Return to Trackview 
Assurance / Criteria / Testing
Electronic Commerce 

Networking and the Internet 

Policy / Administration / Management / Operations 

Research & Development 

Future Issues / Solutions 

Tutorials 

 
Assurance / Criteria / 
Testing Track 
 

This track will address overarching issues and engage the audience in dialogue on such topics as developing profiles, evaluating the Certificate-Issuing Systems (CISs) of Public Key Infrastructures against a common set of security requirements and the Common Evaluation Methodology, as well as new approaches in evaluating security products and systems viable in a commercial world. 

All presentations, speakers, and times are subject to change. We will do our best to list the most current information. 
 
Panels
ISO/IEC JTC 1/SC 27 "IT Security Techniques" or Why Bother About ISO Security Standards? 
Dr. Walter Fumy, Siemens
Using the Common Criteria in Smart Card Security  
Stuart Katzke, NSA
Databases of Threats and Countermeasures 
James Williams, Mitre
TPEP to NIAP: Completing the Transition 
Thomas Anderson, NSA
Cryptographic Module Validation Program: The Next Generation (FIPS 140-2)  
Annabelle Lee, NIST
Healthcare Protection Profile Initiative 
Diann Carpenter, Arca Systems
Common Criteria Project: Implementing the Mutual Recognition Arrangement 
Eugene Troy, NIST
Common Criteria Project: Introducing the Common Evaluation Methodology 
Murray Donaldson, CESG
Security Requirements for Public Key Infrastructures 
Alfred Arsenault, NSA
U.S. Government Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM)  
Mary Schanken, NSA 
Papers
P3I - Protection Profile Process Improvement  
Jeffrey R. Williams & Karen Ferraiolo, Arca Systems
Protection Profiles for Certificate Issuing & Management Systems 
Al Arsenault, NSA 
Russ Housley, SPYRUS
Common Criteria Evaluations in the US: What a Developer Should Know 
Kimberly S. Caplan, Douglas Stuart; CSC
Validating a High-Performance, Programmable Secure Coprocessor  
Sean W. Smith; R. Perez; S. Weingart; V. Austel, IBM
Towards a Measurement Technique for Risk Management 
Donald G. Marks, NIST
Using Security Metrics to Assess Risk Management Capabilities 
Christina Cheetham Kormos, NSA 
Lisa A. Gallagher, Arca Systems 
Natalie Givans, Booz-Allen & Hamilton, Inc. 
Nadya Bartol, Booz-Allen & Hamilton, Inc.
Network Security Framework Robustness Strategy 
Teresa Arber, Dorothy Cooley, Stephen Hirsch, Martha Mahan, James Osterritter, NSA
Interdependency Analysis 
Richard K. McAllister, Sparta 
James L. Coyle, Averstar
 

Last update September 14, 1999

Welcome | Program | General Information | Registration 
Call for Papers and Panels | Contacts | Home | NIST Home