Date: Thu, 16 Aug 90 23:58 EDT
From: Jack Holleran <
[email protected]>
Subject: 13th National Computer Security Conference, October 1-4, 1990
FEES:
Before September 1, 1990 - $225.00
After September 1, 1990 - $250.00
LOCATION (100 yards from Woodley Park Metro Station)
Omni Shoreham Hotel
2500 Calvert Street, NW
Washington, DC 20008
Hotel Room Conference Rates
Corporate Government
Single $125 $ 93
Double $145 $108
Telephone: (202) 234-0700
TRANSPORTATION
Bus transportation will be provided between the Omni Shoreham Hotel and three
local sites:
The National Institute of Standards and Technology, Administration Building
in Gaithersburg, MD;
The National Security Agency, Operations Building 3 (Gatehouse 8), Savage
Road, Fort George G. Meade, MD; and
The National Computer Security Center, Airport Square 11, 911 Elkridge
Landing Road, Linthicum, MD
Buses will depart at 7:15 a.m. each morning and return at the end of the
afternoon sessions (approximately 5:30 p.m.) and after the banquet on
Wednesday. Beginning at 9:30 p.m. on Tuesday evening, buses will depart for
all locations (see above), including the Omni Shoreham Hotel, from the
Smithsonian American History Museum.
SPECIAL INTEREST ROOMS
There will be several rooms available, on a first-come, first-served basis, for
Special Interest discussions ("birds of a feather", etc). The rooms may be
reserved in one-hour increments and should not be used for commercial purposes.
Contact the staff at the reservation desk to reserve one of these rooms.
FURTHER INFORMATION
For further information, call Tammie Grice at (301) 975-2775.
-----------------------------------------------------------------------
CONFERENCE REGISTRATION FORM
13th National Computer Security Conference
October 1-4, 1990
Omni Shoreham Hotel
2500 Calvert Street
Washington, DC 20008
NAME: _______________________________
COMPANY: _______________________________
ADDRESS: _______________________________
CITY: ___________ STATE: ________ ZIP: ____
COUNTRY: ___________ TELEPHONE NO: __________
Full Registrants Fee Students Registration Fee*
Before Sep 1 @ $225 Before Sep 1 @ $50 __
After Sep 1 @ $250 After Sep 1 @ $75 __
*Please Note: A student's registration MUST be accompanied by a letter from
his/her faculty advisor or professor, on university or college letterhead
paper, testifying that the registrant is a full-time student. The student
attendee will be entitled to participate in all conference events except the
evening functions. Tickets for these events may be available at an extra fee.
Payment Enclosed in the Amount of: _____
Form of Payment:
___ Check. Make checks payable to NIST/13th National Computer Security
Conference. All checks must be drawn on U.S. banks only.
___ Purchase Order Attached. P.O. No.: __________
___ Federal Government Training Form
___ MasterCard ___Visa
Account No.: _______________ Exp. Date _______
Authorized Signature: _______________________
PLEASE NOTE: No other credit cards will be accepted.
Please return conference registration form and payment to:
c/o 13th National Computer Security Conference
Office of the Comptroller
National Institute of Standards and Technology
Room A807, Administration Building
Gaithersburg, MD 20899
Conference Participants List:
__ I do want my name on the Conference Participants List which is distributed
to conference attendees.
__ I do not want my name on the Conference Participants List.
Primarily, I plan to attend (see brochure) Track A___ Track B ___
Track C-I ___ Track C-II ___ Track D ___
----------------------------------------------------------
HOTEL RESERVATION FORM
13th National Computer Security Conference
1-4 October 1990
Omni Shoreham Hotel
2500 Calvert Street
Washington, DC 20008
To register for your accommodations, complete this form and return it DIRECTLY
to the hotel NO LATER THAN SEPTEMBER 7. After that date, we cannot guarantee
the availability of rooms nor the special group rates. All reservations must
be accompanied by a first night's deposit. Please make your check payable to
the Omni Shoreham or provide your credit card number and signature in the
spaces provided below. Confirmation of your reservation will be sent to you
directly from the hotel.
NAME: _______________________________
COMPANY: _______________________________
ADDRESS: _______________________________
CITY: ___________ STATE: ________ ZIP: ____
COUNTRY: ___________ TELEPHONE NO: __________
(include country access code if appropriate)
PLEASE RESERVE:
Single Room(s) ________ Double Room(s) __________
Arrival Date: ________ Departure Date: _________
Person Sharing Room: ____________________________
RATES:
Corporate Government*
Single $125 $ 93
Double $145 $108
*Government per diem w/tax
METHOD OF GUARANTEE:
Deposit Enclosed: _____
Check One: ___ American Express ___ Visa ___MasterCard
___Diners Club ___Carte Blanche
Credit Card #: _________________ Exp. Date: ______
Signature of Cardholder: ________________________
--------------------------------------------------------------
FINAL program for the 13th National Computer Security Conference
Special National Computer Security Conference Sessions
October 2, 1990
Opening Plenary Session
0900 Welcoming Remarks
Conference Co-Chairs
Irene Gilbert, National Institute of Standards and Technology
Paul Peters, National Computer Security Center
Patrick R. Gallagher, Jr.
Director, National Computer Security Center
Lynn McNulty, Associate Director for Computer Security
National Computer Systems Laboratory
National Institute of Standards and Technology
Keynote Address
The Honorable Robert G. Torricelli
U. S. House of Representatives (D - NJ)
Presentation: 1990 National Computer System Security Award
1830 Conference Reception
Smithsonian American History Museum
October 3, 1990
1600 Speak Out
Irene Gilbert, National Institute of Standards and Technology
Paul Peters, National Computer Security Center
Session Chairs
1800 Conference Banquet (Omni Shoreham Regency Ballroom)
Speaker: Ms. Michelle K. VanCleave
Assistant Director for National Security Affairs
Office of Science and Technology Policy
Executive Office of the President
October 4, 1990
1100 Closing Plenary Session
Panel: Towards Harmonized International Security Criteria
This session will include representatives of organizations from Europe and
the United States discussing the security criteria and evaluation procedures
being proposed for international use. The impact of current proposals and
their evolution towards satisfying future user and vendor requirements will be
presented.
Stuart Katzke, Session Chair, National Institute of Standards and Technology
1225 Closing Remarks
Conference Co-Chairs
Irene Gilbert, National Institute of Standards and Technology
Paul Peters, National Computer Security Center
TRACK A - Research & Development
MONDAY, OCTOBER 1
1600 Panel: Commercial Development & Evaluation of Trusted
Systems: An Open Discussion -- Our Success to Date
Frank Mayer, Session Chair, Sparta
Steve LaFountain, National Computer Security Center;
Daniel Schnackenberg, The Boeing Corporation;
Captain Keith Frederick, USAF
TUESDAY, OCTOBER 2
Verification
Joshua Guttman, Session Chair, The MITRE Corporation
1030 Covert Storage Channel Analysis: A Worked Example
Timothy Levin, Albert Tao, Gemini Computers, Inc.
Steven Padilla, Trusted Information Systems, Inc.
1050 Verification of the C/30 Microcode Using the State Delta
Verification System (SDVS)
Jeffrey Cook, The Aerospace Corporation
1110 UNIX System V with B2 Security
Craig Rubin, AT&T Bell Laboratories
1400 PANEL: Access Control: Time for A Retrospective
Jonathan Millen, Session Chair, The MITRE Corporation
Catherine McCullom, Unisys
Earl Boebert, SCTC
William Shockley, Digital Equipment Corporation
Leonard LaPadula, MITRE
Richard Graubart, MITRE
Electronic Authentication & Biometrics
William H. Murray, Session Chair
1600 Key Management Systems Combining X9.17 and Public Key Techniques
Jon Graff, Cylink
1620 Electronic Document Authorization
Addison Fischer, Fischer International Systems Corporation
1640 The Place of Biometrics in a User Authentication Taxonomy
Alex Conn, John Parodi, Michael Taylor,
Digital Equipment Corporation
1700 Non-Forgeable Personal Identification System Using
Cryptography and Biometrics
Glenn Rinkenberger, Ron Chandos,
Motorola Government Electronics Group
WEDNESDAY, OCTOBER 3
Intelligent Tools I: Auditing
V. A. Ashby, Session Chair, The MITRE Corporation
0900 An Audit Trail Reduction Paradigm Based on Trusted Processes
Zavdi Lichtman, John Kimmins, Bell Communications Research
0930 The Computerwatch Data Reduction Tool
Cheri Dowell, Paul Ramstedt, AT&T Bell Laboratories
1000 Analysis of Audit and Protocol Data Using Methods from
Artificial Intelligence
Winfried R E. Weiss, Adalbert Baur, Siemens AG
Intelligent Tools II: Intrusion Detection
James Anderson, Session Chair, J.P. Anderson & Co.
1100 A UNIX Prototype for Intrusion and Anomaly Detection in
Secure Networks
J. R. Winkler, Planning Research Corporation
1130 A Neural Network Approach Towards Intrusion Detection
Richard Simonian, Ronda Henning, Jonathan Reed, Kevin Fox,
Harris Corporation
1400 Panel: Data Categorization and Labeling
Dennis Branstad, Session Chair, National Institute of
Standards and Technology
Warren Schmidt, Sears Technology Services, Inc.
Chairman, Data Categorization Working Group
Russell Housley, XEROX Special Information Systems
Chairman, DARPA Internet Labeling Group
Noel Nazario, National Institute of Standards and Technology
Organizer, NIST Labeling Workshop
1600 Panel: R&D Activities
Michael Ware, Session Chair, National Computer Security Center
Rob Johnson - Verification & Evaluation and Analysis
John Campbell - Databases
Wayne Weingaertner - Architectures
Craig Hasson - Networks
THURSDAY, OCTOBER 4
Modeling
D. Elliott Bell, Session Chair, Trusted Information Systems, Inc.
0900 A Generalized Framework for Access Control: An Informal Description
Marshall Abrams, Kenneth Eggers, Leonard LaPadula, Ingrid Olson,
MITRE
0930 Automated Extensibility in THETA
Joseph McEnerney, Randall Brown, D. G. Weber,
Odyssey Research Associates
Rammohan Varadarajan, Informix Software, Inc.
1000 Controlling Security Overrides
Lee Badger, Trusted Information Systems, Inc.
1030 Lattices, Policies, and Implementations
D. Elliott Bell, Trusted Information Systems, Inc.
TRACK B - System
MONDAY, OCTOBER 1
0900 NIST/NSA Services & Publications
Ellen Flahavin, Session Chair, National Institute of
Standards and Technology
Shirley M. Radack, National Institute of Standards and
Technology
Kathleen Ingley, National Security Agency
1400 PANEL: Computer Security Standards
Robert Rosenthal, Session Chair, National Institute of
Standards and Technology
E. J. Humphreys, British Telecom
Russell Housley, XEROX Special Information Systems
Michael Harrop, Canada Treasury Board
Embedded Systems
Earl Boebert, Session Chair, Secure Computing Technology Corporation
1600 The Role of "System Build" in Trusted Embedded Systems
T. Vickers Benzel, M. M. Bernstein, R. J. Feiertag,
Trusted Information Systems
J. P. Alstad, C. M. Brophy, Hughes Aircraft Company
1630 Combining Security, Embedded Systems and Ada Puts the Emphasis
on the RTE
F.. Maymir-Ducharme, M. Armstrong, IIT Research Institute
D. Preston, Catholic University
TUESDAY, OCTOBER 2
1030 PANEL: Disclosure Protection of Sensitive Information
Gene Troy, Session Chair, National Institute of Standards
and Technology
Ingrid Olson, MITRE
Milan Kuchta, Department of National Defence System Security Centre
Network Security I
Steven Lipner, Session Chair, Digital Equipment Corporation
1400 Considerations for VSLAN(TM) Integrators and DAAs
Greg King, Verdix Corporation
1430 Introduction to the Gemini Trusted Network Processor
Michael Thompson, Roger Schell, Albert Tao, Timothy Levin,
Gemini Computers Inc.
1500 An Overview of the USAFE Guard System
Lorraine Gagnon, Logicon Inc.
Network Security II
John Michael Williams, Session Chair, Unisys
1600 Mutual Suspicion for Network Security
Ruth Nelson, David Becker, Jennifer Brunell, John Heimann,
GTE Government Systems
1630 A Security Policy for Trusted Client-Server Distributed Networks
Russell Housley, Sammy Migues, Xerox Special Information Systems
1700 Network Security and the Graphical Representation Model
Jared Dreicer, Laura Stolz, W. Anthony Smith,
Los Alamos National Laboratory
WEDNESDAY, OCTOBER 3
System Test & Integration
Daniel Gambel, Session Chair, Grumman Data Systems
0900 Testing a Secure Operating System
Michael Johnston, Vasiliki Sotiriou, TRW Systems Integration Group
0930 An Assertion-Mapping Approach to Software Test Design
Greg Bullough, James Loomis, Peter Weiss, Amdahl Corporation
1000 Security Testing: The Albatross of Secure System Integration?
Susan Walter, Grumman Data Systems
Network Standards
Marshall Abrams, Session Chair, The MITRE Corporation
1100 Low Cost Outboard Cryptographic Support for SILS and SP4
B. J. Herbison, Digital Equipment Corporation
1130 Layer 2 Security Services for Local Area Networks
Richard Parker II, MITRE
Operating Systems
Teresa Lunt, Session Chair, SRI International
1400 Trusted MINIX: A Worked Example
Albert Donaldson, ESCOM Corporation
John Taylor Jr., General Electric M&DSO
David Chizmadia, National Computer Security Center
1430 Security for Real-Time Systems
Teresa Lunt, SRI International
Franklin Reynolds, Keith Loepere, E. Douglas Jensen,
Concurrent Computer Corporation
1500 Trusted XENIX(TM) Interpretation: Phase I
D. Elliott Bell, Trusted Information System Inc.
1600 Panel: Vendors Activities
Steve Nardone, Session Chair, National Computer Security Center
George R. Mundy, Trusted Information Systems, Inc.
Jan Roberts, Tandem
Gaurang Shah, Verdix Corporation
THURSDAY, OCTOBER 4
Viruses
Bruce H. Custer, Session Chair, National Computer Security Center
0900 PACL's: An Access Control List Approach to Anti-Viral Security
D. Cook, R. Olsson, J. Crossley, P. Kerchen, K. Levitt, R. Lo,
University of California, Davis
D. Wichers, Arca Systems, Inc.
0930 Static Analysis Virus Detection Tools for UNIX Systems
K. Levitt, P. Kerchen, R. Lo, J. Crossley, G. Elkinbard,
R. Olsson, University of California, Davis
1000 The Virus Intervention and Control Experiment
James Molini, Chris Ruhl, Computer Sciences Corporation
1030 Classification of Computer Anomalies
Klaus Brunnstein, Simone Fischer-H?ubner, Morton Swimmer,
Virus Test Center (VTC), University of Hamburg
TRACK C-I - Management & Administration
MONDAY, OCTOBER 1
Contingency Planning & Disaster Recovery (Part I)
Jack Holleran, Session Chair, National Computer Security Center
0900 Disaster Recovery / Contingency Planning
Eileen S. Wesselingh, National Computer Systems Contingency Services
1100 PANEL: Professional Development
Dain Gary, Session Chair, Mellon National Bank
Sally Meglathery, Information System Security Association
Marla Collier, International Professional Resources
Contingency Planning & Disaster Recovery (Part II)
Irene Gilbert, Session Chair, National Institute of Standards and Technology
1400 Disaster Recovery from $138 Million Fire
Lloyd R. Smith, Jr., Information Systems Integrity
1600 PANEL: Plans and Assistance
Jon Arneson, Session Chair, National Institute of Standards
and Technology
Edward Springer, Office of Management and Budget
Christopher Bythewood, National Computer Security Center
Rick Carr, William Colvin, National Aeronautics Space Administration
TUESDAY, OCTOBER 2
Criteria: National & International
Charles Pfleeger, Session Chair, Trusted Information Systems, Inc.
1030 Harmonised Criteria for the Security Evaluation of IT Systems
and Products
P. Casey, A. Brouwer, D. Herson, J. Pacault, F. Taal, U. Van Essen
1050 The VME High Security Option
Tom Parker, ICL Defence Systems
1110 Rainbows and Arrows: How the Security Criteria Address
Computer Misuse
Peter Neumann, SRI International
1130 Civil and Military Application of Trusted Systems Criteria
William Barker, Charles Pfleeger, Trusted Information Systems, Inc.
1400 Panel: Implementation of the Computer Security Act of 1987
Dennis Gilbert, Session Chair, National Institute of Standards
and Technology
Ed Springer, Office of Management and Budget
Harold Segal, U.S. Office of Personnel
Harold J. Podell, U.S. General Accounting Office
Jon Arneson, National Institute of Standards and Technology
Christopher Bythewood, National Computer Security Center
Approaches to Trust
Robert Lau, Session Chair, National Computer Security Center
1600 The CSO's Role in Computer Security
Cindy Hash, National Computer Security Center
1630 Implementation and Usage of Mandatory Access Controls in an
Operational Environment
Leslie Gotch, Honeywell Federal Systems, Inc.
Shawn Rovansek, National Computer Security Center
1700 Building Trust into a Multilevel File System
Cynthia E. Irvine, Todd B. Ackeson, Michael F. Thompson,
Gemini Computers, Inc.
WEDNESDAY, OCTOBER 3
Risk Management
0900 Panel: Risk Management
Irene Gilbert, Session Chair, National Institute of Standards
and Technology
Deborah Bodeau, MITRE
Lance Hoffman, George Washington University
Stuart Katzke, National Institute of Standards and Technology
1000 LAVA/CIS Version 2.0: A Software System for Vulnerability and
Risk Assessment
S. T. Smith, M. L. Jalbert, Los Alamos National Laboratory
1100 WORKFLOW: A Methodology for Performing a Qualitative Risk Assessment
Paul Garnett, SYSCON Corporation
1130 Critical Risk Certification Methodology
Nander Brown, U.S. Small Business Administration
Acquisition
Dennis Gilbert, Session Chair, National Institute of Standards and Technology
1400 Factors Effecting the Availability of Security Measures
in Data Processing Components
Robert H. Courtney, Jr., Robert Courtney, Incorporated
1430 Integrating Computer Security and Software Safety in the Life
Cycle of Air Force Systems
Albert C. Hoheb, The Aerospace Corporation
1500 Panel: Acquisition Discussion
Barbara Guttman, National Institute of Standards and Technology
Blaine Burnham, National Computer Security Center
Integrity
Peter G. Neumann, Session Chair, SRI International
1600 Integrity Mechanisms in Database Management Systems
Ravi Sandhu, Sushil Jajodia, George Mason University
1630 A Taxonomy of Integrity Models, Implementations and Mechanisms
Stephen Welke, J. Eric Roskos, John Boone, Terry Mayfield,
Institute for Defense Analyses
THURSDAY, OCTOBER 4
0900 Panel: National Computer Security Policy
Lynn McNulty, Session Chair, National Institute of Standards and
Technology
TRACK C-II - Management & Administration
MONDAY, OCTOBER 1
DATABASE MANAGEMENT
John Campbell, DBMS Track Chair, National Computer Security Center
0900 TUTORIAL: Database Management Systems and Secure Database Management
Systems
John Campbell, National Computer Security Center
1100 Panel: A Year of Progress in Trusted Database Systems
John Campbell, Session Chair
James Pierce, Teradata Corporation
Peter Sell, David Stewart, William Wesley,
National Computer Security Center
Linda Vetter, Oracle Corporation
Helena Winkler-Parenty, Sybase Corporation
1400 Panel: Trusted Database Systems: The Tough Issues
John Campbell, Session Chair
Thomas Haigh, SCTC
Sushil Jajodia, George Mason University
Teresa Lunt, Stanford Research Institute
Bhavani Thuraisingham, The MITRE Corporation
Linda Vetter, Oracle Corporation
Helena Winkler-Parenty, Sybase Corporation
1600 Panel: Multilevel Object Oriented Database Systems
Ravi Sandhu, Session Chair, George Mason University
Sushil Jajodia, George Mason University
Teresa Lunt, Stanford Research Institute
Catherine Meadows, Naval Research Laboratory
Jonathan Millen, Bhavani Thuraisingham, The MITRE Corporation
TUESDAY, OCTOBER 2
C2 Microcomputer Security
Dennis Steinauer, Session Chair, National Institute of Standards and Technology
1030 C2 Security and Microcomputers
Angel Rivera, Sector Technology
1100 Functional Implementation of C2 by 92 for Microcomputers
Second Lieutenant Alan Berry, USAF/
Air Force Cryptologic Support Center
1400 Panel: Electronic Certification: Has Its Time Come?
Miles Smid, Session Chair, National Institute of Standards and
Technology
Jerrold Powell, Department of the Tresury
Christopher Martin, U.S. General Accounting Office
David Norem, Office of the Secretary of Defense
Oliver R. Smoot, Computer and Business Equipment Manufacturers
Association
1600 Panel: Defense Message System (DMS) Security
Robert W. Shirey, Session Chair, The MITRE Corporation
Thomas W. Clarke, Defense Communications Agency
Gregory L. Bergren, National Computer Security Center
WEDNESDAY, OCTOBER 3
0900 Panel: IEEE Computer Society
Limited Access to Knowledge and Information
Robert Melford, Session Chair, RJ Melford Associates
Ramon Barquin, Washington Consulting Group
J. Timothy Headley, Esq., Baker & Botts
Ralph J. Preiss, International Business Machines
Jane Robinett, Polytechnic University
1100 Panel: Computer Emergency Response Team: Lessons Learned
E. Eugene Schultz, Session Chair, Lawrence Livermore National
Laboratory
Richard Pethia, Software Engineering Institute, Carnegie Mellon
University
Jerome Dalton, AT&T
Patricia Sisson, U. S. Sprint
Ethics
Larry Martin, Session Chair, SISS
1400 Discerning an Ethos for the INFOSEC Community: What Ought We Do?
Eric Leighninger, Dynamics Research Corporation
1430 VIRUS ETHICS: Concerns and Resonsibilities of Individuals and Institutions
John Cordani, Adelphi University
Douglas Brown, OHC, Holy Cross Monastery
1500 Concerning Hackers Who Break into Computer Systems
Dorothy Denning, Digital Equipment Corporation
1600 Panel: National Institute of Standards and Technology Activities
Stuart Katzke, Session Chair,Chief, Computer Security Division
Dennis Steinauer, Manager, Computer Security Management and
Evaluation Group
Miles Smid, Manager, Security Technology Group
Robert Rosenthal, Manager, Protocol Security Group
Gene Troy, Manager, Computer Security Assistance Group
THURSDAY, OCTOBER 4
0900 Panel: Hackers: "Who are They?"
Dorothy Denning, Session Chair, Digital Equipment Corporation
Speakers: Frank Drake, Editor of W.O.R.M.
Katie Hafner, author
Gordon Meyer, Co-Editor, Computer Underground Digest
Sheldon Zenner, Attorney
Craig Neidorf, former publisher, Phrack
Track D - The Computer Security Tutorial Track
MONDAY, October 1
0900 Automated Information Security: Overview of the Tutorial
LTC Gary Smith, USA, Track Chair, Information Resources Management
College
0905 Security Overview and Threat
MAJ Russell K. Brown, USA, Information Resources Management College
1100 Information Security
Dennis Poindexter, Department of Defense Security Institute
1400 Life Cycle Management Requirements
Stephan L. Ball, Army Logistics Management College
1600 Risk Management
Irene Gilbert, National Institute of Standards and Technology
TUESDAY, October 2, 1990
1030 Data Security
Robert L. Payne, Information Resources Management College
1400 Physical, Personnel and Administrative Security
Maj. James D. Penner, USAF, Information Resources Management College
1600 Office Automation Security
Floyd Morgan, Army Logistics Management College
WEDNESDAY, October 3, 1990
0900 Telecommunications Security
Joe C. Daniel, General Service Administration
Ronald G. Mayfield, General Service Administration
1100 Software Controls
Lt Cdr Richard Fergusson, Royal Navy, Information Resources
Management College
1400 Trusted Systems Concepts
LTC Gary Smith, USA, Information Resources Management College
1600 Trusted Network Concepts
Rick A Siebenaler, National Computer Security Center
THURSDAY, October 4, 1990
0900 Tutorial Panel
LTC Gary Smith, USA, Session Chair, IRMC
Educator Sessions
Tuesday, October 2, 1990
1400 Should Computer Security Awareness Replace Training?
Joan Capel-Pohly, Session Chair, USAF/AFCSC
A Reassessment of Computer Security Training Needs
Dennis Poindexter, Department of Defense Security Institute
Panel: Dennis Poindexter, Cathy Weyhausen, Eugene Kozik
1600 Components of an Effective Training Program
Gary Smith, Session Chair, Information Resources Management College
Information Security: The Development of Training Modules
Corey Schou, John Kilpatrick, Idaho State University
Determining Your Training Needs
Adele Suchunsky, U.S. General Accounting Office
Panel: Lauresa Stillwell, Adele Suchinsky, Corey Schou, Roger Quane
Wednesday, October 3, 1990
0900 Training Vehicles: Cost Versus Effectiveness
Lauresa Stillwell, Session Chair, Department of State
Computer Based Training: The Right Choice?
Althea Whieldon, Department of Defense
Panel: Althea Whieldon, Tony Morgan, Cynthia Davis, Kenneth Barbi
1100 Training on a Shoe-String Budget
Althea Whieldon, Session Chair, Department of Defense
Awareness and Training in a World of Reduced Resources
Joan Capel-Pohly, USAF/AFCSC
Panel: Joan Capel-Pohly, Joe Pujals, Dale Barr
------------------------------