default search action
NDSS 1995: San Diego, California, USA
- James T. Ellis, David M. Balenson, Robert W. Shirey:
1995 Symposium on Network and Distributed System Security, (S)NDSS '95, San Diego, California, USA, February 16-17, 1995. IEEE Computer Society 1995, ISBN 0-8186-7027-4
Session 1 - Diverse Approaches to Security at the Network Layer
- Tony Ballardie, Jon Crowcroft:
Multicast-specific security threats and counter-measures. 2-16 - Daniel S. Stevenson, Nathan Hillery, Gregory T. Byrd, Fengmin Gong, Dan Winkelstein:
Design of a key agile cryptographic system for OC-12c rate ATM. 17-30 - Steffen Stempel:
IpAccess-an Internet service access system for firewall installations. 31-46
Session 2 - Panel
- Aviel D. Rubin:
Trusted distribution of software over the Internet. 47-53 - John C. Lowry:
Location-independent information object security. 54-63
Session 4 - Internet Payments
- Stefan Brands:
Electronic cash on the Internet. 64-84 - Ravi Ganesan:
Panel - Internet Payment Mechanisms: Requirements and Architectures. 85-86
Session 5 - Security Monitoring Tools: Practice and Experience
- David G. Simmons, Ronald Wilkins:
NERD: Network Event Recording Device: an automated system for network anomaly detection and notification. 87-93 - Jim Alves-Foss:
An overview of SNIF: a tool for Surveying Network Information Flow. 94-101 - Abdelaziz Mounji, Baudouin Le Charlier, D. Zampuniéris, Naji Habra:
Distributed audit trail analysis. 102-113
Session 6 - Authentication and Authorization
- P. V. McMahon:
SESAME V2 public key and authorisation extensions to Kerberos. 114-131 - Ravi Ganesan:
Yaksha: augmenting Kerberos with public key cryptography. 132-143 - Barry Jaspan:
GSS-API security for ONC RPC. 144-152
Session 7 - Mechanisms of Identity: The Certificate Infrastructure
- Nada Kapidzic, Alan Davidson:
A Certificate Management System: structure, functions and protocols. 153-160 - Alireza Bahreman:
PEMToolKit: building a top-down certification hierarchy for PEM from the bottom up. 161-171 - Suzan Mendes, Christian Huitema:
A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust model. 172-190
Session 8 - Panel
- Frederick M. Avolio:
Panel: Security Issues for Mosaic and the World Wide Web. 191
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.