



<h2>October 1997 JUG Meeting </h2>



<div align="center"><center>







<table border="3" cellpadding="3" cellspacing="4">



    <tr>



        <td bgcolor="#6699FF"><h3 align="center" class="mpresents">Triangle Java Users Group Presents: </h3>



        <p align="center"><!--webbot bot="HTMLMarkup" StartSpan --><STRONG class="mtitle"><!--webbot BOT="HTMLMarkup" endspan -->Towards Secure



        Executable Content: Java Security<!--webbot bot="HTMLMarkup" StartSpan --></STRONG><!--webbot BOT="HTMLMarkup" endspan --><br>



        by <!--webbot bot="HTMLMarkup" StartSpan --><SPAN class="mpresenter"><!--webbot BOT="HTMLMarkup" endspan -->Gary McGraw<!--webbot bot="HTMLMarkup" StartSpan --></SPAN><!--webbot BOT="HTMLMarkup" endspan --><br>



        of <!--webbot bot="HTMLMarkup" StartSpan --><SPAN class="mcompany"><!--webbot BOT="HTMLMarkup" endspan -->Reliable SoftwareTechnologies<!--webbot bot="HTMLMarkup" StartSpan --></SPAN><!--webbot BOT="HTMLMarkup" endspan --></p>



        <p align="center" class="mdate">Monday, October 20, 1997 <br>



        6:30 PM - 9:00 PM</p>



        <p align="center" class="mlocation">LOCATION: MCNC



        Auditorium <br>



        3021 Cornwallis Road <br>



        Research Triangle Park, North Carolina</p>



        <p align="center" class="mphone">919.248.1800</p>



        </td>



    </tr>



</table>



</center></div>







<hr no shade>







<p>Did you know that whenever you surf the Web with Netscape



Navigator or Microsoft Internet Explorer you are probably using



Java? Java allows Web users to automatically download and run



platform-independent code from all over the world on their own



machines---sometimes without even knowing it. Java realizes many



of the promises of object oriented, reusable code that no longer



requires laborious porting efforts to cross platform boundaries.



As such, Java provides an important paradigm shift in computing.



However, together with the exciting benefits of Java come some



dangers. It is critical that Java performs in a secure



fashion---something that its designers tried to ensure. How did



they do it? How successful were they? Do the benefits of Java



outweigh the risks? This talk introduces and discusses the



current Java security model (touching on some of Java's famous



security flaws) as well as hinting at future improvements.</p>







<hr noshade>







<h3>AGENDA: </h3>







<p><b>6:30 - Meet, talk, snacks </b></p>







<p><b>7:00 Presentation </b></p>







<hr noshade>







<p><strong>Gary McGraw, Ph.D.</strong> is a research scientist at



Reliable Software Technologies. He holds a dual Ph.D. in



Cognitive Science and Computer Science from Indiana University



(where his advisor was Douglas R. Hofstadter) and a B.A. in



Philosophy from UVa. Dr. McGraw is a noted speaker, consultant,



and author on Java security. He recently completed &quot;Java



Security: Hostile Applets, Holes, &amp; Antidotes&quot; (John



Wiley &amp; Sons, 1997), with Professor Ed Felten of Princeton



University. McGraw and Felten also collaborated with MindQ to



produce the Java Security CD-ROM. McGraw second book,



&quot;Software Fault Injection: Inoculating Programs Against



Errors&quot; (John Wiley &amp; Sons) written with Dr. Jeff Voas



will be published in November. Besides his books, Dr. McGraw's



research in Cognitive Science and Software Engineering has



resulted in over forty technical publications. Dr. McGraw is



principal investigator on grants from the National Science



Foundation, Rome Labs, and the Defense Advanced Research Projects



Agency (DARPA).</p>







<p>Information about the speaker's book, plus a Java Security



mailing list can be found at: <a href="http://www.rstcorp.com/java-security.html">http://www.rstcorp.com/java-security.html</a>



.</p>







<h3>DIRECTIONS to MCNC: </h3>







<p><b>From Raleigh: </b><br>



Take I-40 West toward Durham and Chapel Hill. You will enter RTP.



Where I-40 splits, bear right onto the Durham Freeway North



(Highway 147). Take the Cornwallis Road Exit. At the end of the



exit ramp, bear right - cross back over the Freeway. MCNC is



located approximately 3/4 mile on the right. </p>







<p><b>From Durham: </b><br>



Get on the Durham Freeway South (Highway 147). Take the



Cornwallis Road exit. At the end of the ramp, bear right - MCNC



is approximately 3/4 mile on right. </p>







<p>For a map with directions, visit the <a href="http://trijug.org/mcnc/?/gotomcnc.html">MCNC web site</a>. </p>







<p>If anyone has questions, please contact <a href="mailto:kelly@interpath.com">Dan Smith</a> at (919)



460-3120. </p>











