[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/882493guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
1997 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
May 4 - 7, 1997
Published:
04 May 1997

Reflects downloads up to 09 Jan 2025Bibliometrics
Abstract

No abstract available.

Article
Message from the Program Chairs
Page .08
Article
Conference Committee
Page .09
Article
Some weaknesses of the TCB model
Page 3

This paper summarizes the affirmative argument supporting the proposition that "the concept of the trusted computing base (TCB) as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to ...

Article
Toward acceptable metrics of authentication
Page 10

Abstract: Authentication using a path of trusted intermediaries, each able to authenticate the next one in the path, is a well-known technique for authenticating entities in a large-scale system. Recent work has extended this technique to include ...

Article
An Authorization Scheme For Distributed Object Systems
Page 21

This paper addresses the problem of distributed object system protection. A new authorization scheme is presented and described. It is based on the collaboration between a central authorization server and security kernels located on each site of the ...

Article
A Logical Language for Expressing Authorizations
Page 31

A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e., accesses to be allowed or denied) must be specified in terms of ...

Article
Anonymous Connections and Onion Routing
Page 44

Onion Routing provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication ...

Article
The design and implementation of a multilevel secure log manager
Page 55

Abstract: This paper discusses the security issues involved in log management for a multilevel secure database system and presents a design and implementation of a prototype multilevel secure log manager. The main goal of a log manager is to provide ...

Article
A secure and reliable bootstrap architecture
Page 65

Abstract: In a computer system, the integrity of lower layers is typically treated as axiomatic by higher layers. Under the presumption that the hardware comprising the machine (the lowest layer) is valid, the integrity of a layer can be guaranteed if ...

Article
An MBone Proxy for an Application Gateway Firewall
Page 72

The Internet's multicast backbone (MBone) holds great potential for many organizations because it supports low-cost audio and video conferencing and carries live broadcasts of an increasing number of public interest events. MBone conferences are ...

Article
Secure software architectures
Page 84

Abstract: The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software ...

Article
A general theory of security properties
Page 94

Abstract: We present a general theory of possibilistic security properties. We show that we can express a security property as a predicate that is true of every set containing all the traces with the same low level event sequence. Given this security ...

Article
Analyzing consistency of security policies
Page 103

Abstract: We discuss the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifies what actions some agents are permitted, obliged or forbidden to perform ...

Article
Ensuring assurance in mobile computing
Page 114

Abstract: This paper introduces a panel discussion on establishing assurance evidence that mobile code applications perform as expected by the user, without the side effects that have been demonstrated as possible in constructed examples of malicious or ...

Article
Filtering postures: local enforcement for global policies
Page 120

A Abstract: When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will do so correctly. We introduce a simple language for expressing ...

Article
Providing flexibility in information flow control for object oriented systems
Page 130

Abstract: This paper presents an approach to control information flow in object-oriented systems that takes into account, besides authorizations on objects, also how the information has been obtained and/or transmitted. These aspects are considered by ...

Article
Automated analysis of cryptographic protocols using Mur/spl phi/
Page 141

Abstract: A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/, to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder (1978) ...

Article
How to Systematically Classify Computer Security Intrusions
Page 154

This paper presents a classification of intrusions with respect to technique as well as to result. The taxonomy is intended to be a step on the road to an established taxonomy of intrusions for use in incident reporting, statistics, warning bulletins, ...

Article
Surviving information warfare attacks on databases
Page 164

Abstract: We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of ...

Article
Execution monitoring of security-critical programs in distributed systems: a Specification-based approach
Page 175

Abstract: We describe a specification-based approach to detect exploitations of vulnerabilities in security-critical programs. The approach utilizes security specifications that describe the intended behavior of programs and scans audit trails for ...

Article
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery
Page 188

Knowledge discovery in databases can be enhanced by introducing "catalytic relations" conveying external knowledge. The new information catalyzes database inference, manifesting latent channels. Catalytic inference is imprecise in nature, but the ...

Article
Article
Escort: securing Scout paths
Page 206

Abstract: Scout is a communication oriented operating system that can be specialized for different information appliances. It uses paths as an explicit first class object to describe the flow of information through the system. Escort is the security ...

Article
Analysis of a Denial of Service Attack on TCP
Page 208

This paper analyzes a network-based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (Transmission Control Protocol) connection requests with spoofed source ...

Article
Deniable password snatching: on the possibility of evasive electronic espionage
Page 224

Abstract: Cryptovirology has recently been introduced as a means of mounting active viral attacks using public key cryptography. It has been shown to be a tool for extortion attacks and "electronic warfare", where attacks are mounted against information ...

Article
Number theoretic attacks on secure password schemes
Page 236

Abstract: Encrypted Key Exchange (EKE) (S. Bellovin and M. Merritt, 1992; 1993) allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secret key cryptography. EKE ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations