Back to Results
First PageMeta Content
National security / Crime prevention / Computer security / Information security / Certified Information Systems Security Professional / National Security Agency / Gene Spafford / Operating system / Symantec / Security / Computing / Data security


23rd National Information Systems Security Conference Conference Committee ..........................................................................................................................i Table of Contents....
Add to Reading List

Document Date: 2000-11-03 00:00:00


Open Document

File Size: 343,22 KB

Share Result on Facebook

City

Symbiosis / Cambridge / /

Company

Cisco Systems Inc. CC / Guardent Inc. Computer / Baltimore Technologies plc. / 3M / Risk Management Associates / CCP / WireX CommunicationsInc. / Symantec Corporation / Available Systems / Achieving Global Trust / Global Integrity Corporation / Oracle Corporation / Cisco Systems Inc. / Gamma Secure Systems Limited / MITRE Corporation / KPMG Peat Marwick LLC / Guardent Inc. / VeriSign / IBM / Infrastructure Defense Inc. / Science Applications International Corporation / COACT Inc. / MRJ Technology Solutions Privilege Management / Data Security Inc. / atsec GmbH / Netigy Corporation / SRI International / Merrill Lynch / Sandia National Laboratories / Xacta Corporation / XEROX / UUNET Technologies / Lehman Brothers / 11K Capability Maturity Model / Computer Sciences Corporation / Microsoft / Secure Computing Corporation / Anteon Corporation / /

Country

Ireland / /

Facility

Georgia Institute of Technology Antivirus Software Testing / Georgia Institute of Technology Fuzzy Data Mining / Georgia Institute of Technology The Curse / National Institute of Standards and Technology Critical Infrastructure Protection / University College / Hackerson A Query Facility / National Institute / National Institute of Standards and Technology Bill / University of Idaho Trust Relations / National Institute of Standards and Technology Dan Woolley / National Institute of Standards and Technology The Secret / National Institute of Standards and Technology Fred Cohen / University of Illinois Security / New College of California / Civil Service College / Terminal Server Architectures / University Slides / National Institute of Standards and Technology Jim Foti / National Institute of Standards and Technology Mary Schanken / /

IndustryTerm

business to business / e-commerce / /

OperatingSystem

Linux / /

Organization

U. S. Department of Energy / University of Maryland / University of Idaho Trust Relations / New College of California / Ministry of Defence / Access Control Service / DETR UK Home Office / Security Service / National Institute of Standards and Technology / Social Security Administration / United States Agency for International Development / International Services Association / George Mason University / Mississippi State University / Georgetown University / General Services Administration / Trust on the Internet / Competitive Intelligence / Civil Service College / Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied / Florida Atlantic University / National Security Agency / Key Recovery Government / Best Security Practices Subcommittee / Institute of Standards and Technology Critical Infrastructure Protection for Chief Information officers / Virginia Commonwealth University / UK Government / University of Illinois Security and Quality of Service Interactions / Naval Postgraduate School / Purdue University / Rethinking Department of Defense Public Key Infrastructure / Federal Bridge Certification Authority / Federal Government / 23rd National Information Systems Security Conference Conference Committee / Georgia Institute of Technology / Pace University / Department of Defense / Institute of Standards and Technology Bill / Environmental Protection Agency / University College / Cork / /

Person

James F. Craft / Forough Kashef / Michael J. Covington / Dan Zhou / Cynthia E. Irvine / Susan M. Bridges / Bel G. Raggad / Terry Losonsky / Frank Jaffe / Marshall D. Abrams / Peter Sargent / Crispin Cowan / Gary W. Smith / Jeff Moss / Dana Madsen / Tom Burke / Peter G. Neumann / Jean-Luc Giraud / Richard B. Newton / Peter Shipley / Helmut Kurth / Matthew J. Moyer / Charles P. Pfleeger / Jack Sherwood / Robert Stone / Thomas J. Watson / Jack L. Brock / Jr. / James A. Mahaffey / Greg Moorer / Ira Winkler / Ian Bryant / Timothy Levin / Mark Loepker / Arthur J. Wylene / J. Katharine Burton / Igor Balabine / Wayne Jansen / Steven R. Balmer / Elaine Barker / Ravi Sandhu / Marianne Swanson / Charles G. Menk III / George Bieber / Jim Duncan / Brandon Craig Rhodes / Guy King / David Burdett / Jay D. Krasnow / Jon David / Jim Christy / John Mildner / Jeremy Epstein / Thomas Peltier / Steven J. Greenwald Conduit / John Doody / Job Listings / John C. Davis / Thomas E. Daniels / Paul C. Clark / James P. Craft / Ludovic Rousseau / G. Mark Hardy / Richard Reybok / Paul W. Boudra / Terry Bartlett / John E. Whiteford / Ravi S. Sandhu / Alexander D. Korzyk / Sr. / John Gilligan / Stéphanie Motré / Tim Polk / Mary D. Schanken / Hilary H. Hosmer / Martin Tim Polk / James D. Cannady / Sarah Gordon / Eric Raymond / X. Sean Wang / Rayford B. Vaughn / Guy L. Copeland / Heather Hinton / Michael J. Corby / Corinne Téri / Benjamin A. Kuperman / Annabelle Lee / /

Position

Information Security Advisors / 107K Chair / Chair / Federal PKI Steering Group / Captain / Role-Based Delegation Model / /

Product

Docucenter DC 230ST / /

ProgrammingLanguage

Java / XML / DC / K / Perl / Hoc / /

ProvinceOrState

California / Georgia / Illinois / /

RadioStation

Fred / 591 Fred / 50 Ways / /

Technology

XML / Linux / PKI / Smart Card / Operating System / Quality of Service / Intelligent Agent / Cryptography / Java / Terminal Server / Antivirus Software / Public Key Infrastructure / Perl / TCP/IP / Digital Signature System / Data Mining / /

SocialTag