NDSS Symposium 1993 Program

Wednesday, Feb. 10

6:00 P.M. — 8:00 P.M.
Registration
Reception hosted by BBN Communications, A Division of Bolt, Beranek and Newman

Thursday, Feb. 11

7:30 A.M.
Continental Breakfast

8:30 A.M.
Opening Remarks

9:00 A.M.

Session 1: Privacy for Large Networks

Chair: Rob Shirey

NREN Security Issues: Policies and Technologies
Dennis Branstad (NIST) and Robert Aiken (DOE)

Security & Management in 1T2000
Goh Seow Hiong, National Computer Board of Singapore, Singapore

10:00 A.M.
Break

10:30 A.M.

Session 2: Panel Session — Layer Wars: Options for placement of Security in the OSI Reference Model

Chair: Russ Housley

L. Kirk Barker (Datotek), Paul Lambert (Motorola), James Zmuda (Hughes) and John
Linn (DEC)

12:00 noon
Lunch

1:30 P.M.

Session 3: Electronic Documents

Chair: John Linn

Electronic Commission Management
Vesna Ristic and Dr. Peter Lipp, Technishe Universitat, Graz, Austria

Workflow 2000 – Electronic Document Authorization in Practice
Addison Fischer, Fischer Intl Systems Corp., USA

2:30 P.M.
Break

3:00 P.M.

Session 4: Privacy Enhanced Mail

Chair: Steve Kent

Security Issues of a UNIX PEM Implementation
James Galvin, et. al., Trusted Information Systems, USA

Implementing Privacy Enhanced Mail on VMS
Michael Taylor, Digital Equipment Corporation, USA

Distributed Public Key Certificate Management
Charles Gardiner, Bolt, Beranek and Newman, USA

Protecting the Integrity of Privacy-enhanced Electronic Mail
Stuart Stubblebine (USC-ISI) and Virgil Gligor (U. Maryland), USA.

7:00 P.M.
Banquet

Friday, Feb. 12

7:30 A.M.
Continental Breakfast

8:30 A.M.

Session 5: Panel Session — Exportable

Algorithms – Promise or Pandora
Steve Dussé (RSA Data Security, Inc.), Ilene Rosenthal (Software Publishers Association), Rob Rosenthal (NIST)

Chair: Steve Kent

10:00 A.M.
Break

10:30 A.M.

Session 6: Distributed Systems

Chair: Clifford Neuman

Practical Authorization in Large Heterogeneous,
Distributed Systems, John Fletcher and Dan Nessett, LLNL, USA

Extending the OSF DCE Authorization
System, josepn Pato and Mariewa Erdus, Hewictt-Packara Cs., Bes |

Security Issues in the Truffles File System
Peter Reiher, et. al.. UCLA and Trusted Information Systems, USA

12:00 noon
Lunch

1:30 P.M.

Session 7: Panel Session — Network Security Using Smart Cards

Chair: Dave Balenson

Jeff Schiller (MIT), Marjan Krajewski (MITRE), Jim Dray (NIST)

3:00 P.M.
Break

3:30 P.M.

Session 8: Panel Session — Should Security be Legislated?

Chair: Clifford Neuman

Steve Kent (BBN), Rob Rosenthal (NIST) and Jeff Schiller (MIT)