The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Report of the NSF/NIST Workshop on NSFNET/NREN Security

Arthur E. Oldehoeft
Added 2002-07-26

Public key Infrastructure Invitational Workshop

U.S. Department of Commerce, William E. Burr, ed

This is the report of the Invitational Workshop on Public key Infrastructure, which was jointly sponsored by the National Institute of Standards and Technology (NIST), the Security Infrastructure Program Management Office (SI-PMO) and the MITRE Corporation.  A public key infrastructure provides a means for issuing and managing public key certificates, which may be used to provide security services, such as authentication, integrity, confidentiality and non-repudiation, between strangers who have no previous knowledge of each other.  Papers were presented on the current state of technology and standards for a Public Key Infrastructure, management and technical issues, escrowing keys used for confidentiality exchanges, and cost models.

Added 2002-07-26

Better Logging Through Formality: Applying Formal Specification Techniques to Improve Audit Logs and Log Consumers

CERIAS TR 2000-28
Chapman Flack and Mikhail J. Atallah
Download: PDF

We rely on programs that consume audit logs to do so successfully (a robustness issue) and form the correct interpretations of the input (a semantic issue). The vendor’s documentation of the log format is an important part of the specification for any log consumer. As a specification, it is subject to improvement using formal specification techniques. This work presents a methodology for formalizing and refining the description of an audit log to improve robustness and semantic accuracy of programs that use the log. Ideally applied during design of a new format, the methodology is also profitably applied to existing log formats. Its application to Solaris BSM (an existing, commercial format) demonstrated utility by detecting ambiguities or errors of several types in the documentation or implementation of BSM logging, and identifying opportunities to improve the content of the logs. The products of this work are the methodology itself for use in refining other log formats and their consumers, and an annotated, machine-readable grammar for Solaris BSM that can be used by the community to quickly construct applications that consume BSM logs.

Added 2002-07-26

D; A Language Framework for Distributed Programming

C.V. Lopes,G. Kiczales
Added 2002-07-26

NetKuang- A Multi-host Configuration Vulnerability Checker

D. Zerkle,K. Levitt
Added 2002-07-26

RG: A Case-Study for Aspect-Oriented Programming

A. Mendhekar,G. Kiczales,J. Lamping
Added 2002-07-26


Specifying and Checking UNIX Security Constraints

A. Heydon,J.D. Tygar
Added 2002-07-26

Report od the NIST Workshop on Key Escrow Encryption

Arthur E. Oldehoeft
Added 2002-07-26

Windows NT Chapter

A. Silberschatz,P. Galvin
Added 2002-07-26

Security Flaws in the Hot Java Web Browser

D. Dean,D.S. Wallach
Added 2002-07-26

Bias Plus Variance Decomposition for Zero-One Loss Functions

R. Kohavi,D.H. Wolpert
Added 2002-07-26

A linear Method for Deviation Detection in Large Databases

A. Arning,R. Agrawal,P. Raghavan
Added 2002-07-26

RALPH: Rapidly Adapting Lateral Position Handler

D. Pomerleau
Added 2002-07-26

Noise-Tolerant Instance-Based Learning Algorithms

D.W. Aha,D. Kibler
Added 2002-07-26