7:30 - 10:00 |
Symposium Registration |
8:00 - 8:30 |
Welcome Refreshments (Sponsored by HP) |
8:30 - 9:30 |
Session 1: Opening |
Frank Mayer, Symposium Chair |
|
9:30 - 10:00 |
Break (Sponsored by Red Hat) |
|
Opening Keynote |
Daniel G. Wolf, Director of the Information Assurance Directorate at the National Security Agency |
10:00 - 12:00 |
Session 2: Core Technology |
Pete Loscocco, Session Chair |
10:00 |
Integrating Flexible Support for Security Policies into the Linux Operating System |
Stephen D. Smalley, National Security Agency, USA |
10:30 |
Architecture of SELinux Network Access Controls |
James Morris, Red Hat, Inc., USA |
11:00 |
Leveraging IPSec for network access control for SELinux |
Trent Jaeger, IBM TJ Watson Research Center, USA |
11:30 |
Implementing SELinux Support for NFS |
James Carter, National Security Agency, USA |
12:00 - 1:30 |
Lunch (Sponsored by Tresys Technology) Potomac Room |
|
1:30 - 3:00 |
Session 3: Core Technology II |
Pete Loscocco, Session Chair |
1:30 |
SELinux and the Linux Desktop |
Colin Walters, Red Hat, Inc., USA |
2:00 |
Core Policy Management Infrastructure for SELinux |
Karl MacMillan, Tresys Technology, USA |
2:30 |
SELinux and MLS |
Chad Hanson, Trusted Computer Solutions, Inc., USA |
3:00 - 3:30 |
Break (Sponsored by IBM)
|
|
3:30 - 5:30 |
Session 4: Policy Issues and Tools |
Karl MacMillan, Session Chair |
3:30 |
Targeted vs Strict policy History and Strategy |
Dan Walsh, Red Hat, Inc., USA |
4:00 |
Simplifying Policy Management with SELinux Policy Editor |
Yuichi Nakamura, Hitachi Software and The George Washington University, Japan |
4:30 |
Policy analysis and generation work at MITRE |
Amy L. Herzog, The MITRE Corporation, USA |
5:00 |
Tresys SeTools: Tools and Libraries for Policy Analysis and Management |
Frank Mayer, Tresys Technology, USA |
6:00 - 8:00 |
Reception
(Sponsored By HP, IBM, Red Hat, Tresys) |
Potomac Room
|
|
March 4, 2005
|
8:00 - 8:30 |
Welcome Refreshments (Sponsored by IBM) |
8:30 - 10:00 |
Session 5: Achieving Security Goals with Type Enforcement |
Stephen D. Smalley, Session Chair |
8:30 |
SELinux Policy Analysis and Generation using Labeled Transition Systems |
Joshua D. Guttman,
John Ramsdell, The MITRE Corporation, USA |
9:00 |
Clark-Wilson Integrity as a Security Goal for SELinux Policies |
Trent Jaeger, IBM TJ Watson Research Center, USA |
9:30 |
Information Flow Analysis for Type Enforcement Policies |
Karl MacMillan, Tresys Technology, USA |
10:00 - 10:30 |
Break (Sponsored by Red Hat)
|
|
10:30 - 12:00 |
Session 6: Security Engineering and Assurance |
Trent Jaeger, Session Chair |
10:30 |
A New Policy Development Framework to Support Security Engineering |
Art Wilson, Tresys Technology, USA |
11:00 |
SELinux Policy Analysis Concepts and Techniques |
David Caplan, Tresys Technology, USA |
11:30 |
Common Criteria Evaluation Challenges for SELinux |
Doc Shankar, IBM, USA |
12:00 - 1:30 |
Lunch (Sponsored by Tresys Technology) Potomac Room |
|
1:30 - 3:00 |
Session 7: SELinux Applications Experiences |
David Caplan, Session Chair |
1:30 |
Lessons Learned Running a SE Linux "play" machine with open root account |
Russell Coker, Red Hat, Inc., Australia |
2:00 |
Lessons learned in designing SE-Linux into a toolkit for secure electric power grid control systems |
Stanley Klein, Stanley Klein Associates, LLC, USA |
2:30 |
HP NetTop: High-Assurance Computing using SELinux and Virtual Machines |
Tony Musgrave, Hewlett-Packard, USA |
3:00 - 3:30 |
Break (Sponsored by HP)
|
|
3:30 - 5:00 |
Session 8: SELinux Business and Products |
Frank Mayer, Session Chair |
3:30 |
SELinux business and community in Japan |
Yuichi Nakamura, Japan Open Source Advocacy Organization, Japan |
4:00 |
SELinux Distribution Panel |
Joshua Brindle, Gentoo, USA Russell Coker, Debian, Australia Roman Drahtmueller, Novell/SuSE, Germany Dan Walsh, Red Hat, USA Chad Hanson, TCS Trusted Linux, USA |
5:00 |
Closing and Gift Raffle |
|