The proceedings webpage has been broken down into 3 parts: papers, tutorials, and panels. This page contains all of the proceedings on the CD that was handed out at the conference. Once you find a proceeding that you would like to download or view, simply click on the blue link and it will open the file. All proceedings are in .pdf format - so you need to have Adobe Acrobat Reader installed into your system.
Panels and Other Presentations:
Chair: Jeff Ingle, National Security Agency | ||
Panelists: | ||
Stan Hanks, Enron
Chris Kubic, National Security Agency Tom Shake, MT Lincoln Laboratory |
Chair: Edward Feustel, Institute for Defense Analyses | ||
Viewpoints: | ||
Edward Feustel, Institute
for Defense Analyses
Bob Blakley, DASCOM, Inc. |
||
What, Exactly is CORBAsec? | ||
David Chizmadia, Computer Science Corporation | ||
The Status of OMG CORBA Security Implementations | ||
Bret Hartman, Concept Five Technologies | ||
Toward an Interoperable *and* Portable CORBA Security Specifications | ||
Polar Humenn, Adiron |
Chair: Alfred W. Arsenault, Jr., National Security Agency | ||
Viewpoints: | ||
Marc LaRoche, Entrust
Kathy L. Lyons-Burke, National Institute of Standards and Technology Eric S. Rosenfeld, Spyrus |
Chair: Santosh Chokani, CygnaCom Solutions | ||
Panelists: | ||
Sharon Boeyen, Entrust
Patrick Cain, BBN Technologies Warwick Ford, Verisign W. Timothy Polk, National Institute of Standards and Technology |
Chair: Dr. Andrew Rathmell, King's College London | ||
Panelists: | ||
Edna Chivers, UK Cabinet
Office
Suzanne Jantsch, IABG, Germany Lars Nicander, Swedish National Defence College |
Chair: John Tritak, Critical Infrastructure Assurance Office | ||
Viewpoints: | ||
Stevan Mitchell, Department
of Justice
Nancy Wong, Pacific Gas and Electric Thomas Burke, General Services Administration John Davis, National Security Agency |
Chair: Blaine Burnham, Ph.D., Georgia Tech Information Security Center (GTISC) | ||
Viewpoints: | ||
Achieving Assurance: What will
we do?
Steve Lipner, Mitretek Systems |
||
Panelists: | ||
Jim Anderson, James P.
Anderson P. Anderson Co.
Todd Inskeep, Bank of America Peter Neumann, SRI International Clark Weissman Roger Schell |
Chair: Jim Litchko, IMSI | ||
Panelists: | ||
Jim Brenton, CISSP, Sprint
Corporate Security
Richard Lee Doty, CISSP, ManTech International Corporation LtCol Fred W. Peters, United States Air Force OASD and TMA David J. Wilson, Telos Corporation |
Chair: Peter G. Neumann, SRI International | ||
Panelists: | ||
George Dinolt, Lock-heed
Martin
Virgil Gligor, University of Maryland, College Park Sami Saydjari, DARPA Brian Snow, National Security Agency |
Chair: Barbara Y. Fraser, Carnegie Mellon University Software Engineering Institute | ||
Panelists: | ||
Dr. Steven Lucas, Privaseek,
Inc.
Ken Fong, IBM Security and Privacy Services Lawrence R. Rogers, Carnegie Mellon University Software Engineering Institute |
Chair: John Campbell, National Security Agency | ||
Panelists: | ||
Tim Ehrsam, Oracle
Corporation
Ronald B. Knode, Computer Sciences Corporation Paul Livingston, Intelink Management Office Jim Williams, Booz-Allen & Hamiliton Corporation |
Chair: Dr. Rayford Vaughn, Mississippi State University | ||
Viewpoints: | ||
Remote Learning for Information Security Professionals | ||
Professor Allan Berg, James Madison University | ||
What Do We Mean by "Computer Security Education"? | ||
Dr. Matt Bishop, University of California, Davis | ||
The NPS CISR Approach to Information System Security Education | ||
Dr. Cynthia Irvine, Naval Postgraduate School | ||
Computer Security Training and Emerging Software Engineering Degree Programs | ||
Dr. Rayford Vaugh, Jr., Mississippi State University | ||
Panelists: | ||
Dr. Virgil Gligor, University of Maryland |
Chair: Professor Lance J. Hoffman, George Washington University | ||
Viewpoints: | ||
Teaching Information Warfare at The George Washington University | ||
Professor Lance J. Hoffman, George Washington University | ||
Teaching Information Warfare at Georgetown University | ||
Dorothy E. Denning, Georgetown University | ||
Frameworks and End States in the Teaching of the Strategic and Ethical Dimensions of Strategic Information Warfare | ||
Roger C. Molander, Rand Corporation | ||
Teaching Information Warfare and Information Operations at National Defense University | ||
Dan Kuehl, National Defense University |
Chair: Mary Ellen Zurko, Iris Associates | ||
Viewpoints: | ||
Strike Back: Offensive Actions in Information Warfare | ||
Nathan A. Buchheit, Anthony Ruocco, Donald J. Welch, United States Military Academy, West Point | ||
Security Architecture Development and its Role in the Seat Management and Total Cost of Ownership Environments | ||
Ronda R. Henning, Harris Corporation | ||
Optimistic Security: A New Access Control Paradigm | ||
Dean Povey, DSTC | ||
Securing Information Transmission by Redundancy | ||
Professor Peter Reiher, Jun Li, Gerald Popek, University of California, Los Angeles |
Chair: Dr. Stephen Kent, BBN Technologies | ||
Panelists: | ||
Roy Pereria, TimeStep
Corporation
Dr. Steven Bellovin, AT&T Research Luis Sanchez, BBN Technologies |
Chair: Marla Collier, Internet Resources | ||
Panelists: | ||
Todd Inskeep, Bank of
America
Mark Mercer, Ernst & Young, LLP G. Mark Hardy, Secure Computing Corporation Ira Winkler, Internet Security Advisors Group Dr. Rayford Vaughn, Mississippi State University Jeremy Epstein, Network Associates Laboratory |
Chair: Peter Mell, National Institute of Standards and Technology | ||
Viewpoints: | ||
Why Share AV Information? | ||
Peter Mell, National Institute of Standards and Technology | ||
The Case for Corporate Sharing of AV Information | ||
Kevin Ziese, Cisco | ||
A Model for Sharing | ||
Gene Spafford, CERIAS | ||
Alternate Sharing Models | ||
Matt Bishop, University of California, Davis |
Chair: Russell Housley, SPYRUS | ||
Panelists: | ||
John Pawling, J.G. Van Dyke
& Associates
Michael Elkins, Network Associates, Inc. |
Chair: Diann A. Carpencter, ARCA Systems | ||
Panelists: | ||
Dr. Ross Anderson, Cambridge
University, UK
Lewis Lorton, DDS, MSD, Forum on Privacy and Security in Healthcare Arnold Johnson, National Institute of Standards and Technology |
Chair: David Kennedy, CISSP, ICSA, Inc. | ||
Panelists: | ||
Michael Miora, InfoSec
Labs, Inc.
Russ Cooper, R.C. Consulting, Inc. Pirkka Palomaki, Datafellows, Inc. Robert Moskowtiz, ICSA, Inc. |
Chair: Paul B. Pattak, The Byron Group, Ltd. | ||
Panelists: | ||
William Bruck, Ph.D., Author
Addison Slayton, Jr., Virginia Department of Emergency Services Steven D. Mitchell, US Department of Justice Donald M. Le Vine, Ph.D., TRW |
Chair: Hilary Hosmer, Data Security, Inc. | ||
Viewpoints: | ||
Rapid Risk Assessment | ||
Walter Cooke, Canada | ||
Panelists: | ||
Caroline Hamilton, RiskWatch |
Chair: Gene Troy, National Institute of Standards and Technology | ||
Panelists: | ||
Murray Donaldson, Communications-Electronics
Security Group, UK
Robert Harland, Communications Security Establishment, Canada Ron Ross, National Institute of Standards and Technology |
Chair: Walter Fumy Ph.D., Siemens AG, Germany | ||
Panelists: | ||
Ted Humphreys, XISEC
Consultants Ltd., UK
Marijke De Soete Ph.D., Europay International, Belgium Eugene Troy, National Institute of Standards and Technology Jerry A. Rainville, JD, National Security Agency |
Chair: Tom E. Anderson, National Security Agency | ||
Panelists: | ||
L. Arnold Johnson, National
Institute of Standards and Technology
Jeffrey Horlick, National Voluntary Laboratory Accrediation Program Keith F. Brewster, National Security Agency Suzanne S. O'Connor, National Security Agency |
Chair: Annabelle Lee, National Institute of Standards and Technology | ||
Panelists: | ||
Ray Snouffer, National
Institute of Standards and Technology
Tom Casar, Communications Security Establishment, Canada |
Chair: Mary D. Schanken, National Security Agency | ||
Panelists: | ||
James P. Craft, United
States Agency for International Development
Charles G. Menk III, National Security Agency |
Chair: Jim Williams, MITRE Corporation | ||
Panelists: | ||
Natalie Brader, L-3 Network
Security
Douglas McGovern, Ray-McGovern Technical Consultants Kenneth Olthoff, National Security Agency Adam Shostack, BindView Development Pascal Meunier, Purdue University |
Chair: Stuart W. Katzke, National Security Agency | ||
Panelists: | ||
Kenneth R. Ayer, Ph.D., Visa
International
Gilles Lisimaque, Gemplus Gene F. Troy, National Institute of Standards and Technology |
Chair: Klaus J. Keus, BSI / GISA, Germany | ||
Panelists: | ||
Michael Hange, BSI / GISA,
Germany
Mark Bohannon, Department of Commerce, USA Detlef Eckert, European Commission, Belgium |
Chair: Dr. Vic Maconachy, National Security Agency | ||
Panelists: | ||
Dr. Corey Schou, Idaho
State University
Dr. Charles Reynolds, James Madison University |
Chair: CAPT J. Katharine Burton, United States Navy | ||
Viewpoints: | ||
Defense-wide Information Assurance Program | ||
CAPT J. Katharine Burton, United States Navy | ||
USCINCSPACE Assumption of CND Mission | ||
COL Tom Muchenthaler, United States Air Force | ||
Panelists: | ||
Christina McBride, DIAP
Mark Viola, DIAP |
Jimmy Kuo, AntiVirus Research, Network Associates Inc. |
Phillip J. Loranger, LTC LeRoy Lundgren, Headquarters, Department of the Army |
NISSC
Homepage | Past Conference Page |
CSRC Homepage
Page created: 10/26/2000. Page
updated: 10/26/2000.