firewall Brian L. Kahn Security Firewall
An Architecture For Advanced Packet Filtering And Access Policy Andrew Molitor Security Access
A Domain And Type Enforcement Unix Prototype Lee Badger , Daniel F. Sterne , David Walker , Haghighat Security Unix
Providing Policy Control Over Object Operations In A Mach-Based System Spencer E. Minear Security
Joining Security Realms: A Single Login For Netware And Kerberos William A. Adamson , Jim Honeyman Security
Independent One-Time Passwords Aviel D. Rubin Security
One-Time Passwords In Everything (Opie): Experiences With Building And Using Strong Authentication Daniel Atkinson Security
Improving The Trustworthiness Of Evidence Derived From Security Trace Files Ennio Pozzetti , Politecnico Vetland Security
Using The Domain Name System For System Break-Ins Steven M. Bellovin Security
Dns And Bind Security Issues Paul Vixie Security DNS
Mime Object Security Services: Issues In A Multi-User Environment James Feldman Security