Research and Development
Track
Explore the industry's latest research
and development activities as presenters discuss a variety of subjects
including software engineering, issues associated with rapidly changing
information technology, as well as emerging R&D philosophies. Sessions
and papers chosen for this track predict lively discussion with the attendees.
All presentations, speakers, and times
are subject to change. We will do our best to list the most current information.
Times and dates will be announced soon.
Track Chair:
Dr. Ray Vaughn, Mississippi State
University
Sessions |
Themes
and Highlights of the New Security Paradigms Workshop 2000,
S. Greenwald |
Security
and Quality of Service Interactions,
S. Hinrichs, Cisco Systems, Inc. |
Recent
Trends in Hacking,
P. Mell, NIST |
Issues
in High Performance Computing Security,
R. Vaughn, Mississippi State University |
Security
and Source-Available Systems: Risks and Opportunities,
P. Neumann, SRI |
Information
Security Research and Development in Academia,
S. Bridges, Mississippi State University |
Information
Assurance Technologies: 10 Years Past, Present and Future,
J. Murphy, EDS |
Information
Security Laboratories in the Academic Setting,
B. Burnham, Georgia Institute of Technology |
R&D Biometrics,
J. Dunn, NSA |
The
OM-AM Framework and Role-Based Access Control,
R. Sandhu, George Mason University |
Papers |
Privilege
Management of Mobile Agents,
W. Jansen, NIST |
Push
Architectures for User Role Assignment,
R. Sandhu, George Mason University |
A
Role-Based Delegation Model and Some Extensions,
R. Sandhu, George Mason University |
Corporate
Vital Defense Strategy: A Framework for Information Assurance,
B. Raggad, Pace University |
Next
Generation Intrusion Detection: Autonomous Reinforcement Learning of Network
Attacks,
J. Cannady, Georgia Institute of Technology |
Generalized
Role-Based Access Control for Securing Future Applications,
M. Covington, Georgia Institute of Technology |
An
Operating System Analog to the Perl Data Tainting Functionality,
D. Madsen, University of Maryland |
Multiple
Self-Organizing Maps for Intrusion Detection,
B. Rhodes, J. Mahaffey, J. Cannady, Georgia
Institute of Technology |
Towards
the Formal Modeling of a Secure Operating System,
D. Zhou, Florida Atlantic University |
|
|