Contents
* Systems
* Policy
* Verification
Panel 1: Brief history of Twenty Years of Computer Security Research
* Intrusion Detection
Panel 2: Near Misses and Hidden Treasures in Early Computer Security Research
* Information Flow
* Authentication an Key Exchange
Panel Discussion 3: Time Capsule - Twenty Years from Now