ARCS - Agenda: Difference between revisions
From Santa Fe Institute Events Wiki
No edit summary |
No edit summary |
||
(7 intermediate revisions by the same user not shown) | |||
Line 14: | Line 14: | ||
<td align=center><b>TIME</b></td> | <td align=center><b>TIME</b></td> | ||
<td align=center><b>ACTIVITY</b></td> | <td align=center><b>ACTIVITY</b></td> | ||
<tr bgcolor=#aaaaaa> | |||
<td><br></td> | |||
<td align=center><b>Tuesday, October 31</b></td> | |||
</tr> | |||
<tr> | |||
</td> | |||
<td>6:00-7:30 p.m.</td> | |||
<td>Informal Welcome Reception, La Fonda Hotel | |||
</td> | |||
<tr> | |||
<tr bgcolor=#aaaaaa> | <tr bgcolor=#aaaaaa> | ||
<td><br></td> | <td><br></td> | ||
Line 20: | Line 30: | ||
<tr> | <tr> | ||
</td> | </td> | ||
<td>8:15-8: | <td>8:15-8:45 a.m.</td> | ||
<td>Registration and Continental Breakfast | <td>Registration and Continental Breakfast | ||
</td> | </td> | ||
<tr> | <tr> | ||
<td>8:45-9:00</td> | <td>8:45-9:00</td> | ||
<td>''Welcome & Introductory Remarks,'' '''Geoffrey West,''' | <td>''Welcome & Introductory Remarks,'' '''Geoffrey West,''' Santa Fe Institute | ||
</tr> | </tr> | ||
<td>9:00-10:00</td> | <td>9:00-10:00</td> | ||
<td>'''Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," | <td>'''Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power'''</td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
Line 39: | Line 49: | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td>11:15-12: | <td>11:15-12:00 p.m.</td> | ||
<td>'' | <td>''An Adaptive System to Build Trust of Remote Email Agents,'' | ||
''' | '''Hong Li,''' Intel Research Group</td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td>12: | <td>12:00-1:30</td> | ||
<td>Buffet Lunch</td> | <td>Buffet Lunch</td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td>1:30-2:15</td> | <td>1:30-2:15</td> | ||
<td>''" | <td>''"Do we need alternative models for computer epidemics?"'' '''Fabrice Saffre,''' BT Labs</td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td>2:15-3:00</td> | <td>2:15-3:00</td> | ||
<td>'' | <td>''Security in US Defense Networks,'' '''Col. Carl Hunt,''' IDA</td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
Line 60: | Line 70: | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td>3:30-4: | <td>3:30-4:30</td> | ||
<td>'' | <td>''Virus Writers,'' '''Sarah Gordon,''' Symantec </td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td>4: | <td>4:30-5:00</td> | ||
<td> | <td>Round table discussion & Adjourn</td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td> | <td>6:00-7:30</td> | ||
<td> | <td>Reception and Dinner, Santa Fe Institute</td> | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
Line 77: | Line 87: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>8:15-9: | <td>8:15-9:00 a.m.</td> | ||
<td>Continental Breakfast</td> | <td>Continental Breakfast</td> | ||
</tr> | </tr> | ||
Line 90: | Line 100: | ||
<tr> | <tr> | ||
<td>10:30-11:15</td> | <td>10:30-11:15</td> | ||
<td>'' | <td>''Anti-worm Dynamics in Distributed Detection,'' '''John Mark Agosta,''' Intel</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>11:15-12: | <td>11:15-12:00 p.m.</td> | ||
<td>'' | <td>''Address Space Obfuscation to Tolerate Windows Code Injection Attacks,'' '''Tufan Demir,''' Security Lab, UC Davis</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 102: | Line 112: | ||
<tr> | <tr> | ||
<td>1:30-2:00</td> | <td>1:30-2:00</td> | ||
<td>'' | <td>''Current and Developing Issues in Information Security in the UK,'' '''Andrew Jones,''' BT Labs</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>2:00-2:45</td> | <td>2:00-2:45</td> | ||
<td>'' | <td>''Creating a Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathways,'' '''Sanjay Goel,''' NYS Center for Information Forensics and Assurance</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>2:45-3:15</td> | <td>2:45-3:15</td> | ||
<td>'' | <td>''Resillience in Complex Systems,'' '''Dave Cliff,''' Large Scale Complex IT Systems Institute, UK</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 118: | Line 128: | ||
<tr> | <tr> | ||
<td>3:45-4:30</td> | <td>3:45-4:30</td> | ||
<td>'' | <td>''Knowledge Management and Social Networking,'' '''Eleanor Wynn,''' Intel</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>4:30-5:15</td> | <td>4:30-5:15</td> | ||
<td>'' | <td>''The Orchids IDS System,'' '''Jean Goubault-Larrecq,''' École Normale Supérieure de Cachan | ||
</td> | </td> | ||
</tr> | </tr> |
Latest revision as of 16:15, 28 October 2006
Workshop Navigation |
TIME | ACTIVITY |
Tuesday, October 31 | |
6:00-7:30 p.m. | Informal Welcome Reception, La Fonda Hotel |
Wednesday, November 1 | |
8:15-8:45 a.m. | Registration and Continental Breakfast |
8:45-9:00 | Welcome & Introductory Remarks, Geoffrey West, Santa Fe Institute |
9:00-10:00 | Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power |
10:00-10:30 | Coffee Break |
10:30-11:15 | TBA, Christian Renaud, Cisco Systems |
11:15-12:00 p.m. | An Adaptive System to Build Trust of Remote Email Agents, Hong Li, Intel Research Group |
12:00-1:30 | Buffet Lunch |
1:30-2:15 | "Do we need alternative models for computer epidemics?" Fabrice Saffre, BT Labs |
2:15-3:00 | Security in US Defense Networks, Col. Carl Hunt, IDA |
3:00-3:30 | Coffee Break |
3:30-4:30 | Virus Writers, Sarah Gordon, Symantec |
4:30-5:00 | Round table discussion & Adjourn |
6:00-7:30 | Reception and Dinner, Santa Fe Institute |
Thursday, November 2 | |
8:15-9:00 a.m. | Continental Breakfast |
9:00-10:00 | Keynote: "Why we are not winning the Security War," Dr. Richard Ford, Florida Institute of Technology |
10:00-10:30 | Coffee Break |
10:30-11:15 | Anti-worm Dynamics in Distributed Detection, John Mark Agosta, Intel |
11:15-12:00 p.m. | Address Space Obfuscation to Tolerate Windows Code Injection Attacks, Tufan Demir, Security Lab, UC Davis |
12:00-1:30 | Buffet Lunch |
1:30-2:00 | Current and Developing Issues in Information Security in the UK, Andrew Jones, BT Labs |
2:00-2:45 | Creating a Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathways, Sanjay Goel, NYS Center for Information Forensics and Assurance |
2:45-3:15 | Resillience in Complex Systems, Dave Cliff, Large Scale Complex IT Systems Institute, UK |
3:15-3:45 | Coffee |
3:45-4:30 | Knowledge Management and Social Networking, Eleanor Wynn, Intel |
4:30-5:15 | The Orchids IDS System, Jean Goubault-Larrecq, École Normale Supérieure de Cachan |
5:15-5:30 | Discussion and Wrap-up |