Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

Events 

NDSS Symposium 1997

Hypermedia Proceedings, Slides, and Summary Report

Copyright © 1997 Institute of Electrical and Electronics Engineers. Reprinted from The Proceedings of the 1997 Symposium on Network and Distributed Systems Security.

This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending a blank email message to info.pub.permission@ieee.org

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Table of Contents

Session 1: Things That Go Bump In The Net
Chair: Stephen T. Kent - BBN Corporation

Session 2: Panel - Security Of Downloadable Executable Content
Chair: Aviel D. Rubin - Bellcore

Session 3: Protocol Implementation And Analysis
Chair: Christoph Schuba - Purdue University

Session 4: Panel - Security Of The Internet Infrastructure
Chair: Russ Mundy - Trusted Information Systems

Session 5: Routing Security
Chair: Hilarie Orman - DARPA/ITO

  1. Securing the Nimrod Routing Architecture
    K.E. Sirois and S.T. Kent
  2. Securing Distance-Vector Routing Protocols
    B.R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves
  3. Reducing the Cost of Security in Link-State Routing
    R. Hauser, T. Przygienda, and G. Tsudik

Session 6: Security For The World Wide Web
Chair: Win Treese - OpenMarket, Inc.

  1. Securing Web Access with DCE
    B.C. Schimpf
  2. Panel - Security and the World Wide Web
    Chair: Win Treese - OpenMarket, Inc.

Session 7: Public Key Management
Chair: Jonathan Trostle - CyberSafe

  1. Hierarchical Organization of Certification Authorities for Secure Environments
    L. Lopez and J. Carracedo
  2. Trust Models in ICE-TEL
    A. Young, N.K. Cicovic, and D. Chadwick (abstract, slides)
  3. Distributed Authentication in Kerberos Using Public Key Cryptography
    M.A. Sirbu and J.C.-I. Chuang (abstract, slides)

Session 8: Panel - Web Privacy And Anonymity
Chair: B. Clifford Neuman - USC Information Sciences Institute (abstract, slides)

Paper/Panel Index