The proceedings webpage has been broken down into 3 parts: papers, tutorials, and panels. This page contains all of the proceedings on the CD that was handed out at the conference. Once you find a proceeding that you would like to download or view, simply click on the blue link and it will open the file. All proceedings are in .pdf format - so you need to have Adobe Acrobat Reader installed into your system.
Panels and Other Presentations:
| Chair: Jeff Ingle, National Security Agency | ||
| Panelists: | ||
| Stan Hanks, Enron
Chris Kubic, National Security Agency Tom Shake, MT Lincoln Laboratory |
||
| Chair: Edward Feustel, Institute for Defense Analyses | ||
| Viewpoints: | ||
| Edward Feustel, Institute
for Defense Analyses
Bob Blakley, DASCOM, Inc. |
||
| What, Exactly is CORBAsec? | ||
| David Chizmadia, Computer Science Corporation | ||
| The Status of OMG CORBA Security Implementations | ||
| Bret Hartman, Concept Five Technologies | ||
| Toward an Interoperable *and* Portable CORBA Security Specifications | ||
| Polar Humenn, Adiron | ||
| Chair: Alfred W. Arsenault, Jr., National Security Agency | ||
| Viewpoints: | ||
| Marc LaRoche, Entrust
Kathy L. Lyons-Burke, National Institute of Standards and Technology Eric S. Rosenfeld, Spyrus |
||
| Chair: Santosh Chokani, CygnaCom Solutions | ||
| Panelists: | ||
| Sharon Boeyen, Entrust
Patrick Cain, BBN Technologies Warwick Ford, Verisign W. Timothy Polk, National Institute of Standards and Technology |
||
| Chair: Dr. Andrew Rathmell, King's College London | ||
| Panelists: | ||
| Edna Chivers, UK Cabinet
Office
Suzanne Jantsch, IABG, Germany Lars Nicander, Swedish National Defence College |
||
| Chair: John Tritak, Critical Infrastructure Assurance Office | ||
| Viewpoints: | ||
| Stevan Mitchell, Department
of Justice
Nancy Wong, Pacific Gas and Electric Thomas Burke, General Services Administration John Davis, National Security Agency |
||
| Chair: Blaine Burnham, Ph.D., Georgia Tech Information Security Center (GTISC) | ||
| Viewpoints: | ||
| Achieving Assurance: What will
we do?
Steve Lipner, Mitretek Systems |
||
| Panelists: | ||
| Jim Anderson, James P.
Anderson P. Anderson Co.
Todd Inskeep, Bank of America Peter Neumann, SRI International Clark Weissman Roger Schell |
||
| Chair: Jim Litchko, IMSI | ||
| Panelists: | ||
| Jim Brenton, CISSP, Sprint
Corporate Security
Richard Lee Doty, CISSP, ManTech International Corporation LtCol Fred W. Peters, United States Air Force OASD and TMA David J. Wilson, Telos Corporation |
||
| Chair: Peter G. Neumann, SRI International | ||
| Panelists: | ||
| George Dinolt, Lock-heed
Martin
Virgil Gligor, University of Maryland, College Park Sami Saydjari, DARPA Brian Snow, National Security Agency |
||
| Chair: Barbara Y. Fraser, Carnegie Mellon University Software Engineering Institute | ||
| Panelists: | ||
| Dr. Steven Lucas, Privaseek,
Inc.
Ken Fong, IBM Security and Privacy Services Lawrence R. Rogers, Carnegie Mellon University Software Engineering Institute |
||
| Chair: John Campbell, National Security Agency | ||
| Panelists: | ||
| Tim Ehrsam, Oracle
Corporation
Ronald B. Knode, Computer Sciences Corporation Paul Livingston, Intelink Management Office Jim Williams, Booz-Allen & Hamiliton Corporation |
||
| Chair: Dr. Rayford Vaughn, Mississippi State University | ||
| Viewpoints: | ||
| Remote Learning for Information Security Professionals | ||
| Professor Allan Berg, James Madison University | ||
| What Do We Mean by "Computer Security Education"? | ||
| Dr. Matt Bishop, University of California, Davis | ||
| The NPS CISR Approach to Information System Security Education | ||
| Dr. Cynthia Irvine, Naval Postgraduate School | ||
| Computer Security Training and Emerging Software Engineering Degree Programs | ||
| Dr. Rayford Vaugh, Jr., Mississippi State University | ||
| Panelists: | ||
| Dr. Virgil Gligor, University of Maryland | ||
| Chair: Professor Lance J. Hoffman, George Washington University | ||
| Viewpoints: | ||
| Teaching Information Warfare at The George Washington University | ||
| Professor Lance J. Hoffman, George Washington University | ||
| Teaching Information Warfare at Georgetown University | ||
| Dorothy E. Denning, Georgetown University | ||
| Frameworks and End States in the Teaching of the Strategic and Ethical Dimensions of Strategic Information Warfare | ||
| Roger C. Molander, Rand Corporation | ||
| Teaching Information Warfare and Information Operations at National Defense University | ||
| Dan Kuehl, National Defense University | ||
| Chair: Mary Ellen Zurko, Iris Associates | ||
| Viewpoints: | ||
| Strike Back: Offensive Actions in Information Warfare | ||
| Nathan A. Buchheit, Anthony Ruocco, Donald J. Welch, United States Military Academy, West Point | ||
| Security Architecture Development and its Role in the Seat Management and Total Cost of Ownership Environments | ||
| Ronda R. Henning, Harris Corporation | ||
| Optimistic Security: A New Access Control Paradigm | ||
| Dean Povey, DSTC | ||
| Securing Information Transmission by Redundancy | ||
| Professor Peter Reiher, Jun Li, Gerald Popek, University of California, Los Angeles | ||
| Chair: Dr. Stephen Kent, BBN Technologies | ||
| Panelists: | ||
| Roy Pereria, TimeStep
Corporation
Dr. Steven Bellovin, AT&T Research Luis Sanchez, BBN Technologies |
||
| Chair: Marla Collier, Internet Resources | ||
| Panelists: | ||
| Todd Inskeep, Bank of
America
Mark Mercer, Ernst & Young, LLP G. Mark Hardy, Secure Computing Corporation Ira Winkler, Internet Security Advisors Group Dr. Rayford Vaughn, Mississippi State University Jeremy Epstein, Network Associates Laboratory |
||
| Chair: Peter Mell, National Institute of Standards and Technology | ||
| Viewpoints: | ||
| Why Share AV Information? | ||
| Peter Mell, National Institute of Standards and Technology | ||
| The Case for Corporate Sharing of AV Information | ||
| Kevin Ziese, Cisco | ||
| A Model for Sharing | ||
| Gene Spafford, CERIAS | ||
| Alternate Sharing Models | ||
| Matt Bishop, University of California, Davis | ||
| Chair: Russell Housley, SPYRUS | ||
| Panelists: | ||
| John Pawling, J.G. Van Dyke
& Associates
Michael Elkins, Network Associates, Inc. |
||
| Chair: Diann A. Carpencter, ARCA Systems | ||
| Panelists: | ||
| Dr. Ross Anderson, Cambridge
University, UK
Lewis Lorton, DDS, MSD, Forum on Privacy and Security in Healthcare Arnold Johnson, National Institute of Standards and Technology |
||
| Chair: David Kennedy, CISSP, ICSA, Inc. | ||
| Panelists: | ||
| Michael Miora, InfoSec
Labs, Inc.
Russ Cooper, R.C. Consulting, Inc. Pirkka Palomaki, Datafellows, Inc. Robert Moskowtiz, ICSA, Inc. |
||
| Chair: Paul B. Pattak, The Byron Group, Ltd. | ||
| Panelists: | ||
| William Bruck, Ph.D., Author
Addison Slayton, Jr., Virginia Department of Emergency Services Steven D. Mitchell, US Department of Justice Donald M. Le Vine, Ph.D., TRW |
||
| Chair: Hilary Hosmer, Data Security, Inc. | ||
| Viewpoints: | ||
| Rapid Risk Assessment | ||
| Walter Cooke, Canada | ||
| Panelists: | ||
| Caroline Hamilton, RiskWatch | ||
| Chair: Gene Troy, National Institute of Standards and Technology | ||
| Panelists: | ||
| Murray Donaldson, Communications-Electronics
Security Group, UK
Robert Harland, Communications Security Establishment, Canada Ron Ross, National Institute of Standards and Technology |
||
| Chair: Walter Fumy Ph.D., Siemens AG, Germany | ||
| Panelists: | ||
| Ted Humphreys, XISEC
Consultants Ltd., UK
Marijke De Soete Ph.D., Europay International, Belgium Eugene Troy, National Institute of Standards and Technology Jerry A. Rainville, JD, National Security Agency |
||
| Chair: Tom E. Anderson, National Security Agency | ||
| Panelists: | ||
| L. Arnold Johnson, National
Institute of Standards and Technology
Jeffrey Horlick, National Voluntary Laboratory Accrediation Program Keith F. Brewster, National Security Agency Suzanne S. O'Connor, National Security Agency |
||
| Chair: Annabelle Lee, National Institute of Standards and Technology | ||
| Panelists: | ||
| Ray Snouffer, National
Institute of Standards and Technology
Tom Casar, Communications Security Establishment, Canada |
||
| Chair: Mary D. Schanken, National Security Agency | ||
| Panelists: | ||
| James P. Craft, United
States Agency for International Development
Charles G. Menk III, National Security Agency |
||
| Chair: Jim Williams, MITRE Corporation | ||
| Panelists: | ||
| Natalie Brader, L-3 Network
Security
Douglas McGovern, Ray-McGovern Technical Consultants Kenneth Olthoff, National Security Agency Adam Shostack, BindView Development Pascal Meunier, Purdue University |
||
| Chair: Stuart W. Katzke, National Security Agency | ||
| Panelists: | ||
| Kenneth R. Ayer, Ph.D., Visa
International
Gilles Lisimaque, Gemplus Gene F. Troy, National Institute of Standards and Technology |
||
| Chair: Klaus J. Keus, BSI / GISA, Germany | ||
| Panelists: | ||
| Michael Hange, BSI / GISA,
Germany
Mark Bohannon, Department of Commerce, USA Detlef Eckert, European Commission, Belgium |
||
| Chair: Dr. Vic Maconachy, National Security Agency | ||
| Panelists: | ||
| Dr. Corey Schou, Idaho
State University
Dr. Charles Reynolds, James Madison University |
||
| Chair: CAPT J. Katharine Burton, United States Navy | ||
| Viewpoints: | ||
| Defense-wide Information Assurance Program | ||
| CAPT J. Katharine Burton, United States Navy | ||
| USCINCSPACE Assumption of CND Mission | ||
| COL Tom Muchenthaler, United States Air Force | ||
| Panelists: | ||
| Christina McBride, DIAP
Mark Viola, DIAP |
||
| Jimmy Kuo, AntiVirus Research, Network Associates Inc. | ||
| Phillip J. Loranger, LTC LeRoy Lundgren, Headquarters, Department of the Army | ||
NISSC
Homepage | Past Conference Page |
CSRC Homepage
Page created: 10/26/2000. Page
updated: 10/26/2000.