Return to Trackview
Research and Development
Assurance / Criteria / Testing

Electronic Commerce

Networking and the Internet

Policy. Management, & Government Issues

Tutorials

 
Research and Development Track

Explore the industry's latest research and development activities as presenters discuss a variety of subjects including software engineering, issues associated with rapidly changing information technology, as well as emerging R&D philosophies. Sessions and papers chosen for this track predict lively discussion with the attendees. 

All presentations, speakers, and times are subject to change. We will do our best to list the most current information.  Times and dates will be announced soon.

Track Chair:
Dr. Ray Vaughn, Mississippi State University

Sessions
Themes and Highlights of the New Security Paradigms Workshop 2000,
S. Greenwald
Security and Quality of Service Interactions,
S. Hinrichs, Cisco Systems, Inc.
Recent Trends in Hacking,
P. Mell, NIST
Issues in High Performance Computing Security,
R. Vaughn, Mississippi State University
Security and Source-Available Systems: Risks and Opportunities,
P. Neumann, SRI
Information Security Research and Development in Academia,
S. Bridges, Mississippi State University
Information Assurance Technologies: 10 Years Past, Present and Future,
J. Murphy, EDS
Information Security Laboratories in the Academic Setting,
B. Burnham, Georgia Institute of Technology
R&D Biometrics,
J. Dunn, NSA
The OM-AM Framework and Role-Based Access Control,
R. Sandhu, George Mason University
Papers
Privilege Management of Mobile Agents,
W. Jansen, NIST
Push Architectures for User Role Assignment,
R. Sandhu, George Mason University
A Role-Based Delegation Model and Some Extensions,
R. Sandhu, George Mason University
Corporate Vital Defense Strategy: A Framework for Information Assurance,
B. Raggad, Pace University
Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks,
J. Cannady, Georgia Institute of Technology
Generalized Role-Based Access Control for Securing Future Applications,
M. Covington, Georgia Institute of Technology
An Operating System Analog to the Perl Data Tainting Functionality,
D. Madsen, University of Maryland
Multiple Self-Organizing Maps for Intrusion Detection,
B. Rhodes, J. Mahaffey, J. Cannady, Georgia Institute of Technology
Towards the Formal Modeling of a Secure Operating System,
D. Zhou, Florida Atlantic University
 

Last update October 12, 2000

Welcome | Program | General Information | Registration
Call for Papers and Panels | Contacts | Home | NIST Home