|
8:30am-10:00 am A Secure Station for Network Monitoring and Control The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer, Secure Computing Corporation; Stephen Smalley, Peter Loscocco, National Security Agency; Mike Hibler, Dave Andersen, Jay Lepreau, University of Utah A Study in Using Neural Networks for Anomaly and Misuse Detection Anup K. Ghosh, Aaron Schwartzbard, Reliable Software Technologies 10:30amNoon The Design of a Cryptographic Security Architecture Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 Alma Whitten, Carnegie Mellon University; J. D. Tygar, University of California at Berkeley Jonah: Experience Implementing PKIX Reference Freeware Mary Ellen Zurko, John Wray, Iris Associates; Ian Morrison, IBM; Mike Shanzer, Iris Associates; Mike Crane, IBM; Pat Booth, Lotus; Ellen McDermott, IBM; Warren Macek, Iris Associates; Ann Graham, Jim Wade, Tom Sandlin, IBM 1:30pm3:00pm Scalable Access Control for Distributed Object Systems Daniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, Pierre X. Pasturel, NAI Labs, Network Associates, Inc.; E. John Sebes, Kroll-O'Gara Information Security Group Certificate-based Access Control for Widely Distributed Resources Mary R. Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, Abdelilah Essiari, Lawrence Berkeley National Laboratory Digital-Ticket-Controlled Digital Ticket Circulation Joint Session 3:30pm5:00pm |
Need help? Use our Contacts page. First posted: May 1999 Last changed: 15 Jul. 1999 jr |
|