On-line Registration Closing Sunday
"Robert Holliday" <robholliday@isocore.com> Wed, 12 April 2006 14:52 UTC
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FTghn-0000Lb-CU for openpgp-archive@lists.ietf.org; Wed, 12 Apr 2006 10:52:27 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTghm-0008Rm-3x for openpgp-archive@lists.ietf.org; Wed, 12 Apr 2006 10:52:27 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3CELnkc070361; Wed, 12 Apr 2006 07:21:49 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k3CELnOc070360; Wed, 12 Apr 2006 07:21:49 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from ns1.cpanel.btnaccess.com (ns1.cpanel.btnaccess.com [205.177.121.2]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3CELltt070353 for <ietf-openpgp@imc.org>; Wed, 12 Apr 2006 07:21:48 -0700 (MST) (envelope-from robholliday@isocore.com)
Message-Id: <200604121421.k3CELltt070353@balder-227.proper.com>
Received: from [65.213.193.6] (helo=ISODELL001) by ns1.cpanel.btnaccess.com with esmtp (Exim 4.52) id 1FTgE4-00086P-SL for ietf-openpgp@imc.org; Wed, 12 Apr 2006 10:21:45 -0400
From: Robert Holliday <robholliday@isocore.com>
To: ietf-openpgp@imc.org
Subject: On-line Registration Closing Sunday
Date: Wed, 12 Apr 2006 10:21:41 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0038_01C65E1A.E3EDC910"
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
Thread-Index: AcZePGrSOO1hlu3gRXWTkZHRX2lUJQ==
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ns1.cpanel.btnaccess.com
X-AntiAbuse: Original Domain - imc.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - isocore.com
X-Source:
X-Source-Args:
X-Source-Dir:
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9b0e2bac7c1211e21cfcad57f02e2c8b
This week is the last chance for attendees to register online for the International Conference on Network Security. For those interested in registering before time runs out please go to: www.networksecurity2006.com <http://www.networksecurity2006.com/> Conference Program Monday, April 17 TECHNICAL SESSIONS AND PANELS 8:45 - 10:30 am Opening Session Chair: Guy Copeland VP and Assistant to the President, CSC . Introduction Guy Copeland . Keynote Speech Andy Purdy Department of Homeland Security . Issues in Wiretapping Technologies Matt Blaze University of Pennsylvania Break (10:30 - 10:45 am) 10:45 am - 12:30 pm Panel: User Authentication Technologies Chair: Radia Perlman Sun Microsystems . PKI: It's not that hard. Why don't we have it? Charlie Kaufman Microsoft . Web Services/Liberty Approach to Single Sign-on Gerald Beuchelt Sun Microsystems . Is the Identity-based Crypto the Best Solution? Terence Spies Voltage Security . PKI: Let's Make it Happen! Bill Burr NIST . SAML Comparison to Kerberos to Support a Centralized Authoritative Source for Authentication Hank Simon Lockheed Martin Lunch (12:30 - 1:45 pm) 1:45 - 3:00 pm Mesh Network Security Chair: Russ Housley Vigil Security, LLC . Status of 802.11 Mesh and Security Donald Eastlake III Motorola . Security Issues in 802.11s William Arbaugh, UMD Jesse Walker, Intel . More on 802.11s Robert Moskowitz ICSA Labs, Cybertrust Break (3:00 - 3:15 pm) 3:15 - 4:30 pm Defending Against Denial of Service Chair: Jim Hughes Sun Microsystems . Surviving Denial of Service Andy Ellis Akamai . MITHRIL: Adaptable Security for Survivability in Collaborative Computing Sites Von Welch, NCSA Jim Basney, NCSA Himanshu Khurana, NCSA . Investigating the Impact of Real-World Factors on Internet Worm Propagation Xiaoyan Hong University of Alabama 4:30 - 5:30 pm Panel: Legislative Aspects of Security . Pat Schambach Nortel . Robert Dix Jr. Citadel Security Software . Michael Aisenberg Verisign . John Morris Center for Democracy & Technology 5:30 - 6:30 pm Reception 6:45 - 7:45 pm Tutorial: Network Incident Response Presenter: Richard Bejtlich Tao Security Tuesday, April 18 TECHNICAL SESSIONS AND PANELS 9:00 - 10:30 am Software Security Chair: Charlie Kaufman Microsoft . Why Software Breaks Andrew Lee Eset . Federal Standards and Guidelines Developed by NIST Stuart Katzke NIST . Impact of NSTISSP-11 on the Current Certification Climate for Products and Technology Keith Beatty SAIC . How can we make products and deployments more secure? Eric Cole Lockheed Martin Break (10:30 - 10:45 am) 10:45 am - 12:30 pm Network Security Protocol Issues Chair: Hilarie Orman Purple Streak, Inc. . Introduction and Comparison of IPv4 Address Resolution Protocol, ICMP Router Discovery and ICMP Redirect; and IPv6 Neighbor Discovery Protocol Security Issues Michael Wasielewski Lockheed-Martin . The ability for the Warfighter to share critical information across and between networks without leakage Adele Friedel Tenix America . Availability and Security Tradeoffs Arun Sood Task Technologies Ltd. . Firewall Traversal: Security and Scalability David McGrew Cisco Systems . Updates on IETF Security Related Working Groups Sam Hartman MIT Russ Housley Vigil Security Lunch (12:30 - 1:45 pm) 1:45 - 3:00 pm Security for Wireless and Internet Mobility Chair: Bijan Jabbari Isocore . Optimizations to Support Secure AP Transitions in 802.11 WLANs Jesse Walker Intel . 3GPP2 Network Firewall Configuration and Control Michael Paddon Qualcomm . Proactive EAP-based handover key management for mobile wireless users Madjid Nakhjiri Motorola Break (3:00 - 3:15 pm) 3:15 - 4:30 pm Panel: Internet Infrastructure Security Chair: Hilarie Orman Purple Streak, Inc. . MPLS VPN Security Harmen van der Linde Cisco Systems . DHS and Internet Infrastructure Security Marcus Sachs SRI . Routing Security Sandra Murphy Sparta . Why Routing Protocol Security isn't Seeing Wide Adoption Russ White Cisco Systems 4:30 - 5:30 pm Web Browser Security Moderator: Darren Moffat Sun Microsystems . The Sad State of Evolution of Interface to User Security with a Focus on the Web Browser Eric Greenberg Netframeworks . XML: Salvation or Struggle Donald Eastlake III Motorola . Web Browser Security Frameworks Perry Metzger Piermont . Issues in Web Browser Security Sam Hartman MIT Wednesday, April 19 TECHNICAL SESSIONS AND PANELS 9:00 - 10:30 am DNS Security Chair: Donald Eastlake III Motorola . Why isn't DNS security deployed, and would we be safer if it was? Charlie Kaufman Microsoft . DNSSEC and FISMA Scott Rose NIST . DNS Security Stuart Schechter Lincoln Laboratory . The Registry Perspective on DNSSEC Matt Larson Verisgn Break (10:30 - 10:45 am) 10:45 am - 12:30 pm Panel: Trusted Platforms Chair: Radia Perlman Sun Microsystems . Trusted Computing: Towards Safe Computing Environments Tom Hardjono SignaCert . A use for TPM Technology in Routing Infrastructure Andy Ellis Akamai . Issues in TPM Technology Ned Smith Intel . An Outsider's Perspective on TPM Russ Housley Vigilsec
- On-line Registration Closing Sunday Robert Holliday