[4023] in Kerberos

home help back first fref pref prev next nref lref last post

Summit '94 - Enterprise Security Technical Sessions

daemon@ATHENA.MIT.EDU (Summit '94)
Wed Oct 12 03:26:45 1994

To: kerberos@MIT.EDU
Date: 12 Oct 1994 04:48:55 GMT
From: summit@ix.netcom.com (Summit '94)


                    Enterprise Management Summit '94
                          November 14-18, 1994
              - Technical Sessions on Enterprise Security -

-------------------------------------------------------------
(Tutorial) From Computer Security to Enterprise Security 

Abstract: The rapid rise of the personal computer and more
recently of client/server computing has emphasized applications
and protocols with very little attention paid to real security.
This tutorial will introduce the attendee to the issues of
enterprise security and how it can be achieved in a distributed
computing environment. Covered will be basic threats,
technologies and strategies to guard networks and the systems
connected to them. The tutorial will include
     * From Time Sharing to Distributed Computing
     * Basic Network Technology
     * The Internet
     * Threats to Network Security
     * Solutions and Technologies: Kerberos, Lotus Notes
     * User Case Studies

Instructor:
Jeff Schiller, MIT

----------------------------------------------------------------
(S14) Integrating the Management of Security

Abstract: This session reviews current attempts at integrated
security services for enterprise environments and proposes a
central Security Information Base (SIB) methodology. By combining
the SIB with the Business Process Reengineering methodology,
people roles can be defined in terms of what applications can be
run and functions performed. These people roles can then be
mapped to security roles. 

Presenter:
Joost Verhofstad, Bull

----------------------------------------------------------------
(S28) Maintaining Security When You Connect Your Corporate
Internet with the Global Internet

Abstract: As more companies connect to the Internet, security has
become a major concern. Gateway approaches often suffer from
bottlenecks and may restrict the flow of valid business
information. This session shows how to build scalable security
gateways that permit information flow filtered by applications
and host names.

Presenter:TBD, Digital Equipment Corporation

home help back first fref pref prev next nref lref last post