December 24, 1996


The NSA-hosted National Information Systems Security Conference, held in October, 1996, has made a wide range of papers available (in PDF format), and are listed in the Table of Contents at:

http://csrc.nist.gov/nissc/1996/papers/NISSC96/toc.pdf   (110K)

This is an HTML version of the TOC by jya.


See index for downloading papers at: http://csrc.nist.gov/nissc/1996/papers/NISSC96/


19th National Information Systems Security
Conference Proceedings

This is the table of contents to the papers, panel statements and presentations which were submitted in electronic form. Each paper was converted to Adobe's Acrobat format, and a link was made from the table of contents entry to the corresponding Acrobat file. Every attempt was made to generate a legible file. Most papers will not be identical to the wordprocessor or printed original, since no two systems, programs or printers generate identical output. Papers which were submitted in PostScript format as generated by TeX/LaTeX and DVIPS used bitmapped rather than scalable fonts. Those papers will be most legible if they are printed out, or if the display monitor is set to the highest possible resolution (e.g. 1600x1200).

The table of contents is derived from the source for the printed version. The numbers on the left should correspond with the page number of the printed version. The label before each entry, e.g. paper001, corresponds to the directory containing the Acrobat files, which will have the .pdf extension. If the entry is prefaced by [none], the document was not submitted in electronic form, or we were unable to successfully generate the Acrobat file.


Bequai

Rise of the Mobile State: Organized Crime in the 21st Century

Keynote Speech: August Bequai, Esq.


Refereed Papers

Criteria & Assurance

[none]

E4 ITSEC Evaluation of PR/SM on ES/9000 Processors

Naomi Htoo-Mosher, Robert Nasser, Nevenko Zunic, International Business Machines
Julian Straw, Syntegra, UK

paper041

A High-Performance Hardware-Based High Assurance Trusted Windowing System

Jeremy Epstein, Cordant Inc.

paper066

WWW Technology in the Formal Evaluation of Trusted Systems

E.J McCauley, Silicon Graphics Computer Systems, Inc.

paper052

The Certification of the Interim Key Escrow System

Ellen Flahavin, Ray Snouffer, National Institute of Standards and Technology

paper035

Configuration Management in Security-related Software Engineering Processes

Klaus Keus, Thomas Gast, Bundesamt fur Sicherheit in der Informationstechnik, Germany

paper028

The Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP)

Jack Eller, DISA
Mike Mastrorocco, Computer Security Consulting
Barry C. Stauffer, CORBETT Technologies, Inc.

paper031

Trusted Process Classes

William L. Steffan, Tracor Applied Science, Inc.
Jack D. Clow, SenCom Corporation

[none]

Design Analysis in Evaluations Against the TCSEC C2 Criteria

Frank Belvin, Deborah Bode and, Shun Razvi, The MITRE Corporation

paper010

System Security Engineering Capability Maturity Model and Evaluations: Partners within the Assurance Framework

Charles G. Menk III, Department of Defense

paper026_027

Applying the IC SEC Guidelines to a Real-Time Embedded System Environment

Jim Alves-Foss, Deborah Frincke, Gene Saghi University of Idaho


Electronic Commerce

paper072_073_074

EDI Moves from the VAN to the Internet

Brian Bradford, University of Maryland

paper029

An International Standard for the Labeling of Digital Products

Victor E. Hampel, Hampel Consulting

paper002

The Business-LED Accreditor - OR .. How to Take Risks and Survive

Michael E J Stubbings, Government Communications Headquarters, UK

paper064

Integration of Digital Signatures into the European Business Register

Helmut Kurth, Industrieanlagen Betriebsgesellschaft mbH, Germany

Joyal

Industrial Espionage Today and Information Wars of Tomorrow

Paul M. Joyal, INTEGER Inc.

paper005

B is for Business: Mandatory Security Criteria & the OECD Guidelines for Information Systems Security

Prof. William J. Caelli, Queensland University of Technology, Australia

paper230_062

Marketing & Implementing Computer Security

Mark Wilson, National Institute of Standards and Technology

paper038

Secure Internet Commerce - Design and Implementation of the Security Architecture of Security First Network Bank, FSB

Nicolas Hammond, NJH Security Consulting, Inc.


In Depth

paper008

Automatic Formal Analyses of Cryptographic Protocols

Stephen H. Brackin, Arca Systems, Inc.

paper014

Surmounting the Effects of Lossy Compression on Steganography

Daniel L. Currie, III, Fleet Information Warfare Center
Cynthia E. Irvine, Naval Post-Graduate School

paper018

Key Escrowing Systems and Limited One Way Functions

William T. Jennings, Southern Methodist University & Raytheon E-Systems
James G. Dunham, Southern Methodist University

paper001

The Keys to a Reliable Escrow Agreement

Richard Sheffield


Internet

paper023

The Advanced Intelligent Network - A Security Opportunity

Thomas A. Casey, Jr., GTE Laboratories, Inc.

paper024

Security Issues in Emerging High Speed Networks

Vijay Varadharajan, University Of Western Sydney, Australia
Panos Katsavos, Hewlett Packard sponsored student, UK

paper045

A Case Study of Evaluating Security in an Open Systems Environment

Daniel L. Tobat, TASC
Errol S. Weiss, Science Applications International Corporation

paper020

Internet Firewalls Policy Development and Technology Choices

Leonard J. D'Alotto, GTE Laboratories Inc.

[none]

A Case for Avoiding Security-Enhanced HTTP Tools to Improve Security for Web-Based Applications

Bradley J. Wood, Sandia National Lahoratory

paper012

Applying the Eight Stage Risk Assessment Methodology to Firewalls

David L. Drake, Katherine L. Morse, Science Applications International Corporation

paper076

Lessons Learned: An Examination of Cryptographic Security Services in a Federal Automated Information System

Jim Foti, Donna Dodson, Sharon Keller, National Institute of Standards and Technology


Legal Perspectives

paper072_073_074

Intellectual Property Rights and Computer Software

Dawn E. Bowman, University of Maryland

paper040

Case Study of Industrial Espionage Through Social Engineering

Ira S. Winkler, National Computer Security Association

paper056

Legal Aspects of Ice Pick Testing

Dr. Bruce C. Gabrielson, Kaman Sciences Corp.


Management & Administration

paper015

Security Through Process Management

Jennifer L. Bayuk, Price Waterhouse, LLP

paper048

Malicious Data and Computer Security

W. Olin Sibert, InterTrust Technologies Corporation

paper058

Security Issues for Telecommuting

Lisa J. Carnahan, Barbara Guttman, National Institute of Standards and Technology


Research & Development

paper055

An Isolated Network for Research

Matt Bishop, L. Todd Heberlein, University of California Davis

paper065

GrIDS - A Graph-Based Intrusion Detection System for Large Networks

S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank,
J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle, University of California, Davis

[none]

Attack Class: Address Spoofing

L. Todd Heberlein, Net Squared
Matt Bishop, University of California, Davis

paper049

Generic Model Interpretations: POSIX.1 and SQL

D. Elliott Bell, Mitretek Systems

paper036

The Privilege Control Table Toolkit: An Implementation of the System Build Approach

Thomas R. Woodall, Roberta Gotfried, Hughes Aircraft Company

paper044

Use of the Zachman Architecture for Security Engineering

Ronda Henning, Harris Corporation

paper026_027

Developing Secure Objects

Deborah Frincke, University of Idaho

paper069

Deriving Security Requirements for Applications on Trusted Systems

Raymond Spencer, Secure Computing Corporation

paper072_073_074

Security Implications of the Choice of Distributed Database Management System Model: Relational vs. Object-Oriented

Stephen Coy, University of Maryland

paper063_054

Management Model for the Federal Public Key Infrastructure

Noel A. Nazario, William E. Burr, W. Timothy Polk, National Institute of Standards and Technology

paper063_054

Security Policies for the Federal Public Key Infrastructure

Noel A. Nazario, National Institute Standards and Technology

paper042

A Proposed Federal PKI using X.509 V3 Certificates

William E. Burr, Noel A. Nazario, W. Timothy Polk, National Institute of Standards and Technology

paper075

A Security Flaw in the X.509 Standard

Santosh Chokhani, CygnaCom Solutions, Inc.


Solutions

paper009

Computer Virus Response Using Autonomous Agent Technology

Christine M. Trently, Mitretek Systems

paper003

Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles

Major Gregory White, Ph.D.,
Captain Gregory Nordstrom (Ret.), USAF Academy

paper060

U.S. Government Wide Incident Response Capability

Marianne Swanson, National Institute of Standards and Technology

paper047

MLS DBMS Interoperability Study

Rae K. Burns, AGCS, Inc.
Yi-Fang Koh, Raytheon Electronic Systems

[none]

MISSI Compliance for Commercial-Off-The-Shelf Firewalls

Michael Hale, Tammy Mannarino, National Security Agency

paper037

Designing & Operating a Multilevel Security Network Using Standard Commercial Products

Richard A. Griffith, Mac E. McGregor, Air Force C4 Technology Validation Office

paper019

Real World Anti-Virus Product Reviews and Evaluations - The Current State of Affairs

Sarah Gordon, Richard Ford, Command Systems, Inc.

paper068

Security Proof of Concept Keystone (SPOCK)

James McGehee, COACT Inc.

paper057

Use of a Taxonomy of Security Faults

Taimur Aslam, Ivan Krsul, Eugene H. Spafford, Purdue University

paper017

Protecting Collaboration

Gio Wiederhold, Michel Bilello, Stanford University
Vatsala Sarathy, Oracle Corp.
XiaoLei Qian, SRI International

paper039

Design and Management of a Secure Networked Administration System: A Practical Solution

Vijay Varadharajan, University of Western Sydney, Australia

paper016

Information Warfare, INFOSEC and Dynamic Information Defense

J.R. Winkler, C. J. O'Shea, M.C. Stokrp, PRC Inc.

paper033

Security for Mobile Agents Issues and Requirements

William M. Farmer, Joshua D. Guttman, Vipin Swarup, The MITRE Corporation

[none]

Extended Capability: A Simple Way to Enforce Complex Security Policies in Distributed Systems

I-Lung Kao, IBM Corporation
Randy Chow, University of Florida

paper070

IGOR: The Intelligence Guard for ONI Replication

R.W. Shore, The ISX Corporation


Invited Papers

Management & Administration

paper259

Ethical and Responsible Behavior for Children to Senior Citizens in the Information Age

Gale S. Warshawsky, International Community Interconnected Computing eXchange


Legal Perspectives

[none]

Privacy Rights in a Digital Age

William Galkin, Esq., Law Office of William S. Galkin


Panels

Criteria & Assurance

paper209

Trust Technology Assessment

Program Chair: Tom Anderson, National Security Agency

Panelists:

Pat Toth, National Institute of Standards and Technology

paper213

Alternative Assurance: There's Gotta Be a Better Way!

Chair: Douglas J. Landoll, Arca Systems, Inc.

Panelists:

John J. Adams, National Security Agency
TBD, WITAT System Analysis & Operational Assurance Subgroup Chair
M. Abrams, The MITRE Organization, WITAT Impact Mitigation Subgroup Chair
TBD, WITAT Determining Assurance Mix Subgroup Chair

paper246

Certification and Accreditation - Processes and Lessons Learned

Chair: Jack Eller, DISA, CISS (ISBEC)

Viewpoints:

The Certification and Accreditation Process Handbook For Certifiers

Paul Wisniewski, National Security Agency

Standards in Certification and Accreditation

Candice Stark, Computer Science Corporation

The Certification of the Interim Key Escrow System

Ray Snouffer, National Institute of Standards and Technology

Lessons Learned From Application of the Department of Defense Information Technology Security Certification and Accreditation

Barry C. Stauffer, CORBETT Technologies, Inc.

paper224

Firewall Testing and Rating

Chair: J. Wack, National Institute of Standards and Technology

[none]

The Trusted Product Evaluation Program: Direction for the Future

Chair: J. Pedersen, National Security Agency

paper226

Common Criteria Project Implementation Status

Chair: E. Troy, National Institute of Standards and Technology

Panelists:

Lynne Ambuel, National Security Agency
Murray Donaldson, Communications-Electronics Security Group, UK
Robert Harland, Communications Security Establishment, Canada
Klaus Keus, BSI/GISA, Germany
Frank Mulder, Netherlands National Communications Security Agency
Jonathan Smith, Gamma Secure Systems, UK

[none]

Developmental Assurance and the Common Criteria

Chair: M. Schanken, National Security Agency

Panelists:

S. Katzke, National Institute of Standards and Technology
E. Troy, National Institute of Standards and Technology
K. Keus, BSI/GISA, Germany
Y. Klein, SCSSJ, France

Lunt

Secure Networking and Assurance Technologies

Chair: T. Lunt, Defense Advanced Research Projects Agency (DARPA)

Panelists:

K. Levitt, University of California, Davis
S. Kent, BBN

Viewpoints:

Secure Mobile Networks

J. McHugh, Portland State University

Adaptable Dependable Wrappers

D. Weber, Key Software Generic Software

Wrappers for Security and Reliability

L. Badger, Trusted Information Systems, Inc.

Defining an Adaptive Software Security Metric From A Dynamic Software Fault-Tolerance Measure

J. Voas, Reliable Software Technologies


Electronic Commerce

paper205

Using Security to Meet Business Needs: An Integrated View From The United Kingdom

Chair: Alex Mclntosh, PC Security, Ltd

Viewpoints:

Dr. David Brewer, Gamma Secure Systems, Ltd
Nigel Hickson, Department of Trade & Industry
Denis Anderton, Barclays Bank PLC
Dr. James Hodsdon, CESG
Michael Stubbings, Government Communications Headquarters, UK

[none]

Security APIs: CAPIs and Beyond

Chair: Amy Reiss, National Security Agency

Panelists:

John Centafont, National Security Agency
TBD, Microsoft
Lawrence Dobranski, Canadian Communications Security Establishment, Canada
David Balenson, Trusted Information Systems, Inc.

paper220_211

Are Cryptosystems Really Unbreakable?

Chair: Dorothy E. Denning, Georgetown University

Panelists:

Steven M. Bellovin, AT&T Research
Paul Kocher, Independent Crvptography Consultant
Eric Thompson, AccessData Corporation

Viewpoints:

The Mathematical Primitives: Are They Really Secure?

Arjen K. Lenstra, Citibank


In Depth

paper204

Best of the New Security Paradigms

Workshop Chair: J. T. Haigh, Secure Computing Corporation

Viewpoints:

New Paradigms for Internetwork Security

J. T. Haigh, Secure Computing Corporation

The Emperor's Old Armor

R. Blakely, International Business Machines

Position Statement for New Paradigms Internetwork Security Panel

S. Greenwald, Naval Research Laboratory

Reactive Security and Social Control

S. Janson, Swedish Institute of Computer Science, Sweden

NISS Whitepaper: A New Model of Security for Distributed Systems

W. Wulf, University of Virginia

paper245

Series: Public Key Infrastructure: From Theory to Implementation

Public Key Infrastructure Technology

Chair: D. Dodson, National Institute of Standards and Technology

Panelists:

R. Housley, Spyrus
C. Martin, Government Accounting Office
W. Polk, National Institute of Standards and Technology
S. Chokani, Cygnacom Solutions, Inc.
V. Hampel, Hampel Consulting

Public Key Infrastructure Implementations

Chair: W. Polk, National Institute of Standards and Technology

Panelists:

P. Edfors, Government Information Technology Services (GITS) Working Group
D. Heckman, National Security Agency
D. Dodson, National Institute of Standards and Technology
J. Galvin, CommerceNet
W. Redden, Communications Security Establishment

[none]

Establishing an Enterprise Virus Response Program

Christine Trently, Mitretek Systems

[none]

Data Warehousing I

Chair: John Campbell, National Security Agency

Panelists:

Jesse C. Worthington, Informix Software, Inc.

Viewpoints:

Data Warehousing, Data Mining, and Security: Developments and Challenges

Dr. Bhavani Thuraisingham, The MITRE Corporation

Data Warehousing, Data Mining, and the Security Issues

Dr. John Campbell, National Security Agency

[none]

Data Warehousing II. The Technology

Chair: John Davis, NCSC

Panelists:

Dr. Bhavani Thuraisingham, The MITRE Corporation
Dr. John Campbell, National Security Agency


Internet

paper267

Introduction to Infowarfare Terminology

Francis Bondoc, Klein & Stump

[none]

Information Warfare: Real Threats, Definition Changes, and Science Fiction

Chair: Wayne Madsen, Computer Sciences Corporation

Panelists:

Martin Hill, Office of the Assistant Secretary of Defense C3I/Information Warfare
Frederick G. Tompkins, Matthew Devost, Science Applications International Corporation
Scott Shane, The Baltimore Sun
John Stanton, Journal of Technology Transfer

[none]

Security in World Wide Web Browsers: More than Visa cards?

Chair: R. Dobry, National Security Agency

Panelists:

C. Kolcun, Microsoft
B. Atkins, National Security Agency
K. Rowe, NCSA

[none]

Attack/Defense

Chair: J. David, The Fortress

Panelists:

S. Bellovin, AT&T
W. Cheswick, AT&T
P. Peterson, Martin Marietta
M. Ranum, V-One

[none]

The Web Series

I. The Web - What is it, Why/How is it Vulnerable
II. Securing the Web

Chair: J. David, The Fortress

Speaker:

J. Freivald, Charter Systems, Inc.
P. Peterson, Martin Marietta
D. Dean, Princeton University


Legal Perspectives

paper265

Electronic Data: Privacy, Security, Confidentiality Issues

Chair: Kristin R. Blair, Esq., Duvall, Harrington, Hale and Hassan

Viewpoints:

Virginia Computer Crime Law

The Honorable Leslie M. Alden, Judge, Fairfax County Circuit Court

Electronic Data: Privacy, Security and Confidentiality

Ronald J. Palenski, Esq., Gordon and Glickson, P. C.
Steve A. Mandell, Esq., The Mandell Law Firm

Monitoring Your Employees: How Much Can You Do And What Should You Do When You Uncover Wrongdoing?

Steven W. Ray, Esq., Kruchko & Fries

[none]

Computer Crime on the Internet - Sources and Methods

Chair: Christine Axsmith, Esq. The Orkand Corporation

Panelists:

Special Agent Mark Pollitt, Federal Bureau of Investigation
Phil Reitinger, Esq., Department of Justice
Barbara Fraser, CERT, Carnegie Mellon University

Smith

Legal Liability for Information System Security Compliance Failures: New Recipes for Electronic Sachertorte Algorithms

Chair: Fred Chris Smith, Esq., Private Practice, Santa Fe, New Mexico

Panelists:

John Montjoy Sr., BBN Corporation
Edward Tenner, Princeton University
David J. Loundy, Esq., Private Practice, Highland Park, Illinois

[none]

V-Chip: Policies and Technology

Chair: Hilary Hosmer, Data Security, Inc.

Panelists:

D. Moulton, Esq., Chief of Staff Office of Congressman Markey, HR
Dr. D. Brody, MD, American Academy of Child and Adolescent Psychiatry
Ms. S. Goering, Esq., American Civil Liberties Union
W. Diffie, Sun Microsystems

paper235

Protecting Medical Records and Health Information

Chair: Joan D. Winston, Trusted Information Systems, Inc.

Panelists:

Gail Belles, VA Medical Information Security Service
Bill Braithwaite, US Department of Health and Human Services
Paula S. Bruening, Information Policy Consultant
Patricia Taylor, US General Accounting Office

[none]

Crimes in Cyberspace: Case Studies

Chair: William S. Galkin, Esq., Law Office of William S. Galkin

Panelists:

Arnold M. Weiner, Esq., Weiner, Astrachan, Gunst, Hillman & Allen
Kenneth C. Bass, III, Venable, Baejter, Howard & Civeletti


Management & Administration

paper230_062

Current Challenges in Computer Security Program Management

Chair: Mark Wilson, National Institute of Standards and Technology

Panelists:

Lynn McNulty, McNulty and Associates
Paul M. Connelly, White House Communications Agency
Ann F. Miller, Fleet and Industrial Supply Center
Barbara Guttman, National Institute of Standards and Technology

[none]

Achieving Vulnerability Data Sharing

Chair: Lisa J. Carnahan, National Institute of Standards and Technology

Panelists:

Matt Bishop, University of California, Davis
James Ellis, CERT/Coordination Center, Carnegie Mellon University
Ivan Krsul, COAST Laboratory, Purdue University

paper234

Incident Handling Policy, Procedures, and Tools

Chair: Marianne Swanson, National Institute of Standards and Technology

Panelists:

Kelly Cooper, BBN Planet
Thomas Longstaff, Computer Emergency Response Team/Coordination Center
Peter Richards, Westinghouse Savannah River Company
Ken van Wyk, Science Applications International Corporation

[none]

Interdisciplinary Perspectives on Information Security Mandatory Reporting

Chair: M. E. Kabay, Ph.D., National Computer Security Association

Panelists:

Bruce Butterworth, Federal Aviation Administration
Barbara Smith Jacobs, Securities and Exchange Commission
Bob Whitmore, Occupational Health and Safety Administration
Dr. Scott Wetterhall, Centers for Disease Control and Prevention

paper220_211

International Perspectives on Cryptography Policy

Chair: Dorothy E. Denning, Georgetown University

Panelists:

Peter Ford, Attorney General's Department, Australia
David Herson, Commission of the European Communities, Belgium

Viewpoint:

International Perspectives on Cryptography Policy: A UK Perspective

Nigel Hickson, Department of Trade and Industry, UK

[none]

Security Protocols/Protocol Security

Chair: D. Maughan, National Security Agency

[none]

Surviving the Year 2000 Time Bomb

Grace L. Hammonds, AGCS, Inc.

Panelists:

James W. White, National Director of the Millennium Solutions Center, OAO Corporation
Andrew Hodyke, United States Air Force, ESC/AXS


Research & Development

[none]

Database Systems Today: Safe. Information at My Fingertips?

Chair: John R. Campbell, National Security Agency

Panelists:

Tim Ehrsam, Oracle
Dick O'Brien, Security Computing Corporation
Thomas Parenty, Sybase Corporation
LTC Ken Pointdexter, DISA
Satpal S. Sahni, 3 S Group Incorporated

[none]

Webware. Nightmare or Dream Come True?

Chair: Peter G. Neumann, SRI International

Viewpoints:

Java - Threat or Menace?

Steve Bellovin, A T& T Research

Language-based Protection: Why? Why Now?

Ed Felten, Drew Dean, Dan S. Wallach, Princeton University

Untrusted Application Need Trusted Operating Systems

Paul Karger, International Business Machines

Webware: Widely Distributed Computation Coming of Age

James A. Roskind, Netscape Communications Corporation

Lunt

Secure Systems and Access Control

Chair: T. Lunt, Defense Advanced Research Projects Agency

Viewpoints:

Domain and Type Enforcement Firewalls

D. Sterne, Trusted Information Systems, Inc.

Task-based Authorization: A Research Project in Next-Generation Active Security Models

R. Thomas, ORA

User-centered Security and Adage

M. Zurko, OSF

Encapsulated Environments Using the Flux Operating System

J. Lepreau, University Of Utah

[none]

Facing the Challenge: Secure Network Technology for the 21st Century

Chair: R. Schaeffer, National Security Agency

Panelists:

R. Meushaw, National Security Agency
C. McBride, National Security Agency
U. Muzzy, National Security Agency
B. Burnham, National Security Agency

paper229

Toward a Common Framework for Role-Based Access Control

Chair: David Ferraiolo, National Institute of Standards and Technology

Panelists:

Dr. Ravi Sandu, George Mason University
Dr. Virgil Gligor, University of Maryland
Rick Kuhn, National Institute of Standards and Technology
Thomas Parently, Sybase


Solutions

[none]

MISSI Security Management Infrastructure The Certificate Management Infrastructure: Now and In the Next Year

Chair: A. Arsenault, National Security Agency

Panelists:

D. Heckman, National Security Agency
S. Capps, National Security Agency
S. Hunt, National Security Agency

[none]
Future Of Trust in Commercial Operating Systems

Chair: T. Inskeep, National Security Agency

Panelists:

K. Moss, Microsoft
J. Alexander, Sun Microsystems
J. Spencer, Data General
M. Branstad, Trusted Information Systems, Inc.
G. Liddle, Hewlett Packard

[none]

Vendors Experience with Security Evaluations

Chair: Jeff DeMello, Oracle Corporation

Panelist:

Janice Caywood, Digital Equipment Corporation

Viewpoints:

Duncan Harris, Oracle Corporation
Ken Moss, Microsoft Corporation
Ian Prickett, Sun Microsystems

paper236

Workshop Report on the Role of Optical Systems and Devices for Security

Chair: Terry Mayfield, Institute Defense Analyses
Mark Krawczewicz, National Security Agency

Viewpoints:

Security Issues For All-Optical Networks

Muriel Medard, MIT Lincoln Laboratory

Security for All-Optical Networks

Jeff Ingles, Scott McNown, National Security Agency

Optical Processing Systems for Encryption, Security Verification, and Anticounterfeiting

Bahram Javidi, University of Connecticut


Closing Plenary Session

Closing

Information Systems Security: Directions and Challenges

Chair: Dr. Willis H. Ware, Corporate Research Staff, Emeritus, The Rand Corporation

Panelists:

J. F. Mergan, BBN
Stephen Smaha, Haystack Labs
Charles Stuckey, Security Dynamics

Viewpoints:

Information Security Challenges in the Financial Services Industry

C. Thomas Cook, Banc One Services Corporation

Information Systems Auditing Requirements

John W. Lainhart IV, Inspector General, US. House of Representatives

Viewpoint:

Willis Ware, The Rand Corporation

[none]

The Next Generation of Cybercriminals

Chair: Mark Gembicki, WarRoom Research, LLC

Panelists:

Jim Christy, Air Force Office of Special Investigation
Bill Perez, Federal Bureau of Investigation
Doug Waller, Time Magazine


[End TOC]