Electronic Commerce
Track
Today's super-application is the buying
and selling of products and services by businesses and consumers over the
internet. Sessions in this track will address the security issues
necessary to make electronic commerce work.
All presentations, speakers, and times
are subject to change. We will do our best to list the most current information.
Times and dates of sessions will be announced soon.
Track Chair:
Jim Litchko, Litchko and Associates
Sessions |
Future
of Information Security,
G. M. Hardy, Guardent, Inc. |
Security
in Business-to-Business E-Commerce,
J. Epstein, webMethods |
Achieving
Global Trust in an e-World,
R. Wilsher, The Zygma Partnership |
Guerilla
Security: The Martial Art of InfoSecurity,
A. Robinson, net/main InfoSecurity Solutions |
Unified Access Management: How to
Enable E-Business, Yet Protect Information,
E. Olden, Securant Technologies |
Collusion
Detection Las Vegas Style,
J. Jonas, Systems Research & Development |
Protection
of Business-to-Business Exchanges and Vendor Operations,
C. Baggett, Risk Management Associates |
Enterprise
Security Infrastructure: A Managed Approach,
J. G. Hanson, Telos Corp. |
PKI
- Sham or Salvation?,
J. David, Lehman Brothers |
Papers |
Chain
of Trust in a Digital Signature System Based on a Smart Card,
J. Giraud, Gemplus |
An
Efficient Secure Authenticated Group Key Exchange Algorithm for Large and
Dynamic Groups,
J. Alves-Foss, University of Idaho |
Business
Process Driven Framework for Defining an Access Control Service Based on
Roles and Rules,
R. Chandramouli, NIST |
|
|