Back to Results
First PageMeta Content
Crime prevention / National security / Data security / Information security / Common Criteria / Telos / Information assurance / Gene Spafford / FIPS 140-2 / Security / Computer security / Cyberwarfare


21st National Information Systems Security Conference Papers Assurance/Criteria/Testing Track A
Add to Reading List

Document Date: 2000-11-30 00:00:00


Open Document

File Size: 102,49 KB

Share Result on Facebook

City

Sunningdale / Establishment / Technology / Sacramento / /

Company

Hewlett Packard / Germany Evaluation / SphereCom Enterprises Inc. / Security Stephen T. Kent / J.G. Van Dyke & Associates / The Aerospace Corporation / CORBETT Technologies Inc. / Virus Scanning Software / Information Systems / Oracle Corporation / Netherlands Andrew W. Saunders / BBN Corporation / Reliable Software Technologies Corporation / IBM Corporation / Deutsche Telekom AG / Engineering Incorporated / CoAct Incorporated / J.P. Morgan / Texas A&M University Public Networks / Telenor / Naval Postgraduate School James P. Anderson / Science Application International Corporation Trust Technology / Dynamic Commerce Systems / Global Integrity Corporation Management / Protegrity Inc. / Systems Inc. / Booz-Allen & Hamilton Inc. / Integrated Management Services Inc. / Bellovin / AT&T Laboratories Software / Computer Sciences Corporation / TimeStep Corporation / COAST Laboratories / Sandia National Laboratories Artificial Neural Networks / GTE / SAIC Canada / Arca Systems Inc. / ICSA Inc. / National Security Telecommunications / Cisco Systems Inc. / Unisys Corporation / J. Stubbings / MITRE Corporation / CSX / Confirmation of Products / Blue Ridge Networks / Gemplus Corporation / Citicorp / Data Security Inc. / National Information Assurance Partnership / SPARTA Inc. / Statement P. Mertes / Operations Track E International Information Security Solutions / Telos Corporation / Carib F/X Ltd. / TUEV Information Technology GmbH / Seimens AG / Entegrity Solutions Inc. / Cygnacom Solutions Incorporated / Tekna Inc. / Allocating Resources / /

Continent

ASIA / /

Country

United Kingdom / Australia / Germany / Sweden / United States / /

Event

FDA Phase / /

Facility

Virginia Commonwealth University / University of Idaho Security / University The Cyber Battlefield / National Institute of Standards and Technology Ravi Sandhu / University of West Sydney / Chalmers University of Technology / University of Idaho Analyzing Programs / University of Idaho Security Policy Target / Civil Service College / University of Idaho A Framework / University The Macro Virus / University of California at Davis Cynthia Irvine / National Institute of Standards and Technology DBMS PPs Jeff DeMello / University of Hamburg / University of Virginia Networked Information Systems / University of Western Sydney / National Institute of Standards and Technology Multi-Protocol Attacks / National Institute of Standards and Technology / National Institute of Standards and Technology PKI STs Marc Laroche / University of Idaho Panelists / Government Communications Headquarters / /

IndustryTerm

Internet Steven M. Bellovin / Internet Security / e - commerce / Internet Credit / e - business / Internet Anti-Virus Strategies / Internet Track / Web Security / /

OperatingSystem

UNIX / Windows NT / /

Organization

University of California / Iowa State University / Cornell University / National Institute of Standards and Technology / University of Virginia Networked Information Systems / Nova Southeastern University / Central Intelligence Agency / University of Southern California / George Mason University / Mississippi State University / Curry College / University of West Sydney / United States Navy / Federal Aviation Administration / Pentagon / National Security Agency / Virginia Commonwealth University / Netherlands National Communications-Electronics Security Agency / Purdue University / Institute of Standards and Technology Multi-Protocol Attacks / Naval Air Systems Command / Information Systems Security Committee / German Information Security Agency / US Jean / University of Idaho / COAST Lab / Central Information Systems Security Service / North Atlantic Treaty Organization / George Washington University / United States Army / Department of Agriculture / Carnegie Mellon University / University of Hamburg / Texas A&M University / General Services Administration / Civil Service College / University of Idaho Security / Certification Authority / University of Western Sydney / Nepean / Naval Postgraduate School / Federal Bureau of Investigation / Department of Justice / Chalmers University of Technology / University of Idaho Security Policy Target / National Aeronautics and Space Administration / Department of Defense / Stanford / /

Person

O.E. Liebetrau / Mario Tinto / James Cannady / Matt Schmid / Don Tobin / Sam Nitzberg / Kris Britton / Yong Cai / Mark Jesmer / Dean Polla / David Murphy / Barry W. Keyes / Gary Stoneburner / Jimmy Kuo / Steve Kent / Mark A. Boster / Thomas E. Anderson / Ray Snouffer / Rick Craft / Linda Gilmore / George Datesman / Penny Klein / John C. Knight / Greg Wyss / Wayne Jansen / Stacey Lum / Ulf G. Dahl / Tim Maulehue / Charles G. Menk / III / Taher Elgamal / Tom Gilbert / Christine M. Orshesky / Russell M. Shumway / Mike Brown / Kathy Fithen / Ulf Lindqvist / Fred B. Scheider / Joe Pato / Abigail Hafer / Ulf T. Mattsson / Jim Williams / Donald Phipps / Bernard Ramsey / Robert M. Jackson / Carolyn M. Johnson / D. Abrams / Jay J. Kahn / Michel E. Kabay / Loreto Remorca / Jr. / Jamie Marconi / Ulf Gustafson / Klaus J. Keus / Ron Ross / Hilary Hosmer / Stefan Axelsson / Ivan Krsul / Mary D. Schanken / S. Jeff Turner / Peter A. Loscocco / George Madison / John F. Farrell / Deborah A. Frincke / Rayford Vaughn / Jr. / David Adler / Laurie Mack / Howard E. Glavin / Jr. / Fred Chase / David Nelson / Annabelle Lee / Tom Anderson / Robert Williamson / Jack Eller / David Solo / Don Funkhouser / Cynthia E. Irvine / Douglas J.M. Wiemer / Dan Galik / Keith Brewster / Karen Silberman / Erika Langerman / Stephen D. Smalley / Mike Carson / Roy Pereira / Thomas Gregg / Frederick M. Avolio / Anne F. Thomson Reed / Gail-Joon Ahn / Donald Tobin / Jr. / Jesse McConnell / Greg Vert / Karen F. Worstell / Ira Winkler / Vijay Varadharajan / Mahesh Tripunitara / Bernard Ramsey / Jr. / Ravi Sandhu / Marianne Swanson / Gene Troy / Frank T. Bass / Jim Litchko / Jason Hackerson / Simone Fischer-Hübner / Ruthe Vandewart / John Campbell / Charles Blauner / Susan G. King / Anish Bhimani / Christina R. Cheetham / Dion Robb / Ruth Nelson / Jim Alves-Foss / Daryl W. White / Judith A. Spencer / Patrick A. Muckelbauer / Nick Plasier / Fred B. Schneider / Philip C. Hyland / David Temoshok / Ruth C. Taylor / Don Solano / Murray Donaldson / Alexander D. Korzyk Sr. / Alexander D. Korzyk / Sr. / Yuan Ho / Jim Davis / Roy Periera / David M. Kennedy / Matt Bishop / Tina Bird / /

Position

Captain / Recovery Chair / Research Agenda Chair / Information Security Advisors / Worldwide View Chair / Professor / Worked Example Chair / Business and E-commerce Chair / Consultant / Cryptographic Module Validation Program Chair / Colonel / Testing and Evaluation Chair of Commercial Security / Epidemic Chair / Forecasting Model for Internet Security / Guard / Engineering Capability Maturity Model Chair Systems Security / Security and Convenience Chair / Private Access Chair / Global Information Infrastructure Chair / Information Security Marshal / Electronic Commerce Landscape Chair / Perspective Chair / Financial Services Industry Perspective Chair / Developments Co-Chair / Virtual Computer Incident Response Capability Chair / Co-Chair / Domain Security Policy Model for International Interoperability / Chair / Service PM / Digital Signature Chair / International Standard Co-Chair / Independent Security Consultant Key Recovery Chair / Marshall / /

Product

Edward McLaughlin / Kimberly Kaplan / Security / /

ProvinceOrState

California / Idaho / Iowa / Southern California / Mississippi / /

Region

Southern California / /

Technology

PKI / Encryption / Digital Signature / Public Key Infrastructure / DBMS / Information Technology / Smart Card / Cryptography / UNIX / Public Key / /

SocialTag