News Bits
The final program and registration information for the IEEE 20th Symposium on Reliable
Distributed Systems (SRDS'01) is available at srds.cs.umn.edu.
Advanced registration ends September 28, 2001. The symposium will be held October 28-31, 2001
in New Orleans, LA, USA. Here's the final program:
The final program and registration information for the 8th ACM Conference on Computer
and Communications Security (CCS-8) is available at
seclab.crema.unimi.it/~ccs8/. Advanced registration ends October 1, 2001.
The conference
will be held November 5-8, 2001 in Philadelphia, PA, USA.
Here is the preliminary program for the RSA Conference 2002 Cryptographers' Track
(RSA-CT '02).
News Bits contains correspondence,
interesting links, non-commercial announcements and other snippets of
information the editor thought that Cipher readers might find interesting.
And, like a UCITA protected product, by reading the above page you have already
agreed to not hold the editor accountable for the correctness of its contents.
--------------------
Sunday October 28, 2001
9:00-5:00 Workshop 1: Reliable and Secure Applications in Mobile Environments
9:00-5:00 Workshop 2: Reliability in Embedded Systems
Monday October 29, 2001
9:00-10:00 Keynote Lecture: Dr. Ambuj Goyal
General Manager, Solutions and Strategy
IBM Software Group
10:00 10:30 Coffee break
10:30-12:00 Session 1: Replication
Session Chair: Lorenzo Alvisi, University of Texas at Austin, USA
Optimizing File Availability in a Secure Serverless
Distributed File System
John R. Douceur Roger P. Wattenhofer
Primary-backup replication: From a time-free protocol to
a time-based implementation
Rui Oliveira, JosÈ Pereira, AndrÈ Schiper
How to Select a Replication Protocol According to Scalability,
Availability, and Communication Overhead
R. Jimenez-Peris, M. Patino-Martinez, B. Kemme, and G. Alonso
2:00-3:30 Session 2: Recovery
Session Chair: Gilles Muller, INRIA Rennes, France
Quantifying Rollback Propagation in Distributed Checkpointing
Adnan Agbaria and Hagit Attiya and Roy Friedman and Roman Vitenberg
Continental Pronto
Svend Frolund and Fernando Pedone
Compiler-Assited Heterogeneous Checkpointing
Feras Karablieh, Margaret Hicks, and Rida Bazzi
3:30 -4:00 Coffee break
4:00-5:30 Panel Session "Reliability and Security in Distributed and
Mobile Systems"
Moderator: Bharat Bhargava, Purdue University
Panelists: Joseph Betser, Aerospace Corporation
Kevin Kiat, US Airforce Rome Lab
Kane Kim, University of California Irvine
Catherine Meadows, Naval Research Lab
Mukesh Singhal, University of Kentucky
6:00-7:00 Reception
Tuesday October 30, 2001
8:30-10:00 Session 3: Security
Session Chair: Catherine Meadows, Naval Research Labs, USA
Detecting Heap Smashing Attacks Through Fault Containment Wrappers
Christof Fetzer, Zhen Xiao
Efficient Update Diffusion inByzantine Environments
Dahlia Malkhi, Ohad Rodeh, Michael K. Reiter , Yaron Sella
An Analytical Framework for Reasoning About Intrusions
Shambhu Upadhyaya, Ramkumar Chinchani and Kevin Kwiat
10:00-10:30 Coffee break
10:30-12:00 Session 4: Agreement Protocols
Session Chair: Suresh Rai, Lousiana State University, USA
Optimistic Validation of Electronic Tickets
Fernando Pedone
A Consensus Protocol Based on a Weak FailureDetector and
a Sliding Round Window
Michel Hurfin, Raimundo Macedo,Achour Mostefaoui, and Michel Raynal
Polynomial Time Synthesis of Byzantine Agreement
Sandeep S. Kulkarni, Anish Arora, Arun Chippada
2:00-3:30 Session 5: Application Level Fault Tolerance
Session Chair: Luca Simoncini, University of Pisa & CNR, Italy
Looking Ahead in Atomic Actions with Exception Handling
Alexander Romanovsky
Assessing Inter-Modular Error Propagation In Distributed Software
Arshad Jhumka, Martin Hiller, Neeraj Suri
Designing a Robust Namespace for Distributed File Services
Zheng Zhang, Christos Karamanolis
3:30 -4:00 Coffee break
4:00-5:30 Panel Session "Building Reliable Systems out of COTS Components"
Moderator: Farokh Bastani, University of Texas, Dallas
Panelists: Savio Chau, Nasa JPL
Matthew Chiramal, Nuclear Regulatory Commission
David Hislop, Army Research Office
Jeffrey M. Voas, Reliable System Technology
Mladen Vouk, Univ.of South Carolina
7:30-9:00 Banquet
Wednesday October 31, 2001
8:30-10:00 Session 6: Concise Contributions
Session Chair: Jie Xu, Durham University, UK
Message Logging Optimization for Wireless Networks
B. Yao and W. Kent Fuchs
Reducing Noise in Gossip-Based Reliable Broadcast
P.Kouznetsov, R.Guerraoui, S.B.Handurukande, A.-M.Kermarrec
Chasing the FLP Impossibility Result in a LAN
or How Robust Can a Fault Tolerant Server Be?
Peter Urban and Xavier Defago and Andre Schiper
Consensus with Written Messages Under Link Faults
Bettina Weiss, Ulrich Schmid
An Efficient TDMA Synchronization Approach for
Distributed Embedded Systems
Vilgot Claesson, Henrik L–nn, Neeraj Suri
Efficient Recovery Information Management Schemes for the
Fault Tolerant Mobile Computing Systems
Taesoon Park, Namyoon Woo and Heon Y. Yeom
10:00-10:30 Coffee break
10:30-12:00 Session 7: QoS and Real-Time Systems
Session Chair: Gerhard Fohler, Malardalen University, Sweden
Using the Timely Computing Base for Dependable QoS Adaptation
AntÛnio Casimiro and Paulo VerÌssimo
A Microkernel Middleware Architecture for Distributed
Embedded Real-Time Systems
U. Brinkschulte, A. Bechina, F. Picioroaga, E. Schneider
Th. Ungerer,
J.Kreuzinger, M. Pfeffer
Performance Analysis of the CORBA Notification Service
Srinivasan Ramani, , Kishor S. Trivedi, and Balakrishnan Dasarathy
1:30-3:00 Session 8: Mobile Systems
Session Chair: Nian-Feng Tzeng, University of Louisiana, USA
Reliable Real-Time Cooperation of Mobile Autonomous Systems
Stefan Schemmer, Edgar Nett, Michael Mock
On the Effectiveness of A Counter-Based Cache Invalidation Scheme
and Its Resiliency to Failures in Mobile Environments
Guohong Cao and Chita Das
Comparison-Based System-Level Fault Diagnosis in Ad-Hoc Networks
Stefano Chessa and Paolo Santi
TUTORIALS ON NOV. 5 -- WORKSHOPS ON NOV. 5 and NOV. 8
PRELIMINARY CONFERENCE PROGRAM
TUESDAY NOV. 6
9:00 - 9:15 OPENING REMARKS BY CHAIRS
Mike Reiter (Bell Labs, Lucent Technologies, USA)
Pierangela Samarati (Universita` di Milano, Italy)
9:15-10:30 INVITED TALK
Brian Snow
(Technical Director, Information Assurance Directorate,
National Security Agency, USA)
10:30- 11:00 - COFFEE BREAK
11:00-13:00 PASSWORD MANAGEMENT AND DIGITAL SIGNATURES
Error Tolerant Password Recovery
Niklas Frykholm, Ari Juels
(RSA Laboratories, USA)
Delegation of Cryptographic Servers for Capture-Resilient Devices
Philip MacKenzie, Michael K. Reiter
(Bell Labs, Lucent Technologies, USA)
Twin Signatures: An Alternative to the Hash-and-Sign Paradigm
David Naccache, David Pointcheval, Jacques Stern
(Ecole Normale Superieure, France)
BiBa: A New Signature Scheme for Broadcast Authentication
Adrian Perrig (UC Berkeley, USA)
14:00-15:30 ACCESS CONTROL
Policy Algebras for Access Control - The Propositional Case
Duminda Wijesekera, Sushil Jajodia
(George Mason University, USA)
A Chinese Wall Security Model for Decentralized Workflow Systems
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni
(Rutgers University, USA)
Design and Implementation of a Flexible RBAC-Service in an
Object-Oriented Scripting Language
Gustaf Neumann, Mark Strembeck
(Vienna University of Economics and BA, Austria)
15:30-16:00 COFFEE BREAK
16:00-17:30 MOBILE CODE AND DISTRIBUTED SYSTEMS
An Efficient Security Verification Method for Programs with
Stack Inspection
Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki
(Nara Institute of Science and Technology, Japan)
The Performance of Public Key-Enabled Kerberos Authentication
in Mobile Computing Applications
Alan Harbitter, Daniel A. Menasce`
(PEC Solutions Inc., USA - George Mason University, USA)
A New Approach to DNS Security (DNSSEC)
Giuseppe Ateniese, Stefan Mangard
(The Johns Hopkins University, USA)
19:00 - RECEPTION
WEDNESDAY NOV. 7
9:00-10:30 PROTOCOLS
Events in Security Protocols
Federico Crazzolara, Glynn Winskel
(University of Cambridge, England)
On the Relationship between Strand Spaces and Multi-Agent Systems
Joseph Y. Halpern, Riccardo Pucella
(Cornell University, USA)
Verifiable, Secret Shuffles of ElGamal Encrypted Data for
Secure Multi-Authority Elections
C. Andrew Neff (VoteHere Inc., USA)
11:00-13:00 SECURE DATA PUBLISHING AND CERTIFICATE MANAGEMENT
Tangler - A Censorship Resistant Publishing System Based On Document
Entanglements
Marc Waldman, David Mazieres
(New York University, USA)
Flexible Authentication of XML documents
Prem Devanbu, Michael Gertz, April Kwong, Chip Martel,
Glen Nuckolls, Stuart G. Stubblebine
(UC Davis, USA and Stubblebine Consulting, USA)
Interoperable Strategies in Automated Trust Negotiation
Ting Yu, Marianne Winslett, Kent Seamons
(University of Illinois at Urbana-Champaign, USA,
and Brigham Young Univeristy, USA)
Distributed Credential Chain Discovery in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitchell
(Stanford University, USA, and NAI Labs, USA)
13:00-14:00 LUNCH
14:00-15:30 PROTOCOL ANALYSIS
Bounded-Process Cryptographic Protocol Analysis
Jonathan Millen, Vitaly Shmatikov
(SRI International, USA)
On the Abuse-Freeness of the Garay-Jakobsson-MacKenzie
Two-Party Protocol
Rohit Chadha, Max Kanovich, Andre Scedrov
(University of Pennsylvania, USA)
The Faithfulness of Abstract Encryption
Joshua D. Guttman, F. Javier Thayer Fabrega, Lenore D. Zuck
(MITRE, USA - New York University, USA)
15:30-16:00 COFFEE BREAK
16:00-17:30 PANEL (TBA)
THURSDAY NOV. 8
8:30-10:00 CRYPTOSYSTEMS
OCB: An Authenticated-Encryption Mode for Emerging Cryptographic
Standards
Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
(UC Davis, USA - UC San Diego, USA - University of Nevada, USA)
Paillier's Cryptosystem Revisited
Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham,
Phong Q. Nguyen
(Universita` di Catania, Italy - IBM Research Yorktown
Heights, USA - Ecole Normale Superieure, France)
Securely Combining Public-Key Cryptosystems
Stuart Haber, Benny Pinkas
(InterTrust STAR Lab, USA)
10:00-10:30 COFFEE BREAK
11:00-12:30 GROUP KEY MANAGEMENT AND SIGNATURES
Formalizing GDOI Group Key Management Requirements in NPATRL
Catherine Meadows, Paul Syverson, Iliano Cervesato
(Naval Research Laboratory, USA)
Accountable-Subgroup Multisignatures
Silvio Micali, Kazuo Ohta, Leonid Reyzin
(MIT, USA - University of Electoro-Communications, Japan)
Provably Authenticated Group Diffie-Hellman Key Exchange
Emmanuel Bresson, Olivier Chevassut, David Pointcheval,
Jean-Jacques Quisquater
(Ecole Normale Superieure, France - Lawrence Berkeley National
Laboratory, USA - Microelectronic laboratory, Belgium)
A Practical Forward Secure Group Signature Scheme
Dawn Song (UC Berkeley, USA)
12:30 CLOSING
TUTORIALS AND WORKSHOPS
MONDAY NOV. 5
TUTORIAL 1: TOPICS IN INTRUSION DETECTION: CORRELATION AND
NETWORK-BASED APPROACHES
(Vern Paxson and Stuart Staniford)
TUTORIAL 2: SECURITY AND SOFTWARE ENGINEERING
(Stuart Stubblebine and Prem Devanbu)
WORKSHOP: SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
(http://www.star-lab.com/sander/spdrm)
THURSDAY NOV. 8 (13:30-18:30)
WORKSHOP: DATA MINING FOR SECURITY APPLICATIONS
(http://www.bell-labs.com/user/reiter/ccs8/mining-program.html)
Ciphers with Arbitrary Finite Domains
John Black, University of Nevada at Reno, USA
Phillip Rogaway, University of California at Davis, USA and
Chiang Mai University, Thailand
Known Plaintext Correlation Attack Against RC5
Atsuko Miyaji, Japan Advanced Institute of Science and Technology
Masao Nonaka, Japan Advanced Institute of Science and Technology
Yoshinori Takii, Japan Air Self Defense Force
The Representation Problem Based on Factoring
Marc Fischlin, Roger Fischlin
University of Frankfurt, Germany
On the Impossibility of Constructing Non-Interactive Statistically-Secret
Protocols from any Trapdoor One-Way Function
Marc Fischlin, University of Frankfurt, Germany
Observability Analysis: Detecting when Improved Cryptosystems Fail
M. Joye, Gemplus, France
J.-J. Quisquater, Universite Catholique de Louvain, Belgium
S.-M. Yen, National Central University, Taiwan
M. Yung, Certco, USA
Generic Chosen-Ciphertext Secure Encryption
J.-S. Coron, Gemplus, France
H. Handschuh, Gemplus, France
M. Joye, Gemplus, France
P. Paillier, Gemplus, France
D. Pointcheval, Ecole Normale Superieure, France
C. Tymen, Gemplus, France
Security of Encryption + Proof of Knowledge in the Random Oracle Model
Masayuki ABE, NTT Information Sharing Platform Laboratories, Japan
RSA-based Undeniable Signatures For General Moduli
Steven D. Galbraith, University of Bristol, UK
Wenbo Mao, Hewlett-Packard Laboratories, Bristol, UK
Kenneth G. Paterson, Royal Holloway, University of London, UK
On Hash Function Firewalls in Signature Schemes
Burt Kaliski, RSA Laboratories, USA
Homomorphic Signature Schemes
Robert Johnson, David Molnar, Dawn Song, David Wagner
University of California at Berkeley, USA
Transitive Signature Schemes
Silvio Micali, Ron L. Rivest
MIT, USA
Co-operatively Formed Group Signatures
Greg Maitland, Colin Boyd
Queensland University of Technology, Australia
Stateless-Recipient Certified E-mail System based on Verifiable Encryption
Giuseppe Ateniese, Cristina Nita-Rotaru
The Johns Hopkins University, USA
Secure Key Evolving Protocols for Discrete Logarithm Schemes
Cheng-Fen Lu, Shiuh-Pyng Shieh
National Chiao-Tung University, Taiwan
Proprietary Certificates
Markus Jakobsson, RSA Laboratories, USA
Ari Juels, RSA Laboratories, USA
Phong Nguyen, Ecole Normale Superieure, France
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman
Problem in Finite Fields under Conjecture
Qi Cheng, Shigenori Uchiyama
University of Southern California, USA
An ASIC implementation of the AES SBoxes
Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger
Graz University of Technology, Austria
Montgomery in Practice: How to Do It More Efficiently in Hardware
Lejla Batina, Geeke Muurling
Securealink bv., The Netherlands
Precise Bounds for Montgomery Modular Multiplication and Some Potentially
Insecure RSA Moduli
Colin D. Walter, UMIST, UK
Mist: An Efficient, Randomized Exponentiation Algorithm for Resisting
Power Analysis
Colin D. Walter, UMIST, UK
Fast Software Implementation of Multiplication in GF(2^m) Using Normal Bases
Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee
Pohang University of Science & Technology (POSTECH), Korea
Invited talks:
Ron L. Rivest, MIT, USA
Micropayments Revisited
(joint work with Silvio Micali)
Victor Shoup, IBM Research, Zurich
title to be announced
Call for Participation
ACM State-of-the-Art Summer School
on
Foundations of Internet Security
September 16-23, 2001, Duszniki Zdrój, Poland
For BASIC INFORMATION see http://www.ii.uni.wroc.pl/school/
Lecturers:
Verification of cryptographic protocols:
Catherine A. Meadows, Naval Research Laboratory, USA
Andrew D. Gordon, Microsoft Research, USA
Practical cryptography:
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Phillip Rogaway, University of California, Davis, USA
Intrusion detection:
Peter Stephenson, Netigy Corporation, USA
Information flow:
Peter Ryan, Carnegie Mellon University, USA
Language based security:
Fritz Henglein, IT University, Glentevej, Denmark
Dexter Kozen, Cornell University, USA
David Walker, Carnegie Mellon University, USA
Dan Wallach, Rice University, USA
Role-based access control:
Ravi Sandhu, George Mason University, USA
Program Committee:
Fritz Henglein, IT University, Glentevej, Denmark
Catherine A. Meadows, Naval Research Laboratory, USA
Leszek Pacholski (chair), University of Wroclaw, Poland
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Fees: regular - 500 US dollars
students and young faculty - 200 US dollars
accompanying person - 180 US dollars
Fees include full board accommodation (in triple or double room)
(single room for participants paying regular fee) and school materials.
A limited number of grants will be available.
Address
Summer School FIS'01
Institute of Computer Science
University of Wroc³aw
ul. Przesmyckiego 20
51-151 Wroclaw, Poland
school@ii.uni.wroc.pl}
phone (+48) 71-3247344
fax (+48) 71-3251271
The goal of the meeting is to bring state-of-the art knowledge on the
theory and tools that can be applied to enhance the security of the
Internet.
The program of the school will include cryptography, design of
secure (cryptographic) network protocols, crypto protocol
verification, intrusion detection, security of distributed computing,
and security of mobile code, including proof carrying code and
byte-code verification. The focus of the school will be intentionally
broad so that students can acquire, not only information about
particular topics they may be interested in working on, but awareness
of security in all its different aspects. We shall concentrate
primarily on the theoretical basis of network and distributed systems
security, but we will also emphasize the connection with applications.
Thus our lecturers will include not only prominent researchers in the
theory of computer security, but those with practical experience who
can give insight into applying this theory to real-world problems. We
thus expect that participants in the school will gain knowledge that
will help them both to carry on research in this area and to build tools
applicable in practice.