1st CCS 1993 PREFACE We would like to begin by thanking all the authors who submitted papers to our conference. Because of their work, we have the privilege of presenting to you this fine collection of papers on computer and communications security. We would also like to thank our invited speakers and panelists for their contributions to the program. When this conference was but a gleam in the eyes of the organizers, we frankly did not anticipate that we would, in our first go around, be able to produce a program with the depth and breadth that we succeeded in producing. But we are getting ahead of our story. First, where did this new conference spring up from, and why a new conference? In the Fall of 1992, Ravi Sandhu was a guest speaker at a Bell Atlantic Research Colloquium devoted to security, organized by Ravi Ganesan. Ray Pyle, who was attending the conference, announced during a break that he would like to get in touch with anyone interested in helping him organize a one day security session as part of a Symposium of an IEEE Communications Technical Committee - The two Ravi's volunteered. Word of Ray's request also reached Vicky Ashby, via several MITRE folk at the colloquium. Events moved fast: Vicky conveyed ACM SIGSAC's interest in sponsoring an ACM conference, Dorothy Denning graciously agreed to serve at the helm, and soon the planned one day security session metamorphized into a whole new conference - The Ist ACM Conference on Computer and Communications Security. A driving theme for all five organizers was to emphasize the practical, especially as it related to the commercial sector. By providing a forum with this emphasis, we felt we could catalyze practical commercial industry oriented work in the security community. Have we been successful in this goal? Only time will tell. In future years we hope to see more application and case study papers to balance the more theoretical, though very high quality, papers in the program. Through chance, more than deliberation, this conference also succeeds in bringing together the Computer Security and Cryptography worlds, which, in our opinion, have tended be less closely connected than desirable. We are encouraged by our results, and anticipate that in future years the conference can further accentuate its focus on practical applications. How did we choose the papers you see in these proceedings? We received 60 papers. Program Committee members, except the Program Chairs, were allowed to submit and we received 7 such papers. Based on the areas of expertise, these papers were sent to appropriate committee members (to whom we did not disclose the author names). The committee members either reviewed the paper themselves, or had them reviewed by external referees with expertise in the area. All papers had at least two reviews, most had three and a few had four. The final decisions were made at a Program Committee meeting attended by fifteen of the twenty-five committee members. Committee members who submitted papers left the room when their paper was being discussed. Twenty-two of the sixty papers made it through this process, and a further five were selected for the Short Talks session. A conference such as this can be put together only with the assistance of many individuals "behind the scenes." Several people helped us in various ways. We value the help of each one, and look for continued cooperation in the future. They are listed here alphabetically by organization: Dan Faigin (Chairman of ACM SIGSAC), Paul Haven, Mark Wegleitner (both of Bell Atlantic), Peter Denning, Kitty Hoover, Ganta Srinivas, Roshan Thomas, Diane Waters (all of GMU), Peter Landrock (President of IACR), Doug Zuckerman (Chairman of IEEE CNOM), Tom Plevyak (Editor- in-Chief of IEEE Communications). We also thank Deana Walsh and Sharon Cassel of Ben Atlantic for invaluable administrative assistance. Finally, we express our deepest gratitude to members of the Program Committee and external referees who willingly helped us with the difficult task of selecting the papers. Victoria Ashby Dorothy Denning Ravi Ganesan Raymond Pyle Ravi Sandhu Conference Organizers