News Bits


October 24, 2002

Correspondence from Gene Spafford, CERIAS, Purdue University

In May of this year, CERIAS and Accenture convened a two-day roundtable of experts to discuss the causes, solutions, and nature of challenges to security in a world of wireless connectivity. The group included notables from academia, government, and industry who participated in a variety of facilitated discussions.

The result of these deliberations was captured and reduced to a set of documents that are now available on-line. These reports are intended for policymakers, vendors, and end-users. Included is an executive summary, a full report, and a "best-practices" document for organizations considering deployment of wireless systems.

Copies of the "Roadmap to a Safer Wireless World" documents may be downloaded from www.cerias.purdue.edu/securitytrends/.


November 10, 2002

The IEEE Computer Society has named George Cybenko as the first Editor in Chief of the new IEEE Security & Privacy Magazine for 2003-2004. George is the Dorothy and Walter Gramm Professor of Engineering in the Thayer School of Engineering at Dartmouth College.  He brings to the project extensive leadership experiences with IEEE publications as well as a long history of achievements  in computer security. Congratulations George!

IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.

The magazine concept was developed by a Task Force which earlier this year published a supplement to IEEE Computer. That supplement and other details about Security & Privacy Magazine can be found at www.computer.org/security.

 


November 4, 2002

Correspondence from Carl Landwehr:

Carl Landwehr would like to remind Cipher readers that the next deadline for proposals to NSF's continuing Trusted Computing program is coming up on Wednesday, December 4, 2002.

A description of the research projects funded in the first year of the program (including related NSF CAREER and ITR awards), with pointers to proposal abstracts, can be found directly at: www.cise.nsf.gov/fndg/pubs/display.cfm?pgm_pims_id=5158&pgm_supp_id=10091&loc=fndg_ops&pub_id=5370 or, alternatively by visiting: www.cise.nsf.gov and then selecting "funding opportunities" [then "Announcements and Solicitations"] and selecting "trusted computing".

Carl encourages you to take a look at these pages and consider submitting a proposal this year.

 


 

This is surely old news by now, but between issues of Cipher, the President's Critical Infrastructure Protection Board released (on September 18, 2002) to the public the "National Strategy to Secure Cyberspace - Draft for Comment."  The Strategy is posted on www.securecyberspace.gov for review. (the comment period closed November 18, 2002)

You can stay current on the latest new on the Homeland Security Department at www.whitehouse.gov/homeland/.

 


News Bits contains correspondence, interesting links, non-commercial announcements and other snippets of information the editor thought that Cipher readers might find interesting.