8th USENIX Security Symposium 1999 Aug. 23, 1999 to Aug. 26, 1999, Washington DC, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Burglar Alarm Builder'S Toolbox Marcus Ranum When you're protecting your site, don't ignore the home court advantage! One of the best ... Security
Activex Insecurities Richard M. Smith Microsoft's ActiveX technology in the Internet Explorer browser is enough to give any person concerned ... Security Access Browser
Keynote Address – Experience Is The Best Teacher Peter G. Neumann Everyone involved in information security and overall system survivability can learn more from the historical ... Security Keynote
Pdas Jim Duncan None Security
The Design And Analysis Of Graphical Passwords Ian Jermyn , Alain Mayer , Fabian Monrose Michael K. Reiter,Aviel Rubin Security Analysis
Hand-Held Computers Can Be Better Smart Cards Dirk Balfanz , Edward W. Felten None Security
Offline Delegation Arne Helme , Tage Stabell-kul None Security
Vaulted Vpn: Compartmented Virtual Private Networks On Trusted Operating Systems Tse-huong Choo None Security
Enforcing Well-Formed And Partially-Formed Transactions For Unix Dean Povey None Security Unix
Synthesizing Fast Intrusion Prevention/Detection Systems From High-Level Specifications R. Sekar , Prem Uppuluri None Security
Keys Carl Ellison None Security
Building Intrusion-Tolerant Applications Thomas Wu , Michael Malkin , Dan Boneh Security
Brute Force Attack On Unix Passwords With Simd Computer Gershon Kedem , Yuriko Ishihara None Security Unix
Antigone: A Flexible Framework For Secure Group Communication Peter Honeyman , Patrick Mcdaniel , Atul Prakash None Security
Apples, Oranges And The Public Key Infrastructure (Pki) Paul Oorschot The unprecedented growth of the Internet is surpassed only by the confusion resulting from the ... Security Infrastructure
Cryptography And The Internet Steven M. Bellovin Slides for this invited talk are now available in PDF format and PostScript. Security Cryptography
U.S. Crypto Policy: Explaining The Inexplicable Susan Landau The richest, strongest, most electronically vulnerable nation on earth persists in a policy that effectively ... Security Cryptography
Potpourri Trent Jaeger None Security
A Secure Station For Network Monitoring And Control Vassilis Prevelakis None Security Monitoring
The Flask Security Architecture: System Support For Diverse Security Policies Ray Spencer , Stephen Smalley , Peter Loscocco , Mike Hibler , Dave Andersen , Jay Lepreau None Security
A Study In Using Neural Networks For Anomaly And Misuse Detection Anup K. Ghosh , Aaron Schwartzbard None Security
Security Practicum Wolfgang Ley None Security
The Design Of A Cryptographic Security Architecture Peter Gutmann None Security
Why Johnny Can'T Encrypt: A Usability Evaluation Of Pgp 5.0 Alma Whitten , J. D. Tygar None Security
Jonah: Experience Implementing Pkix Reference Freeware Mary Ellen Zurko , John Wray , Ian Morrison , Mike Shanzer , Mike Crane , Pat Booth , Ellen Mcdermott , Warren Macek , Ann Graham , Jim Wade , Tom Sandlin None Security
Access Control Christoph Schuba None Security Access
Scalable Access Control For Distributed Object Systems Daniel F. Sterne , David L. Sherman , Gregg W. Tally , C. Durward Mcdonell , David L. Sames , Pierre X. Pasturel , E. John Sebes None Security Access
Certificate-Based Access Control For Widely Distributed Resources Mary R. Thompson , William Johnston , Srilekha Mudumbai , Gary Hoo , Keith Jackson , Abdelilah Essiari None Security Access
Digital-Ticket-Controlled Digital Ticket Circulation Ko Fujimura , Hiroshi Kuno , Masayuki Terada , Kazuo Matsuyama , Yasunao Mizuno , Jun Sekine None Security
Works-In-Progress Reports Greg Rose This session will consist of short presentations from researchers about work-in-progress, new results, or timely ... Security