Back to Results
First PageMeta Content
Data security / Crime prevention / Certified Information Systems Security Professional / Corey Schou / Gene Spafford / Information security / National Security Agency / Protection Profile / Common Criteria / Security / Computer security / National security


22nd National Information Systems Security Conference Conference Committee 1999 National Computer Systems Security Award Papers Find and Fix Y2K Embedded Equipment Risks
Add to Reading List

Document Date: 2000-10-25 01:00:00


Open Document

File Size: 88,40 KB

Share Result on Facebook

City

Sydney / IABG / Establishment / London / /

Company

Beyond / I/O Software Inc. / Lockheed Martin / J.G. Van Dyke & Associates / Ernst & Young LLP / DASCOM Inc. / Enron / Booz-Allen & Hamiliton Corporation / Internet Security Advisors Group / CCP / ManTech International Corporation / Integrating Biometric Systems / Privaseek Inc. / Oracle Corporation / Pulse Engineering Inc. / Verisign / Bank of America Peter / Datafellows Inc. / Murray Donaldson / Pacific Gas and Electric / Sprint / Netect Ltd. / Averstar Incorporated / XISEC Consultants Ltd. / Cisco / Booz-Allen & Hamilton Inc. / James P. Anderson P. Anderson Co. / Computer Science Corporation / Harris Corporation / Computer Sciences Corporation / Secure Computing Corporation / TRW / TimeStep Corporation / Network Associates Inc. / NAI Labs / Arca Systems Inc. / ICSA Inc. / Support Security Architecture Trade / M Corby & Associates Inc. / R.C. Consulting Inc. / MIT Lincoln Laboratory / MITRE Corporation / Rand Corporation / IBM / Bayuk Bear Stearns & Co. / AT&T / Data Security Inc. / SPARTA Incorporated / Siemens AG / InfoSec Labs Inc. / Telos Corporation / SRI International / Computer Graphics Inc. / IntraSec Corporation / SecureLogix Corporation / Byron Group Ltd. / Bank of America Mark / InfoGard Laboratories Inc. / AntiMalware Software / Critical Infrastructure Assurance / /

Country

United Kingdom / Canada / Germany / Belgium / United States / /

Facility

University Frameworks / University of Memphis From AntiVirus / University Teaching Information Warfare / National Institute / National Institute of Standards and Technology Jerry A. Rainville / University of California / University Dorothy / University of Maryland Teaching Information Warfare / University Viewpoints / University of Hamburg / Massachusetts Institute of Technology Using Composition / National Institute of Standards and Technology ISO/IEC JTC / National Institute of Standards and Technology Eric S. Rosenfeld / National Institute of Standards / King’s College / Laboratory The Current State / College Park Sami Saydjari / National Institute of Standards and Technology Jeffrey Horlick / University of Idaho Digital Watermark Mobile Agents Jian Zhao / Building Survivable Systems J. Jenny Li / Miami University / University of W. / National Institute of Standards and Technology Tom Casar / Cambridge University / University of Maryland / University of Idaho Automatically Detecting Authentication Limitations / /

IndustryTerm

Web Joon S. Park / Internet Resources Panelists / Internet Threats / /

Organization

University of California / New York University / UK Cabinet Office / United States Military Academy / Massachusetts Institute of Technology / Army / Virginia Department of Emergency Services Steven D. Mitchell / Institute of Standards and Technology Eric S. Rosenfeld / George Mason University / Mississippi State University / CND Mission / Georgetown University / West Point Security Architecture Development / 22nd National Information Systems Security Conference Conference Committee / United States Navy / Federal Aviation Administration / National Security Agency / Virginia Commonwealth University / National Institute of Standards and Technologies Comparative Approaches / Purdue University / National Institute for Standards / Georgia Tech Information Security Center / University of Idaho / Cambridge University / George Washington University / United States Agency for International Development / Miami University / European Commission / National Institute of Standards / Carnegie Mellon University / University of Hamburg / General Services Administration / Department of Commerce / University of Maryland Teaching Information Warfare / University of Memphis From AntiVirus / The George Washington University / Carnegie Mellon / University of Maryland / College Park / Naval Postgraduate School / Department of Justice / Institute for Defense Analyses Viewpoints / Intelink Management Office / National Park Service / University of California / Davis / National Defense University / Idaho State University / James Madison University / University of California / Los Angeles / /

Person

Klaus Brunnstein / Lewis Lorton / Jun Li / Roy Pereria / Blaine Burnham / Joan Dyer / Ron Perez / Sean Smith / Warwick Ford / Scott Blake / Steven Lucas / Robert Harland / Brian Snow / Keith F. Brewster / Barbara Y. Fraser / Gene Spafford / Eugene Troy / Jim Kates / Andrew Rathmell / Ray Snouffer / Thomas J. Watson / Tom E. Anderson / Framework Dipankar Dasgupta / Tom Caddy / Jeff Ingle / J. Katharine Burton / Thomas Burke / Rayford Vaugh / Jr. / Mark Lindemann / Allan Berg / Sarbari Gupta / Kathy L. Lyons-Burke / Diann A. Carpeneter / Kimberly S. Caplan / Ruth Taylor / John Tritak / Stevan Mitchell / Russell Housley / Jim Williams / Jeremy Epstein / Suzanne Jantsch / Michael Hitchens / Tom Muchenthaler / Ann E. Kelley / Natalie Brader / Cynthia Irvine / Alfred W. Arsenault / Jr. / Vic Maconachy / Sharon Boeyen / Stephen Kent / Michael Hange / Addison Slayton / Jr. / Klaus J. Keus / Ron Ross / Hilary Hosmer / Shawn Hernan / Mary D. Schanken / Robert Moskowtiz / Peter Mell / Stuart W. Katzke / Richard K. McAllister / Sarah Gordon / Douglas McGovern / Bob Blakley / Walter Cooke / Melissa Anyway / Jim Osterritter / Charles Reynolds / Donald J. Welch / Jim Anderson / Charles G. Menk / Lawrence R. Rogers / W. Timothy Polk / Gilles Lisimaque / Christopher Marquart / Caroline Hamilton / Michael J. Corby / Nancy Wong / Review M.E. Kabay / Annabelle Lee / John Davis / Walter Fumy / Phillip J. Loranger / Douglas Stuart / Dan Kuehl / C.N. Payne / Jr. / Richard Lee Doty / Ross Anderson / Clark Weissman Roger Schell / Lars Nicander / William Wilson / Brenda Kallighan / Steve Lipner / Bret Hartman / Anthony Ruocco / George Dinolt / Mary Ellen Zurko / David J. Wilson / Kenneth R. Ayer / David Kennedy / Peter G. Neumann / Chris Kubic / Marla Collier / William B. Martin / Roger C. Molander / Christina McBride / Gerald Popek / Roshan Thomas / Gregory B. White / Ronda Henning / Lance J. Hoffman / Christina Kormos / L. Arnold Johnson / Vijay Varadharajan / Peter Reiher / Ravi Sandhu / Marianne Swanson / Gene Troy / Jim Litchko / Rayford Vaughn / Ken Fong / Tim Ehrsam / Virgil Gligor / John Campbell / Deb Cooley / James W. Meritt / Mark Viola / Martha Mahan / Kenneth Olthoff / Ted Humphreys / Steve Weingart / Vernon Austel / Paul Livingston / Jim Alves-Foss / Teri Arber / Timothy W. Kremann / Jeffrey J. Carpenter / Joon S. Park / Marc LaRoche / G. Mark Hardy / Kevin Ziese / Todd Inskeep / Steven Bellovin / Alexander D. Korzyk / Sr. / Kevin L. Fox / Rajan Shankaran / Edna Chivers / Patrick Cain / William Bruck / Jeffrey R. Williams / Ronda R. Henning / Steve Hirsch / Stan Hanks / Natalie Givans / Corey Schou / Nadya Bartol / Matt Bishop / Fred W. Peters / Jim Brenton / /

Position

Encryption Chair / PKIs Chair / Information Systems Security Education Chair / CORBA Security Market Chair / General / Networks Chair / Protection Chair / Author / Professor / Bishop / Smart Card Security Chair / Information Security Chair / Healthcare Protection Profile Initiative Chair / Model / Mutual Recognition Arrangement Chair / Influencing Information Assurance Chair / Transition Chair / Chair of Information Systems / Chair / Carpenter / /

Product

Marquis / L-3 / /

ProgrammingLanguage

Pascal / /

ProvinceOrState

Ohio / California / Idaho / Massachusetts / Virginia / New York / Mississippi / Georgia / Maryland / /

PublishedMedium

Computer Graphics / /

Region

Canada U.S. / /

Technology

PKI / Five Technologies / Encryption / CAT / AV / Information Technology / Smart Card / CORBA / Telcordia Technologies / LAN / Provably Insecure Mutual Authentication Protocols / /

SocialTag