Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

Events 

NDSS Symposium 2001

NDSS 2001 8-9 February 2001 Sand Diego, California, USA

Network and Distributed System Security Symposium
Catamaran Resort Hotel
San Diego, California

7 February 2001 - Technical Tutorials
8-9 February 2001 - Symposium

Final Program

WEDNESDAY, 7 FEBRUARY 2001

On-Site Registration (07:30 - 19:30)

Tutorial #1 - Network Security Protocol Standards (08:30 - 17:00)

Tutorial #2 - Network Security Protocols: Generic tricks and emerging standards (08:30 - 17:00)

Tutorial #3 - Building Secure Software: Why the standard approach to security doesn't work (08:30 - 12:00)

Tutorial #4 - Practical Intrusion Detection (08:30 - 12:00)

Tutorial #6 - Secure Electronic Commerce Tutorial (13:30 - 17:00)

Tutorial #7 - Group Security (13:30 - 17:00)

Welcome Reception - Catamaran Resort Hotel (18:30 - 21:00)

THURSDAY, 8 FEBRUARY 2001

PACKET FLOWS (9:00-10:30)

  • An Algebraic Approach to IP Traceback, D. Dean, M. Franklin and A. Stubblefield
  • Authenticating Streamed Data in the Presence of Random Packet Loss, P. Golle and N. Modadugu
  • Practical Experiences with ATM Encryption, G. Byrd, N. Hillery, and J. Symon

SECURITY PROTOCOLS (11:00-12:00)

  • Efficient and Secure Source Authentication for Multicast, A. Perrig, R. Canetti, D. Song and D. Tygar
  • TRICERT: A Distributed Certified E-Mail Scheme, G. Ateniese, B. de Medeiros and M.T. Goodrich

INVITED TALK: WIRELESS SECURITY - IS IT REAL? Alfred Menezes, Certicom Corp. and University of Waterloo
(14:00-15:00)

MISCELLANEOUS: (15:30-16:30)

  • An Architecture for Flexible, High Assurance, Multi-Security Domain Networks, T.J. Gibson
  • Authentication and Key Agreement Via Memorable Passwords, T. Kwon

CASINO NIGHT - CATAMARAN HOTEL
Sponsored by Qualcomm
(18:30 - 23:00)

FRIDAY, 9 FEBRUARY 2001

POLICY (8:30-10:00)

  • SPL: An Access Control Language for Security Policies and Complex Constraints, C. Ribeiro, A. Zuquete, P. Ferreira and P. Guedes
  • Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation, K.E. Seamons, M. Winslett and T. Yu
  • Principles of Policy in Secure Groups, P. McDaniel, H. Harney and A. Colgrove

TRUST MANAGMENT (10:30-12:00)

  • Trust Management for IPsec, A.D. Keromytis, M. Blaze and J. Ioannidis
  • Building Certifications Paths: Forward vs. Reverse, Y. Elley, A. Anderson, S. Hanna, S. Mullan, R. Perlman, S. Proctor
  • Decentralized Jini Security, P. Eronen, P. Nikander

IMPLEMENTATION ISSUES (14:00-15:30)

  • Termination in Language-based Systems, A. Rudys, J. Clements, D.S. Wallach
  • Cryptology As a Network Service, D. Dean, T. Berson, M. Franklin, D. Smetters, M. Spreitzer
  • Implementation of Crossrealm Referral Handling in the MIT Kerberos Client, J. Trostle, I. Kosinovsky

INVITED TALK: SECURITY RISKS OF PEER-TO-PEER NETWORKING
Steve Bellovin, AT&T Labs-Research (16:00-17:00)