|
TRACK A |
TRACK B |
TRACK C |
8:30 |
Crypto
Chair: Dan Gambel, Mitretek
Systems, USA
An Effective Defense Against First
Party Attacks In Public-Key
Algorithms, Stephen Matyas, Jr. &
Allen Roginsky, IBM, USA
Towards A Practical, Secure, And
Very Large Scale Online Election, Jared Karro & Jie Wang, Univ. of
North Carolina at Greensboro, USA
Design of LAN-Lock, a System for
Securing Wireless Networks, Richard
Newman, Mark Hoyt, Phillipe
Broccard, Tim Swanson, & Mark
Sanders, Univ. of Florida, USA
|
Panel: Composition Problems of
Component TOEs - Entrust,
Oracle, and Windows NT/2000
Chair: L. Ambuel, TRW, USA
M. Lai, Microsoft, USA
M. LaRoche, ENTRUST, USA
D. Harris, ORACLE, USA
J. Straw, Syntegra, USA
M. Donaldson, CESG, USA
|
Virtual Private Networks
Chair: Stan Johnson, Motorola
ATM Security VPN Case Study, Dan Winkelstein, Celotek Corp., USA
VPN Case Study: Kansas Bureau
of Investigation, Mark Elliott, Check
Point Software, USA, Gary Fish,
Fishnet Consulting, USA
Independent Policy Oriented
Layering of Security Services, Herbert Leitold, Graz Univ. of
Technology, Austria
|
10:00 |
BREAK |
10:30 |
Security Services
Chair: Jody Heaney, MITRE
Corp., USA
Toward a Taxonomy and Costing
Method for Security Services, Cynthia Irvine, Naval Postgraduate
School, & Tim Levin, Anteon, USA
Trustedbox: A Kernel-Level
Integrity Checker, Pietro Iglio,
Fondazione Ugo Bordoni, Italy
Adding Availability To Log
Services Of Untrusted Machines, Arianna Arona, Danilo Bruschi, &
Emilia Rosti, Universita` di Milano,
Italy
|
Security Policy
Chair: Marshall Abrams, MITRE
Corp., USA
Policy-Based Management:
Bridging the Gap, Susan Hinrichs,
Cisco Systems, USA
Security Policy Coordination for
Heterogeneous Information Systems, John Hale, Univ. of Tulsa; Pablo Galiasso, Mauricio
Papa, & Sujeet Shenoi, Washington
State Univ., USA
The ARBAC99 Model for
Administration of Roles, Qamar
Munawer & Ravi Sandhu, George
Mason Univ., USA
|
PKI
Chair: Jim Gerretson, ACS
Defense Inc., USA
An Introduction to PKI, Judy Furlong , GTE Interworking -
CyberTrust Solutions, USA
ABN AMRO Bank’s Corporate
Cryptographic Infrastructure, Lisa
Pretty, Baltimore Technologies, USA
Drilling Down the DoD PKI
Roadmap, Jandria Alexander,
Science Applications International
Corp., USA
|
12:00 |
LUNCH |
1:00 |
Public Key Infrastructures
Chair: Frank Sledge, TRW,
USA
A Distributed Certificate
Management System (DCMS)
Supporting Group-Based Access
Controls, Rolf Oppliger, Andreas
Greulich, & Peter Trachsel,
Swiss Federal Office of
Information Technology &
Systems (BFI), Switzerland
Fast Checking of Individual
Certificate Revocation on Small
Systems, Selwyn Russell,
Queensland Univ. of Technology,
Australia
A Model of Certificate
Revocation, David A. Cooper,
National Institute of Standards
and Technology, USA
|
Panel:
Information Security Education for the Next Millennium:
Building the Next Generation of Practitioners
Chair: Ron Ross, NIST,
USA
Rayford Vaughn, Mississippi
State Univ., USA
Ravi Sandhu, George Mason
Univ., USA
Charles Reynolds, James Madison University, USA
Dr. Cynthia Irvine, Naval Postgraduate School, USA
Dr. Blaine Burnham, Georgia Institute of Technology, USA
|
Electronic Commerce
Chair: Ken Heist, IIT
Research Institute, USA
Internet Based EC/EDI
Solution, Mark Glass, ACS,
USA
Securing Your Insecurities
on the Web, Deepak Taneja,
Netegrity, Inc., USA
High Assurance Trusted E-commerce Servers, Paul McNabb, Argus Systems Group Inc.
|
2:30 |
BREAK |
3:00 |
Public Key Infrastructures
Chair: Klaus Keus, GISA/BSI,
Germany
Generic Support for PKIX
Certificate Management in CDSA, Shabnam Erfani, WatchGuard Technologies & Sekar
Chandersekaran, Microsoft Corp., USA
Efficient Certificate Status Handling
Within PKIs: An Application To
Public Administration Services, Marco
Prandini, Università di Bologna, Italy
|
Mobile Code
Chair: Dan Thomson, Secure
Computing Corp., USA
User Authentication And
Authorization In The JavaTM
Platform, Charlie Lai & Li Gong,
Sun Microsystems; Larry Koved & Anthony Nadalin, IBM Corp.; Roland Schemers, onebox.com; USA
Transactions in Java Card, Marcus Oestreicher, IBM Research
Division, Switzerland
|
Protocols
Chair: Steve LaFountain, NSA, USA
Achieving Fair Document
Exchange among Multi-Parties, N.
Zhang, Manchester Metropolitan
Univ., UK
Protecting the Enterprise to Assure eBusiness Success,
Chris Inskeep, Compaq, USA
|
4:00 |
ADJOURN |
4:30 |
CONFERENCE DINNER |
¡OLE! Corona Ranch Mexican Fiesta and Rodeo
The dinner is included in the conference registration fee.
Guest tickets can be ordered on the pre-registration form for $50.00.
See below for event details.
|
Ay, carrumba – Get ready for an exciting evening at the Corona Ranch set against the backdrop of South
Mountain Park. We will depart promptly from the hotel at 4:30, arriving at the Corona Ranch in time to enjoy
appetizers and drinks amidst a fiery Arizona sunset. Following the reception we move to the grandstand for a
Mexican Charreada. A “charreada”, or rodeo, consists of several feats of horsemanship including riding, roping,
accuracy, courage, and style. The exciting entertainment will be followed by a delicious Mexican Fiesta served
under a canopy of white lights and amid festive decorations.
We will be outside for a significant portion of the evening and suggest you bring a light jacket as the December
evenings can become cool. Should the weather be uncooperative, an equally exciting alternative indoor
entertainment venue has been planned for us.
Attendance will be limited, so please have your Conference Dinner ticket validated at the registration desk by
noon on Wednesday December 8th in order to confirm your seat. Additional tickets for guests may be
purchased at the registration desk for $50.00.