TRACK A | TRACK B | TRACK C | |
08:30 | Plenary Panel Session: Critical Infrastructure Protection; Report on National Infrastructure Coordination Initiatives, Infrastructure Protection Task Force (IPTF) Chair: S. League, IPTF-Defense Information Systems Agency, Panelists: D. Keyes, FBI, D. Knuaf, IPTF-NSA, M. Woods, CITAC Counsel, FBI |
||
10:00 | BREAK | ||
10:30 | Guards and Firewalls Chair: E. Siarkiewicz, Air Force Research Laboratory Domain and Type Enforcement Firewalls, K. Oostendorp, L. Badger, C. Vance, W. Morrison, D. Sherman, D. Sterne, TIS, Inc. A Reference Model for Firewall Technology, C. Schuba, Purdue University Using Type Enforcement to Assure a Configurable Guard, P. Greve, J. Hoffman, R. Smith, Secure Computing Corp. |
Security Architecture Chair: J. Heaney, The MITRE Corp. Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architectures, D. Mosier, T. Lowman, SAIC An Architecture for Multilevel Secure Interoperability, M. Kang, J. Froscher, J. Moskowitz, NRL Using Web Technologies in Two MLS Environments: A Security Analysis, R. Niemeyer, CSC |
Public Key Infrastructure (PKI) Chair: A. Friedman, The MITRE Corp. Implementation Strategies for Secure Network Computing, T. Ehrsam, Oracle Corp. CyberTrust, R. Dulude, GTE Implementing PKI, B. Pratt, Verisign |
12:00 | LUNCH | 1:30 |
Forum: Assurance Lessons Learned
Chair: J. Adams, TIS, Inc.
Speakers: |
Cryptography and Key Management Chair: M. Bishop, UC, Davis On the Key Recovery of the Key Escrow System, Y. Lee, C. Liah, National Huwei Institute of Technology (t+1, n) Threshold and Generalized DSS Signatures without a Trusted Party, C. Wang, T. Hwang, National Cheng-Kung University click for text . . An Improved E-Mail Security Protocol, B. Schneier, C. Hall, Counterpane Systems |
Firewalls Chair: M. Kleidermacher, L-3 Communications Secure Computing Firewall for NT, D, Thompsen and T. Reamer, SCC New Paradigms for Securing the Global Enterprise, S. Kramer, Check Point OmniGuard & Firewalls, D. Conorich, Axent Technologies |
3:00 | BREAK | ||
3:30 | Access Control Chair: E. Coyne, SETA Corp. Implementing RBAC on a Type Enforced System, J. Hoffman, Secure Computing Corp. Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System, T. Himdi, R. Sandhu, George Mason University Using Kernel Hypervisors to Secure Applications, T. Mitchem, R. Lu, D. O'Brian, Secure Computing Corp. |
Forum: PKI Chair: A. Friedman, The MITRE Corp. Speakers: |
Electronic Commerce Chair: C. McBride, NSA Certificate Authority Services, A. Wheeler, First Data Corp. Enabling Secure Commerce on the Internet, Cybercash IVES, Lucent Technologies |
6:00 | CONFERENCE DINNER |
Thursday Conference Dinner will take place at the Hyatt Islandia. During the evening, the Best Paper Award will be announced so you don't want to miss this special presentation. The dinner is included in the conference registration fee. Guest tickets can be ordered on the pre-registration form for $40.00
[ HOW TO REGISTER ]
[ ACSAC HOME PAGE ] [ GENERAL INFORMATION ] [ MAIL ACSAC WEBMASTER ]