Assurance / Criteria /
Testing Track
This track will address overarching issues and engage the audience in
dialogue on such topics as developing profiles, evaluating the Certificate-Issuing
Systems (CISs) of Public Key Infrastructures against a common set of security
requirements and the Common Evaluation Methodology, as well as new approaches
in evaluating security products and systems viable in a commercial world.
All presentations, speakers, and times are subject to change. We will
do our best to list the most current information.
Panels |
ISO/IEC
JTC 1/SC 27 "IT Security Techniques" or Why Bother About ISO Security Standards?
Dr. Walter Fumy, Siemens |
Using
the Common Criteria in Smart Card Security
Stuart Katzke, NSA |
Databases
of Threats and Countermeasures
James Williams, Mitre |
TPEP
to NIAP: Completing the Transition
Thomas Anderson, NSA |
Cryptographic
Module Validation Program: The Next Generation (FIPS 140-2)
Annabelle Lee, NIST |
Healthcare
Protection Profile Initiative
Diann Carpenter, Arca Systems |
Common
Criteria Project: Implementing the Mutual Recognition Arrangement
Eugene Troy, NIST |
Common
Criteria Project: Introducing the Common Evaluation Methodology
Murray Donaldson, CESG |
Security
Requirements for Public Key Infrastructures
Alfred Arsenault, NSA |
U.S.
Government Use of the Systems Security Engineering Capability Maturity
Model (SSE-CMM)
Mary Schanken, NSA |
Papers |
P3I
- Protection Profile Process Improvement
Jeffrey R. Williams & Karen Ferraiolo, Arca Systems |
Protection
Profiles for Certificate Issuing & Management Systems
Al Arsenault, NSA
Russ Housley, SPYRUS |
Common
Criteria Evaluations in the US: What a Developer Should Know
Kimberly S. Caplan, Douglas Stuart; CSC |
Validating
a High-Performance, Programmable Secure Coprocessor
Sean W. Smith; R. Perez; S. Weingart; V. Austel, IBM |
Towards
a Measurement Technique for Risk Management
Donald G. Marks, NIST |
Using
Security Metrics to Assess Risk Management Capabilities
Christina Cheetham Kormos, NSA
Lisa A. Gallagher, Arca Systems
Natalie Givans, Booz-Allen & Hamilton, Inc.
Nadya Bartol, Booz-Allen & Hamilton, Inc. |
Network
Security Framework Robustness Strategy
Teresa Arber, Dorothy Cooley, Stephen Hirsch, Martha Mahan, James Osterritter,
NSA |
Interdependency
Analysis
Richard K. McAllister, Sparta
James L. Coyle, Averstar |
|