Subject: Electronic CIPHER, Issue 37, May 29, 2000 _/_/_/_/ _/_/_/ _/_/_/_/ _/ _/ _/_/_/_/ _/_/_/_/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/_/_/_/ _/_/_/_/ _/_/ _/_/_/_/ _/ _/ _/ _/ _/ _/ _/ _/ _/_/_/_/ _/_/_/ _/ _/ _/ _/_/_/_/ _/ _/ ==================================================================== Newsletter of the IEEE Computer Society's TC on Security and Privacy Electronic Issue 37 May 29, 2000 Jim Davis, Editor Hilarie Orman, Assoc. Editor Bob Bruen, Book Review Editor Mary Ellen Zurko, Assoc. Editor Anish Mathuria, Reader's Guide ==================================================================== http://www.ieee-security.org/cipher.html Contents: * Letter from the Editor * Conference and Workshop Announcements o Program for Computer Security Foundations Workshop (CSFW-13) o Upcoming calls-for-papers and events * News Briefs: o Using the 1999 S&P Symposium Proceedings on UNIX o LISTWATCH by Mary Ellen Zurko will return in the August issue o TC annual report for 1999 by Tom Berson o New security book series: Advances in Information Security * Commentary and Opinion o "Don't Blame the Victim", Editorial by Carl Landwehr o Robert Bruen's review of "Trust and Risk in Internet Commerce", by L. Jean Camp o Report on WWW9, by Mary Ellen Zurko o Report on Eurocrypt, by Richard Graveman o Report on NDSS, by Mahesh Tripunitara * Staying in Touch o Information for subscribers and contributors o Recent address changes * Interesting Links and New reports available via FTP and WWW (no new entries) * Reader's guide to recent security and privacy literature, by Anish Mathuria * List of Computer Security Academic Positions, by Cynthia Irvine * Technical Committee on Security and Privacy o Becoming a member of the TC o TC Officers o TC publications for sale ==================================================================== Letter from the Editor ==================================================================== Dear Readers: We are pleased to bring you this issue of Cipher! You will find excellent reviews of WWW9 (by Mary Ellen Zurko), Eurocrypt (by Richard Graveman), and NDSS (by Mahesh Tripunitara) along with Robert Bruen's book reviews, an editorial by Carl Landwehr, and Anish Mathuria's Readers Guide. In the August issue, we will have reviews for S&P 2000, CSFW, and NCISSE. If you are attending one of the many summer conferences or workshops and are willing to write a review (or 'volunteer' a colleague to write a review), please let me know. One item of note from the TC meeting at S&P in Oakland was the naming of the conference organizers for S&P 2001: Conference Chair:  Li Gong Conference Vice Chair: Heather Hinton Program Chair: Roger Needham Program Vice Chair: Martin Abadi Treasurer: Brian Loe Next year's symposium is clearly in good hands! Some of you may not be familiar with NCISSE; it's a colloquium that brings together academia, government, and industry to discuss, predominately, strategies to advance INFOSEC educational and research efforts at academic institutions. During the course of a panel session featuring IT directors from two US state governments, the issue of supporting the Uniform Computer Information Transaction Act arose. In anticipation of a guest editorial on this issue, I'd like to give you a homework assignment (yes, this WILL be on the final exam). The text for UCITA can be found at www.law.upenn.edu/bll/ulc/ulc_frame.htm and a few points of opposition are given at www.badsoftware.com/oppose.htm. This discussion was but a few minutes in a very productive three day colloquium; a summary of other presentations will be provided in August. While this particular problem is US-centric, the underlying issues are significant to all of us. As always, many thanks to our contributors and for their help in putting this issue together! Best regards, Jim Davis ==================================================================== Conference and Workshop Announcements ==================================================================== ____________________________________________________________________ 13th IEEE Computer Security Foundations Workshop Cambridge, England July 3-5, 2000 ____________________________________________________________________ 13th IEEE Computer Security Foundations Workshop July 3-5, 2000 Cambridge, England Sponsored by the IEEE Computer Society Preliminary Technical Program (Subject to Change) MONDAY July 3, 2000 8:45 - 9:00 Welcome E. Stewart Lee (Cambridge University), General Chair Paul Syverson (Naval Research Laboratory), Program Chair 9:00 - 10:00 Names and Certificates "Local Names In SPKI/SDSI 2.0", Ninghui Li (New York Univ.) "Reasoning about Trust and Insurance in a Public Key Infrastructure", Jonathan Millen (SRI) and Rebecca Wright (AT&T Labs -- Research) 10:00 - 10:30 Break 10:30 - 12:00 Invariants, Induction, Ranks, Languages, and Ideals "Towards automatic verification of authentication protocols on an unbounded network", James Heather and Steve Schneider (Royal Holloway, University of London) "TAPS: A First-Order Verifier for Cryptographic Protocols" Ernie Cohen (Telcordia) "Invariant Generation Techniques in Cryptographic Protocol Analysis" Catherine Meadows (Naval Research Lab) 12:00 - 2:00 Lunch 2:00 - 3:30 Automated Security Protocol Methods "Looking for a Needle in a Haystack -- Extending Automatic Protocol Generation to Three-Party Key Authentication and Key Agreement Protocols", Dawn Song and Adrian Perrig (UC Berkeley) "C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis" Anthony H. Dekker "An Executable Specification Language for Planning Attacks to Security Protocols", Luigia Carlucci Aiello (Univ. Roma "La Sapienza") and Fabio Massacci (Univ. Di Siena) 3:30 - 4:00 Break 4:00 - 5:30 Panel: Intrusion Detection Panel Chair: Teresa Lunt (Xerox PARC) Panelists: TBD TUESDAY July 4, 2000 9:00 - 10:00 Network Security "Analyzing single-server network inhibition", Tuomas Aura (Helsinki University of Technology), Matt Bishop,(UC, Davis), and Dean Sniegowski (UC, Davis) "Reasoning About Secrecy for Active Networks", Carl A. Gunter(U. Pennsylvania), Pankaj Kakkar (U. Pennsylvania), and Martin Abadi (Lucent, Bell Labs) 10:00 - 10:30 Break 10:30 - 12:00 Strands and Multiset Rewriting "Protocol Independence through Disjoint Encryption", Joshua D. Guttman and F. Javier THAYER Fabrega (MITRE) "Relating Strands and Multiset Rewriting for Security Protocol Analysis", Iliano Cervesato (ITT Industries), Nancy Durgin (Stanford), Patrick Lincoln (SRI), John Mitchell (Stanford), and Andre Scedrov (Penn.) "Optimizing Protocol Rewrite Rules of CIL Specifications", G. Denker (SRI), J. Millen (SRI) J. Kuester-Filipe (Tech. Univ. Braunschwieg), and A. Grau (Tech. Univ. Braunschwieg) 12:00 - 2:00 Lunch 2:00 - 3:30 Noninterference and Information Flow "Information Flow Analysis in a Discrete-Time Process Algebra", Riccardo Focardi (U. Venezia - Ca' Foscari), Roberto Gorrieri (U. Bologna), and Fabio Martinelli (IAT-CNR) "Possibilistic Definitions of Security -- An Assembly Kit --", Heiko Mantel (German Research Center for Artificial Intelligence (DFKI)) "Probabilistic Noninterference for Multi-threaded Programs", Andrei Sabelfeld and David Sands (Chalmers University of Technology) 3:30 - 4:00 Break 4:00 - 5:00 Invited Talk: "American Fish and Colossus, WW II Code breaking in Bletchley Park" Anthony E Sale, Hon. FBCS, ex Museums Director, Bletchley Park WEDNESDAY July 5, 2000 9:00 - 10:00 Java and Mobile Code Security "An Operational Semantics of Java 2 Access Control", Guenter Karjoth (IBM Research) "Confidentiality for Mobile Code: The Case of a Simple Payment Protocol", Mads Dam and Pablo Giambiagi (SICS) 10:00 - 10:30 Break 10:30 - 12:00 Types and Language-Based Security "Secure Introduction of One-way Functions", Dennis Volpano (Naval Postgraduate School) "How to Prevent Type Flaw Attacks on Security Protocols", James Heather (Royal Holloway), Gavin Lowe (U. Leicester), and Steve Schneider (Royal Holloway) "Secure Composition of Untrusted Code: Wrappers and Causality Types", Peter Sewell (Cambridge) and Jan Vitek (Purdue) 12:00 - Closing remarks. Presentation of Croquet Awards Lunch Field Trip to Bletchley Park ==================================================================== Upcoming Calls-For-Papers and Events ==================================================================== The complete Cipher Calls-for-Papers is located at www.ieee-security.org/cfp.html. The Cipher event Calendar is at www.cs.utah.edu/flux/cipher/cipher-hypercalendar.html ____________________________________________________________________ Conference and Workshop Calls-for-Papers June 2000-December 2000 ____________________________________________________________________ NGC2000 Web: www.cs.ucsb.edu/ngc2000 The 2nd International Workshop on Networked Group Communication, Stanford University, Palo Alto, California, USA, November 8-10, 2000. (papers due June 5, 2000) The aim of the Workshop is to allow researchers and practioners to present the design and implementation techniques for networked group communication. The focus of the Workshop is strictly on multicast and networked group communication. Authors are invited to submit papers on any issue related to networked group communication, including but not limited to: - multicast congestion control - multicast routing, naming, address allocation - scalability in multicast services - reliable and semi-reliable multicast protocols - novel multicast architectures - multicast security - multicast deployment related issues - multicast over heterogeneous media - multipeer applications (distributed interactive apps,games,DIS) - QoS issues with multicast - Pricing and economic model for multicast traffic - group management techniques - network engineering for multicast services Information on submission of papers, along with additional information on the conference can be found at the conference web site. FSTTCS 2000 Web: www.cse.iitd.ernet.in/~fsttcs20/ The 20th Conference on the Foundations of Software Technology and Theoretical Computer Science, New Delhi, India, December 13-15, 2000. (paper deadline extended to June 6, 2000) This annual conference provides a platform for presentation of original research results in fundamental aspects of computer science. It also provides an excellent forum for meeting and exchanging ideas with people who are at the frontline of software technology and theoretical computer science. A list of topics of interest along with detailed instructions for submitting a paper can be found at the conference web site. PROMS 2000 Web: PROMS2000.kt.agh.edu.pl Protocols for Multimedia Systems, Cracow, Poland, October 22-25, 2000. (papers due June 26, 2000) The PROMS2000 conference is intended to contribute to a scientific, strategical and practical cooperation between research institutes and industrial companies in the area of distributed multimedia applications, protocols, and intelligent management tools, with emphasis on their provision over broadband networks. An extensive list of topics of interest, along with instructions for submitting a paper, can be found on the conference web page. NORDSEC'2000 Web: www.ru.is/nordsec2000/ Fifth Nordic Workshop on Secure IT Systems - Encouraging Co-operation, Reykjavik, Iceland, October 12-13, 2000. (Submissions due August 1, 2000) The NORDSEC workshops were started in 1996 with the aim to bring together researchers and practitioners within IT security in the Nordic countries. The emphasis of the workshop is to encourage interchange and cooperation between the research community and the industrial and software development community. The theme of the workshop is applied security, i.e., all kinds of security issues for all kinds of information technology systems. We are in particular looking for contributions that deal with technology transfer and application of research in development. Furthermore, this year's NORDSEC will look more specifically at several Special Topics that are closely related to Computer Security, but are not often discussed in the same forum: Software Engineering, Virus Protection, and Privacy Protection. Details are to be found on the conference web site. NDSS'01 Web: www.isoc.org/ndss01/cfp The Internet Society 2001 Network and Distributed System Security Symposium, Catamaran Resort, San Diego, California, February 7-9, 2001. (Papers due: August 2, 2000) This symposium will foster information exchange among researchers and practioners of network and distributed system security services. The intended audience includes those who are interested in the practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than theory. A major goal of the symposium is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The Program Committee invites both technical papers and panel proposals. Submissions are solicited for, but are not limited to, the following topics: - Secure Electronic Commerce. - Intellectual Property Protection. - Network security policies. - Integrating Security in Internet protocols. - Attack-resistant protocols and services. - Special problems and case studies. - Security for collaborative applications and services. - Fundamental security services. - Supporting mechanisms and APIs. - Integrating security services with system and application security facilities and protocols. - Security for emerging technologies. - Intrusion Avoidance, Detection, and Response. - Network Perimeter Controls. - Virtual Private Networks. Complete submission information can be found at the conference web site. INDOCRYPT'2000 Web: www.isical.ac.in/~indocrypt First International Conference on Cryptology in India, Indian Statistical Institute, Calcutta, India, December 10-13, 2000. (Submissions due: August 10, 2000) Original papers on all technical aspects of cryptology are solicited. Please see the conference web page for details. ISADS 2001 Web: isads.utdallas.edu The Fifth International Symposium on Autonomous Decentralized Systems, Dallas, Texas, USA, March 26-28, 2001. (Papers and panel proposals due August 15, 2000) Driven by the continuous growth in the power, intelligence and openness of computer, communication and control technologies, possibilities and opportunities for realizing highly efficient and dependable business and control systems have been steadily increasing. Dynamically changing social and economic situations demand next-generation systems based on emerging technologies and applications. Such systems are expected to have the characteristics of living systems composed of largely autonomous and decentralized components. Such systems are called Autonomous Decentralized Systems (ADS). While ISADS 2001 will primarily focus on advancements and innovation in ADS concept, technologies, and applications related to the increasingly important topic of Electronic Commerce, other themes such as telecommunications and heterogeneous system and application integration will also be included. The scope of discussions on ADS shall include, but not be limited to: - Computer and communication architectures / intelligent network /Internet; - Heterogeneous distributed information / control systems; - Mobile agent /computer-supported cooperative works; - Distributed software development and maintenance; - Assurance, fault tolerance and on-line expansion; - Object management architecture /design pattern / application frameworks; - Emergent control and robotic systems; - Novel applications: electronic commerce, telecommunications, information service systems, manufacturing systems, real-time event management, office automation, traffic and transportation control, logistics systems. See the conference web site for details. FME2001 Web: www.informatik.hu-berlin.de/top/fme2001 FORMAL METHODS EUROPE Formal Methods for Increasing Software Productivity, Humboldt-Universitaet zu Berlin, Germany, March 12-16, 2001. (Papers, tutorial and workshop proposals due: August 25, 2000) FME 2001 is the tenth in a series of symposia organised by Formal Methods Europe, an independent association whose aim is to stimulate the use of, and research on, formal methods for software development. The theme of FME 2001 is Formal Methods for Increasing Software Productivity. This theme recognizes that formal methods have the potential to do more for industrial software development than enhance software quality--they can also increase productivity at many different points in the software life-cycle. The symposium committee is particularly interested in papers on the use of formal methods to increase productivity, for example on: - Codifying domain knowledge - Re-using components - Automatically generating code and/or documentation - Improving the efficiency of software testing - Enhancing analysis techniques for validation and verification - Exploiting commonalities within product families - Improving the maintainability and modifiability of software - Empirical studies of effects on productivity The symposium committee solicits full-length papers in two broad categories: 1. Use of formal methods, including reports on industrial use, substantial case studies, comparisons among methods, education, and technology transfer. 2. Development of formal methods, including motivating factors, theoretical foundations, extensions, manual procedures, and tool support. More information about the submission of papers, tutorial and workshop proposals can be found on the conference web site. OPENARCH'01 Web: www.openarch.org The Fourth IEEE Conference on Open Architectures and Network Programming, Hilton Anchorage Hotel, Anchorage, Alaska, April 22-23, 2001. (Papers, tutorial and workshop proposals due: October 1, 2000) The Fourth IEEE Conference on Open Architectures and Network Programming invites participation in this international forum on active, and programmable networks. Advances in open signaling and control, active networks, mobility management, transportable software, web-based services access, and distributed systems technologies are driving a reexamination of existing network software architectures and the evolution of control and management systems away from traditional constrained solutions. OPENARCH 2001 will foster a better understanding of these new network software architectures and techniques that are making the network interface more flexible and robust. Authors are invited to submit both full and short papers for consideration. Suggested topics include: - Advances in active networks - Open and innovative signaling systems - Programming abstractions and interfaces for networks - Service creation platforms - Programming for mobility - Programming for Quality of Service - Intelligent agents and trading - Distributed computing models and algorithms - Security in an open object world - Support for multiple control planes - Control and resource APIs and object representations - Performance of control architectures - Experimental architectures and implementation techniques - Enabling technologies, platforms and languages (CORBA, WWW, Java, ...) - Reliability of programmable networking technologies - Modeling of network services - Programmability support for virtual networks - Interactive multimedia, multi-party cooperation and groupware - Pricing and real-time billing - Secure transactions processing and electronic commerce - Active networks in telephony Complete instructions for submissions can be found on the conference web site. IHW2001 Web: chacs.nrl.navy.mil/IHW2001 4th International Information Hiding Workshop, Holiday Inn University Center, Pittsburgh, PA, USA, April 25-27, 2001 (submissions due December 7, 2000) Many researchers are interested in hiding information or, conversely, in preventing others from doing so. As the need to protect digital intellectual property grows ever more urgent, this research is of increasing interest to both the academic and business communities. Current research themes include: copyright marking of digital objects, covert channels in computer systems, detection of hidden information, subliminal channels in cryptographic protocols, low-probability-of-intercept communications, and various kinds of anonymity services ranging from steganography through location security to digital elections. Interested parties are invited to submit papers on research and practice which are related to these areas of interest. Further information can be obtained at chacs.nrl.navy.mil/IHW2001 or by contacting the program chair at ihw@itd.nrl.navy.mil ==================================================================== Conferences and Workshops June 2000-August 2000 ==================================================================== CITSS12 Web: www.cse-cst.gc.ca/cse/english/annual.html Canadian Information Technology Security Symposium, Ottawa, Canada, June 19-23, 2000. We invite you to attend Building Trust for a Secure Global Economy, the 12th Annual Information Technology Security Symposium. This year's symposium takes you inside some of the most important security issues facing businesses and governments today. CSE's weeklong symposium features one and a half days of tutorials, a one-day plenary session and more than 36 in depth presentations by Canadian and international experts in their fields. An industry leading vendor trade show with more than 40 booths completes the program. Presentations will focus on: - PKI issues and solutions - e-commerce/e-business - Critical Information Infrastructure Protection - Intrusion detection - Security in open source software See the symposium web page for more information. FIRST'2000 Web: www.first.org/conference/2000 The 12th Annual FIRST Conference on Computer Security and Incident Handling, Chicago, Illinois, USA, June 25-30, 2000. The Forum of Incident Response and Security Teams (FIRST, www.first.org) brings security incident response teams together including government, commercial, and academic organizations. The conference is a five day event, two days of tutorials and three days of technical sessions including refereed paper presentations, invited talks, and panel discussions. The focus of the FIRST'2000 conference is on the most recent practical advances in computer security in all its aspects. The full call for papers is at www.first.org/conference/2000. IC'2000 Web: www.cs.umanitoba.ca/~iwic/ Special session at IC'2000, the First International Conference on Internet Computing, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2000. This special session, New Paradigms in Computer Security, at IC'2000 is to present recent advances in computer system security. The main focus will be on new approaches for less vulnerable program generation and intrusion detection. More information can be found on the conference web site. CSFW-13 Web: www2.csl.sri.com/csfw/csfw13-cfp.html/ 13th IEEE Computer Security Foundations Workshop, Cambridge, England, July 3-5, 2000. This workshop series brings together researchers in computer science to examine foundational issues in computer security. We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories. Workshop attendance is limited to about 40 participants. More information can be found on the workshop web page. IRISH2000 Web: www.cs.may.ie/IWFM00/ 4th Irish Workshop on Formal Methods National University of Ireland, Maynooth, July 5-6, 2000. The fourth in a series of annual Irish Workshops on Formal Methods will be held in the National University of Ireland, Maynooth. We are now seeking submissions of work in progress papers in the area of formal methods, theoretical computer science, and mathematics covering the topics listed above. There will be opportunity for these papers to be submitted and reviewed as full papers, after the workshop has completed. For the theoretical day the Programme Committee seeks submissions of papers in the general area of formal methods, theoretical computer science, and mathematics, covering, but not restricted to, the following topics: formal systems, proof systems, mathematical models of computing, semantics, tools, industrial and teaching experiences. For the industrial day it is planned to offer industry-oriented tutorials. The idea is that these will provide an introduction to formal methods, and be tailored to meet specific needs. The conference web site is at www.cs.may.ie/IWFM00/ WITS'2000 Web: www.dsi.unive.it/IFIPWG1_7/wits2000.html Workshop on Issues in the Theory of Security, Geneva, Switzerland, July 7-8, 2000. The members of The IFIP WG 1.7 on "Theoretical Foundations of Security Analysis and Design" will hold their annual workshop as an open event to which all researchers working on the theory of computer security are invited. The W/S will be co-located with ICALP '00 (cuiwww.unige.ch/~icalp/). Its program will encourage discussions by all attendees, both during and after scheduled presentations on participants' ongoing work. More information can be found on the conference web page at www.dsi.unive.it/IFIPWG1_7/wits2000.html, or contact the program chair, Pierpaolo Degano, by email, degano@di.unipi.it, or phone, +39 050 887257, or fax, +39 050 887226. ACISP'2000 Web: www.isrc.qut.edu.au/acisp2K/ Fifth Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 10-12, 2000. Conference topics include theory, techniques, applications and practical experiences on any relevant topic including: authentication and identification, database security, mobile communications security, secure operating systems, security and cryptography policy, security management, commercial applications, key management and auditing, secure electronic commerce, security architectures and models, distributed system security, evaluation and certification, cryptology, access control, network security, smart cards, risk assessment and copyright protection. Please see the conference web page for details. PODC'2000 Web: www.podc.org/podc2000/ Nineteenth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Portland, Oregon, USA, July 16-19,2000. This year PODC will be held in conjunction with a workshop on middleware (information concerning the workshop will be posted on the PODC web site once it is available). In light of this, PODC especially encourages papers addressing distributed computing issues in building and using middleware. Topics of interest include: distributed algorithms and their complexity; specification, semantics and verification of distributed systems; issues relating to the design and use of middleware platforms; fault tolerance of distributed systems; cryptographic and security protocols for distributed systems; mobile computing; distributed computing issues in the Internet, including the Web; communication network protocols and architectures; multiprocessor/cluster architectures and algorithms; distributed operating systems and databases; consistency conditions, concurrency control and synchronization; distributed object-oriented computing. See the conference web site for details. FMCS'2000 Web: www.cs.cmu.edu/~veith/fmcs/ Workshop on Formal Methods and Computer Security, Chicago,Illinois, USA, July 20, 2000. Computer security protocols are notoriously difficult to get right. Surprisingly simple problems with some well known protocols have been found years after the original protocol was published and extensively analyzed. Our workshop goal is to bring together the formal methods and security communities. Security is a current hot topic in the formal methods community, and we hope that this workshop can help focus these energies. Topics of interest include descriptive techniques (specification languages, models, logics) and analysis techniques (model checking, theorem proving, and their combination), as applied to protocols for authentication, fair exchange, electronic commerce, and electronic auctions. More information can be found at the conference web site. RBAC'2000 Web: www.acm.org/sigsac/rbac2000.html Fifth ACM Workshop on Role-Based Access Control, Technical University of Berlin, Berlin, Germany, July 26-28, 2000. The ACM workshops on RBAC bring together researchers, developers, and practitioners to discuss the application of RBAC to both traditional and emerging systems and the development of new modeling paradigms for future applications. The workshop invites participation from the database, network, distributed systems, operating systems, security and application communities. See the workshop web page for details. MSWiM'2000 Web: www.tlc.polito.it/mswim Third ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, in conjunction with MobiCom 2000, August 6-11, 2000, Boston, MA, USA. This workshop will focus on all aspects of wireless systems, particularly modeling analysis and simulation in wireless communication. In its third year, the 2000 International ACM Workshop on Modeling and Simulation of Wireless and Mobile Systems, will take place in Boston, MA, just after the International Conference on Mobile Computing and Networking (MobiCom 2000) to be held in Boston, August 6-11, 2000. This is an excellent opportunity to partake in two events covering a wide range of research in wireless and mobile systems. Authors are encouraged to submit both theoretical and practical results of significance. Demonstration of new tools/simulation languages are very welcome. A complete list of topics of interest are given on the workshop web page. 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing & Communications, Boston, Massachusetts, USA, August 11, 2000. In conjunction with ACM MobiCom 2000. The introduction of mobility raises a number of new research issues. This workshop is devoted to discrete algorithms and methods in the context of mobile and wireless computing and communications. Contributions are solicited in all areas related to mobile computing and communications where discrete algorithms and methods are utilized, including, but not limited to: distributed algorithms frequency allocation; scheduling location tracking; site allocation multi-hop packet radio networks; wireless networks synchronization; cryptography and security error correcting codes; handover (handoff) telecommunications; modeling optimization; routing satellite communication. SAC2000 Web: www.cacr.math.uwaterloo.ca/conferences/2000/SAC2000/announcement.html Seventh Annual Workshop on Selected Areas in Cryptography, August 14-15, 2000, Waterloo, Ontario, Canada. Workshop Themes: Design and analysis of symmetric key cryptosystems; Primitives for private key cryptography, including block and stream ciphers, hash functions and MACs; Efficient implementations of cryptographic systems in public and private key cryptography; Cryptographic solutions for web/internet security. USENIX Web: www.usenix.org/events/sec2000 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000. The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security and applications of cryptography. Please see the conference web site for details. CHES'2000 Web: www.ece.WPI.EDU/Research/crypt/ches Workshop on Cryptographic Hardware and Embedded Systems, Worcester Polytechnic Institute, Worcester, Massachusetts, USA., August 17-18, 2000. The focus of this workshop is on all aspects of cryptographic hardware and embedded system design. Of special interest are contributions that describe new methods for efficient hardware implementations and high-speed software for embedded systems. The topics of interest include but are not limited to: Computer architectures for public-key cryptosystems; Computer architectures for secret-key cryptosystems; Reconfigurable computing and applications in cryptography; Cryptographic processors and co-processors; Modular and Galois field arithmetic architectures; Tamper resistance on the chip and board level; Architectures for smart cards; Tamper resistance for smart cards; Efficient algorithms for embedded processors; Special-purpose hardware for cryptanalysis; Fast network encryption; True and pseudo random number generators, CRYPTO Web: www.cse.ucsd.edu/users/mihir/crypto2k Santa Barbara, California, USA, August 20-24, 2000. Crypto 2000 is organized by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. ==================================================================== News Briefs ==================================================================== News briefs from past issues of Cipher are archived at www.ieee-security.org/Cipher/NewsBriefs.html ================================================================== Using the 1999 S&P Symposium Proceedings CD on UNIX At the Oakland symposium this year, I heard some complaints that the CD-ROM distributed at the 1999 meeting containing the first 20 years of proceedings does not work properly on Unix platforms. When the proof copy of the CD came in last spring, I tried it briefly on a Solaris platform and thought it worked, so I was surprised and dismayed to hear this. Happily (with Lee Badger's help), I found Doug Kilpatrick of NAI Labs who was running Linux on his laptop. Doug tried it out and found that the problem seems to stem from case-sensitive operations: Acrobat Reader tries to open a file named "DATA/01234567.PDF" when the file on the CD is actually "data/01234567.pdf". In Unix, case matters, so the operation fails. Doug proposes several alternative solutions for Unix users to try. Thanks very much to Doug for his work on this problem. --Carl Landwehr Doug Kilpatrick's advice: 1. For Linux, the iso9660 fs driver takes some options that might help. Try mounting the cd with a command similar to: mount -t iso9660 -o norock,map=n,check=r /dev/cdrom /mnt/cdrom Other versions of Unix may have similar options. 2. Copy the file tree to your hard drive and rename all the files in the tree. For example: $ mkdir ~/oakland99 $ cd /mnt/cdrom $ tar -cf - . | (cd ~/oakland99 ; tar -xf -) $ cat > ~/bin/tolower #!/bin/bash if [ $# -ne 1 ]; then echo "useage: tolower " echo "renames the file, changeing any upper case" echo "characters to lower-case" return 1 fi mv $1 $(dirname $1)/$(basename $1 | tr 'A-Z' 'a-z') ^D $ chmod u+x ~/bin/tolower $ cd ~/oakland99 $ find * | sort -r | xargs -r -n 1 ~/bin/tolower 3. Use LD_PRELOAD to replace the open() call with code that does conditional case-smashing before executing the system call. (I've attached some x86 glibc-linux-specific sample code. Its painfully ugly, at least partially due to some GNU-ism's that make this more difficult.) #include #include #include #include #include #include #include #include #include /* * gcc -shared -O2 -Wall -g -c case-smash-open.c * ld -Bsymbolic -shared -o case-smash-open.so case-smash-open.o * export LD_PRELOAD=`pwd`/case-smash-open.so * * unset LD_PRELOAD */ int errno; int trap_open(const char *pathname, int flags, mode_t mode) { long __res; __asm__ volatile ("int $0x80" : "=a" (__res) : "0" (__NR_open),"b" ((long)(pathname)),"c" ((long)(flags)), "d" ((long)(mode))); do { if ((unsigned long)(__res) >= (unsigned long)(-125)) { errno = -(__res); __res = -1; } } while (0); return __res; } int open(const char *pathname, int flags, ...) { va_list ap; char newpath[4096]; mode_t mode; int i; int retval; int smash = 0; for (i = 0; pathname[i] != '\0' && i < (sizeof(newpath)-1); ++i) { if (pathname[i] >= 'A' && pathname[i] <= 'Z') newpath[i] = pathname[i] - ('A' - 'a'); else newpath[i] = pathname[i]; } newpath[i] = '\0'; if (newpath[i-1] == 'f' && newpath[i-2] == 'd' && newpath[i-3] == 'p') smash = 1; if (flags & O_CREAT) { va_start(ap, flags); mode = va_arg(ap, mode_t); retval = trap_open(smash?newpath:pathname,flags,mode); va_end(ap); } else { retval = trap_open(smash?newpath:pathname,flags,0); } return retval; } ___________________________________________________________________ Exercise for the reader: does the above make this issue of Cipher into an example of mobile code? ___________________________________________________________________ ===================================================================== List Watch by Mary Ellen Zurko will return in August 2000 ===================================================================== The Cipher web site contains TC Chairman Tom Berson's annual report for 1999. The URL is web.ieee-security.org/Cipher/PastIssues/E37.May29-00/TC-Report1999.pdf ===================================================================== Kluwer Academic Publishers Announces The Kluwer International Series on ADVANCES IN INFORMATION SECURITY The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer and network security, but related areas such as fault tolerance and software assurance. The series will serve as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact either Sushil Jajodia or Lance Wobus: Sushil Jajodia Consulting Editor Dept. of Information & Software Engineering Mail Stop 4A4 George Mason University Fairfax, VA 22030-4444 Phone: 703-993-1653 Fax: 703-993-1638 Email: jajodia@gmu.edu Lance Wobus Acquisitions Editor Kluwer Academic Publishers 101 Philip Drive Norwell, MA 02061 USA Phone: 781-681-0602 Fax: 781-871-7507 Email: lance.wobus@wkap.com Received @Cipher May 10, 2000 ==================================================================== Commentary and Opinion ==================================================================== Book reviews from past issues of Cipher are archived at www.ieee-security.org/Cipher/BookReviews.html, and conference reports are archived at www.ieee-security.org/Cipher/ConfReports.html. ===================================================================== Book Review by Robert Bruen, Cipher Book Review Editor, bruen@exile.ne.mediaone.net Trust and Risk in Internet Commerce, by L. Jean Camp. MIT Press, 279 pages, bibliography, $32.95, ISBN 0-262-03271-6 In spite of the fact that many, old time net purists cringe when they see marketing material as the peruse the web, commercial activity is really a natural evolution of network use. The use of such a marvelous communication medium for any communication should not be such a surprise nor cause dismay. Given that business as usual is taking place over the net, there is lots of adjusting for the business world to do. Although business can be conducted almost as usual, the net offers some features that have tremendous consequences that must be taken into account in order for success to be achieved. Think about be the extent of network - it's everywhere. And it's fast, not just when you send out something, but when that something generates a response. It's convenient - put up a web site and your customers come to you. Make a change and it is there immediately for everyone to see. What more could a business want? For starters, trust and risk are elevated as concerns. Knowing your customer is more difficult. Keeping track of them is bit harder. And by the way, understanding the technology is a bit beyond opening that little lemonade stand. The issues go beyond just security, not that security is a small feature of internet commerce, because without secure transactions there will be no internet commerce. However, security is about trust and risk. As Bruce Schneier puts it, "security is a process." Nothing is totally secure, but rather one engages in a constant assessment and management of risk, making tradeoffs every day. Underneath this approach is the problem of trust. Trust is a fundamental piece of our interaction with other people. When it is broken, it is very hard to repair. Think about money for a moment. The US currency has been off the gold standard since Nixon. The money in your pocket is only worth as much as there is trust in the US government to back it up. Of course money is important to any business venture, so trust requires procedures, rules, regulations and laws to govern how the exchange of money for goods and services happens. For the most part, this is all well understood. Now, enter business on the net - not so well understood. Jean Camp has pulled together the technology, commerce and the ideas of trust into a wonderful, readable book. She clearly understands the technology as she explains the basics of TCP/IP and cryptography, but she also explains money, commerce and how trust works in relation to the technology. She delves into privacy, security and data with insight that comes from extensive research. The book is detailed without being boring and the switching between the topics is smooth, so that the reader does not have stop to ask how she jumped to some point from another point. I hope that lots of people will benefit from reading this book. It is an intelligent presentation of one of the most far reaching changes in our way life today. This is contribution to help us understand the problem, as she obviously does. I highly recommend it. ===================================================================== Don't Blame the Victim Editorial by Carl Landwehr May 21, 2000 Following the I Love You virus and its copycat variants, there was the usual spate of news articles and discussions about why this happened, whether it should have been prevented somehow, what this or that organization did to respond, and whose fault it was. In many discussions, there has been a strong a note that since we can't know what the next virus will look like, we need to focus our efforts on educating users not to open "suspicious" attachments. This is blaming the victim. I fully agree that security is not just a matter of technology. In many environments, the weak link in our defenses is the human one. Organizations do need to worry about "social engineering" attacks and need to be sure that their employees are appropriately informed about the possibility of such attacks and how to respond to them. And they need to be aware of the importance of configuring their systems safely and keeping up with releases that patch security holes. But I cannot stomach the idea that users must be expected to guess what is safe for them to open and what isn't. For example, here is an extract of testimony before Congress following the recent incident, as reported by the Associated Press: The easiest way [to stop future viruses] is to educate people about computer "hygiene", including not opening unexpected e-mail attachments, said Harris Miller, president of the computer group Information Technology Association of America. "This bug was passed along because people were opening e-mail that they shouldn't," said Miller. [...] "Why, in a professional environment, would you open something that says `I love you?' Good common sense should tell you that if it's not coming from someone who should be saying `I love you,' then you shouldn't open it." Of course, in many cases people who received this message did receive it from someone they knew and trusted. Mr. Miller is not alone in his opinion, however. I heard similar comments from other "expert" sources on television and radio interviews as well. For technologists to suggest that foolish users who unwisely open dangerous attachments should be the focus of the community's attention in the wake of the recent virus attacks is disingenuous to say the least. To think that users should be able, by looking at the name and extension of a file, to guess whether it is safe to open it or not, is silly, and to suggest that the security of our systems should depend on users' intuition in this respect is irresponsible. Technology that would permit attachments to be opened in a separate domain with limited privileges has been known for, conservatively, 25 years. Of course, today's dominant operating systems and applications don't exploit this knowledge very effectively. Instead, they seem intent on integrating applications so closely that any application will have complete access to every other application's data and programs without any notification to or permission from the user. When problems occur because developers seem to pay little attention to the security risks entailed, for example, when programming language support is added to applications, it is an affront to technologists to suggest that the problem is with uneducated users. Perhaps there is room for a little hope. Microsoft's initial response to the latest virus amounted to "not our problem -- anyone can write a virus for any platform." But a week later, they released a patch that will add at least a little bit of isolation between Outlook's mail facilities and the attachments users open. The "price" of this added security, in terms of user inconvenience? A Palm Pilot user wishing to resynchronize address books will be confronted with a dialog box asking whether it's OK to do that. What this seems to say is that, because the developer was unwilling to provide this degree of isolation in the first place, the world was left vulnerable to such elementary attacks as we saw wasting resources around the world on May 4. I urge you to speak up in defense of the right of users to be naive and of the responsibility of developers to produce systems that are not only convenient but also safe against well-known attacks. --Carl Landwehr [Opinions expressed above are my own and not necessarily those of Mitretek Systems] ____________________________________________________________________ Conference Reports ____________________________________________________________________ The Ninth International World Wide Web Conference (WWW9) May 15-19, 2000 Amsterdam Review by Mary Ellen Zurko The Ninth International World Wide Web Conference (WWW9) was held on May 15-19, in Amsterdam. There were a number of activities of interest to Cipher readers, which I'll mention. I will only provide some detail on the refereed paper sessions on Security and ECommerce, which I attended. On tutorial day, Avi Rubin gave the "Web Security" tutorial, Ricarda Weber gave the "Digital Payment Systems" tutorial, and Lorrie Faith Cranor gave one on "Internet Privacy and P3P". I opted for a Web area that was totally new to me, and went to an excellent full day tutorial by Ken Holman called "An Introduction to XSLT and XPath". During the 3 main conference days, there were plenaries, and tracks for refereed papers, W3C reports, panels, and 3 special tracks; Culture, Web and Industry, and Web/Internet and Society. A theme running through the conference was Mobile Web, with at least 3 keynotes, 1 plenary panel, 1 refereed paper session, 2 Web and Industry track sessions and several posters. Best paper was awarded to "Graph structure in the Web" by 8 authors from 3 companies (AltaVista, IBM, and Compaq). The W3C track has a session on "Building a `Web of Trust'" with talks on XML Signature, P3P -The Platform for Privacy Preferences, and Semantic Web Initiative. There was an "IPR Protection" session in the Culture track, with talks on "Digital Watermarking: A Solution to Electronic Copyright Management Systems Requirements" (Alessandro Piva, Universita' di Firenze Dip. Elettronica e Telecommunicazioni, Italy), "Copy Left UNESCO OCCAM Point of View" (Pier Paolo Saporito, UNESCO OCCAM Coordinatore Generale, Italy), "Digital Watermarking of 3D Models" (Jian Zhao, Fraunhofer Center for Research in Computer Graphics, USA) and "Copyright Limitation for Art On-line" (Christiaan A. Alberdingk Thijm, Institute for Information Law, University of Amsterdam, The Netherlands). "WAP Security Schemes in Today's Internet Environment" (Espen Kristensen, Ericsson) was part of the Mobile Web sessions in the Web and Industry Track. There was a panel on "The Role of Informational Property Rights in Digital Architecture" with Brian Fitzgerald (Southern Cross University), Bernt Hugenholtz (Institute for Information Law, University of Amsterdam), and Leif Gamertsfleder (Deacons Lawyers). There were posters on "Auditing Web Sites Using Their Access Patterns" and "Developing a Model of Trust for Electronic Commerce: An Application to a Permissive Marketing Web Site". In the Semantic Web Infrastructure session on Developer's Day, Dan Connolly of W3C presented "Specifying Web Architecture with Larch". He is currently using Larch to develop a formal specification to be used to determine if a Web page should be considered a trustworthy authority on a particular topic, and he hopes to have it in about 3 months. The first paper in the Security session (chaired by Lorrie Faith Cranor) was "Risks of the Passport Single Signon Protocol" by David Kormann and Aviel Rubin. Avi presented. Avi motivated the need for single signon with examples of the sorts of places passwords are being used on the web. Then he discussed how Passport works. Sites using a Passport server for authentication will redirect unauthenticated requests to their passport server. If the browser does not have a cookie for that passport server, it will provide a login page and send the cookie to the browser when the user authenticates. If/when the user is successfully authenticated (via the login page or a preexisting cookie) the server will redirect the browser back to the original site, with tokens in the header indicating the request is authenticated. The original site will then send its own cookie to the browser, to eliminate any further redirections in that session. Avi discussed a bug that they had discovered where logging out of Passport did not actually do so (with a Netscape browser). He also discussed key management issues, which are underspecified in the available Microsoft white paper. A number of other attacks are outlined in the paper. During the question session, Avi was asked what his recommendation would be, and he indicated that Kerberos has a good track record, but requires unKerberized sites to get new software. The next paper was "Design and Implementation of an Access Control Processor for XML Documents" by Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Sabrina presented. The group has implemented a model of access control tied to XML schema and documents (presently only on the read action). Access control information can be applied to collections of documents or instances, and on elements/attributes. Exceptions (using denials) and overrides (hard and soft statements) are also supported. Access control information is determined via a process of parsing the XML document, labeling the parsed tree with access control information from the parse and the DTD, pruning the tree based on exceptions and overrides, and unparsing the tree to apply it to the document. Questions centered on implementation issues such as performance. The last paper of the session was "Supporting Reconfigurable Security Policies for Mobile Programs" by Brant Hashii, Scott Malabarba, Raju Pandey, and Matt Bishop. Brant presented. He began by motivating the need for mobile code security, citing the recent ILOVEYOU bug. The security model they have implemented is built around an event/response mechanism, which allows a response (currently deny or audit) to be executed whenever a security-related event is recognized by their JVM. Programmers can extend the recognized events and the response types. Their principals are methods, classes, or groups of classes. Policy can be altered dynamically, to respond to internal changes or new threats. Brant presented the performance results of the benchmarks they ran. The first paper in the E-Commerce session (chaired by Christine Vanoirbeek) was "An Entropy Approach to Unintrusive Targeted Advertising on the Web" by John Tomlin. Because of the math, this was a hard paper to present, and John did an excellent job getting the concepts across (which I am not able to do justice to). His work extends a linear programming approach to unintrusive customizing techniques. It divides users into buckets and ads into types, while keeping advertisers discreet. It uses nonlinear terms to "more or less evenly distrbut[e] the ads between groups of users" with a "bias toward the group(s) with the higher click-through probability". The second paper was "A Web marketing System with Automatic Pricing" by Naoki Abe and Tomonari Kamba. Naoki presented. Their system will automatically set the best sales prices based on past prices and sales. Item category, and initial and minimum prices are specified for each item. Their algorithms have a goal of maximizing total revenue over all items. They tested algorithms based on stochastic approximation and linear approximation, They did preliminary evaluation on simulated data, where the algorithms converged on an optimal price. The questions after the presentation centered on user acceptance of the notion of automatic pricing, and were quite spirited. The last paper of the session was "MicroISPs: Providing Convenient and Low-Cost High-Bandwidth Internet Access" By Jose Brustoloni and Juan Garay. Jose presented. The architecture is targeted at ISPs providing internet access at installations such as airports and conference centers. MicroISPs connect their LAN to conventional ISPs via a router. The architecture supports both online and offline charging of the users by the MicroISP. It uses IPSec's IKE for exchange of authentication keys with the paying users. It uses IPSec's AH to authenticate packets, so that non-paying packets can be detected and dropped. The architecture requires MicroISPs to be certified by an authority trusted by the user (thus the user must bring some notion of which authorities they trust with them, in some form), while users certificates can be self-signed (as payment is assumed to be the most important issue for the MicroISP). Encryption of information is optional, as sufficient protection may be occurring at some other level (such as a corporate VPN). May 22, 2000. ===================================================================== Eurocrypt'2000 May 15-18, 2000 Report by Richard Graveman Editor's note: Richard Graveman's excellent report contains notation that is best viewed with a browser. The URL for the report is www.ieee-security.org/Cipher/ConfReports/2000/CR2000-Eurocrypt.html ===================================================================== NDSS 2000 February 2-4, 2000 Report by Mahesh V. Tripunitara The Network and Distributed System Security (NDSS) Symposium for the year 2000 was held February 2-4 in San Diego, California, USA. As with the previous symposium, the location was the very tasteful Catamaran Resort. The resort offered not only excellent facilities for the presentations and discussions, but also opportunities for activities outside the symposium. The first day of NDSS 2000 consisted of pre-conference tutorials on such topics as Network Security Protocol Standards, Deployed and Emerging Security Systems for the Internet, Mobile Code Security, Cryptography and Intrusion Detection technology. The remainder of this note summarizes the program events that took place over the next two days. Please note that all the papers and several of the presentations are available online at www.isoc.org/ndss2000/proceedings/. Day 1 The general chair, Steve Welke, and the program co-chairs, Gene Tsudik and Avi Rubin, began the symposium by welcoming all attendees and discussing the nature of NDSS. Steve Welke pointed out that the symposium emphasizes applied work over more theoretical work in information security. Gene Tsudik remarked that the NDSS has a unique profile and offered some statistics: there were 51 submissions, as compared to 36 to the previous symposium, of which 15 were accepted. Each paper went through a minimum of three reviews. The first session, titled "Software Assurance," was chaired by Gary McGraw. The first presentation, by D. Wagner, was based on a paper titled "A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities." He pointed out that buffer overruns have been going up as a percentage of the number of CERT advisories. He proposed recasting the problem as an integer range analysis problem involving two integers: the allocated size of a buffer and the number of bytes currently in use. The standard C library functions are then modeled as imposing constraints on the ranges of the two quantities. Any algorithm for integer range analysis can then be used. He reported that two previously unknown buffer overflow problems were found in Sendmail, but neither of these had security implications. The second presentation, by R. Sekar, was based on a paper titled "User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement." He proposed user-level system call interposition as a strategy for intrusion detection. The interposer has both pre- and post-system call extensions. The architecture of the interposer is object-oriented, and consists of supervisor objects that are layered on top of an architecture/OS independent portion, that is in turn layered on top of an architecture/dependent portion. He also presented performance statistics: the interposer has low overhead (2%) under low and high loads for some applications (e.g., gzip), but has higher overhead (35%) under high loads for some others (e.g., httpd). The second session, titled "Group and Multicast Security," was chaired by Thomas Hardjono. The first presentation in the session, by O. Rodeh, was based on a paper titled "Optimized Rekey for Group Communication Systems." He presented a distributed secret-key management approach for group communication. He differentiated between a centralized key management scheme (e.g., keygraphs) and his scheme. His scheme involves the use of balanced tree to group principals, as with keygraphs; but each group chooses a leader who is in charge of negotiating mutual keys between groups. He then argued for the safety and scalability properties of his solution. The second presentation, by R. Canetti, was based on a paper titled "An IPSec-based Host Architecture for Secure Internet Multicast." He spoke about a host-based architecture for secure multicast. He focused on a Multicast Internet Key Exchange (MIKE) module that is deployed on each host to handle group membership and control, and of a Sender Authentication Module (SAM) that interacts with MIKE for key material. He pointed out that MIKE is only a framework that can deploy within it one of several multicast key exchange protocols. He then presented some test results based on a deployment on Linux systems. The third session was a panel moderated by James Ellis and Gary McGraw. The title of the session was "The Economics of Security." The panelists were Nicholas Economidis, Nick Pasciullo, Fred Chris Smith, and Laurie Wagner. The panel discussed the business and legal aspects of information security. Nick Economidis gave an industry perspective, Nick Pasciullo and Fred Smith gave legal perspectives, and Laurie Wagner gave a non-profit organization’s perspective. Nick Economidis opined that information security currently consists of guarantees with security assessments, and in the future will involve sureties from software companies. Nick Pasciullo lamented that lawsuits are ineffective, that technological solutions are incomplete, and that security will become pertinent and effective when Wall Street includes it in the list of items they use to value a company. Fred Smith gave a very entertaining talk replete with pertinent cartoons, and opined that litigation will drive product development from the information security perspective. He said that false insurance claims pertaining to information security will turn out to be a huge, illegal business soon. Laurie Wagner pointed out that property damage lies at the heart of information security issues: only if property damage is involved is there a pertinent security issue. Most questions to the panelists pertained to insurance and legal issues around information security, and the cost-benefit issues associated with security solutions. The final session of the day, titled "Protocols," was chaired by Marc Dacier. The first presentation in the session was by A. Perrig, and he spoke on "A First Step Towards the Automatic Generation of Security Protocols." He presented an automatic protocol generator that takes as input information encoded using the specification language security properties of the desired protocol, a metric function, and an "initial setup." It searches a suite of protocols and finds one that matches the inputs. The metric function is assumed to be monotonically non-decreasing, and typically depicts the performance overhead associated with a protocol primitive. His discussion was motivated by an example. He discussed generation of an optimal protocol given some input, and a pruning algorithm to speed up the generator. The second presentation was titled "A Revocation, Validation and Authentication Protocol for SPKI-based Delegation Systems" by Y. Kortesniemi. He stressed the advantages of using the Simple Public Key Infrastructure (SPKI) for authorization over Access Control Lists (ACLs), and then focused on the certificate validation and revocation problem for SPKI. He commented that while validation and revocation have been previously discussed in the context of SPKI, several details were missing. He discussed some of these details, including the state machine for a verification protocol, and proposed several changes to the SPKI. The last presentation was titled "Secure Border Gateway Protocol- Real World Performance and Deployment Issues" by S. Kent. He discussed a prototype implementation and proof of concept deployment of S-BGP. The tests were geared towards addressing the following two issues: whether S-BGP does offer the security to the control traffic it is supposed to, and the overhead S-BGP introduces over BGP. His results were encouraging, and he proposed security-related enhancements to the Internet infrastructure that will further improve performance and security in this context. There was then an impromptu "Birds Of a Feather" session by Peter Brundrett from the Windows 2000 security group at the Microsoft Corporation on "The Security Architecture of Windows 2000." He spoke extensively on all the security features available within Windows 2000. In particular, he pointed to Kerberos v5, L2TP and IPSec support, and access to security services via the SSPI and CryptoAPI interfaces. He also discussed protocols used to negotiate security parameters between clients and servers, and how tightly security is integrated into Windows 2000 networking. Prof. Gene Spafford from the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University was the banquet speaker for the evening. He gave a captivating and entertaining talk on the Y2K related panic. He delved into history to discuss similar episodes, such as during the time of Y1K. He said that the problem lay in technical people not being able to place and see things in a broader context. He said that this is a cause for the lack of public awareness, and opined that IT professionals need to be aware of the role of the media and the law. In conclusion, he pointed out that we lose more from loss of productivity because of software unreliability than break-ins, and that to promote reliability, we need to move towards stripped down systems as opposed to cramming more features into them. He warned that laws are being drafted to address software quality and this would soon have an impact on the IT industry. Day 2 The first session of Day 2 was titled "Protocols II" and was chaired by Paul Van Oorschot. The first presentation was based on a paper titled "Analysis of a Fair Exchange Protocol" by V. Shmatikov. He spoke about a particular contract signing protocol, and the use of the Murj finite state analysis tool to show the weakness in the protocol. The use of Murj also aids in repairing the protocol. The talk’s intent was to showcase Murj. The second presentation, by M. Steiner, was based on "Secure Password-based Cipher Suite for TLS." He spoke about the Transport Layer Security (TLS) protocol and its predecessor, SSL. He gave several reasons why the use of PKI as part of TLS is unsuitable for some applications. One of the reasons was that PKI is not "lightweight" enough. He then discussed the suite of EKE key exchange protocols that are based on passwords. He then discussed the integration of one version of EKE, the DH-EKE, into TLS. The final presentation in the session was by T. Rabin on "Chameleon Signatures." His presentation discussed two problems: sender non-repudiation and controlled dissemination. He discussed chameleon hash functions, that have the property that the holder of "trapdoor information" (which acts like a public key) can easily find several inputs that hash to a particular value. Using chameleon hash functions and a signature algorithm, he showed how it can be arranged that the sender cannot repudiate a signature because he does not have access to the trapdoor information, and a receiver cannot disseminate the information in an uncontrolled fashion as he is capable of finding several inputs that hash to the value attached to the document. He also discussed the practical implications for the scheme. The second session was titled "Intrusion Detection" and was chaired by Douglas Maughan. The first presentation, by H. Debar, was based on "A Lightweight Tool For Detecting Web Server Attacks." He discussed why "standard" network intrusion detection tools are inappropriate in the specific context of detecting intrusions against web servers, given the constraint that the detection must be in "real time." He then presented an informal categorization of attacks against web servers, and a signature based scheme to detect those types of attacks. He also presented an architecture to support the scheme, and presented statistics from running the tool at a commercial site for extended periods of time. The second presentation, by J. Loyall, was based on "Building Adaptive and Agile Applications Using Intrusion Detection and Response." He spoke about the CORBA DOC paradigm and the Quality Objects (QuO) framework that is based on it. He then discussed the use of QuO as middleware for intrusion detection. The middleware is typically situated between a client application and its corresponding ORB proxy. He presented integration scenarios, especially of security within QuO, and experiences to date from the use of such a framework with COTS software. The third session was chaired by Virgil Gligor and was titled "Distributed Systems." The first presentation was by D.Shands on "Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies." She presented Secure Virtual Enclaves (SVE) as an infrastructure for multiple organizations to share information based on a security policy. She argued that SVE can be incorporated into COTS as middleware, with no change to existing code. She presented the SVE component architecture and the notion of enclaves as it pertains to SVE. She also presented example policies that can be supported within the framework. She commented on the performance and scalability features based on a prototype implementation. The second presentation, by K. Hildrum, was based on "Security of Encrypted rlogin Connections Created with Kerberos 4." She showed that rlogin sessions, protected using Kerberos v4, are susceptible to TCP session hijacking. She said that her observations indicated that the Kerberized version of rlogin (and rsh) does not use the "standard" encryption techniques from Kerberos that are immune to replay, but one that is. She pointed out (as did an audience member that happens to be one of the creators of Kerberos) that this is not a flaw fundamental to Kerberos, but its implementation in version 4. The final presentation, by M. Humphrey, was based on "Accountability and Control of Process Creation in Metasystems." He spoke about the metasystem concept: it involves the ability to present several heterogeneous entities across multiple administrative domains as part of a single system. He spoke about the problem of user identification and access control within such a system. He presented a specific metasystem, Legion, and addressed those problems in the context of that system. He presented a few different design approaches to the security subsystem and discussed their benefits and disadvantages. The final session of the day, and the conference, was a panel titled "Red Teaming and Network Security." The moderator was Douglas Maughan, and the panelists were Brad Wood, Sami Saydjari and Michael Puldy. The panelists first spoke about the basis for red-teaming, and the attributes of "good quality" red teaming. They argued that red teaming can indeed be made scientific, with its basis in software testing approaches. They also spoke about the limitations of red teaming, and argued for its appropriateness and efficacy in today’s information security environment. They presented real world statistics on red teaming and what it costs. They also stressed the differences between adversaries modeled within a red teaming scenario, and real world adversaries. As the conference from the year 2000 indicates, the NDSS continues to be a high quality information security conference that attempts to include all important aspects of information security in its agenda. There were over 175 attendees from 19 different countries, spanning various fields within security, and drawn from industry, academia and government. The conference only has one track, thus ensuring that the attendees do not get "fragmented." This author looks forward to attending the next conference. The call for papers is now out, and the website for it is www.isoc.org/ndss01/. ==================================================================== Staying in Touch ==================================================================== ____________________________________________________________________ Information for Subscribers and Contributors ____________________________________________________________________ SUBSCRIPTIONS: Two options: 1. To receive the full ascii CIPHER issues as e-mail, send e-mail to (which is NOT automated) with subject line "subscribe". 2. To receive a short e-mail note announcing when a new issue of CIPHER is available for Web browsing send e-mail to (which is NOT automated) with subject line "subscribe postcard". To remove yourself from the subscription list, send e-mail to cipher@issl.iastate.edu with subject line "unsubscribe". Those with access to hypertext browsers may prefer to read Cipher that way. It can be found at URL www.ieee-security.org/cipher.html CONTRIBUTIONS: to cipher@issl.iastate.edu are invited. Cipher is a NEWSletter, not a bulletin board or forum. It has a fixed set of departments, defined by the Table of Contents. Please indicate in the subject line for which department your contribution is intended. For Calendar entries, please include a URL and/or e-mail address for the point-of-contact. For Calls for Papers, please submit a one paragraph summary. See this and past issues for examples. ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY. All reuses of Cipher material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy, publications using Cipher material should obtain permission from the contributors. ____________________________________________________________________ Recent Address Changes ____________________________________________________________________ Address changes from past issues of Cipher are archived at www.ieee-security.org/Cipher/AddressChanges.html Entered May 20, 2000 Bob Bruen bruen@exile.ne.mediaone.net Entered April 26, 2000 Bill Bartgis TRW P.O. Box 58992 Riyadh 11515 Saudi Arabia Voice: +966.1.476.9777 ext. 42776 Fax: +966.1.478.5622 E-mail: bartgis@gibraltar.ncsc.mil Entered March 20, 2000 Heather Hinton IBM Tivoli Security Business Unit 9020 Capital of Texas Hwy N. Great Hills Corporate Center Building 1, Suite 270 Austin, TX 78759 USA e-mail: hhinton@tivoli.com Telephone: +1:(512)458-4037x5023 Fax: +1(512)458-2377 ==================================================================== Interesting Links and Reports Available via FTP and WWW ==================================================================== Nothing new...."Reports Available" links from previous issues of Cipher are archived at www.ieee-security.org/Cipher/NewReports.html and www.ieee-security.org/Cipher/InterestingLinks.html ==================================================================== Reader's Guide to Current Technical Literature in Security and Privacy, by Anish Mathuria ==================================================================== The Reader's Guide from Past issues of Cipher is archived at www.ieee-security.org/Cipher/ReadersGuide.html ------------------------ 20th International Conference on Distributed Computing Systems, April 10-13, 2000, Taipei, Taiwan: [Security-related paper only] Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments J. Stanton, Y. Amir, D. Hasse, G. Ateniese, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, and G. Tsudik ------------------------ 7th IEEE/IFIP Network Operations and Management Symposium, April 10-14, 2000, Honolulu, Hawaii, USA: [Security-related papers only] ISCP: Design and Implementation of An Inter-Domain Security Management Agent Coordination Protocol Z. Fu, H. Huang, T.-L. Wu, S. Wu, F. Gong, C. Xu, and I. Baldine Network Security Management with Intelligent Agents K. Boudaoud, H. Labiod, R. Boutaba, and Z. Guessoum Study on the Prevention of SYN Flooding by Using Traffic Policing Y.-W. Chen Security Considerations for Workflow Systems S. Li, D. Jia, G. Zhuang, and A. Kittel Authentication Protocols for the Broadband ISDN Billing System C. Lo and Y. Yeh A Proposal for and Evaluation of Secure Key Management in Service Operation Systems K. Muto, H. Arimichi, and H. Kikuchi Security Policy Management for Networked Information Systems D. Trcek ------------------------ The 9th International World Wide Web Conference, May 15-19, 2000, Amsterdam, Netherlands: [Security-related papers only] Risks of the Passport Single Signon Protocol D. Kormann and A. Rubin Design and Implementation of an Access Control Processor for XML Documents E. Damiani, S. Vimercati, S. Paraboschi, and P. Samarati Supporting Reconfigurable Security Policies for Mobile Programs B. Hashii, S. Malabarba, R. Pandey, and M. Bishop ------------------------ 8th International Algebraic Methodology and Software Technology Conference, May 23-27, 2000, Iowa City, Iowa, USA: [Security-related papers only] Message authentication through non interference R. Focardi, R. Gorrieri, and F. Martinelli New logic for electronic commerce protocols K. Adi, M. Debbabi, and M. Mejri Computer & Security, Vol. 19, No. 1 (2000): B. Hancock, From The Editor, pp. 2-5. B. Hancock, Mass Network Flooding Attacks (Distributed Denial of Service -DDoS) Surface in the Wild. pp. 6-17. C. Williams, N. Zunic, S. Matyas, and S. Gupta, M. Willett. Key Recovery Alliance (KRA) Technology Papers, Special Issue --- Introduction. pp. 18-20. M. Smith, P. Van Oorschot, and M. Willett. Cryptographic Information Recovery Using Key Recovery. pp. 21-27. M. Willett. Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. pp. 28-30. J. Kennedy, S. Matyas, and N. Zunic, Key Recovery Functional Model. pp. 31-36. S. Matyas and N. Zunic, Additional Key Recovery Functions. pp. 37-40. S. Gupta. A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms. pp. 41-47. C. Williams and N. Zunic, Global Interoperability for Key Recovery. pp. 48-55. S. Gupta and S. Matyas. Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. pp. 56-68. A. Maclean, S. Matyas, and N. Zunic. Organization Implementation Guidelines for Recovery of Encrypted Information. pp. 69-81. N. Zunic. Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. pp. 82-85. T. Markham and C. Williams, Key Recovery Header for IPSEC. pp. 86-90. D. Balenson and T. Markham. ISAKMP Key Recovery Extensions. pp. 91-99. T. Shoriak. SSL/TLS Protocol Enablement for Key Recovery. pp. 100-104. ------------------------ IEEE/ACM Transactions on Networking, Vol. 8, No. 1 (February 2000): [Security-related paper only] C. Wong, M. Gouda and S. Lam. Secure group communications using key graphs. pp. 16 - 30. ------------------------ Computer Communications, Volume 23, Issue 3 (February 2000): [Security-related paper only] W. Geyer and R. Weis. The design and the security concept of a collaborative whiteboard. pp. 233-241. ------------------------ Information Processing Letters, Vol. 73, Nos. 3-4 (February 2000): [Security-related papers only] S. Saeednia. On the security of a convertible group signature scheme. pp. 93-96. M.-S. Hwang. Cryptanalysis of YCN key assignment scheme in a hierarchy. pp. 97-101. ------------------------ Computer Communications, Vol. 23, No. 4 (February 2000): [Security-related paper only] C.-I. Fan, W.-K. Chen and Y.-S. Yeh. Date attachable electronic cash. pp. 425-428. ------------------------ Future Generation Computer Systems, Vol. 16, No. 4 (February 2000): C. Ellison, C. Hall, R. Milbert and B. Schneier. Protecting secret keys with personal entropy. pp. 311-318. E. Dawson, A. Clark and M. Looi. Key management in a non-trusted distributed environment. pp. 319-329. B. Crispo, P. Landrock and V. Matya. WWW security and trusted third party services. pp. 331-341. D. Gollmann. New paradigms - old paradigms? pp. 343-349. F. Monrose and A. Rubin. Keystroke dynamics as a biometric for authentication. pp. 351-359. A. Varvitsiotis. Scaling issues in large PKI communities. pp. 361-372. D. Kueter and R. Fisher. Business insights in e-commerce and trusted services. pp. 373-378. R. Oppliger. Privacy protection and anonymity services for the World Wide Web (WWW). pp. 379-391. N. Alexandris, M. Burmester, V. Chrissikopoulos and Y. Desmedt. Secure linking of customers, merchants and banks in electronic commerce. pp. 393-401. J.-F. Mainguet, M. Pegulu and J. Harris. Fingerprint recognition based on silicon chips. pp. 403-415. U. Lang. CORBA security on the web - an overview. pp. 417-421. S. Gamvroulas, D. Polemi and M. Anagnostou. A secure brokerage network for retail banking services. pp. 423-430. ------------------------ Journal of Systems and Software, Vol. 50, No. 2 (February 2000): [Security-related papers only] Y.-S. Chang, T.-C. Wu and S.-C. Huang. ElGamal-like digital signature and multisignature schemes using self-certified public keys. pp. 99-105. P.-L. Lin. Robust transparent image watermarking system with spatial mechanisms. pp. 107-116. ------------------------ Journal of the ACM, Vol. 47, No. 2 (March 2000): [Security-related paper only] M. Franklin, Z. Galil and M. Yung. Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. pp. 225 - 243. ------------------------ Computer Communications, Vol. 23, Nos. 5-6 (March 2000): [Security-related papers only] C. Boyd and A. Mathuria. Key establishment protocols for secure mobile communications: a critical survey. pp. 575-587 A. Ganz, S. Park and Z. Ganz. Security broker for multimedia wireless LANs. pp. 588-594. ------------------------ Computer Standards And Interfaces, Volume 22, Issue 1 (March 2000): [Security-related paper only] J.-J. Hwang, K.-C. Wu and D.-R. Liu. Access control with role attribute certificates. pp. 43-53. ------------------------ ACM Computer Communication Review, Vol. 30, No. 2 (April 2000): [Security-related paper only] J. Zhou and R. Deng. On the Validity of Digital Signatures. ------------------------ Data And Knowledge Engineering, Vol. 33, No. 1 (April 2000): [Security-related paper only] J. Biskup. For unknown secrecies refusal is better than lying. pp. 1-23. ------------------------ Computer Networks, Vol. 32, No. 6 (May 2000): [Security-related paper only] G. Wolf and A. Pfitzmann. Properties of protection goals and their integration into a user interface. pp. 685-700. ------------------------ Information and Computation, Vol. 158, No. 2 (May 2000): [Security-related paper only] E. Modiano and A. Ephremides. Communication Protocols for Secure Distributed Computation of Binary Functions. pp. 71-97. ------------------------ Science of Computer Programming, Vol. 37, Nos. 1-3 (May 2000): [Security-related paper only] R. Joshi and K. Leino. A semantic approach to secure information flow. pp. 113-138. ------------------------ Theoretical Computer Science, Vol. 240, No. 1 (June 2000): [Security-related paper only] R. De Nicola, G. Ferrari, R. Pugliese and B. Venneri. Types for access control. pp. 215-254. ==================================================================== Listing of academic positions available by Cynthia Irvine May 22, 2000 ==================================================================== Department of Computer Science, University of Twente, Enschede, The Netherlands Research Assistant/Ph.D. (depending on candidate) (05/22/00) Areas of particular interest: Distributed multimedia database systems, information security, security of multimedia databases, COTS components in the construction of secure systems, and tools and techniques to copyright and protect content. Application open until June 01, 2000. http://www.utwente.nl/vacancies/1/3/1/015.shtml Department of Information and Software Engineering, George Mason University, Fairfax, VA 1 Tenure-track and 1 visiting position in security (05/01/00) Areas of particular interest: Computer security, networking, data mining and software engineering Search will continue until positions are filled. http://ise.gmu.edu/hire/ Department of Computer Science, University of Twente, Enschede, The Netherlands Ph.D., Postdoctoral or research fellow (depending on candidate) (04/20/00) Areas of interest: E-commerce. Areas of particular interest: Hiring for the following security related projects: "Architectural support for secure cooperation", and "User authentication and authorisation in dynamic (mobile) e-commerce environments". Application open until June 01, 2000. http://www.ctit.utwente.nl/vacancies/ad_ec_uk.html Department of Computer Science, Dartmouth College, Hanover, NH Tenure Track Positions Areas of interest: all fields of computer systems. Areas of particular interest: Computer security, or anything that can contribute to the new Institute for Security Studies at Dartmouth. Applications will be processed as they arrive, with interviews expected in March or April 2000. http://www.cs.dartmouth.edu/job.html Department of Computer Science, Purdue University, West Lafayette, IN Emphasis on Assistant Professor Positions, but more senior applicants will be considered Areas of particular interest: Computer security, and INFOSEC. Positions beginning August 2000. http://www.cs.purdue.edu/positions.html Department of Computer Science, Renesselaer Polytechnic Institute, Troy, NY Tenure Track, Teaching, and Visiting Positions Areas of particular interest: Computer security, networking, parallel and distributed computing and theory. Positions beginning Fall 2000. http://www.cs.rpi.edu/faculty-opening.html Swiss Federal Institute of Technology, Lausanne (EPFL), Switzerland/Eurecom/Telecom Paris General Director Areas of particular interest: Education and research in telecommunications. Applications begin immediately. http://admwww.epfl.ch/pres/dir_eurecom.html Department of Computer Science, Naval Postgraduate School, Monterey, CA Junior and Senior Tenure Track Positions in Professorship Areas of particular interest: Computer Security, but applicants from all areas of Computer Science will be considered. Applications begin immediately and are open until filled. http://www.cs.nps.navy.mil/people/faculty/chairman.html Department of Computer Science, Florida State University, Talahassee, FL Tenure-track positions at all ranks. Several positions available. (1/00) Areas of particular interest: Trusted Systems, security, cryptography, software engineering, provability and verification, real-time and software engineering, provability and verifications, real-time and safety-critical systems, system software, databases, fault tolerance, and computational/simulation-based design. http://www.cs.fsu.edu/positions/ Naval Postgraduate School Center for INFOSEC Studies and Research, Monterey, CA, Visiting Professor (Assistant, Associate, or Full Professor levels) (9/98) Areas of particular interest: Computer and information systems security. http://cisr.nps.navy.mil/jobs/npscisr_prof_ad.html This job listing is maintained as a service to the academic community. If you have an academic position in computer security and would like to have in it included on this page, send the following information: Institution, City, State, Position title, date position announcement closes, and URL of position description to: irvine@cs.nps.navy.mil ==================================================================== Information on the Technical Committee on Security and Privacy ==================================================================== ______________________________________________________________________ How to become <> a member of the IEEE Computer Society's TC on Security and Privacy ________________________________________________________________________ You do NOT have to join either IEEE or the IEEE Computer Society to join the TC, and there is no cost to join the TC. All you need to do is fill out an application form and mail or fax it to the IEEE Computer Society. A copy of the form is included below (to simplify things, only the TC on Security and Privacy is included, and is marked for you). Members of the IEEE Computer Society may join the TC via an https link. The full and complete form is available on the IEEE Computer Society's Web Server by following the application form hyperlink at the URL: computer.org/tcsignup/ IF YOU USE THE FORM BELOW, PLEASE NOTE THAT THE IT IS TO BE RETURNED (BY MAIL OR FAX) TO THE IEEE COMPUTER SOCIETY, >>NOT<< TO CIPHER. --------- IEEE Computer Society Technical Committee Membership Application ----------------------------------------------------------- Please print clearly or type. ----------------------------------------------------------- Last Name First Name Middle Initial ___________________________________________________________ Company/Organization ___________________________________________________________ Office Street Address (Please use street addresses over P.O.) ___________________________________________________________ City State ___________________________________________________________ Country Postal Code ___________________________________________________________ Office Phone Fax ___________________________________________________________ Email Address (Internet accessible) ___________________________________________________________ Home Address (optional) ___________________________________________________________ Home Phone ___________________________________________________________ [ ] I am a member of the Computer Society IMPORTANT: IEEE Member/Affiliate/Computer Society Number: ____________________ [ ] I am not a member of the Computer Society* Please Note: In some TCs only current Computer Society members are eligible to receive Technical Committee newsletters. Please select up to four Technical Committees/Technical Councils of interest. TECHNICAL COMMITTEES [ X ] T27 Security and Privacy Please Return Form To: IEEE Computer Society 1730 Massachusetts Ave, NW Washington, DC 20036-1992 Phone: (202) 371-0101 FAX: (202) 728-9614 _____________________________________________________________ TC Publications for Sale _____________________________________________________________ Proceedings of the IEEE CS Symposium on Security and Privacy The Technical Committee on Security and Privacy has copies of its publications available for sale directly to you. Proceedings of the IEEE Symposium on Security and Privacy -------------------------------------- 2000 $25.00 1999 -- SOLD OUT -- 1998 $15.00 For domestic shipping and handling, add $3.20 (3 volumes or fewer). For overseas delivery: -- by surface mail, please add $5 per order (3 volumes or fewer) -- by air mail, please add $10 per volume If you would like to place an order, please specify * how many issues you would like, and * where to send them, and * the shipping method (air or surface) for overseas orders. For mail orders, please send a check in US dollars, payable to the "2000 IEEE Symposium on Security and Privacy" to: Brian J. Loe Treasurer, IEEE TC on Security and Privacy Secure Computing Corp. 2675 Long Lake Rd. Roseville, MN 55113 U S A For electronic orders, in addition to the information above, please send the following credit card information to brian.loe@computer.org: - the name of the cardholder, - type of card (VISA, Mastercard, American Express, and Diner's Club are accepted) - credit card number, and - the expiration date. You may use the following PGP public key to encrypt any information that you're not comfortable sending as cleartext. -----BEGIN PGP SIGNATURE----- Version: 4.0 Business Edition iQCVAwUBOSVyE0y6WVOs56vlAQFVRwQAg3/SovqmTqWKCExfeTDkgMaFpkOGRKpo A/p5c/oSrg8g2ev7GBllKz+e3/frSi27pyA5HBxXzm5tnqnCafjS1Fub8S7XepWo opI/lPGGXRmHHlBDNQ+58ui5/SH68cT64auBbYmvhh8YQqJJnoieMMWDlU3fvR/y RynPbZ2hMn0= =FL5l -----END PGP SIGNATURE----- -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 4.0 Business Edition mQCNAy+T6TkAAAEEAN/fnVu7VCPtcmBQhXFhJbejSoZJkEmWNUYvx13yRwl/gyir 61ae+GUjgWjWs9O06C6dugRGrjFZpBhMosu7sgGJMz54hvKbBNrYBSHpH0yex6e/ +c2mzbCbh40naARgPAaAki2rCkV2ryETj2Z6w98/k5fMgOZDnEy6WVOs56vlAAUR tBtCcmlhbiBKLiBMb2UgPGxvZUBzY3RjLmNvbT6JARUDBRA5FvlSehjn4trNNnMB AVulCAC/cqeBfMVohQqSZSHsaBudKUaKRCbH9PoKB0xr2SkmI/XYTzm6X7Cc+CXb hfcO/t++p1IscnB9Ne7Qa/MYqTD3zzgp/x/xor0bHnLSLGlVCN3XoRr3oxWuGOE9 Bul85Jse5V3FqMjsnGzm3PFRnYEJ9EPfTbWLnmmPteNSCwzFJe0z2nSAWbW+X4BQ W6qN/5SHFWQ/0xcpSWte7TD98BDpZl12ow3W+NY1P01AYfby0IthvuPL7PMrcOgV cGz8sBflkF4QbL/CJW42oPjztvj+Ks+I2b1W9oSJgX5fPeU9hcsPg3wVO5o3/Mdb lEtBSrdQfnbfOpiEm16/CK3OGr3NiQB1AwUQL5UPKjVOHVCprfxtAQG2tgMAruPD qtQzxJVdegzUG+0r0AMEDxmGDN84PUU9AMhXl2owR2/TthpDpmovMq8ibeLd0PGk NgXJFlLHJNvU09jP1O4TqwvoSTzG84qm8OY7kfdOqY7PTsz0keT7WgFuuglKiQCV AwUQL5UOenp25Pxx+Z6ZAQH5MAP/c1SngCYf1+Ks1M2Cbf8PR4t5hQAM5tGFHA8J zS5L/3NZNyoNAD4fgRm62xr8trFWtT4BSmZboXgqklTvwbQKWn90EsoKEtdfJNtJ swVNkLF/SjLyes/J6HEgllPUaKVIq5PM8AIrKsAKvHZoDcDbDH8QypnQsdxYhOOh a0pxCpaJAJUDBRAvlCiXTLpZU6znq+UBAdmiA/9eq6niZHHykR/27P9chkqhYLuq /E1CirA+aYP73OdbfXeV+vwDxr9Zzv2iTra/DUNyJzU7JelWRFlov+k7yiO6Pr7j bWeqms0WYsQV30jIelBs6w34A4CC1bnuHxt6gKxd63EZCqhVsZV+GN3pGfL2CQBc mraYYRb4Q1+gSocsAIkAdQMFEDXRyzCbYv3kpAuW2QEBv+AC/jDstmZP0UTTwixB htVd50TqxE0vU/g6YC6sKg1wyHNlYEvwP0xRsM1P+Qs1603SV6TarP8q5AQVMuwg 1qQxxuThCAG/hXcsI5t/5pbMTQSAMUkZQHittS69sSQtNSd+R7QlQnJpYW4gSi4g TG9lIDxicmlhbi5sb2VAY29tcHV0ZXIub3JnPrQmQnJpYW4gSi4gTG9lIDxsb2VA c2VjdXJlY29tcHV0aW5nLmNvbT4= =PUX1 -----END PGP PUBLIC KEY BLOCK----- You may also order some back issues from IEEE CS Press at www.computer.org/cspress/catalog/proc9.htm. Proceedings of the IEEE CS Computer Security Foundations Workshop (CSFW 1, 5 through 12) The most recent Computer Security Foundation Workshop (CSFW12) took place the 28th through 30th of June in Mordano, Italy. Topics included formal specification of security protocols, protocol engineering, distributed systems, information flow, and security policies. Copies of the proceedings are available from the publications chair for $25 each after 1 July. Copies of earlier proceedings starting with year 5 are available at $10. Photocopy versions of year 1 are also $10. Checks payable to "Joshua Guttman for CSFW" may be sent to: Joshua Guttman, MS A150 The MITRE Corporation 202 Burlington Rd. Bedford, MA 01730-1420 USA guttman@mitre.org ________________________________________________________________________ TC Officer Roster ________________________________________________________________________ Chair: Past Chair: Thomas A. Berson Charles P. Pfleeger Anagram Laboratories Arca Systems, Inc. P.O. Box 791 8229 Boone Blvd, Suite 750 Palo Alto, CA 94301 Vienna VA 22182-2623 (650) 324-0100 (voice) (703) 734-5611 (voice) berson@anagram.com (703) 790-0385 (fax) c.pfleeger@computer.org Vice Chair: Chair, Subcommittee on Academic Affairs: Michael Reiter Prof. Cynthia Irvine Bell Laboratories U.S. Naval Postgraduate School 600 Mountain Ave., Room 2A-342 Computer Science Department Murray Hill, NJ 07974 USA Code CS/IC Monterey CA 93943-5118 (908) 582-4328 (voice) (408) 656-2461 (voice) (908) 582-1239 (fax) irvine@cs.nps.navy.mil reiter@research.bell-labs.com Newsletter Editor: Jim Davis Department of Electrical and Computer Engineering 2413 Coover Hall Iowa State University Ames, Iowa 50011 (515) 294-0659 (voice) davis@iastate.edu Chair, Subcommittee on Standards: Chair, Subcomm. on Security Conferences: David Aucsmith Jonathan Millen Intel Corporation SRI International EL233 JF2-74 Computer Science Laboratory 2111 N.E. 25th Ave 333 Ravenswood Ave. Hillsboro OR 97124 Menlo Park, CA 94025 (503) 264-5562 (voice) (650) 859-2358 (voice) (503) 264-6225 (fax) (650) 859-2844 (fax) awk@ibeam.intel.com millen@csl.sri.com BACK ISSUES: There is an archive that includes each copy distributed so far, in ascii, in files you can download at URL www.ieee-security.org/cipher.html ========end of Electronic Cipher Issue #37, May 29, 2000============