On-line Registration Closing Sunday

"Robert Holliday" <robholliday@isocore.com> Wed, 12 April 2006 14:52 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FTghn-0000Lb-CU for openpgp-archive@lists.ietf.org; Wed, 12 Apr 2006 10:52:27 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTghm-0008Rm-3x for openpgp-archive@lists.ietf.org; Wed, 12 Apr 2006 10:52:27 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3CELnkc070361; Wed, 12 Apr 2006 07:21:49 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k3CELnOc070360; Wed, 12 Apr 2006 07:21:49 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from ns1.cpanel.btnaccess.com (ns1.cpanel.btnaccess.com [205.177.121.2]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3CELltt070353 for <ietf-openpgp@imc.org>; Wed, 12 Apr 2006 07:21:48 -0700 (MST) (envelope-from robholliday@isocore.com)
Message-Id: <200604121421.k3CELltt070353@balder-227.proper.com>
Received: from [65.213.193.6] (helo=ISODELL001) by ns1.cpanel.btnaccess.com with esmtp (Exim 4.52) id 1FTgE4-00086P-SL for ietf-openpgp@imc.org; Wed, 12 Apr 2006 10:21:45 -0400
From: Robert Holliday <robholliday@isocore.com>
To: ietf-openpgp@imc.org
Subject: On-line Registration Closing Sunday
Date: Wed, 12 Apr 2006 10:21:41 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0038_01C65E1A.E3EDC910"
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
Thread-Index: AcZePGrSOO1hlu3gRXWTkZHRX2lUJQ==
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ns1.cpanel.btnaccess.com
X-AntiAbuse: Original Domain - imc.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - isocore.com
X-Source:
X-Source-Args:
X-Source-Dir:
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9b0e2bac7c1211e21cfcad57f02e2c8b

 

This week is the last chance for attendees to register online for the
International Conference on Network Security.  For those interested in
registering before time runs out please go to:  www.networksecurity2006.com
<http://www.networksecurity2006.com/> 

 

Conference Program 

 

Monday, April 17

TECHNICAL SESSIONS AND PANELS 

 

8:45 - 10:30 am

Opening Session

Chair: Guy Copeland 

VP and Assistant to the President, CSC

 

. Introduction 

Guy Copeland 

 

. Keynote Speech 

Andy Purdy

Department of Homeland Security 

 

. Issues in Wiretapping Technologies 

Matt Blaze

University of Pennsylvania 

 

Break (10:30 - 10:45 am) 

 

10:45 am - 12:30 pm

Panel: User Authentication Technologies

Chair: Radia Perlman

Sun Microsystems 

 

. PKI: It's not that hard. Why don't we have it? 

Charlie Kaufman

Microsoft 

 

. Web Services/Liberty Approach to Single Sign-on 

Gerald Beuchelt 

Sun Microsystems

 

. Is the Identity-based Crypto the Best Solution? 

Terence Spies

Voltage Security

 

. PKI: Let's Make it Happen! 

Bill Burr

NIST

 

. SAML Comparison to Kerberos to Support a Centralized Authoritative Source
for Authentication 

Hank Simon

Lockheed Martin

 

Lunch (12:30 - 1:45 pm) 

 

1:45 - 3:00 pm

Mesh Network Security 

Chair: Russ Housley

Vigil Security, LLC 

 

. Status of 802.11 Mesh and Security 

Donald Eastlake III

Motorola 

 

. Security Issues in 802.11s 

William Arbaugh, UMD

Jesse Walker, Intel 

 

. More on 802.11s 

Robert Moskowitz

ICSA Labs, Cybertrust

 

Break (3:00 - 3:15 pm) 

 

3:15 - 4:30 pm 

Defending Against Denial of Service 

Chair: Jim Hughes 

Sun Microsystems 

 

. Surviving Denial of Service

Andy Ellis

Akamai 

 

. MITHRIL: Adaptable Security for Survivability in Collaborative Computing
Sites 

Von Welch, NCSA

Jim Basney, NCSA

Himanshu Khurana, NCSA 

 

. Investigating the Impact of Real-World Factors on Internet Worm
Propagation

Xiaoyan Hong 

University of Alabama 

 

4:30 - 5:30 pm 

Panel: Legislative Aspects of Security 

 

. Pat Schambach

Nortel

 

. Robert Dix Jr.

Citadel Security Software

 

. Michael Aisenberg

Verisign

 

. John Morris

Center for Democracy & Technology

 

5:30 - 6:30 pm

Reception 

 

6:45 - 7:45 pm

Tutorial: Network Incident Response 

Presenter: Richard Bejtlich

Tao Security 

 

Tuesday, April 18

TECHNICAL SESSIONS AND PANELS 

 

9:00 - 10:30 am 

Software Security 

Chair: Charlie Kaufman

Microsoft 

 

. Why Software Breaks

Andrew Lee 

Eset 

 

. Federal Standards and Guidelines

Developed by NIST

Stuart Katzke

NIST

 

. Impact of NSTISSP-11 on the Current

Certification Climate for Products and 

Technology

Keith Beatty

SAIC 

 

. How can we make products and

deployments more secure?

Eric Cole

Lockheed Martin 

 

Break (10:30 - 10:45 am) 

 

10:45 am - 12:30 pm

Network Security Protocol Issues

Chair: Hilarie Orman

Purple Streak, Inc. 

 

. Introduction and Comparison of IPv4 Address Resolution Protocol, ICMP
Router Discovery and ICMP Redirect; and IPv6 Neighbor Discovery Protocol
Security Issues

Michael Wasielewski

Lockheed-Martin 

 

. The ability for the Warfighter to share critical information across and
between networks without leakage

Adele Friedel 

Tenix America 

 

. Availability and Security Tradeoffs 

Arun Sood 

Task Technologies Ltd. 

 

. Firewall Traversal: Security and Scalability

David McGrew

Cisco Systems

 

. Updates on IETF Security Related Working Groups

Sam Hartman

MIT 

Russ Housley

Vigil Security 

 

Lunch (12:30 - 1:45 pm) 

 

1:45 - 3:00 pm

Security for Wireless and Internet Mobility

Chair: Bijan Jabbari

Isocore 

 

. Optimizations to Support Secure AP Transitions in 802.11 WLANs

Jesse Walker

Intel 

 

. 3GPP2 Network Firewall Configuration and Control

Michael Paddon

Qualcomm

 

. Proactive EAP-based handover key management for mobile wireless users

Madjid Nakhjiri

Motorola 

 

Break (3:00 - 3:15 pm) 

 

3:15 - 4:30 pm 

Panel: Internet Infrastructure Security

Chair: Hilarie Orman

Purple Streak, Inc. 

 

. MPLS VPN Security

Harmen van der Linde

Cisco Systems

 

. DHS and Internet Infrastructure Security

Marcus Sachs 

SRI

 

. Routing Security 

Sandra Murphy 

Sparta

 

. Why Routing Protocol Security isn't Seeing Wide Adoption

Russ White 

Cisco Systems

 

4:30 - 5:30 pm

Web Browser Security 

Moderator: Darren Moffat

Sun Microsystems 

 

. The Sad State of Evolution of Interface to User Security with a Focus on
the Web Browser

Eric Greenberg

Netframeworks 

 

. XML: Salvation or Struggle

Donald Eastlake III

Motorola 

 

. Web Browser Security Frameworks 

Perry Metzger

Piermont 

 

. Issues in Web Browser Security

Sam Hartman

MIT 

 

Wednesday, April 19

TECHNICAL SESSIONS AND PANELS 

 

9:00 - 10:30 am 

DNS Security

Chair: Donald Eastlake III

Motorola 

 

. Why isn't DNS security deployed, and would we be safer if it was?

Charlie Kaufman

Microsoft 

 

. DNSSEC and FISMA 

Scott Rose

NIST

 

. DNS Security 

Stuart Schechter 

Lincoln Laboratory 

 

. The Registry Perspective on DNSSEC

Matt Larson 

Verisgn 

 

Break (10:30 - 10:45 am) 

 

10:45 am - 12:30 pm

Panel: Trusted Platforms

Chair: Radia Perlman

Sun Microsystems 

 

. Trusted Computing: Towards Safe Computing Environments

Tom Hardjono

SignaCert 

 

. A use for TPM Technology in Routing Infrastructure

Andy Ellis

Akamai 

 

. Issues in TPM Technology

Ned Smith

Intel 

 

. An Outsider's Perspective on TPM

Russ Housley 

Vigilsec