Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment is now available from the Institute for Security Technology Studies.
A Call for Papers has been issued for the ACM Workshop on Scientific Aspects of Cyber Terrorism, taking place on November 21, 2002 in Washington D.C. More information about submissions and the workshop are available at:
This article in the L.A. Times is testament to the need for information security on all machines - personal or professional. It talks about compromising home PCs with high speed connections and about CERT’s recent warning that home users need to be watching for malicious activity.
A reminder that the ACSAC Committee is currently soliciting papers, panels, forums, case studies, and tutorial proposals for ACSAC. This conference is internationally recognized by information system security engineers, practitioners, and researchers as the place to
exchange practical ideas about solving critical security problems. Approximately 300 attendees are expected with a mix of 70% industry, 20% government, and 10% academia. Last year, about half the papers submitted were from outside the U.S.; we welcome global participation and attendance.
The deadline for submissions is June 1, 2001. For general information or questions about ACSAC, please see our web page at http://www.acsac.org or email Publicity_Chair@acsac.org For specific submission-related information, please see the following web page: http://www.acsac.org/2001/cfp
The security of data speeding along wireless networks should be a critical concern when deploying new connections, according to a report presented at the United Nations.
Fingerprinting schemes embed a fingerprinting sequence in a
digital object to construct an individualized version for each buyer.
A c-secure fingerprinting system can be used to identify at least
one of the colluders if a pirate object is constructed by a collusion
of up to c colluders. A ‘marking assumption’ determines possible
pirate objects (fingerprints) that the colluders can construct. We review
existing marking assumptions and their corresponding fingerprint codes,
and propose an extension that reflects the attack where the colluders
remove part of the object.
The facilitator of this program is Reihaneh Safavi-Naini of the University of Wollongong.
|
Edward J. Delp, Professor of Electrical Engineering and Professor of Biomedical Engineering, has received an honorary doctorate from the Tampere University of Technology. Delp’s citation states:
CERIAS’ CIRDB project has been recommended by the The Open Web Application Security Project’s Guide to Building Secure Web Applications.
The free vulnerability notification service Cassandra is now serving
relevant Secunia advisories, without any extra work from users.
Papers are now being accepted for the 4th Annual IEEE Information Assurance workshop that will be held at West Point this coming June. If you are interested in submitting a paper, the suspense is 12 February. Registration will begin in mid-February.