Return to Trackview
Policy, Management, & Gov't. Issues
Assurance / Criteria / Testing

Electronic Commerce

Networking and the Internet

Research and
Development

Tutorials

 
Policy, Management &
Government Issues Track

These sessions highlight the security policy perspective, showcasing practical solutions to security dilemmas that face government IT managers.  Sessions and papers chosen for this track predict lively discussion with the attendees.

All presentations, speakers, and times are subject to change. We will do our best to list the most current information.  Times and dates will be announced soon.

Track Chairs:
W. Joy Prangley, USDA
Greg Gage, USDA
Janice Green, GSA

Sessions
Access Certificates for Electronic Services (ACES) - Enabling Government-to-Citizen Interaction via the Internet,
J. Spencer, GSA
Working on a Shoestring,
D. Jarrell, GSA
Best Security Practices: Lowering Quality’s Total Cost of Ownership in an Age of Growing Complexity,
M. Schanken, NSA
Tracking the Virus Writer: The Legal
Ramifications,
C. Orshesky, I-Secure Corp.
Cybersecurity in the Year 2000: Not Just for Systems Administrators Anymore,
R. Shullaw, HHS
Guideline for Implementing Cryptography in the Federal Government,
A. Lee, NIST
Privacy in the Information Age,
B. Burnham, Georgia Institute of Technology
Anonymity in the Information Age,
B. Burnham, Georgia Institute of Technology
Professional Certification of Information Security Professionals,
L. McNulty, RSA Security
Department of Defense (DoD) Wide Information Assurance Program (DIAP): Current Initiatives,
J. K. Burton, USN, DOD
Critical Infrastructure Protection for Chief Information Officers (or CIP for CIOs),
J. Davis, Mitretek
The Secret and Below Interoperability (SABI) Process - Continuing the Discovery of Community Risk,
M. Loepker, NSA
Progress of the Best Security Practices Subcommittee,
J. Craft, USAID
Federal Bridge Certification Authority (FBCA) Demonstration and Panel - Part I,
R. Guida, Treasury
Federal Bridge Certification Authority (FBCA) Demonstration and Panel - Part II,
R. Guida, Treasury
“Hands-On” Approach of Building a Security Program,
B. Hadesty, USDA
The National Security Agency’s Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM)
Ms. Mary D. Schanken, National Security Agency
The New National Computer Security Center,
L. Martin, NSA
Papers
Database Security 2000,
J. Campbell, NSA
Controlling Primary and Secondary Access to Digital Information,
M. Abrams, MITRE Corporation
Policy-Enhanced Linux,
P. Clark, Naval Postgraduate School
Best Security Practices: An Overview,
G. King, Computer Sciences Corp.
The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques,
C. Cowan, WireX Communications, Inc.
The Curse of Service: Civil Liability for Computer Security Professionals,
A. Wylene, New College of California School of Law
Icons for Information Attack Scenarios,
H. Hosmer, Data Security, Inc.
A Taxonomy of Organizational Security Policies,
G. Smith, SAIC
 

Last update October 12, 2000

Welcome | Program | General Information | Registration
Call for Papers and Panels | Contacts | Home | NIST Home