Items from security-related news (E73.Jul-2006)
ACM SIGSAC AWARDS
ACM SIGSAC is offering two annual awards: SIGSAC Outstanding
Innovation Award and SIGSAC Outstanding Contributions Award.
At most one award is given each year in each category.
The award criteria are as follows:
The SIGSAC Awards Committee is now open to receiving nominations for
the awards. The awards will be presented at ACM Computer and
Communication Security Conference, Alexandria, VA, October 30 -- Nov.
3, 2006.
NOMINATION PROCESS: Each nomination should be co-sponsored by at least
3 people. Email co-sponsorship is accepted. Nominations should include
a proposed citation (up to 25 words), a succinct (100-250 words)
description of the innovation/contribution, and a detailed statement
(1-2 page) to justify the nomination as well as other supporting
materials. Nominations should be submitted via e-mail (with subject
"SIGSAC
Innovation/Contribution Award nomination") to the
chair of the SIGSAC Awards Committee: Pierangela Samarati
(samarati@dti.unimi.it).
DEADLINE FOR NOMINATIONS: Deadline for receiving nomination is August
5, 2006.
EXCLUSION: Members of the ACM SIGSAC Awards Committee are not eligible
to be nominated.
The details related to the nomination process and administration of
the awards are posted at http://www.acm.org/sigs/sigsac/awards.html
"Services are now run with reduced privileges that contain profiles
specifying allowed file system, registry and network
activities."
"Internet Explorer 7 in Vista runs in a low Integrity Level known as
'Protected Mode' in order to prevent malicious Web sites from
compromising an entire system."
Vista supports full disk on-the-fly encryption using 256-bit AES.
Contributed by Pierangela Samarati
June 13, 2006
Microsoft: Vista Most Secure OS Ever
By Nate Mook and Tim Conneally, BetaNews June 15, 2006, 6:08 AM
http://www.betanews.com/article/Microsoft_Vista_Most_Secure_OS_Ever/1150366131
NIST Announces Hash Function Timeline
July 14, 2006
A tentative timeline of the development of new hash functions has been
posted on the Hash Workshop web site:
http://www.nist.gov/hash-function
This topic will be discussed in the Second Cryptographic Hash Workshop. Comments should be sent to hash-function@nist.gov by August 4, 2006.
Details about the workshop and a preliminary program are available at the same web site listed above.
Sincerely,
The Hash Workshop Program Committee
NIST