The Symposium Speakers
|
|
Steven M. Bellovin is the co-author of the recent book, Firewalls and Internet Security: Repelling the WilyHacker, and holds several patents on cryptographic protocols. He is a member of the Internet Architecture Board, and is currently focusing on how to write systems that are inherently more secure. Despite the fact that he has not changed jobs since joining AT&T Labs - Research in 1982, he is still working on networks, security, and why the two don't get along.
|
Bill Cheswick logged into his first computer in 1969 and has worked on operating system security for more than 25 years. Since joining Bell Laboratories in 1987, he has worked on network security, PC viruses, mailers, the Plan 9 operating system, and kernel hacking. With Steve Bellovin, he co-authored the first full book on Internet security, Firewalls and Internet Security, Repelling the Wily Hacker. Cliff Stoll has called Ches "one of the seven avatars of the Internet." Ches's current work includes various Internet munitions, a new edition of the book, and maybe a way to hunt down anonymous denial-of-service attacks.
|
Jim Duncan is manager of Network and Information Systems and principal systems administrator for Pennsylvania State University's Applied Research Laboratory. He is a contributor to the Site Security Policy Handbook and has developed numerous policies, guidelines, and presentations on computer security, incident handling, and ethics. Jim is an active member of the Penn State CERT team.
|
Carl Ellison is a professional cryptographer who has been researching certification for over two years now. He is draft author for the IETF standard track certificate structure known as SPKI. In addition to his cryptography background, Carl has expertise in networking, operating systems, real time computer graphics, fault tolerance and digital signal processing.
|
Rik Farrow provides UNIX and Internet security consulting and training. He has been working with UNIX system security since 1984, and with TCP/IP networks since 1988. He is the author of UNIX System Security and System Administrator's Guide to System V. Farrow writes two columns for ;login:, and a network security column for Network magazine.
|
Daniel E. Geer, Jr. is vice president of CertCo, LLC, a market leader in digital certification for electronic commerce. He has a long history in network security and distributed computing management as an entrepreneur, consultant, teacher and architect. He is a co-author of the recently-published Web Security Sourcebook.
|
Brad Johnson is a well-known authority in the field of distributed systems. He has participated in seminal industry initiatives like the Open Software Foundation, X/Open, and the IETF. At SystemExperts he has led numerous security probes for major companies, revealing significant unrealized exposures.
|
Arjen K. Lenstra's major research interest is computational number theory, in particular algorithms for factoring integers and computing discrete logarithms. He developed a portable toolkit for experimenting with cryptographic protocols; this software was used in 1994 to break the famous 1977 RSA-Challenge number. He is one of the co-developers of the recent number field sieve factoring algorithm.
|
Gary McGraw is a research scientist with a dual PhD in Cognitive Science and Computer Science. He recently completed Java Security: Hostile Applets, Holes, & Antidotes and Software Fault Injection: Inoculating Programs Against Errors. Dr. McGraw has published his research in over forty technical publications. He is principal investigator on grants from the National Science Foundation, Rome Labs, and the Defense Advanced Research Projects Agency (DARPA).
|
Alfred Menezes is co-author of Handbook of Applied Cryptography and Elliptic Curve Public Key Cryptosystems. He is actively involved in cryptographic research, consults on a regular basis for Certicom Corp., and participates in IEEE and ANSI standards forums. He is a professor of mathematics at Auburn University.
|
Clifford Neuman is a senior research scientist at the Information Sciences Institute of the University of Southern California (USC), a faculty member in the Computer Science Department at USC, and Chief Scientist for CyberSafe Corporation. Dr. Neuman's recent work includes the development of a security infrastructure supporting authorization, accounting, and the NetChequereg. electronic payment system.
|
JoAnn Perry was vice president and head of computer scurity for Goldman Sachs for eight years. During that time the organization was expanded to handle global issues with teams set up in London and Tokyo. JoAnn managed the expansion teams from the London office. She is currently a security consultant with her own firm.
|
Marcus Ranum is CEO of Network Flight Recorder, Inc. He is the principal author of several major Internet firewall products, including the DEC SEAL, the TIS Gauntlet, and the TIS Internet Firewall Toolkit. He has been managing UNIX systems and security for over 13 years, including configuring and managing whitehouse.gov. He is a co-author of the Web Security Sourcebook.
|
Jon Rochlis is a senior consultant for SystemExperts Corp. He provides high level advice to businesses in the areas of network security, distributed systems design and management, high-availability, and electronic commerce. Before joining SystemExperts, Mr. Rochlis was engineering Manager with BBN Planet, a major national Internet service provider.
|
Avi Rubin is a senior technical staff member in the secure systems research department at AT&T Labs - Research and an adjunct professor of computer science at New York University where he teaches cryptography and computer security. His past research includes trusted distribution of software in hostile environments, one-time password schemes, key management, world-wide web security, anonymity and privacy, and formal methods for cryptographic protocol analysis. He is a co-author of the Web Security Sourcebook.
|
Shabbir J. Safdar is a senior member of the world-wide information security department at Goldman, Sachs & Co. He is responsible for building the GS CERT organization. He has also been active in working to obtain more favorable regulations regarding encryption for the industry.
|
Bruce Schneier is president of Counterpane Systems, a cryptography and computer security consulting company. He is the author of Applied Cryptography, the seminal work in its field. He has written dozens of articles on cryptography for major magazines and designed the popular Blowfish encryption algorithm, still unbroken after years of cryptanalysis.
|