New Security Paradigms Workshop 1998
Preliminary Program
6 -- 7 p.m. Cocktail Reception and Hors-d'oeuvres
7 -- 9 p.m. Dinner
8 -- 9 a.m. Continental Breakfast
9 a.m. Welcome, Opening Remarks (Bob Blakley)
9:30 a.m. - 11:30 a.m. Session 1: The Software Life-Cycle
Chair: Hilary Hosmer, Data Security Inc.
Toward A Secure System Engineering Methodology
O. Sami Saydjari, DARPA, presenting
Security Engineering in an Evolutionary Acquisition Environment
Marshall D. Abrams, MITRE, presenting
11:30 -- 1:00pm Lunch
1:30 p.m. - 3 p.m. Session 2: Protection
An Integrated Framework for Security and Dependability
Erland Jonsson, Chalmers University of Technology, presenting
Meta Objects for Access Control: A Formal Model for Role-Based Principals
Thomas Riechmann, University of Erlangen, presenting
3 p.m. - 3:30 p.m. Break with Coffee and afternoon tea
3:30 p.m. - 5:30 p.m. Session 3: Integrity
Chair: Cristina Serban, AT&T Labs
Evaluating System Integrity
Simon N. Foley, University of Cambridge, presenting
Position Paper: Prolepsis on The Problem of Trojan-Horse-Based Integrity Attacks
J. McDermott, Naval Research Laboratory, presenting
6:30p.m. Wine hour
7 -- 9p.m. Cookout dinner on the patio
8 -- 9 a.m. Continental Breakfast
9 a.m. - 11 a.m. Session 4: Assurance
Chair: Marv Schaefer, Arca Systems, Inc.
Death, Taxes, and Imperfect Software: Surviving the Inevitable
Crispin Cowan, Oregon Graduate Institute of Science & Technology, presenting
A Graph-Based System for Network-Vulnerability Analysis
Cynthia Phillips, Sandia National Laboratories, presenting
11 - 11:30 Break
11:30 - 12:15 Session 5: Tough Stuff; part 1
Chair: Cathy Meadows, Naval Research Laboratory
Parsimonious Downgrading and Decision Trees Applied To The Inference Problem
LiWu Chang, Naval Research Laboratory, presenting
12:15 - 1:30 Lunch Buffet
1:30 - 2:15 Session 5: Tough Stuff (continued); part 2
Server-Assisted Cryptography
Donald Beaver, IBM/Transarc Corp., presenting
2:15 - 3 Break
3 - 4:30 Session 6: Discussion
Chair and author: Steven J. Greenwald, Independent Consultant
Discussion Topic: What is the Old Security Paradigm?
7--9pm Plated sit-down dinner
8 -- 9 a.m. Continental Breakfast
9 - 11 Session 7: Availability
Chair: Brenda Timmerman, California State University, Northridge
Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration
Clifford Kahn, The Open Group Research Institute, presenting
A New Model for Availability in the Face of Self-Propagating Attacks
Meng-Jang Lin, University of Texas at Austin, presenting
11 - 12 Business Meeting
12 -- 1p.m. Lunch