Wednesday, October
18 |
Room(s) |
Time / Topic for Sessions and Events
|
8:30 - 10:00 |
10:30 - 12:00 |
1:30 - 3:00 |
3:30 - 5:00 |
6:00 / 7:00 |
301-303 |
Information
Security Year in Review�Computer Crime |
Information
Security Year in Review--Technical Vulnerabilities |
PKI
Paradigms: Promoting Global Connectivity |
Guerilla
Security: The Martial Art of Infosecurity |
|
307 |
Your
Always-On Connection & the Telecommuter |
Security
for High-Speed Internets |
Security
for Domain Name System�Ready for Prime Time |
SNMPv3
with Security and Administration |
308 |
Distributed
Denial of Service Attacks - Can We Survive This New Threat? |
How
Do We Prevent Denials of Service? |
Black
Hat - White Hat |
Recent
Trends in Hacking |
309 |
Understanding
FIPS 140-2 Validation |
A
Protection Profile for FIPS 140-2, Lessons Learned |
Testing
of Cryptographic Modules Against FIPS 140-2 |
The
Cryptographic Module Validation Program: FIPS 140-2 �The Next Generation |
310 |
Single
Sign-on: Myth or Reality |
Biometrics
� Understanding the Architecture, API�s, Encryption and Authentication
Security for Integration into Existing Systems & Applications |
Scorecard
for Online Authentication Technologies |
The
OM-AM Framework and Role-Based Access Control |
324-326 |
Strong
Authentication |
Desktop
Security |
End-to-End
Encryption |
Certificate-Based
Access Control and Administration |
327-329 |
�Hands-On�
Approach of Building a Security Program |
Working
On A Shoestring |
Cybersecurity
in the Year 2000: Not Just for Systems Administrators Anymore |
Professional
Certification of Information Security Professionals |
330 |
Paper Session: Architectures
paper 1:
Chain
of Trust in a Digital Signature System Based on a Smart Card
paper 2:
An
Efficient Secure Authenticated Group Key Exchange Algorithm for Large and
Dynamic Groups
paper 3:
Business
Process Driven Framework for Defining an Access Control Service Based on
Roles and Rules |
Paper Session: Refocused Views
paper 1:
Rethinking
Department of Defense Public Key Infrastructure
paper 2:
Corporate
Vital Defense Strategy: A Framework for Information Assurance
paper 3:
Trends
in Government Endorsed Security Product Evaluations |
Paper Session: Information Access
Issues
paper 1:
Controlling
Primary And Secondary Access To Digital Information
paper 2:
A
Query Facility for Common Intrusion Detection Framework |
Paper Session: Capabilities
paper 1:
Database
Security 2000
paper 2:
Privilege
Management of Mobile Agents
paper 3:
Towards
XML as a Secure Intelligent Agent Communication Language |
331-332 |
Information
Security Research and Development in Academia |
Information
Security Laboratories in the Academic Setting |
Innovations
in Biometric Authentication Technologies |
Certificates
in the Internet: State, Issues, and Futures |