*** DRAFT ***
The format of the event will be selected presentations with discussion, followed by a Q&A panel, and lightning talks.
Presentation sessions are 30 minutes in length, including discussion.
|09:00||Recent Advances in the SELinux Sandbox||Dan Walsh, Red Hat|
|09:30||in ur webserver, writin ur logs||Joshua Brindle, Tresys|
|10:00||Integrating Security into Vyatta||Stephen Hemminger, Vyatta|
|11:00||MSF Security Framework Overview||Elena Reshetova, Nokia Meego|
|11:30||Access Control in the MSF Security Framework||Janne Karhunen, Nokia Meego|
|12:00||lunch (self-funded at nearby location)||l|
|13:00||Linux Security in 10 Years||Brad Spengler, grsecurity|
|13:30||Using EVM to protect security extended attributes||Mimi Zohar, IBM|
|14:00||Secstate: Integrating SCAP and Puppet for System Lockdown||Karl MacMillan, Tresys|
|15:00||Widely Used But Out-Of-Tree||Kees Cook, Canonical|
|15:30||Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM||Z. Cliffe Schreuders, Murdoch University|
|16:00||System Security Services Daemon (SSSD)||Stephen Gallagher, Red Hat|
The panel session will start with a discussion topic, followed by open Q&A. Members of the panel will be determined closer to the event.
|17:00||The viability of a Linux Security API||Casey Schaufler, Smack Project|
|17:20||Open Q&A||Paul Moore, HP|
Lightning talks and closing
From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event.
Lightning talks will be five minutes in length, with up to six slots. Topics will be accepted on the day, with priority given to topics not accepted as main presentations.