`
`Page 1 of 4
`
`Technical Program Features and Organization
`
`We continue to add diversity to the manner in which computer security applications are discussed at the conference. Paper
`sessions include refereed papers that describe the latest in implementations and applications-oriented research. The
`conference includes two types of sessions designed to allow significant time for interaction with the audience: panel sessions
`are designed to provoke discussion on a controversial topic; forum sessions report on the results of implementation activities.
`
`Vendor presentations proved to be valuable the last two years and are included again this year. The Vendor presentations
`allow providers of products and/or services an opportunity to describe the innovative ways in which their products or services
`are being used to implement secure systems. On Thursday and Friday, the Vendor Track will include vendor presentations on
`capabilities and applications of INFOSEC products to realistic civil, defense, and commercial problems. The Vendor Track
`will feature systems integrators, designers, and architects from the government and private sector. Displays will also be open
`on Wednesday during the evening reception and on Thursday between the sessions and breaks.
`
`Technical Program
`WEDNESDAY, DECEMBER 11, 1996
`
`GENERAL SESSION
`
`7:30
`
`Registration
`
`Dr. Gary Smith
`
`8:30
`
`Opening Remarks
`
`Conference Chair,
`
`8:35
`
`Welcome to San Diego
`
`8:40
`
`Keynote Speaker
`
`9:10
`
`Distinguished Lecture
`
`9:50
`
`Student Paper Award
`
`SAIC
`Hotel Manager
`Jim Flyzik
`
`Dept. of Treasury
`Dr. Roger Schell
`
`Novell, Inc.
`Dr. Matt Bishop
`
`UC, Davis
`
`Dr. Ravi Sandhu
`
`Technical Program
`
`Program Chair
`
`http://www.acsac.org/pastconf/1996/wed.html
`
`6/6/2013
`
`Petitioner Apple - Ex. 1044, p. 1
`
`
`
`Advance Program--Twelfth Annual Computer Security Applications Conference
`
`Page 2 of 4
`
`Introduction
`
`9:55
`
`10:00
`
`Break
`
`George Mason
`University
`
`Program Splits Into Tracks A and B
`
`TRACK A
`10:30 Security Engineering
`
`TRACK B
`
`Chair: Jody Heaney, The MITRE Corporation
`
`An Evaluation of the JAVA Security Model
`
`Andreas Sterbenz, University of Graz, Austria
`
`Implementing Security Policy in a Large Defense
`Procurement
`
`10:30 Forum: SSE-CMM Pilot Results
`
`Moderator: M. Schanken, National Security Agency
`
`Michael Nash, Gamma Secure Systems, UK; Ronald
`Kennett, Royal Air
`
`Speakers: Warren Monroe, Hughes Aircraft; Robert
`Schwartz, TRW; Jan Filsinger, TIS
`
`Force, UK
`
`An Authenticated Camera
`
`John Kelsey, Bruce Schneier and Chris Hall, Counterpane
`Systems
`12:00 LUNCH
`
`1:30 Secure Links
`
`Chair: Terry Vickers-Benzel, Trusted Information Systems
`
`A Case Study of Two NRL Pump Prototypes
`
`Myong Kang, Ira Moskowitz, Bruce Montrose and James
`Parsonese, Naval
`
`Research Laboratory
`
`Asymmetric Isolation
`
`John Davidson, Norex
`
`12:00 LUNCH
`
`1:30 Electronic Payment
`
`Chair: Dan Thomsen, Secure Computing Corporation
`
`Security Measures for the Austrian "PAYCHIP"
`Electronic Purse Application
`
`Manfred Holzbach, STUZZA, Austria
`
`Design of a Secure Electronic Payment System for the
`Internet
`
`Vijay Varadharajan, University of Western Sydney,
`Australia, and Micheal
`
`Hitchens, Sydney University, Australia
`
`Starlight: Interactive Link
`
`Innovative Secure Payments on the Internet Using the
`
`http://www.acsac.org/pastconf/1996/wed.html
`
`6/6/2013
`
`Petitioner Apple - Ex. 1044, p. 2
`
`
`
`Advance Program--Twelfth Annual Computer Security Applications Conference
`
`Page 3 of 4
`
`M. Anderson, C. North, J. Griffin, R. Milner, J. Yesberg and
`K. Yiu,
`
`German Electronic Purse
`
`Defense Science and Technology Organization, Australia
`3:00 BREAK
`
`3:30 Forum: Alternate Assurance Working Group
`
`Moderator: Klaus Keus, BSI, Germany
`
`Brigitte Althen, Brigitte Nebelung and Gerd Enste, debis
`Systemhaus GEI
`3:00 BREAK
`3:30 Cryptographic Protocols
`
`Chair: Eugene Bacic, Texar, Canada
`
`Proxies for Anonymous Routing
`
`Michael Reed, Paul Syverson and David Goldschlag, Naval
`Research Laboratory
`
`Design Choices for Symmetric Key Based Inter-Domain
`Protocols for Distributed Systems
`
`Vijay Varadharajan, University of West Sydney, Australia
`and Micheal
`
`Speakers: Herve Hosy, SCSSI, France; Deitra Kimpton,
`CSE, Canada; Mary
`
`Hitchens, Sydney University, Australia
`
`Schanken, NSA; and Gene Troy, NIST
`
`5:30 RECEPTION
`
`Verifying the Correctness of Cryptographic Protocols
`Using "Convince"
`
`Randall Lichota, Hughes Technical Services; Steve Brackin,
`Arca Systems;
`
`Grace Hammonds, AGCS
`
`Security Issues in an EDI Environment
`
`N. Zhang, Manchester Metro University; Q. Shi, Liverpool
`J.M. University
`5:30 RECEPTION
`
`Wednesday Reception
`
`starting promptly at 5:30 PM
`
`The reception provides an opportunity for informal conversation and renewal of acquaintances.
`Continuing an innovation from last year, vendor displays will be available to provide product and
`service information.
`
`[ FORWARD TO THURSDAY PROGRAM ]
`
`http://www.acsac.org/pastconf/1996/wed.html
`
`6/6/2013
`
`Petitioner Apple - Ex. 1044, p. 3
`
`
`
`Advance Program--Twelfth Annual Computer Security Applications Conference
`
`Page 4 of 4
`
`[ACSAC HOME PAGE] [ GENERAL INFORMATION] [ PROGRAM OVERVIEW]
`[ TECHNICAL PROGRAM] [ TUTORIALS] [ REGISTRATION/LOGISTICS] [MAIL ACSAC
`WEBMASTER]
`
`http://www.acsac.org/pastconf/1996/wed.html
`
`6/6/2013
`
`Petitioner Apple - Ex. 1044, p. 4