|
Wednesday, October 18: 8:30-10:00 Day Track
All presentations, speakers, and times are subject to change. We will
do our best to list the most current information.
8:30-10:00
Sessions for Wednesday October 18 |
Rooms: 301-303
Information
Security Year in Review—Computer Crime
-
Mich E. Kabay, ADARIO, Inc.
|
Room: 307
Your
Always-On Connection & the Telecommuter
-
Chair: Peter
Dinsmore, NAI Labs, Network Associates
-
Michael St. Johns
-
Gregor Freund, Zone Labs
|
Room: 308
Distributed
Denial of Service Attacks - Can We Survive This New Threat?
-
Chair: Jon
David, Lehman Brothers
-
Steve Bellovin, AT&T Labs Research
-
Bill Cheswick, Lucent Technologies
-
Paul Ferguson, Cisco
|
Room: 309
Understanding
FIPS 140-2 Validation
-
John Morris, Corsec Security
|
Room: 310
Single
Sign-on: Myth or Reality
-
Thomas Peltier, Netigy Corporation
|
Rooms: 324-326
Strong
Authentication
-
Chair: Fred Tompkins, KTSI
-
Panel: (TBD)
|
Rooms: 327-329
“Hands-On”
Approach of Building a Security Program
|
Room: 330
Paper Session: Architectures
paper 1:
Chain
of Trust in a Digital Signature System Based on a Smart Card
-
Jean-Luc Giraud, Gemplus, France
paper 2:
An
Efficient Secure Authenticated Group Key Exchange Algorithm for Large and
Dynamic Groups
-
Jim Alves-Foss, University of Idaho
paper 3:
Business
Process Driven Framework for Defining an Access Control Service Based on
Roles and Rules
-
Ramaswamy Chandramouli, NIST
|
Rooms: 331-332
Information
Security Research and Development in Academia
-
Chair: Susan M. Bridges, Mississippi
State University
-
Blaine W. Burnham, University of Nebraska
at Omaha
-
Dipankar Dasgupta, The University of Memphis
-
James A. Davis, Iowa State University
-
Cynthia Irvine, Naval Postgraduate School
|
|
|
Last update October 12, 2000
|