PROGRAM

Thursday, December 11, 1997

TRACK A TRACK B TRACK C
08:30 Plenary Panel Session: Critical Infrastructure Protection; Report on National Infrastructure Coordination Initiatives, Infrastructure Protection Task Force (IPTF)

Chair: S. League, IPTF-Defense Information Systems Agency,

Panelists: D. Keyes, FBI, D. Knuaf, IPTF-NSA, M. Woods, CITAC Counsel, FBI

10:00 BREAK
10:30 Guards and Firewalls
Chair: E. Siarkiewicz, Air Force Research Laboratory

Domain and Type Enforcement Firewalls, K. Oostendorp, L. Badger, C. Vance, W. Morrison, D. Sherman, D. Sterne, TIS, Inc.

A Reference Model for Firewall Technology, C. Schuba, Purdue University

Using Type Enforcement to Assure a Configurable Guard, P. Greve, J. Hoffman, R. Smith, Secure Computing Corp.

Security Architecture
Chair: J. Heaney, The MITRE Corp.

Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architectures, D. Mosier, T. Lowman, SAIC

An Architecture for Multilevel Secure Interoperability, M. Kang, J. Froscher, J. Moskowitz, NRL

Using Web Technologies in Two MLS Environments: A Security Analysis, R. Niemeyer, CSC

Public Key Infrastructure (PKI)
Chair: A. Friedman, The MITRE Corp.

Implementation Strategies for Secure Network Computing, T. Ehrsam, Oracle Corp.

CyberTrust, R. Dulude, GTE

Implementing PKI, B. Pratt, Verisign

12:00 LUNCH
1:30 Forum: Assurance Lessons Learned
Chair: J. Adams, TIS, Inc.

Speakers:
K. Ferraiolo, Arca Systems
Dr. D. Baker, SAIC
J. Filsinger, TIS, Inc.
W. Dawson, BDM International

Cryptography and Key Management
Chair: M. Bishop, UC, Davis

On the Key Recovery of the Key Escrow System, Y. Lee, C. Liah, National Huwei Institute of Technology

(t+1, n) Threshold and Generalized DSS Signatures without a Trusted Party, C. Wang, T. Hwang, National Cheng-Kung University

click for text . . An Improved E-Mail Security Protocol, B. Schneier, C. Hall, Counterpane Systems

Firewalls
Chair: M. Kleidermacher, L-3 Communications

Secure Computing Firewall for NT, D, Thompsen and T. Reamer, SCC

New Paradigms for Securing the Global Enterprise, S. Kramer, Check Point

OmniGuard & Firewalls, D. Conorich, Axent Technologies

3:00 BREAK
3:30 Access Control
Chair: E. Coyne, SETA Corp.

Implementing RBAC on a Type Enforced System, J. Hoffman, Secure Computing Corp.

Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System, T. Himdi, R. Sandhu, George Mason University

Using Kernel Hypervisors to Secure Applications, T. Mitchem, R. Lu, D. O'Brian, Secure Computing Corp.

Forum: PKI
Chair: A. Friedman, The MITRE Corp.

Speakers:
T. Burke, GSA
P. Mellinger, First Data Corp.
B. Thopmson, TIS, Inc.
G. Moore, Entrust

Electronic Commerce
Chair: C. McBride, NSA

Certificate Authority Services, A. Wheeler, First Data Corp.

Enabling Secure Commerce on the Internet, Cybercash

IVES, Lucent Technologies

6:00 CONFERENCE DINNER


Thursday Conference Dinner will take place at the Hyatt Islandia. During the evening, the Best Paper Award will be announced so you don't want to miss this special presentation. The dinner is included in the conference registration fee. Guest tickets can be ordered on the pre-registration form for $40.00

[ FRIDAY'S PROGRAM ]

[ HOW TO REGISTER ]

[ ACSAC HOME PAGE ] [ GENERAL INFORMATION ] [ MAIL ACSAC WEBMASTER ]