Skip to main content

Trust in Cyberspace (1999) / Chapter Skim
Currently Skimming:

Appendix C: Workshop Participants and Agendas
Pages 269-278

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 269...
... Bellovin, AT&T Labs Research Barbara Blaustein, National Science Foundation Earl Boebert, Sandia National Laboratories Martha Branstad, Computer Security Researcher and Entrepreneur Blaine Burnham, National Security Agency William E Burr, National Institute of Standards and Technology David Carrel, Cisco Systems Inc.
From page 270...
... O'Dell, UUNET Technologies Inc. Hilarie Orman, Defense Advanced Research Projects Agency Radia Perlman, Novell Corporation Frank Perry, Defense Information Systems Agency Elaine Reed, MCI Telecommunications Inc.
From page 271...
... Panelists Chrisan Herrod, Defense Information Systems Agency Mack Hicks, Bank of America Stephen Katz, Citibank Margaret Scarborough, National Automated Clearing House Association 1:30 p.m. Session 2 (Steven Bellovin)
From page 272...
... Watson Research Center Henning Schulzrinne, Columbia University Abel Weinrib, Intel Corporation Rick Wilder, MCI Telecommunications Inc. John Wroclawski, Massachusetts Institute of Technology Break Session 4 (Stephen Kent)
From page 273...
... Panelists John Klensin, MCI Telecommunications Inc. Richard Schell, Netscape Communications Corporation Mark Segal, Bell Communications Research 10:00 10:30 11:30 Break Continue discussion, Session 5 · Hard problems in terms of time frame, cost, and certainty of result
From page 274...
... Peter Lee, Carnegie Mellon University Karl N Levitt, University of California at Davis Steven Lucco, Microsoft Corporation Teresa Lunt, SRI International Leo Marcus, Aerospace Corporation John McHugh, Portland State University John McLean, U.S.
From page 275...
... Spix, Microsoft Corporation Mark Stefik, Xerox Palo Alto Research Center Vipin Swarup, MITRE Corporation Doug Tygar, University of California at Berkeley Bennet S Yee, University of California at San Diego Workshop 2 Agenda Wednesday, February 5, 1997 7:30 a.m.
From page 276...
... Tamper Resistant Devices Paul Kocher, Cryptography Consultant Elaine Palmer, IBM T.r. Watson Research Center Bennet S
From page 277...
... Naval Research Laboratory Concluding discussion Adjourn WORKSHOP 3: OPEN SYSTEMS ISSUES Workshop 3 Participants Steven M Bellovin, AT&T Labs Research Earl Boebert, Sandia National Laboratories Dick Brackney, National Security Agency Martha Branstad, Computer Security Researcher and Entrepreneur Blaine Burnham, National Security Agency Thomas Buss, Federal Express Corporation Stephen D
From page 278...
... 278 8:30 8:45 10:45 11:00 12:00 1:00 2:00 2:15 4:45 5:00 APPENDIX C Welcome and Overview (Fred Schneider and Stephen Crockery Session 1 Large-Scale Open Transactional Systems Panelists Thomas Buss, Federal Express Corporation fang Jeon, Liberty Financial Break Session 2 Antivirus Technology Trends Panelist Jimmy Kuo, McAfee Associates Inc. Lunch Session 3 Intrusion Detection: Approaches and Trends Panelists John Francis Mergen, BEN Corporation Stephanie Forrest, University of New Mexico Break Session 4 Costing Trustworthiness: Process and Practice as Levers Panelist Michael Diaz, Motorola Plenary Discussion All participants and committee Closing Remarks Committee caucus Discussion and dinner with Steven Lipner


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.