LinuxSecuritySummit2010/Schedule
JamesMorris (Talk | contribs) (→Panel) |
JamesMorris (Talk | contribs) (→Presentations) |
||
(4 intermediate revisions by one user not shown) | |||
Line 25: | Line 25: | ||
|- | |- | ||
|09:00 | |09:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Walsh_Sandbox|Recent Advances in the SELinux Sandbox]] | + | |[[LinuxSecuritySummit2010/Abstracts/Walsh_Sandbox|Recent Advances in the SELinux Sandbox]] [http://userweb.kernel.org/~jmorris/lss2010_slides/sandbox_new.odp] |
| Dan Walsh, Red Hat | | Dan Walsh, Red Hat | ||
|- | |- | ||
|09:30 | |09:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Brindle_lolcats|in ur webserver, writin ur logs]] | + | |[[LinuxSecuritySummit2010/Abstracts/Brindle_lolcats|in ur webserver, writin ur logs]] [http://userweb.kernel.org/~jmorris/lss2010_slides/lolpolicy.pptx] |
| Joshua Brindle, Tresys | | Joshua Brindle, Tresys | ||
|- | |- | ||
|10:00 | |10:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Hemminger_Vyatta|Integrating Security into Vyatta]] | + | |[[LinuxSecuritySummit2010/Abstracts/Hemminger_Vyatta|Integrating Security into Vyatta]] [http://userweb.kernel.org/~jmorris/lss2010_slides/Whoville.pdf] |
| Stephen Hemminger, Vyatta | | Stephen Hemminger, Vyatta | ||
|- | |- | ||
Line 40: | Line 40: | ||
|- | |- | ||
|11:00 | |11:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Reshetova_MSF_overview|MSF Security Framework Overview]] | + | |[[LinuxSecuritySummit2010/Abstracts/Reshetova_MSF_overview|MSF Security Framework Overview]] [http://userweb.kernel.org/~jmorris/lss2010_slides/reshetova_LinuxCon_overview_v_final.pdf] |
| Elena Reshetova, Nokia | | Elena Reshetova, Nokia | ||
|- | |- | ||
|11:30 | |11:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Karhunen_MSF_AC|Access Control in the MSF Security Framework]] | + | |[[LinuxSecuritySummit2010/Abstracts/Karhunen_MSF_AC|Access Control in the MSF Security Framework]] [http://userweb.kernel.org/~jmorris/lss2010_slides/LinuxCon_access_control_v3.pdf] |
| Janne Karhunen, Nokia | | Janne Karhunen, Nokia | ||
|- | |- | ||
Line 51: | Line 51: | ||
|- | |- | ||
|13:00 | |13:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Spengler_Linux|Linux Security in 10 Years]] | + | |[[LinuxSecuritySummit2010/Abstracts/Spengler_Linux|Linux Security in 10 Years]] [http://userweb.kernel.org/~jmorris/lss2010_slides/spender_summit.pdf] |
| Brad Spengler, grsecurity | | Brad Spengler, grsecurity | ||
|- | |- | ||
|13:30 | |13:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Zohar_EVM|Using EVM to protect security extended attributes]] | + | |[[LinuxSecuritySummit2010/Abstracts/Zohar_EVM|Using EVM to protect security extended attributes]] [http://userweb.kernel.org/~jmorris/lss2010_slides/EVM-security-summit.odp] |
|Mimi Zohar, IBM | |Mimi Zohar, IBM | ||
|- | |- | ||
|14:00 | |14:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/MacMillan_Secstate|Secstate: Integrating SCAP and Puppet for System Lockdown]] | + | |[[LinuxSecuritySummit2010/Abstracts/MacMillan_Secstate|Secstate: Integrating SCAP and Puppet for System Lockdown]] [http://userweb.kernel.org/~jmorris/lss2010_slides/Secstate_Overview.pdf] |
|Karl MacMillan, Tresys | |Karl MacMillan, Tresys | ||
|- | |- | ||
Line 66: | Line 66: | ||
|- | |- | ||
|15:00 | |15:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Cook_Tree|Widely Used But Out-Of-Tree]] | + | |[[LinuxSecuritySummit2010/Abstracts/Cook_Tree|Widely Used But Out-Of-Tree]] [http://userweb.kernel.org/~jmorris/lss2010_slides/out-of-tree.pdf] |
|Kees Cook, Canonical | |Kees Cook, Canonical | ||
|- | |- | ||
|15:30 | |15:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]] | + | |[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]] [http://userweb.kernel.org/~jmorris/lss2010_slides/Schreuders_Linux_Security_Summit.pdf] |
|Z. Cliffe Schreuders, Murdoch University | |Z. Cliffe Schreuders, Murdoch University | ||
|- | |- | ||
|16:00 | |16:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]] | + | |[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]] [http://userweb.kernel.org/~jmorris/lss2010_slides/sssd_slides.odp] |
|Stephen Gallagher, Red Hat | |Stephen Gallagher, Red Hat | ||
|- | |- | ||
Line 80: | Line 80: | ||
|colspan="2" |''break'' | |colspan="2" |''break'' | ||
|} | |} | ||
− | |||
== Panel == | == Panel == | ||
Line 98: | Line 97: | ||
|17:20 | |17:20 | ||
|Open Q&A | |Open Q&A | ||
+ | |As above, plus Casey | ||
|Paul Moore, HP | |Paul Moore, HP | ||
|} | |} |
Latest revision as of 21:22, 24 August 2010
Contents |
[edit] Overview
This is the schedule for the Linux Security Summit 2010, to be held in Boston in conjunction with Linuxcon on Monday, August 9th. The format of the event is a series of selected presentations, followed by a Q&A panel, and lightning talks. This schedule is subject to change: check this page for updates.
[edit] Registration
Time | Event | Notes |
---|---|---|
08:30 | LinuxCon Registration and setup | The registration desk will be open from 8am. Please arrive early enough to register (there may be queues) and get settled: we plan to start at 9am sharp. |
[edit] Presentations
Presentation sessions are 30 minutes in length, including discussion.
Time | Title | Presenter |
---|---|---|
09:00 | Recent Advances in the SELinux Sandbox [1] | Dan Walsh, Red Hat |
09:30 | in ur webserver, writin ur logs [2] | Joshua Brindle, Tresys |
10:00 | Integrating Security into Vyatta [3] | Stephen Hemminger, Vyatta |
10:30 | break | |
11:00 | MSF Security Framework Overview [4] | Elena Reshetova, Nokia |
11:30 | Access Control in the MSF Security Framework [5] | Janne Karhunen, Nokia |
12:00 | lunch (self-funded at nearby location) | |
13:00 | Linux Security in 10 Years [6] | Brad Spengler, grsecurity |
13:30 | Using EVM to protect security extended attributes [7] | Mimi Zohar, IBM |
14:00 | Secstate: Integrating SCAP and Puppet for System Lockdown [8] | Karl MacMillan, Tresys |
14:30 | break | |
15:00 | Widely Used But Out-Of-Tree [9] | Kees Cook, Canonical |
15:30 | Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM [10] | Z. Cliffe Schreuders, Murdoch University |
16:00 | System Security Services Daemon (SSSD) [11] | Stephen Gallagher, Red Hat |
16:30 | break |
[edit] Panel
The panel session will start with a discussion topic, followed by open Q&A. Members of the panel will be determined closer to the event.
Time | Topic | Panel Members | Moderator |
---|---|---|---|
17:00 | The viability of a standard Linux security API | Kees Cook, Serge Hallyn, Stephen Smalley | Casey Schaufler, Smack Project |
17:20 | Open Q&A | As above, plus Casey | Paul Moore, HP |
[edit] Lightning talks and closing
From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event.
Time | Event | Moderator |
---|---|---|
18:00 | Lightning Talks (5mins each) | Joshua Brindle, Tresys |
18:30 | finish |
Lightning talks will be five minutes in length, with up to six slots. Topics will be accepted on the day, with priority given to topics not accepted as main presentations.