[2783] in Kerberos

home help back first fref pref prev next nref lref last post

FYI

daemon@ATHENA.MIT.EDU (Ganesan)
Mon Aug 16 14:08:54 1993

From: bf4grjc@socrates.MIT.EDU (Ganesan)
To: kerberos@Athena.MIT.EDU
Date: Mon, 16 Aug 1993 13:45:21 -0500 (EDT)
Reply-To: Ravi.Ganesan@bell-atl.com

Enclosed is the Call for Participation for the 1st ACM Conference on 
Computer and Communications Security. Please consider participating....

Ravi
-- 

*******************************************************************************
Ravi Ganesan                            e-mail: Ravi.Ganesan@Bell-Atl.Com
IS SAS Research & Strategic Planning    v-mail: (301) 595-8439
Bell Atlantic                           Fax:    (301) 595-1341/0245
******************************************************************************

********* 1st ACM Conference on Computer and Communications Security **********
                        Nov 3-5 1993, Fairfax, Virginia


                             Sponsor: ACM SIGSAC        
                Hosts:  Bell Atlantic and George Mason U

                     In cooperation and participation from:
                International Association of Cryptologic Research
        IEEE Communications Society TC on Network Operations and Management
                 IEEE Computer Society TC on Security and Privacy
                        Washington DC Chapter ACM


CONFERENCE HIGHLIGHTS: We invite your participation in this exciting new
conference whose purpose is to bring together researchers and
practitioners of computer and communications security. Our program
offers a unique blend of cryptography and security theory and practice,
with emphasis on the practical. The conference will be held in the
Holiday Inn, Fair Oaks, in Fairfax, Virginia; minutes from the Nation's
Capital. We welcome you to enjoy an informative and invigorating
program, and Washington's pleasant mid-fall sight-seeing weather.

Registration form and hotel information: 
---------------------------------------
Is given at the end, or can be obtained from George Mason University at:
Ph#: +1 703-993-2090, Fax#: +1 703-993-2112, email: acmccs93@isse.gmu.edu


                ADVANCE TECHNICAL PROGRAM (subject to change)
              ===============================================

November 3rd
------------

Welcome (Dorothy Denning & Ray Pyle)                            
        
Session: Applications-1 (Ravi Sandhu)

        - Does Licensing require new Access Control Techniques? 
         (Ralf Hauser)

        - A Cryptographic File System for UNIX  
         (Matt Blaze)

        - A Particular Solution to Provide Secure Communication in an   
          Ethernet environment 
         (Jordi Forne, Miguel Soriano, Jose Melus and Francisco Recacha)

Session: Cryptographic Protocols - 1 (Michael Weiner)

        - Some Metrics and Lower Bounds of Authentication Protocols 
          (Li Gong)

        - Optimality of Multi-Domain Protocols   
          (Raphael Yahalom)

        - On Simple and Secure Key Distribution 
          (Gene Tsudik and Els Van Herreweghen)

Session: Digital Signatures (Ravi Ganesan)

        - The History of RSA -- Invited Talk (Ronald Rivest)

        - A New Signature Scheme Based on the DSA Giving Message Recovery 
          (Kaisa Nyberg and Rainer Rueppel)

        - Random Oracles are Practical: A Paradigm for Designing Efficient 
          Protocols 
          (Mihir Bellare and Phillip Rogaway)

        - Sorting Out Signature Schemes
          (Birgit Pfitzmann)

Session: Legal and Policy Issues (Richard Graveman)

        - Avoiding Cryptographic Information Anarchy in Enterprises: 
          Invited Talk 
          (Don Parker)

        - Digital Signatures: Can They Be Accepted As Legal Signatures in EDI?
         (Patrick Brown)

Session: Short Talks (Virgil Gligor)

        - Design of the Commercial Data Masking Facility (CDMF) Data Privacy 
          Algorithm (Don Johnson, Stephen Matyas, An Le and John Wilkins)

        - Adding Time to a Logic of Authentication 
          (Paul Syverson)

        - NetCash: A design for practical electronic currency on the Internet 
          (Gennady Medvinsky and Clifford Neuman)

        - Considerations for Security in Personal Communications Systems (PCS)
          (Dan Brown)

        - A Framework for Distributed Authorization (Thomas Woo and Simon Lam)

November 4th
------------

Session: Multilevel and Database (Carl Landwehr)

        - A Pump for Rapid, Reliable, Secure Communication
          (Myong Kang and Ira Moskowitz)

        - Authorizations in Relational Data Base Mgmt. Systems 
          (Elisa Bertino, Pierangela Samarati and Sushil Jajodia)

        - High Assurance Discretionary Access Control for Object Bases 
          (Elisa Bertino, Pierangela Samarati and Sushil Jajodia)

Session: Applications - 2 (Victoria Ashby)

        - Denial of Service - Invited Talk
         (Roger Needham)

        - Analysis of an Algorithm for Distributed Recognition and
          Accountability 
          (Terrance Goan, Deborah Frincke, Calvin Ko, Todd heberlein, 
           Karl Levitt, Biswanath Mukherjee and Chris Wee)

        - Integration of DCE and Local Registries 
          (Ping Lin)

Session: Cryptology  (Rainer Rueppel)

        - Multiple Encryption and the Economics of DES - Invited Talk
          (Whitfield Diffie)

        - Systematic Generation of Cryptographically Robust S-boxes 
          (Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng)

        - Differential Cryptanalysis of Hash Functions Based on a Block Cipher 
          (Bart Preneel)

        - Verifiable Secret Sharing for Monotone Access Structures
          (Marcus Otten, Han-Joachim Knobloch and Thomas Beth)

Session: Telecommunications Security (Ravi Ganesan)

        - Securing a Global Village and its Resources: Baseline Security for 
          Interconnected Signaling System 7 Telecommunications Networks 
          - Invited Talk
          (Hank Kluepfel)

        - Panel: How Secure is the Public Switched Network?

November 5th
------------

Session: Reliability of Security Systems (Ravi Sandhu)

        - Cryptanalysis and Protocol Failure - Invited Talk 
          (Gustavus Simmons)

        - Why Cryptosystems Fail (Ross Anderson)

        - Panel: How to Engineer Reliable Security


Session: Cryptgraphic Protocols  - 2 (Yacov Yacobi)

        - Towards Practical `Proven Secure' Authenticated Key Distribution 
          (Yvo Desmedt and Mike Burmester)

        - Applying Formal Analysis Techniques to Authenticated  Diffie-Hellman
          Protocols 
          (Paul Van Oorschot)

        - Augmented Encrypted Key Exchange: A Password-Based Protocol Secure 
          Against Dictionary Attacks and Password File Compromise 
          (Steve Bellovin and Michael Merritt)


                        ******************************

General Chairs                     Program Committee                
--------------                     -----------------                
                                                                    
Dorothy Denning                    Victoria Ashby (MITRE)           
(Georgetown University)            Steve Bellovin (Bell Labs)       
                                   Whitfield Diffie (Sun)           
Raymond Pyle                       Taher El Gamal (Oki Data)        
(Bell Atlantic)                    Deborah Estrin (USC)             
                                   Joan Feigenbaum (Bell Labs)      
Program Chairs                     Virgil Gligor (U. Maryland)      
--------------                     Li Gong (SRI)                    
                                   Richard Graveman (Bellcore)      
Ravi Ganesan                       Sushil Jajodia (GMU)             
(Bell Atlantic)                    Paul Karger (GTE)                
                                   Carl Landwehr (NRL)              
Ravi Sandhu                        E. Stewart Lee (U. Toronto)      
(George Mason University)          Giancarlo Martella (U. Milan)    
                                   Michael Merritt (Bell Labs)      
Invited Speakers                   Jonathan Millen (MITRE)          
----------------                   Clifford Neuman (USC ISI)        
Whitfield Diffie (Sun)             Steven Rudich (CMU)              
Hank Kluepfel (Bellcore)           Rainer Rueppel (R3 Sec. Eng.)      
Roger Needham (Cambridge U)        Eugene Spafford (Purdue U)       
Donn Parker (SRI)                  Jacques Stern (DMI-GRECC)        
Ronald Rivest (MIT)                Michael Wiener (BNR)             
Gustavus Simmons                   Yacov Yacobi (Bellcore)          


********* 1st ACM Conference on Computer and Communications Security **********
                        Nov 3-5 1993, Fairfax, Virginia
                               REGISTRATION FORM

Mail or fax (+1 703-993-2112) this form to:
    ACMCCS '93 Registration
    Center for Professional Development-Business Office
    George Mason University
    Fairfax, VA 22030-4444

REGISTRATION CONTACT:
    Diane Waters, GMU (Phone: +1 703-993-2090, fax: +1 703-993-2112)

NAME:

AFFILIATION:

ADDRESS:

Phone:                            Fax:

ACM/IEEE Member Number:

Special Meal Requirements:  Kosher    Vegetarian 

REGISTRATION FEE: (Circle one)
    ACM/IEEE Member        $300 (before 10/1/93)      $325 (after 10/1/93)
    Non-Members            $360 (before 10/1/93)      $400 (after 10/1/93)
    Students               $100                       $100
                         
Fees include continental breakfast (11/3-5), lunch (11/3-4) and banquet (11/4).
Student fee is restricted to full-time students, or part-time students
who are unemployed.  In either case an advisor's endorsement is required.

Advisor Name and Signature:

Make checks or money orders payable, in US currency, to GMU/ACMCCS'93
Payment can also be made by purchase order (US organizations only) or 
credit card (Visa or Mastercard only).

Cirle one of: VISA    Mastercard

Card No:                             Expiration:

Name on Card:                        Signature: 

HOTEL: Holiday Inn at Fair Oaks, Phone: +1 703 352 2525, Fax: +1 703 352 4771
Rate: $69 (single/double) available until Oct 12
Mention 'ACM Security Conference' to get this rate


home help back first fref pref prev next nref lref last post