[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

4th ACM Conference on Computer and Communications Security



	

        *** EARLY REGISTRATION DISCOUNT ENDS JANUARY 31 ***



    Fourth ACM Conference on Computer and Communications Security
               (Preliminary Technical Program)
                     Zurich, Switzerland
                      April 1-4, 1997
                   Sponsored by ACM SIGSAC


For more information, including registration and hotel information,
see: http://www.zurich.ibm.ch/pub/Other/ACMsec/index.html


================
TUESDAY, APRIL 1
================

4 half-day tutorials in two parallel tracks:

		Theory Track			Practice Track

Morning     Cryptography		CERT and Practical Network Security
            Jim Massey, Ueli Maurer	Tom Longstaff
	    (ETH Zurich)		(Software Engineering Institute)

				lunch

Afternoon   Internet Security		Info-Wars
	    Refik Molva			Paul Karger
	    (Eurecom)			(IBM TJ Watson)

==================
WEDNESDAY, APRIL 2
==================

09:00-09:30 Introduction and Opening Comments
			Richard Graveman (Bellcore)
			Phil Janson (IBM Zurich Lab)
			Li Gong (JavaSoft)
			Clifford Neuman (Univ. of Southern California)

09:30-10:30 Invited talk 1: To Be Announced

10:30-11:00 Coffee Break

11:00-12:00 Session 1: Fair Exchange of Information
			Chair: Philippe Janson (IBM Zurich Lab)

* Fair Exchange with a Semi-Trusted Third Party
  Matthew Franklin, Mike Reiter (AT&T Research)

* Optimistic Protocols for Fair Exchange
  N. Asokan, Matthias Schunter, Michael Waidner
	(IBM Zurich Lab and Univ. Dortmund)

12:00-14:00 Lunch

14:00-15:30 Session 2: Language and System Security
			Chair: Michael Waidner (IBM Zurich Lab)

* Static Typing with Dynamic Linking
  Drew Dean (Princeton University)

* Secure Digital Names
  Scott Stornetta, Stuart Haber (Surety Technologies)

* A Calculus for Cryptographic Protocols: The Spi Calculus
  Martin Abadi, Andrew D. Gordon (DEC SRC and Cambridge)

15:30-16:00 Coffee Break

16:00-17:30 Panel 1: Programming Languages as a Basis for Security
			Chair: Drew Dean (Princeton)
			Panelists: To Be Announced

Welcome Cocktail

=================
THURSDAY, APRIL 3
=================

09:00-10:30 Session 3: Authentication
			Chair: Ravi Sandhu (George Mason Univ.)

* Authentication via Keystroke Dynamics
  Fabian Monrose, Avi Rubin (New York Univ. and Bellcore)

* Path Independence for Authentication in Large-Scale Systems
  Mike Reiter, Stuart Stubblebine (AT&T Research)

* Proactive Password Checking with Decision Trees
  Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
	(Univ. of Turin)

10:30-11:00 Coffee Break

11:00-12:00 Invited talk 2: To Be Announced

12:00-14:00 Lunch

14:00-15:30 Session 4: Signatures and Escrow
			Chair: Martin Abadi (DEC SRC)

* Verifiable Partial Key Escrow
  Mihir Bellare, Shafi Goldwasser (UC San Diego and MIT)

* New Blind Signatures Equivalent to Factorisation
  David Pointcheval, Jacques Stern (ENS/DMI, France)

* Proactive Public-Key and Signature Schemes
  Markus Jakobsson, Stanislaw Jarecki, Amir Herzberg,
	Hugo Krawczyk, Moti Yung (UC San Diego, MIT, IBM Haifa Lab,
	IBM TJ Watson, and Bankers Trust)

15:30-16:00 Coffee Break
 
16:00-17:30 Panel 2: Persistance and Longevity of Digital Signatures
			Chair: Gene Tsudik (USC/ISI)
			Panelists: To Be Announced

Banquet Dinner

===============
FRIDAY, APRIL 4
===============

09:00-10:30 Session 5: Commerce and Commercial Security
			Chair: Jacques Stern (ENS/DMI, France)

* A New On-Line Cash Check Scheme
  Robert H. Deng, Yongfei Han, Albert B. Jeng,
	Teow-Hin Ngair (National University of Singapore)

* Conditional Purchase Orders
  John Kelsey, Bruce Schneier (Counterpane Systems)

* The Specification and Implementation of 'Commercial' Security
	Requirements including Dynamic Segregation of Duties
  Simon Foley (University College, Cork, Ireland)

10:30-11:00 Coffee Break

11:00-12:30 Session 6: Cryptography
			Chair: Mike Reiter (AT&T Research)

* On the Importance of Securing Your Bins:
	The Garbage-Man-in-the-Middle Attack
  Marc Joye, Jean-Jacques Quisquater (Univ. Louvain)

* Improved Security Bounds for Pseudorandom Permutations
  Jacques Patarin (Bull)

* Asymmetric Fingerprinting for Larger Collusions
  Birgit Pfitzmann, Michael Waidner
	(Univ. Hildesheim and IBM Zurich Lab)

12:30 Conference Adjourns