Back
Intrusion Tolerant Systems (ITS) PI Meeting

February 22-23, 2000 - Aspen, CO

Tuesday, February 22, 2000
 
8:00 - 8:30 Welcome and Introduction Remarks Jay Lala, DARPA
8:30 - 9:00 Containment and Integrity for Mobile Code Fred Schneider, Cornell University
9:00 - 9:30 Scaling Proof-Carrying Code to Production Compilers and Security Policies Andrew Appel, Princeton University
9:30 - 10:00 New Approaches to Mobile Code: Reconciling Execution Efficiency with Provable Security Michael Franz, University of California, Irvine
10:30 - 11:00 A Binary Agent Technology for COTS Software Integrity Anant Agarwal, InCert Software Corporation
11:00-11:30  Integrity Through Mediated Interfaces  - Robert Balzer, University of Southern California/Information Science Institute.
11:30 - 12:00 Sandboxing Mobile code Execution Environments Anup Ghosh, Reliable Software Technologies Corporation
4:00 - 4:30 Semantic Data Integrity David Rosenthal, Odyssey Research Associates, Inc.
4:30 - 5:00 Agile Objects Component-based Inherent Survivability Andrew Chien, University of California, San Diego
5:00 - 5:30 A Distributed Framework for Perpetually Available and Secure Information Systems Pradeep Khosla, Carnegie Mellon University
6:00 - 6:30 FOUR A Agent Adaptation and Assurance William Scherlis, Carnegie Mellon University
6:30 - 7:00 End of Day One Comments Jay Lala

Wednesday, February 23, 2000
 
8:00 8:30 Secure Execution of Mobile Programs Raju Pandey, University of California, Davis
8:30 - 9:00 Intrusion Tolerant Software Architectures - Victoria Stravridou, SRI International
9:00 9:20 Vision Video
9:20 - 9:40 IA&S Roadmap and ITS Direction  - Jay Lala
10:00 - 11:00 Taxonomy Workshop
11:30 12:00 End of Session Comments Jay Lala

     [ Back ]