Proceedings: USENIX Association, Baltimore, MD, September 14 - 16, 1992
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | Undetermined |
Veröffentlicht: |
Berkeley, Calif.
USENIX Assoc.
1992
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | 347 S. graph. Darst. |
ISBN: | 1880446464 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV009534434 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 940311s1992 d||| |||| 10||| und d | ||
020 | |a 1880446464 |9 1-880446-46-4 | ||
035 | |a (OCoLC)633343213 | ||
035 | |a (DE-599)BVBBV009534434 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | |a und | ||
049 | |a DE-91G | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 440f |2 stub | ||
111 | 2 | |a UNIX Security Symposium |n 3 |d 1992 |c Baltimore, Md. |j Verfasser |0 (DE-588)5092148-4 |4 aut | |
245 | 1 | 0 | |a Proceedings |b USENIX Association, Baltimore, MD, September 14 - 16, 1992 |c UNIX Security Symposium III |
264 | 1 | |a Berkeley, Calif. |b USENIX Assoc. |c 1992 | |
300 | |a 347 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006296163&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-006296163 |
Datensatz im Suchindex
_version_ | 1804123872228802560 |
---|---|
adam_text | UNIX Security Symposium III
Baltimore, MD
September
14-16,1992
Sponsored by the USENIX Association in cooperation mth the
Computer Emergency Response Team (CERT)
Tuesday, September
15
8:30 - 8:45
Opening Remarks
8:45 -10:15
Keynote Address
The Justice Department s Computer Crime Initiative
Scott Charney, U.S. Department of Justice
10:35 -
12.O5 War Stories
There Be Dragons
.....................................................................................................................................................1
Steve Bellovin, AT&T Bell Laboratories
The Greatest Cracker-Case in Denmark: The Detecting,
Tracing, and Arresting of Two International Crackers
.....................................................................................17
Joergen Bo Madsen, The Danish Computing Center for Research and Education
Experiences of Internet Security in Italy
.............................................................................................................41
Alessandro
Berni,
Paolo
Franchi, ]oy
Marino, University of
Genova
1:30 - 3:00
ТСРЯР
Network Security
An Internet Gatekeeper
.........................................................................................................................................49
Herve
Schauer, Christophe Wolfhugel, Herve Schauer
Consultants
Network (Insecurity Through IP Packet Filtering
...........................................................................................63
D. Brent Chapman, Great Circle Associates
SOCKS
......................................................................................................................................................................77
David Koblas, Independent Consultant, Michelle R. Koblas, Computer Sciences Corporation
3:20 - 5:20
Tools
1
TCP WRAPPER: Network Monitoring, Access Control and Booby Traps
....................................................85
Wtefse
Venerna,
Eindhoven University of Technology
Restricting Network Access to System Daemons Under SunOS
....................................................................93
William
Lďebvre,
Northwestern University
Centralized System Monitoring with Swatch
...................................................................................................105
Stephen E.
Hansen,
E.
Todd Atkins, Stanford University
Security Aspects of a UNIX
РЕМ
Implementation
..........................................................................................119
James M. Galvin, David M.
Balenson,
Trusted Information Systems, Inc.
Wednesday, September
16
9:00 -10:30
Tools
2
Introduction to the Shadow Password Suite
.....................................................................................................133
John F. Haugh, II, Locus Computing Corporation
Giving Customers the Tools to Protect Themselves
.........................................................................................145
ShabbirJ. Safdar, Purdue University
ESSENSE: An Experience in Knowledge-Based Security Monitoring and Control
....................................155
Linda Baillie, Gary W.
Höglund,
Lisa
Jansen,
Eduardo
M. Valcarce,
Digital Equipment Corporation
10:50 -12:20
Tools
2
(Continued)
Anatomy of a Proactive Password Changer
.....................................................................................................171
Matt Bishop, Dartmouth College
Audit: A Policy Driven Security Checker for a Heterogeneous Environment
.............................................185
Bjorn Satdeva, /sys/admin, inc.
Secure
Superuser
Access Via the Internet
..........................................................................................................203
Darrell Suggs, Clemson University
1:45 - 3:15
Track
1 -
Applied Research
Specifying and Checking UNIX Security Constraints
.....................................................................................211
Allan Heydon, DEC Systems Research Center; J. D. Tygar, Carnegie Mellon University
A Secure Public Network Access Mechanism
..................................................................................................227
J. David Thompson, Science Applications International Corporation, Kate
Arndt,
The MITRE Corporation
Network Security Via Private-Key Certificates
.................................................................................................239
Don Davis,
Geer Zolot
Associates, Ralph Swick, Digital Equipment Corporation
1:45 - 3:15
Track
2 -
MLS
Is There a C2 UNIX System in the House?
........................................................................................................243
Jeremy Epstein, TRW Systems Division
Software Security for a Network Storage Service
.............................................................................................253
Rena
A. Haynes, Suzanne M. Kelly,
Sandia
National Laboratories
3:35 - 5:35
Track
1 -
Applied Research (Continued)
SunOS, C2 and
Kerberos -
A Comparative Review
.........................................................................................265
John
N.
Stewart, Syracuse University
Heterogeneous Intra-Domain Authentication
..................................................................................................285
Bart De
Decker, Els Van Herreweghen, Frank Piessens,
K.U.Leuven
Observing Reusable Password Choices
.............................................................................................................299
Eugene Spafford, Purdue University
3:35 - 5:35
Track
2 -
MLS (Continued)
Reconciling a Formal Model and a Prototype Implementation:
Lessons Learned in Implementing the ORGCON Policy
..................................................................................313
Marshall Abrrnns, Leonard LaPadula,
Manette
Lazear,
Ingrid
Olson, The MITRE Corporation
UNIX Operating Services on a Multilevel Secure Machine
.............................................................................329
Bruno d Ausbourg, CEKT/ONERA France
Distributed Trusted UNIX Systems
.....................................................................................................................347
Charisse
Castagnoli,
Charles Watt, SecureWare, Inc.
Program Committee
Ed DeHart, Program Chair, CERT
Matt Bishiop, Dartmouth College
Bill Cheswick, AT&T Bell Laboratories
Ana Maria
De
Alvare , Silicon Graphics, Inc.
Jim Ellis, CERT
Barbara
Fraser,
CERT
Ken van
Wyk,
CERT
|
any_adam_object | 1 |
author_corporate | UNIX Security Symposium Baltimore, Md |
author_corporate_role | aut |
author_facet | UNIX Security Symposium Baltimore, Md |
author_sort | UNIX Security Symposium Baltimore, Md |
building | Verbundindex |
bvnumber | BV009534434 |
classification_tum | DAT 050f DAT 460f DAT 440f |
ctrlnum | (OCoLC)633343213 (DE-599)BVBBV009534434 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01257nam a2200325 c 4500</leader><controlfield tag="001">BV009534434</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">940311s1992 d||| |||| 10||| und d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1880446464</subfield><subfield code="9">1-880446-46-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)633343213</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV009534434</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">und</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 440f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">UNIX Security Symposium</subfield><subfield code="n">3</subfield><subfield code="d">1992</subfield><subfield code="c">Baltimore, Md.</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)5092148-4</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings</subfield><subfield code="b">USENIX Association, Baltimore, MD, September 14 - 16, 1992</subfield><subfield code="c">UNIX Security Symposium III</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, Calif.</subfield><subfield code="b">USENIX Assoc.</subfield><subfield code="c">1992</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">347 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006296163&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-006296163</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV009534434 |
illustrated | Illustrated |
indexdate | 2024-07-09T17:36:40Z |
institution | BVB |
institution_GND | (DE-588)5092148-4 |
isbn | 1880446464 |
language | Undetermined |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-006296163 |
oclc_num | 633343213 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | 347 S. graph. Darst. |
publishDate | 1992 |
publishDateSearch | 1992 |
publishDateSort | 1992 |
publisher | USENIX Assoc. |
record_format | marc |
spelling | UNIX Security Symposium 3 1992 Baltimore, Md. Verfasser (DE-588)5092148-4 aut Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 UNIX Security Symposium III Berkeley, Calif. USENIX Assoc. 1992 347 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben (DE-588)1071861417 Konferenzschrift gnd-content Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006296163&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 |
subject_GND | (DE-588)1071861417 |
title | Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 |
title_auth | Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 |
title_exact_search | Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 |
title_full | Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 UNIX Security Symposium III |
title_fullStr | Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 UNIX Security Symposium III |
title_full_unstemmed | Proceedings USENIX Association, Baltimore, MD, September 14 - 16, 1992 UNIX Security Symposium III |
title_short | Proceedings |
title_sort | proceedings usenix association baltimore md september 14 16 1992 |
title_sub | USENIX Association, Baltimore, MD, September 14 - 16, 1992 |
topic_facet | Konferenzschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006296163&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT unixsecuritysymposiumbaltimoremd proceedingsusenixassociationbaltimoremdseptember14161992 |