| 
				
				
				Collaborative Secure Knowledge Management By Bill McQuay, 
				Technical Advisor, Air Force Research Laboratory
				Secure 
				Knowledge Management By Dr. Bhavani Thuraisingham, National 
				Science Foundation
				
				
				DHS, National Cyber Security Division Overview By Hun Kim, 
				Deputy Director, Strategic Initiatives
				
				
				Economics, psychology, and sociology and the limitations they 
				impose on secure knowledge management By Andrew Odlyzko, 
				Digital Technology Center, University of Minnesota
				
				
				Faster Differentiation of Terrorists and Malicious Cyber 
				Transactions from Good People and Transactions By Peter P. 
				Chen, Foster Distinguished Chair Professor, Computer Science 
				Dept. Louisiana State University
				Some 
				Patterns of Knowledge Management in Secure Environments By 
				Alan D. Marwick, IBM Software Group, Fred Maymir-Ducharme, IBM 
				Federal Systems
				
				Cyber-Identity, Authority and Trust in an Uncertain World By 
				Ravi Sandhu, Laboratory for Information Security Technology, 
				George Mason University
				
				The 
				Challenges of Secure Knowledge Management By Margaret E. 
				Grayson, President & CEO, V-ONE Corporation 
			 
			 |