Proceedings 13th Annual Computer Security Applications Conference

8-12 Dec. 1997

Filter Results

Displaying Results 1 - 25 of 38
  • Proceedings 13th Annual Computer Security Applications Conference

    Publication Year: 1997
    Request permission for reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • Micro-digital money for electronic commerce

    Publication Year: 1997, Page(s):2 - 8
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Proposes two novel cash-based micropayment schemes based on a new technique referred to as the double-locked hash chain technique. Both schemes support the divisibility and transferability of digital coins in a simpler way compared to the existing solutions. The basic scheme allows full or partial use of a coin chain in a transaction; if only part of a coin chain has been used with one vendor, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure and efficient digital coins

    Publication Year: 1997, Page(s):9 - 15
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (506 KB)

    Current off-line electronic cash systems require a great number of complex online computations by clients during the payment phase. In this paper, we propose a new off-line anonymous cash scheme that greatly reduces the number of online computations that need to be done by the clients for each payment transaction. In particular, except for the first coin in a transaction, the client only needs to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The secure distribution of digital contents

    Publication Year: 1997, Page(s):16 - 22
    Cited by:  Papers (1)  |  Patents (22)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (649 KB)

    A report is given on the development of a system for the distribution of encrypted digital contents via freely accessible distribution media. To be able to use this information, the key needed for decryption has to be ordered from a key management system. The distribution of the keys required for decryption is restricted whereas the distribution of the encrypted contents is not. The key is sent to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple assured bastion hosts

    Publication Year: 1997, Page(s):24 - 33
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (845 KB)

    It is shown how compartmented mode workstation (CMW) technology can be used as the basis of simple assured firewalls, where the vast majority of the evaluation effort required is reused from the evaluation of the CMW. The generic bastion host architecture described provides ITSEC E3 assurance that the unevaluated proxies cannot be bypassed. Assurance that the inappropriate export of information is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kernel and shell based applications integrity assurance

    Publication Year: 1997, Page(s):34 - 43
    Cited by:  Papers (6)  |  Patents (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (846 KB)

    The verification of the authenticity of software by an executing host has become a vital security issue in recent years with the original postulation and subsequent evolution of computer viruses. The CASS (Computer Architecture for Secure Systems) project addresses this issue by incorporating integrity checking at the operating system level. This paper describes three prototype implementations of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk assessment for large heterogeneous systems

    Publication Year: 1997, Page(s):44 - 52
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (847 KB)

    This paper describes a security risk assessment process for large, heterogeneous systems of systems, such as C/sup 4/I or weapon systems. It first defines the characteristics of an effective security risk assessment process. Next, it discusses subsystem-level and top-down risk assessment approaches and describes their advantages and limitations. The paper then presents and discusses the characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel: Product Assurance

    Publication Year: 1997, Page(s): 54
    Request permission for reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Evolving The Evaluation Paradigm

    Publication Year: 1997, Page(s):56 - 57
    Request permission for reuse | PDF file iconPDF (152 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing an object relational database

    Publication Year: 1997, Page(s):59 - 68
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (942 KB)

    A form of security labelling is added to a COTS object relational DBMS. The labelling is discretionary and so provides mediated access to data, but does not defend against the inappropriate release of data through the database, whether by Trojan Horse software or a treacherous user. To counter these risks, business constraints are imposed to ensure that a user sanctions the release of any data and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting secure canonical upgrade policies in multilevel secure object stores

    Publication Year: 1997, Page(s):69 - 80
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1044 KB)

    Secure canonical upgrade policies are multilevel re-label policies that, under certain conditions, allow high-level subjects to update low-level security labels. This paper describes a scheme whereby these policies can be supported within the message filter model for multilevel secure object-oriented database management systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental assurance for multilevel applications

    Publication Year: 1997, Page(s):81 - 88
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    The paper describes an approach, incremental assurance, for balancing security with the economic pressures of developing secure systems. The approach combines many of the existing techniques for reducing costs in developing secure systems. The paper illustrates incremental assurance with three example applications involving high assurance and multilevel DBMS technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient message authentication scheme for link state routing

    Publication Year: 1997, Page(s):90 - 98
    Cited by:  Papers (41)  |  Patents (21)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (882 KB)

    We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some routers such as border routers may need to sign many routing updates. Previous work such as public-key based schemes are very expensive computationally or have certain limitations. This paper presents an efficient solution,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection and classification of TCP/IP network services

    Publication Year: 1997, Page(s):99 - 107
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (811 KB)

    Computer intruders are employing more sophisticated techniques to compromise computer systems. Once compromised, in most cases, intruders install remote terminal software to ensure continued, undetectable access to the victim site bypassing standard system audit and security features. Detection of this type of intruder activity was a problem for law enforcement during a computer intrusion investig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving user privacy in mobile networks

    Publication Year: 1997, Page(s):108 - 116
    Cited by:  Papers (12)  |  Patents (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (897 KB)

    Third generation mobile networks aim to offer 'any service, anywhere, at any time'. Users require privacy within these systems in order to feel confident of their use. Privacy requirements (in mobile networks) are: content, location and identification privacy, and authentication. Differing from previous approaches to privacy, the network itself is considered to be an untrusted party. The paper pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical Infrastructure Protection-the cyber/information dimension: report on national infrastructure coordination initiatives

    Publication Year: 1997, Page(s):118 - 120
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (215 KB)

    Executive Order 13010, entitled "Critical Infrastructure Protection," states that certain national infrastructures are so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the United States. Threats to these critical infrastructures fall into two categories: physical threats and cyber threats. The order established the President's Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain and type enforcement firewalls

    Publication Year: 1997, Page(s):122 - 132
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1164 KB)

    Internet connected organizations often employ an Internet firewall to mitigate risks of system penetration, data theft, data destruction, and other security breaches. Conventional Internet firewalls, however, impose an overly simple inside vs outside model of security that is incompatible with many business practices that require extending limited trust to external entities. The paper reports on o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reference model for firewall technology

    Publication Year: 1997, Page(s):133 - 145
    Cited by:  Papers (7)  |  Patents (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1377 KB)

    The paper concentrates on one particular technological aspect of providing communications security, firewall technology. Currently firewall technology is a specialized engineering solution rather than a scientifically based solution. The paper introduces a reference model that captures existing firewall technology and allows for an extension to networking technologies to which it was not applied p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assurance Forum: Lessons Learned

    Publication Year: 1997, Page(s):155 - 156
    Request permission for reuse | PDF file iconPDF (115 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing RBAC on a type enforced system

    Publication Year: 1997, Page(s):158 - 163
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    Role Based Access Control (RBAC) has gathered much attention in the recent literature. Much of the discussion has focused on theoretical issues, potential features, or on Web or security database implementations. The paper describes an implementation of RBAC mechanisms on LOCK6, a secure operating system developed at Secure Computing Corporation. The implementation has the RBAC features necessary ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lattice-based models for controlled sharing of confidential information in the Saudi Hajj system

    Publication Year: 1997, Page(s):164 - 174
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (926 KB)

    The pilgrimage (Hajj) is an annual event that takes place in Saudi Arabia. Three major government ministries (Foreign, Internal, and Hajj) create and process Hajj data separately in their systems. Currently all data sharing between these ministries regarding Hajj is done manually. Benefits from sharing data electronically are obvious. But due to the sensitivity of some data and the common requirem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using type enforcement to assure a configurable guard

    Publication Year: 1997, Page(s):146 - 154
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Prior to the introduction of guard systems for electronic mail, guards tended to be overly specialized and not versatile enough for today's user community. The paper examines the use of type enforcement to create a highly assured yet administrator configurable guard. The administrator must be able to trust that the configuration provided will indeed be followed. This occurs by using highly assured... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using kernel hypervisors to secure applications

    Publication Year: 1997, Page(s):175 - 181
    Cited by:  Papers (13)  |  Patents (17)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    The paper describes an approach for selectively controlling COTS components to provide robustutess and security. Using the concept of a loadable module, "kernel hypervisors" have been implemented on a Linux kernel. These kernel hypervisors provide unbypassable security wrappers for application specific security requirements and can be used to provide replication services as well. A framework has b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying the DoD goal security architecture as a methodology for the development of system and enterprise security architectures

    Publication Year: 1997, Page(s):183 - 193
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1196 KB)

    Many organizations have a need to conduct security assessments and develop security architectures. It was recognized that a structured approach is needed. The Department of Defense Goal Security Architecture (DGSA) was already developed through considerable effort by knowledgeable security professionals. Our approach was to tailor the DGSA to fit many enterprise information system security profile... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for multilevel secure interoperability

    Publication Year: 1997, Page(s):194 - 204
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1131 KB)

    As computer systems become distributed and heterogeneous, there is strong movement in the commercial sector to ease the problems of interoperability and security. Many standards have been proposed for these problems. However, the commercial sector has not shown strong interest in providing cost effective high assurance multilevel security (MLS) solutions to the relatively small communities (e.g., ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.