Return to Trackview
Electronic Commerce
Assurance / Criteria / Testing

Networking and the Internet

Policy, Management, & Government Issues

Research & Development

Tutorials

 
Electronic Commerce Track

Today's super-application is the buying and selling of products and services by businesses and consumers over the internet.  Sessions in this track will address the security issues necessary to make electronic commerce work. 

All presentations, speakers, and times are subject to change. We will do our best to list the most current information.  Times and dates of sessions will be announced soon.

Track Chair:
Jim Litchko, Litchko and Associates

Sessions
Future of Information Security,
G. M. Hardy, Guardent, Inc.
Security in Business-to-Business E-Commerce,
J. Epstein, webMethods
Achieving Global Trust in an e-World,
R. Wilsher, The Zygma Partnership
Guerilla Security: The Martial Art of InfoSecurity,
A. Robinson, net/main InfoSecurity Solutions
Unified Access Management: How to Enable E-Business, Yet Protect Information,
E. Olden, Securant Technologies
Collusion Detection Las Vegas Style,
J. Jonas, Systems Research & Development
Protection of Business-to-Business Exchanges and Vendor Operations,
C. Baggett, Risk Management Associates
Enterprise Security Infrastructure: A Managed Approach,
J. G. Hanson, Telos Corp.
PKI - Sham or Salvation?,
J. David, Lehman Brothers
Papers
Chain of Trust in a Digital Signature System Based on a Smart Card,
J. Giraud, Gemplus
An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups,
J. Alves-Foss, University of Idaho
Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules,
R. Chandramouli, NIST
 

Last update July 5, 2001

Welcome | Program | General Information
 Contacts | Home | NIST Home