News Bits
October 24, 2002
Correspondence from Gene
Spafford, CERIAS, Purdue University
In May of this year, CERIAS and Accenture convened a two-day
roundtable of experts to discuss the causes, solutions, and nature of
challenges to security in a world of wireless connectivity. The
group included notables from academia, government, and industry who
participated in a variety of facilitated discussions.
The result of these deliberations was captured and reduced to a set
of documents that are now available on-line. These reports are
intended for policymakers, vendors, and end-users. Included is an
executive summary, a full report, and a "best-practices" document for
organizations considering deployment of wireless systems.
Copies of the "Roadmap to a Safer Wireless World" documents may be
downloaded from
www.cerias.purdue.edu/securitytrends/.
November 10, 2002
The IEEE Computer Society has named George Cybenko as the first Editor in
Chief of the new IEEE Security & Privacy Magazine for 2003-2004.
George is the Dorothy and Walter Gramm Professor of Engineering in the
Thayer School of Engineering at Dartmouth College. He brings to the
project extensive
leadership experiences with IEEE publications as well as a long history
of achievements in computer security. Congratulations George!
IEEE Security & Privacy provides a unique combination of research articles,
case studies, tutorials, and regular departments covering diverse aspects
of information assurance such as legal and ethical issues, privacy
concerns, tools to help secure information, analysis of vulnerabilities
and attacks, trends and new developments, pedagogical and curricular
issues in educating the next generation of security professionals,
secure operating systems and applications, security issues in wireless
networks, design and test strategies for secure and survivable systems,
and cryptology.
The magazine concept was developed by a Task Force which earlier this
year published a supplement to IEEE Computer. That supplement and other
details about Security & Privacy Magazine can be found at
www.computer.org/security.
November 4, 2002
Correspondence from Carl Landwehr:
Carl Landwehr would like to remind Cipher readers that the next deadline for
proposals to NSF's continuing Trusted Computing program is coming up on
Wednesday, December 4, 2002.
A description of the research projects funded in the first year of the
program (including related NSF CAREER and ITR awards), with pointers to
proposal abstracts, can be found directly at:
www.cise.nsf.gov/fndg/pubs/display.cfm?pgm_pims_id=5158&pgm_supp_id=10091&loc=fndg_ops&pub_id=5370
or, alternatively by visiting:
www.cise.nsf.gov and then selecting "funding opportunities"
[then "Announcements and Solicitations"] and selecting "trusted computing".
Carl encourages you to take a look at these pages and consider submitting a
proposal this year.
This is surely old news by now, but between issues of Cipher,
the President's Critical Infrastructure Protection Board released
(on September 18, 2002) to the public the "National Strategy to
Secure Cyberspace - Draft for Comment." The Strategy is posted on
www.securecyberspace.gov
for review. (the comment period closed November 18, 2002)
You can stay current on the latest new on the Homeland Security
Department at
www.whitehouse.gov/homeland/.
News Bits contains correspondence, interesting links, non-commercial announcements and other snippets of information the editor thought that Cipher readers might find interesting.