Hilarie Orman, Editor | Robert Bruen, Book Review Editor |
Sven Dietrich, Associate Editor | Editor, Reader's Guide |
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
IEEE Internet Computing Special Homeland Security Issue
Guest Editors
"Homeland security" is a major concern for governments worldwide,
which must protect their populations and the critical infrastructures
that support them, including power systems, communications, government
and military functions, and food and water supplies. In this special
issue, we seek contributions describing the role of Internet and
information technologies in homeland security, both as an
infrastructure to be protected and as a tool for enabling the defense
of other critical infrastructures.
On one hand, information technology can be used for mitigating risk
and enabling effective responses to disasters of natural or human
origin. However, its suitability for this role is plagued by questions
ranging from dependability concerns to the risks that some
technologies -- surveillance, profiling, information aggregation, and
so on -- pose to privacy and civil liberties.
On the other hand, information technology is itself an infrastructure
to be protected. This includes not only the Internet infrastructure
but also the complex systems that control critical infrastructure such
as energy, transportation, and manufacturing. While control systems
have traditionally been proprietary and closed, the trend toward the
use of standard computer and networking technologies coupled with the
use of more open networks for communication makes these systems
increasingly vulnerable to catastrophic attacks and failures.
We invite researchers and information technologists to submit original
articles on the use of Internet and information technologies for
homeland security and on the protection of critical technology
assets. Of particular interest are articles that describe technology
within the context of an actual deployment or initiative in homeland
security. Indeed, articles focusing on these larger initiatives or the
policy debates surrounding them are also welcome, provided that they
offer a strong technology component. Articles detailing technology
without a compelling application to homeland security are
discouraged. Commercial advertisements will be rejected.
Relevant topics include, but are not limited to:
For more information, please see http://www.computer.org/internet/call4ppr.htm
The aim of this workshop is to provide a forum for continued activity
in this area, to bring computer security researchers in contact with
the LICS'04 and ICALP'04 communities, and to give LICS and ICALP
attendees an opportunity to talk to experts in computer security. We
are interested both in new results in theories of computer security
and also in more exploratory presentations that examine open questions
and raise fundamental concerns about existing theories.
Topics include, but are not limited to:
The 2004 International Conference on Information and Communications
Security will be the sixth event in the ICICS conference series,
started in 1997, that brings together individuals involved in multiple
disciplines of Information and Communications Security in order to
foster exchange of ideas. Original papers are solicited for
submission.
Areas of interest include but are not limited to:
The objective of this workshop is to bring together researchers from
research communities in wireless networking, security, applied
cryptography, and dependability; with the goal of fostering
interaction. With the proliferation of wireless networks, issues
related to secure and dependable operation of such networks are
gaining importance. Topics of interest include, but are not limited
to:
new calls or announcements added since Cipher E58
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
November/December 2004. (submissions due April 1, 2004) [posted 02/18/04]
Michael Reiter - Carnegie Mellon University
Pankaj Rohatgi - IBM T.J. Watson Research Center
Composition issues authentication
Formal specification availability and denial of service
Foundations of verification covert channels
Information flow analysis cryptographic protocols
Language-based security confidentiality
Logic-based design for integrity and privacy
Program transformation intrusion detection
Security models malicious code
Static analysis mobile code
Statistical methods mutual distrust
Trust management security policies
For more details, see: http://www.cs.chalmers.se/~andrei/FCS04/.
For more information, see http://icics04.lcc.uma.es for details.
More information can be found at http://www.ece.cmu.edu/~adrian/wise2004
Commentary and Opinion
Robert Bruen's review of Security Warrior by Peikari, Cyrus and Anton Chuvakin
Robert Bruen's review of Hacking. The Art of Exploitation by Jon Erikson
Robert Bruen's review of Security Assessment Case Studies for Implementing the NSA IAM by Miles, Greg, Russ Rogers, Ed Fuller, Matthew Hoagberg and Ted Dykstra
NewsBits:
Announcements and correspondence from readers (please contribute!)
"Networked computers reside at the heart of systems on which
people now rely, both in critical national infrastructures
and in their homes, cars, and offices. Today, many of these systems
are far too vulnerable to cyber attacks that can inhibit their
function, corrupt important data, or expose private information."
Nominations are invited for the next Editor-in-Chief of ACM
Transactions on Information and System Security.
Self-nominations are
welcome. Candidates should be well-established researchers in
Computer Security who have sufficient experience serving on program
committees and journal editorial boards. Candidates are asked to send
a current curriculum vita and a brief (one to three pages) statement
of vision for TISSEC to: Gul Agha, Chair, ACM TISSEC EIC Search
Committee, agha@cs.uiuc.edu,
by April 20, 2004. Nominations received after April 20 will
be considered up until the position has been filled.
Reader's guide to recent security and privacy literature
(last updated March 15, 2002)
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
New address:
Charles N. Payne, Jr.
Member, Technical Staff
Adventium Labs
100 Mill Place
111 Third Avenue South
Minneapolis, MN 55401 USA
http://www.adventiumlabs.org
EMAIL: charles.payne@adventiumlabs.org
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |