23rd National Information Systems Security Conference
Overview of the Program
Last update October 12, 2000


Wednesday, October 18
Room(s)
Time / Topic for  Sessions and Events
8:30 - 10:00 10:30 - 12:00 1:30 - 3:00 3:30 - 5:00 6:00 / 7:00
301-303 Information Security Year in Review—Computer Crime Information Security Year in Review--Technical Vulnerabilities PKI Paradigms: Promoting Global Connectivity Guerilla Security: The Martial Art of Infosecurity
307 Your Always-On Connection & the Telecommuter Security for High-Speed Internets Security for Domain Name System—Ready for Prime Time SNMPv3 with Security and Administration
308 Distributed Denial of Service Attacks - Can We Survive This New Threat? How Do We Prevent Denials of Service? Black Hat - White Hat Recent Trends in Hacking
309 Understanding FIPS 140-2 Validation A Protection Profile for FIPS 140-2, Lessons Learned Testing of Cryptographic Modules Against FIPS 140-2 The Cryptographic Module Validation Program: FIPS 140-2 …The Next Generation
310 Single Sign-on: Myth or Reality Biometrics – Understanding the Architecture, API’s, Encryption and Authentication Security for Integration into Existing Systems & Applications Scorecard for Online Authentication Technologies The OM-AM Framework and Role-Based Access Control
324-326 Strong Authentication Desktop Security End-to-End Encryption Certificate-Based Access Control and Administration
327-329 “Hands-On” Approach of Building a Security Program Working On A Shoestring Cybersecurity in the Year 2000: Not Just for Systems Administrators Anymore Professional Certification of Information Security Professionals
330 Paper Session: Architectures
paper 1:
Chain of Trust in a Digital Signature System Based on a Smart Card

paper 2:
An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups

paper 3:
Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules

Paper Session: Refocused Views
paper 1:
Rethinking Department of Defense Public Key Infrastructure

paper 2:
Corporate Vital Defense Strategy: A Framework for Information Assurance

paper 3:
Trends in Government Endorsed Security Product Evaluations

Paper Session: Information Access Issues
paper 1:
Controlling Primary And Secondary Access To Digital Information

paper 2:
A Query Facility for Common Intrusion Detection Framework


Paper Session: Capabilities
paper 1:
Database Security 2000

paper 2:
Privilege Management of Mobile Agents

paper 3:
Towards XML as a Secure Intelligent Agent Communication Language

331-332 Information Security Research and Development in Academia Information Security Laboratories in the Academic Setting Innovations in Biometric Authentication Technologies Certificates in the Internet: State, Issues, and Futures
Close this Window