This week is the last chance for attendees to register online for the
International Conference on Network Security. For those interested in
registering before time runs out please go to: www.networksecurity2006.com
<http://www.networksecurity2006.com/>
Conference Program
Monday, April 17
TECHNICAL SESSIONS AND PANELS
8:45 - 10:30 am
Opening Session
Chair: Guy Copeland
VP and Assistant to the President, CSC
. Introduction
Guy Copeland
. Keynote Speech
Andy Purdy
Department of Homeland Security
. Issues in Wiretapping Technologies
Matt Blaze
University of Pennsylvania
Break (10:30 - 10:45 am)
10:45 am - 12:30 pm
Panel: User Authentication Technologies
Chair: Radia Perlman
Sun Microsystems
. PKI: It's not that hard. Why don't we have it?
Charlie Kaufman
Microsoft
. Web Services/Liberty Approach to Single Sign-on
Gerald Beuchelt
Sun Microsystems
. Is the Identity-based Crypto the Best Solution?
Terence Spies
Voltage Security
. PKI: Let's Make it Happen!
Bill Burr
NIST
. SAML Comparison to Kerberos to Support a Centralized Authoritative Source
for Authentication
Hank Simon
Lockheed Martin
Lunch (12:30 - 1:45 pm)
1:45 - 3:00 pm
Mesh Network Security
Chair: Russ Housley
Vigil Security, LLC
. Status of 802.11 Mesh and Security
Donald Eastlake III
Motorola
. Security Issues in 802.11s
William Arbaugh, UMD
Jesse Walker, Intel
. More on 802.11s
Robert Moskowitz
ICSA Labs, Cybertrust
Break (3:00 - 3:15 pm)
3:15 - 4:30 pm
Defending Against Denial of Service
Chair: Jim Hughes
Sun Microsystems
. Surviving Denial of Service
Andy Ellis
Akamai
. MITHRIL: Adaptable Security for Survivability in Collaborative Computing
Sites
Von Welch, NCSA
Jim Basney, NCSA
Himanshu Khurana, NCSA
. Investigating the Impact of Real-World Factors on Internet Worm
Propagation
Xiaoyan Hong
University of Alabama
4:30 - 5:30 pm
Panel: Legislative Aspects of Security
. Pat Schambach
Nortel
. Robert Dix Jr.
Citadel Security Software
. Michael Aisenberg
Verisign
. John Morris
Center for Democracy & Technology
5:30 - 6:30 pm
Reception
6:45 - 7:45 pm
Tutorial: Network Incident Response
Presenter: Richard Bejtlich
Tao Security
Tuesday, April 18
TECHNICAL SESSIONS AND PANELS
9:00 - 10:30 am
Software Security
Chair: Charlie Kaufman
Microsoft
. Why Software Breaks
Andrew Lee
Eset
. Federal Standards and Guidelines
Developed by NIST
Stuart Katzke
NIST
. Impact of NSTISSP-11 on the Current
Certification Climate for Products and
Technology
Keith Beatty
SAIC
. How can we make products and
deployments more secure?
Eric Cole
Lockheed Martin
Break (10:30 - 10:45 am)
10:45 am - 12:30 pm
Network Security Protocol Issues
Chair: Hilarie Orman
Purple Streak, Inc.
. Introduction and Comparison of IPv4 Address Resolution Protocol, ICMP
Router Discovery and ICMP Redirect; and IPv6 Neighbor Discovery Protocol
Security Issues
Michael Wasielewski
Lockheed-Martin
. The ability for the Warfighter to share critical information across and
between networks without leakage
Adele Friedel
Tenix America
. Availability and Security Tradeoffs
Arun Sood
Task Technologies Ltd.
. Firewall Traversal: Security and Scalability
David McGrew
Cisco Systems
. Updates on IETF Security Related Working Groups
Sam Hartman
MIT
Russ Housley
Vigil Security
Lunch (12:30 - 1:45 pm)
1:45 - 3:00 pm
Security for Wireless and Internet Mobility
Chair: Bijan Jabbari
Isocore
. Optimizations to Support Secure AP Transitions in 802.11 WLANs
Jesse Walker
Intel
. 3GPP2 Network Firewall Configuration and Control
Michael Paddon
Qualcomm
. Proactive EAP-based handover key management for mobile wireless users
Madjid Nakhjiri
Motorola
Break (3:00 - 3:15 pm)
3:15 - 4:30 pm
Panel: Internet Infrastructure Security
Chair: Hilarie Orman
Purple Streak, Inc.
. MPLS VPN Security
Harmen van der Linde
Cisco Systems
. DHS and Internet Infrastructure Security
Marcus Sachs
SRI
. Routing Security
Sandra Murphy
Sparta
. Why Routing Protocol Security isn't Seeing Wide Adoption
Russ White
Cisco Systems
4:30 - 5:30 pm
Web Browser Security
Moderator: Darren Moffat
Sun Microsystems
. The Sad State of Evolution of Interface to User Security with a Focus on
the Web Browser
Eric Greenberg
Netframeworks
. XML: Salvation or Struggle
Donald Eastlake III
Motorola
. Web Browser Security Frameworks
Perry Metzger
Piermont
. Issues in Web Browser Security
Sam Hartman
MIT
Wednesday, April 19
TECHNICAL SESSIONS AND PANELS
9:00 - 10:30 am
DNS Security
Chair: Donald Eastlake III
Motorola
. Why isn't DNS security deployed, and would we be safer if it was?
Charlie Kaufman
Microsoft
. DNSSEC and FISMA
Scott Rose
NIST
. DNS Security
Stuart Schechter
Lincoln Laboratory
. The Registry Perspective on DNSSEC
Matt Larson
Verisgn
Break (10:30 - 10:45 am)
10:45 am - 12:30 pm
Panel: Trusted Platforms
Chair: Radia Perlman
Sun Microsystems
. Trusted Computing: Towards Safe Computing Environments
Tom Hardjono
SignaCert
. A use for TPM Technology in Routing Infrastructure
Andy Ellis
Akamai
. Issues in TPM Technology
Ned Smith
Intel
. An Outsider's Perspective on TPM
Russ Housley
Vigilsec