News Bits
The dates for CSW 15 have been announced: June 24-26, 2002 in Nova Scotia, Canada. The call for papers will be out in September (watch the Cipher calls-for-papers and calendar list, www.ieee-security.org/cfp.html)
Avi Rubin's new book, White-Hat Security Arsenal: Tackling the Threats (Addison-Wesley) is out! See white-hat.org for more information.
Correspondence from IEEE:
The IEEE Computer Society Press is now sending out a monthly E-Bulletin, the CS Press Alert, that announces the latest books and proceedings releases to our subscribers. The CS Press Alert is only sent out to those who request the bulletin (after an initial trial run and opt in period). For more information, contact Tom Fink, Press Marketing Manager. IEEE Computer Society, tfink@computer.org
Organizers for the 8th ACM Conference on Computer and Communications Security
(November 5-8, 2001, Philadelphia, PA USA) have announced the conference program and registration process.
See www.bell-labs.com/user/reiter/ccs8/
for details. The following papers will be presented:
Error Tolerant Password Recovery, Niklas Frykholm. Ari Juels, RSA Laboratories, Bedford, MA, USA
Twin Signatures: an Alternative to the Hash-and-Sign Paradigm. David Naccache,
David Pointcheval, Jacques Stern, Dept Informatique - Ecole Normale Superieure, Paris, France
Events in Security Protocols. Federico Crazzolara, Glynn Winskel, Computer Laboratory,
University of Cambridge, Cambridge, England
Formalizing GDOI Group Key Management Requirements in NPATRL. Catherine Meadows,
Paul Syverson, Iliano Cervesato, Center for High Assurance Computer Systems, Naval
Research Laboratory, Washington, USA
An Efficient Security Verification Method for Programs with Stack Inspection. Naoya Nitta,
Yoshiaki Takata, Hiroyuki Seki, Graduate School of Information
Science, Nara Institute of Science and Technology
OCB: An Authenticated-Encryption Mode for Emerging Cryptographic Standards.
Phillip Rogaway, University of California at Davis, Davis, California, USA,
Mihir Bellare, University of California at San Diego, La Jolla, California,
USA, John Black, University of Nevada, Reno, Nevada, USA, Ted Krovetz,
University of California at Davis, Davis, California, USA
The Performance of Public Key-Enabled Kerberos Authentication in Mobile Computing Applications.
Alan Harbitter, PEC Solutions, Inc., Fairfax, VA, Daniel A. Menascé, Department
of Computer Science, George Mason University, Fairfax, VA
Accountable-Subgroup Multisignatures.
Silvio Micali, MIT LCS, Cambridge, MA, USA, Kazuo Ohta, Department of
Information and Comunication Engineering, University of Electoro-Communications,
Tokyo, Japan, Leonid Reyzin, MIT LCS, Cambridge, MA, USA
Policy Algebras for Access Control - The Propositional Case.
Duminda Wijesekera, Sushil Jajodia, Center for Secure Information Systems,
George Mason University, Fairfax VA, USA
A Chinese Wall Security Model for Decentralized Workflow Systems.
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni, MSIS Department and
CIMIC, Rutgers University, Newark, NJ, USA
On the Relationship between Strand Spaces and Multi-Agent Systems.
Joseph Y. Halpern, Riccardo Pucella, Department of Computer Science, Cornell
University, Ithaca, NY, USA
Provably Authenticated Group Diffie-Hellman Key Exchange.
Emmanuel Bresson, Ecole normale supérieure, Paris, France, Olivier
Chevassut, Lawrence Berkeley National Laboratory, Berkeley, CA, USA,
David Pointcheval, Ecole normale supérieure, Paris, France, Jean-Jacques
Quisquater, Microelectronic laboratory, Louvain-la-Neuve, Belgium
Tangler - A Censorship Resistant Publishing System Based On Document Entanglements.
Marc Waldman, David Mazieres, Computer Science Department, New York
University, New York, NY, USA
Design and Implementation of a Flexible RBAC-Service in an Object-Oriented
Scripting Language. Gustaf Neumann, Mark Strembeck, Department of Information Systems, New Media,
Vienna University of Economics and BA, Vienna, Austria
Delegation of Cryptographic Servers for Capture-Resilient Devices.
Philip MacKenzie, Michael K. Reiter, Bell Labs, Lucent Technologies, Murray
Hill, NJ, USA
Distributed Credential Chain Discovery in Trust Management.
Ninghui Li, Department of Computer Science, Stanford University, Stanford,
CA, USA, William H. Winsborough, NAI Labs, Glenwood, MD, USA, John C.
Mitchell, Department of Computer Science, Stanford University, Stanford, CA,
USA
Bounded-Process Cryptographic Protocol Analysis.
Jonathan Millen, Vitaly Shmatikov, Computer Science Laboratory, SRI
International, Menlo Park, CA, USA
A New Approach to DNS Security (DNSSEC). Giuseppe Ateniese, Stefan Mangard,
Department of Computer Science, The Johns Hopkins University, Baltimore, MD, USA
On the Abuse-Freeness of the Garay-Jakobsson-MacKenzie Two-Party Protocol.
Rohit Chadha, Department of Mathematics, University of Pennsylvania,
Philadelphia, PA, USA, Max Kanovich, Andre Scedrov, Department of
Computer and Information Science, University of Pennsylvania, Philadelphia, PA,
USA
Flexible Authentication of XML documents. Prem Devanbu, Michael Gertz, April Kwong,
Chip Martel, Glen Nuckolls, Department of Computer Science, University of California,
Davis, California, CA, USA, Stuart G. Stubblebine, CertCo, New York, NY, USA
Securely Combining Public-Key Cryptosystems. Stuart Haber, InterTrust STAR Lab, Santa
Clara, CA, Benny Pinkas, InterTrust STAR Lab, Princeton, NJ, USA
Interoperable Strategies in Automated Trust Negotiation.
Ting Yu, Marianne Winslett, Department of Computer Science, University of
Illinois at Urbana-Champaign, Urbana, IL, USA, Kent Seamons, Department
of Computer Science, Brigham Young Univeristy, Provo, Utah, USA
The Faithfulness of Abstract Encryption.
Joshua D. Guttman, F. Javier Thayer Fabrega, MITRE, Bedford, MA, USA,
Lenore D. Zuck, Department of Computer Science, Yale University, New Haven,
CT, USA
Verifiable, Secret Shuffles of ElGamal Encrypted Data for Secure Multi-Authority Elections.
C. Andrew Neff, VoteHere, Inc., Bellevue, WA, USA
A Practical Forward Secure Group Signature Scheme. Dawn Song, University of California,
Berkeley, Berkeley, CA, USA
BiBa: A New Signature Scheme for Broadcast Authentication.
Adrian Perrig, SIMS - UC Berkeley, Berkeley, CA, USA
Paillier's Cryptosystem Revisited. Dario Catalano, Università di Catania, Italy,
Rosario Gennaro, Nick Howgrave-Graham, IBM Research, Yorktown Heights, NY, USA, Phong Q.
Nguyen, Ecole Normale Superieure, Paris, France
2002 TC Officers
At the Technical Committee on Security and Privacy meeting at the 2001 S&P symposium, the following
folks were elected, drafted, or otherwise volunteered:
( effective January 2002)
Correspondence to Cipher:
NIST Seeks Comments on Security Risk Management Guide
One of the greatest computer security challenges faced by government
agencies and businesses is figuring out how much is too much.
Doing nothing in the age of hackers and viruses is unwise. Still,
spending too much time and money trying to thwart every conceivable
computer security threat simply drains resources.
Computer scientists at the National Institute of Standards and
Technology have drafted a risk management guide that helps managers sort
out all the issues and set priorities. The document gives suggestions
about how to approach risk assessment and mitigation in a computer
security context.
It is organized by the three phases of an ongoing risk management
process: performing a risk assessment, addressing the mitigation of that
risk and evaluating the results. The guide also contains two appendices:
a glossary of terms and a sample outline to use in documenting results.
A draft of the guide is available at csrc.nist.gov/publications/drafts.html. A final version of the
guide is expected by the end of the year.
NIST's Computer Security Division is accepting public comments on the
document until August 15, 2001. These should be sent to Gary
Stoneburner, NIST, 100 Bureau Dr., Stop 8930, Gaithersburg, Md.
20899-8930; gary.stoneburner@nist.gov .
The National Science Foundation awarded $8.6 million in fellowships for 200
students studying in Information Assurance. The "CyberCorps"
fellowships support US citizens who are working towards an undergraduate or
Masters degree in Information Assurance with the requirement that students work
for a federal agency upon graduation. Six Universities were selected to
participate in the first year of the program: Carnegie Mellon University,
Iowa State University, Purdue University, the University of Idaho, the
University of Tulsa, and the Naval Postgraduate School. See Colleen
O'Hara's articles in Federal Computing Week (5/23/01, 5/28/01): www.fcw.com/fcw/articles/2001/0521/web-nsf-05-23-01.asp
and www.fcw.com/fcw/articles/2001/0528/mgt-nsf-05-28-01.asp. News Bits contains correspondence,
interesting links, non-commercial announcements and other snippets of
information the editor thought that Cipher readers might find interesting.
And, like a UCITA protected product, by reading the above page you have already
agreed to not hold the editor accountable for the correctness of its contents.
Chair:
Michael Reiter
Past Chair:
Thomas A. Berson
Vice Chair:
Heather Hinton
Chair, Subcommittee on Academic Affairs:
Cynthia Irvine
Newsletter Editor:
Jim Davis
Chair, Subcommittee on Standards:
David Aucsmith
Chair, Subcomm. on Security Conferences:
Jonathan Millen
2002 IEEE Symposium on Security and Privacy:
General Chair:
Heather Hinton
Vice-Chair:
Bob Blakley
Program Chair:
Martín Abadi
Program Co-Chair:
Steve Bellovin