13 November 1997
Source:
http://csrc.nist.gov/nissc/1997/proceedings/
Note: The collected NISSC97 papers listed here are available in PDF format in a compressed file:http://csrc.nist.gov/nissc/1997/proceedings/nissc97.zip (6.2MB).The Table of Contents for the collection in PDF format is available at:
http://csrc.nist.gov/nissc/1997/proceedings/toc.pdf (86KB)and provides links to papers in the collection.
[*] Indicates that paper is not available in this collection.
Information Security is Information Security ................................................................................................. 1
Ira S. Winkler, National Computer Security Association
Secrets, Lies, and IT Security ....................................................................................................................... 7
Guy King, Computer Sciences Corporation
The NPS CISR Graduate Program in INFOSEC: Six Years of Experience................................................ 22
Cynthia E. Irvine, Daniel F. Warren, Paul C. Clark Naval Postgraduate School
Cellular Technology and Security............................................................................................................... 31
Ryan Jones, University of Maryland
The Security of Electronic Banking............................................................................................................. 41
Yi-Jen Yang, University of Maryland slides
Extranet Security: A Technical Overview from a Business Perspective .................................................... 53
Jennifer Jordan, University of Maryland
Digital Coins based on Hash Chain............................................................................................................ 72
Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan, University of Western Sydney, Nepean, Australia
Go Ahead, Visit Those Web Sites, You Cant Get Hurt Can You? ........................................................ 80
James S. Rothfuss, Lawrence Livermore National Laboratory slidesJeffrey W. Parrett, PeopleSoft
Web Spoofing: An Internet Con Game ...................................................................................................... 95
Edward W. Felton, Dirk Balfanz, Drew Dean, Dan S. Wallach Princeton University
When JAVA Was One: Threats from Hostile Byte Code ..........................................................................104
Mark D. Ladue, Georgia Institute of Technology
Stupid JavaScript Security Tricks .............................................................................................................116
Walter Cooke, CISSP, W. J. Cooke & Associates Ltd., Canada
Cryptographic Algorithm Metrics................................................................................................................128
Landgrave T. Smith, Jr., Institute for Defense Analyses slides
Using Datatype-Preserving Encryption to Enhance Data Warehouse Security.........................................141
Harry E. Smith, Quest Database Consulting, Inc. slidesMichael Brightwell, FM Software, Inc.
Multistage Algorithm for Limited One-Way Functions................................................................................150
William T. Jennings, Raytheon E-Systems & Southern Methodist University
Practical Defenses Against Storage Jamming...........................................................................................162
J. McDermott, J. Froscher, Naval Research Laboratory
What is Wild? .............................................................................................................................................177
Sarah Gordon, IBM slides
Secure Software Distribution System ........................................................................................................191
Lauri Dobbs, Tony Bartoletti, Marcey Kelley, Lawrence Livermore National Laboratory slides
A Methodology for Mechanically Verifying Protocols Using an Authentication Logic ................................202
J. Alves-Foss, University of Idaho
Munna, Tata Institute of Fundamental Research, India
[*] A Practical Approach to Design and Management of Secure ATM Networks ...........................................213
Vijay Varadharajan, Rajan Shankaran, University of West Sydney, Nepean, Australia;Michael Hitchens, University of Sydney, Australia
Distributed Network Management Security ...............................................................................................233
Paul Meyer, Secure Computing Corporation slides
A New Strategy for COTS in Classified Systems.......................................................................................250
Simon Wiseman, Defence Evaluation and Research Agency, UKLt. Col. Colin J. Whittaker, UK Ministry of Defence, UK
[*] Outsourcing-A Certification & Accreditation Dilemma................................................................................265
Harold Gillespie, CISSP, Mike ONeill, CISSP, CTA Incorporated
The Department of Defense Information Assurance Support Environment...............................................276
Barry C. Stauffer, CORBETT TechnologiesJack Eller, Penny Klein, DISA, IPMO
Joel Sachs, The Sachs Group
Dennis Winchell, Logicon, Inc.
[*] CYBERTERRORISM - Fact or Fancy? ......................................................................................................285
Mark Pollitt, Federal Bureau of Investigation Laboratory
Protecting American Assets -- Who is Responsible?.................................................................................290
Anthony C. Crescenzi, Defense Investigative Service
Who Should Really Manage Information Security in the Federal Government..........................................295
Alexander D. Korzyk, Sr., A. James Wynne, Virginia Commonwealth University slides
Application of the IT Baseline Protection Manual ......................................................................................305
Dr. Angelika Plate, BSI, Germany
The Use of Information Technology Security Assessment Criteria to Protect Specialized Computer Systems .....................................................................................................................................................319
Ronald Melton, David Devaney, Pacific Northwest National LaboratoryV.A. Lykov, A.V. Shein, A.S Piskarev, Russia
William J. Hunteman, Joan M. Prommel, Los Alamos National Laboratory
James S. Rothfuss, Lawrence Livermore National Laboratory
Role Based Access Control for the World Wide Web................................................................................331
D. Richard Kuhn, John F. Barkley, Anthony V. Cincotta, David Ferraiolo, Serban Gavrila, National Institute of Standards and Technology slides
Observations on the Real-World Implementation of Role-Based Access Control .....................................341
Burkhard Hilchenbach, Schumann Security Software, Inc.
EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances .............................353
Phillip Porras, Peter Neumann, SRI International
[*] An Application of Machine Learning to Anomaly Detection .......................................................................366
Terran Lane, Carla E. Brodley, Purdue University
[*] A Process of Data Reduction in the Examination of Computer Related Evidence ....................................381
Mary F. Horvath, Federal Bureau of Investigation Laboratory
Automated Information System (AIS) Alarm System.................................................................................394
William Hunteman, University of California, Los Alamos National Laboratory
The Use of Belief Logics in the Presence of Casual Consistency Attacks ................................................406
J. Alves-Foss, University of Idaho
[*] Achieving Interoperability Through Use of the Government of Canada Public Key Infrastructure ............418
Capt. John H. Weigelt, Department of National Defence (Canada)
Implementation of Key Escrow with Key Vectors to Minimize Potential Misuse of Key ...........................431
William J. Caelli, D. Longley, Queensland University of Technology, Australia
Security Tools - A Try Before You Buy Web-Based Approach................................................................443
Sheila Frankel, National Institute of Standards and Technologies
Internet Protocol Next Generation: Saving the Internet in the New Millennium ........................................452
Robert A. Kondilas, MCI slides
Vulnerability of Secure Web Browsers ....................................................................................................476
Richard Kemmerer, Flavio De Paoli, Andre L. Dos Santos, University of California, Santa Barbara
A Multi-Level Secure Object-Oriented Database Model ............................................................................488
George Durham, Konstantinos Kalpakis, University of Maryland Baltimore County
Use of SSH on a Compartmented Mode Workstation ...............................................................................498
Johnny S. Tolliver, Oak Ridge National LaboratoryDavid Dillow, Lockheed Martin Energy Systems
Multilevel Architectures for Electronic Document Retrieval .......................................................................505
James A. Rome, Johnny S. Tolliver, Oak Ridge National Laboratory
Security Modeling for Public Safety Communication Specifications ..........................................................514
Daniel Gambel, Mitretek Systems, Inc.
Towards a Framework for Security Measurements ...................................................................................522
Chenxi Wang, William Wulf, University of Virginia
Connecting Classified Nets to the Outside World: Costs and Benefits.....................................................534
Christopher P. Kocher, L-3 Corporation
Software Encryption in the DoD ................................................................................................................543
Russell Davis, Boeing Information Services, Inc.
Al Kondi, PMO RCAS
TRANSMAT Trusted Operations for Untrusted Database Applications.....................................................555
Dan Thomsen, Secure Computing Corporation slides
A New Paradigm for Performing Risk Assessment....................................................................................565
Judith L. Bramlage, Computer Associates International, Inc. slides
INFOSEC Risk Management: Focused, Integrated & Sensible................................................................577
Donald R. Peeples, National Security Agency
[*] Role-Based Risk Analysis..........................................................................................................................587
Capt Amit Yoran, USAFLance C. Hoffman, George Washington University
A Risk Minimisation Framework For Electronic Commerce .......................................................................603
Denis TrCek, Jozef Stefan Insititute, Slovenia
Threats And Vulnerabilities For C4I In Commercial Telecommunications: A Paradigm for Mitigation ......................................................................................................................................612
Joan Fowler, Robert C. Seate III, Data Systems Analysts, Inc.
[*] Surviving Denial of Service on the Internet................................................................................................619
Winn Schwartau, COO, Security Experts, Inc.
The Extended Commercially Oriented Functionality Class for Network-based IT Systems.......................641
Alexander Herrigel, r3 Security Engineering, SwitzerlandRoger French, Digital Equipment Corporation, U.S.
Herrmann Siebert, EDP Consulting, Germany
Helmut Stiegler, STI Consulting, Germany
Haruki Tabuchi, Fujitsu Ltd., Japan
Critical Elements of Security Frameworks .................................................................................................654
Chair: Judith Furlong, MITRE Corporation
Panelists:
Michael Willett, IBM CorporationDavid Aucsmith, Intel Architecture Labs
Keith Klemba, Hewlett Packard Company
Security and Trust on the World Wide Web ...............................................................................................656
Chair: Jim Miller, World Wide Web Consortium
Panelists:
Philip DesAutels, World Wide Web ConsortiumWin Treese, Open Market, Inc.
Brian O'Higgins, Entrust Technologies
John Wankmueller, MasterCard
Critical Components of Intrustion Detection Systems ................................................................................657
Chair: Jill Oliver, Citibank
Panelists:
Dan Esbensen, Touch TechnologiesLee Sutterfield, WheelGroup
Mark Crosbie, Hewlett-Packard
Christopher Klaus, Internet Security Systems, Inc.
Public Key Infrastructure - Issues and Challenges ....................................................................................660
Chair: Warwick Ford, VeriSign, Inc.
Panelists:
Taher ElGamal, Netscape Communications CorporationDonna Dodson, National Institute of Standards and Technology
Tom Manessis, Visa
Ted Humphreys, XiSEC Consultants Ltd.
Developing a PKI Solution for Web Transactions: Lessons Learned .......................................................662
Chair: Judith A. Spencer, General Services Administration
Viewpoints:
[*] Implementation Lessons Learned .............................................................................................................665
Stanley Choffrey, General Services Administration
[*] Public Key Infrastructure Philosophy .........................................................................................................670
Phillip Mellinger, First Data Corporation
[*] How it Works .............................................................................................................................................672
Monette Respress, Mitretek Systems
[*] Where Do We Go From Here ....................................................................................................................678
Isadore Schoen, Cygnacom Solutions
Firewalls Are More Than Just Bandages ...................................................................................................679
Chair: Peter Tasker, The MITRE Corporation
Panelists:
Tom Haigh, Secure Computing CorporationJohn Pescatore, Trusted Information Systems
Tony Vincent, Raptor Systems, Inc.
[*] Practical Experience WithVirtual Private Networks (VPNs) .......................................................................681
Chair: Steve Kent, BBN
Panelists:
Paul Lambert, OracleNaganand Doraswamy, Bay Networks, Inc.
Roy Pereira, Timestep
Dan McDonald, Sun Microsystems, UK
Network Security - From a User & Vendor Perspective.............................................................................682
Chair: Ken Heist, National Security Agency
Panelists:
Frank Hecker, Netscape Communications CorporationGregory Gilbert, National Security Agency
James S. Prohaska, Litronic, Inc.
Richard Parker, NATO Consultation, Command, and Control Agency
Security Architectures for Electronic Commerce .......................................................................................684
Chair: Clinton Brooks, National Security Agency
Panelists:
Bruce Schneier, Counterpane SystemsTony Lewis, VISA International
Jerome Solinas, National Security Agency
[*] Legislative Issues Associated with Digital Signatures and Supporting Technologies ................................685
Chair: Steve Ross, Deloitte and Touche
Viewpoints:
[*] Certification Authorizes and Digital Signature A UK Perspective ..............................................................685
Nigel Hickson, Department of Trade and Industry
[*] Infrastructure Vulnerabilities ......................................................................................................................686
Chair: John P. L. Woodward, MITRE Corporation
Panelists:
John C. Davis, NCSC; Commissioner, Presidentials Commission on Critical Infrastructure Protection
Technologies/Procedures Needed to Enhance the Assurance of the Telecommunications Infrastructure ................................................................................................................................687
Chair: Dick Brackney, National Security Agency
Viewpoints:
[*] Internet Routing Infrastructure ...................................................................................................................688
Steve Kent, BBN
[*] Intrusion Detection: Technology Gaps and Research Investments ..........................................................688
Teresa Lunt, Defense Advanced Research Projects Agency
[*] Securing The Evolving Public Telecommunications Networks ..................................................................689
John Kimmins, BELLCORE
GII Security - Research, Technical Developments and Standards............................................................690
Ted Humphreys, XiSEC, UK
[*] Technology Research................................................................................................................................690
Nancy Wong, Presidents Commission on Critical Infrastructure Protection
The InterTrust Commerce Architecture .....................................................................................................692
Chair: Willis Ware, RAND Corporation
Viewpoints:
[*] The InterTrust Approach to Electronic Commerce ....................................................................................692
David Van Wie, Inter Trust Technologies Corporation
[*] The InterTrust Security Architecture ..........................................................................................................694
Olin Sibert, Inter Trust Technologies Corporation
[*] InterTrusts Research Directions for Electronic Commerce .......................................................................696
James Horning, InterTrust Star Laboratory
Legal and Liability Issues for Use of Cryptography ...................................................................................698
Chair: Joan Winston, Trusted Information Systems, Inc.
Panelists:
Michael Scott Baum, VeriSign, Inc.Hoyt L. Kesterson II, Bull HN Information Systems Inc.
Robert L. Meuser, Attorney at Law
Copyright: Should Media Matter? (How Much?)......................................................................................700
Chair: Joan Winston, Trusted Information Systems, Inc.
Panelists:
Prue Adler, Association of Research LibrariesJonathan Band, Morrison & Foerster LLP
Technology Around The Next Corner: The Future of INFOSEC................................................................702
Chair: Hilary Hosmer, Data Security Inc.
Panelists:
Emmet Paige, OAOKathy Kincaid, IBM
John Graff, KPMG, Peat, Marwick, LLP
Ruth Nelson, Information Systems Security
The Data Encryption Standard: 20 Years Later........................................................................................705
Chair: Dorothy E. Denning, Georgetown University
Panelists:
William J. Caelli, Queensland University of Technology, AustraliaStephen T. Kent, BBN Corporation
Viewpoint:
The Data Encryption Standard: 20 Years Later........................................................................................706
William H. Murray, Deloitte & Touche
[*] Can the Internet be Controlled? ................................................................................................................709
Chair: Vin McLellan, The Privacy Guild
Panelists:
James Bidzos, RSA Data Security, Inc.Thomas Black, Smith System Engineering, Ltd.
Patricia Edfors, US Governments Public Key Infrastructure (PKI) Steering Committee
David Farber, University of Pennsylvania
David Harper, National Computer Security Association
Alternate Assurances: Implementation of Better Ways! ...........................................................................712
Chair: Mary Schanken, National Security Agency
Viewpoints:
[*] Trusted Capability Maturity Model (TCMM) ...............................................................................................712
LT Renell D. Edwards, National Security Agency
[*] Network Rating Methodology (NRM) .........................................................................................................712
Todd D. Schucker, National Security Agency
[*] Systems Security Engineering Capability Maturity Model (SSE CMM) ......................................................713
Charles G. Menk, III, National Security Agency
Commercial Intrusion Detection & Auditing: Installation, Integration & Use from the Security Professionals Prospective ...........................................................................................................714
Chair: Jim Codespote, National Security Agency
Panelists:
Dan Gahafer, CACI Inc.Lawrence B. Suto, Strategic Data Command, Inc.
Gordon Coe, AT&T
[*] Information Systems Security (INFOSEC) COTS Strategy: A New Approach..........................................715
Chair: Michael G. Fleming, National Security Agency
Panelists:
Thomas J. Bunt, National Security AgencyDavid E. Luddy, National Security Agency
Louis F. Giles, National Security Agency
Database Security: Browsers, Encryption, Certificates and More ............................................................717
Chair: John Campbell, National Security Agency
Panelists:
Tim Ehrsam, Oracle Corporation
Viewpoints:
Architecture and Components for Data Management Security: NRL Perspective.....................................722
Carl Landwehr, J.N. Froscher, Naval Research Laboratory slides
Viewpoints:
Tom Parenty, Sybase, Inc. ...........................................................................................................729
Wrappers, Composition and Architecture Issues for Security and Survivability.........................................730
Chair: Teresa Lunt, Defense Advanced Research Projects Agency
Panelists:
Franklin Webber, Key Software;
Viewpoints:
[*] Experiments with Software Wrappers........................................................................................................731
Lee Badger, Trusted Information Systems
[*] Survivability Architectures ..........................................................................................................................733
John Knight, University of Virginia
[*] Composable Replaceable Security Services .............................................................................................734
Rich Feiertag, Trusted Information Systems
Survivability Technologies .........................................................................................................................736
Chair: Teresa Lunt, Defense Advanced Research Projects Agency
Viewpoints:
[*] Computational Immunology for the Defense of Distributed Large Scale Systems ....................................736
Maureen Stillman, ORA
[*] Event Monitoring Enabling Responses to Anonmalous Live Disturbances ...............................................737
Phillip Porras, SRI International
[*] Automated Response to Detected Intrustions ...........................................................................................738
Dan Schnackenberg, Boeing
[*] Common Intrusion Detection Framework ..................................................................................................739
Stuart Staniford-Chen, University of California, Davis
Manhattan Cyber Project ...........................................................................................................................740
Chair: Mark Gembicki, WarRoom Research
Computer Security in the Year 2000 .........................................................................................................747
Chair: Richard Lefkon, Year 2000 Committee of AITP SIG-Mainframe
Panelists:
Gregory Cirillo, JD; Williams, Mullen, Christian & DobbinDaniel Miekh, Consultant, Terasys
Sanford Feld, President, TBI
Public Key Certificate Policies ...................................................................................................................752
Chair: Noel Nazario, National Institute of Standards and Technology
Panelists:
Santosh Chokhani, CygnaCom Solutions Inc.Warwick Ford, VeriSign Inc.
Michael Jenkins, National Security Agency
[*] Cryptographic Standards for the Next Century..........................................................................................754
Chair: Miles Smid, National Institute of Standards and Technology
Panelists:
James Foti, National Institute of Standards and Technology
Viewpoints:
IEEE P1363: A Comprehensive Standard For Public-Key Cryptography .................................................754
Burt Kaliski, RSA Laboratories
ANSI X9.F.1 Cryptographic Standards.....................................................................................................761
Don B. Johnson, Certicom
[*] DOCKMASTER II, A Lesson Learned: Balancing Security, Technology Advancements & The Desire To Field A System ..................................................................................................765
Chair: Steve Kougoures, National Security AgencyPanelists:
Cindy Hash, National Security Agency
Mark Redenour, National Security Agency
William Dawson, BDM
[End]