Date: Sun Mar 31 21:00:38 EST 1996 From: coast-request@cs.purdue.edu (Coast Watch maintainers) Reply-To: Coast-request@cs.purdue.edu Subject: Coast Watch Digest V2 #2 To: important-people@cs.purdue.edu (Coast Watch subscribers) Coast Watch Digest Sun, 31 Mar 96 Volume 2 : Issue 2 Today's Topics: Administrivia Electronic CIPHER, Issue 13, March 31, 1996 ISOC SNDSS IV 96 - report Call for Proposals: CERT Co-ordination Centre Call for participation: SDNE'96 11th ACSAC Advanced Program Internet Security Call for Papers SANS96 Final Program The "Coast Watch" newsletter is intended as an irregular electronic digest of information about the COAST Laboratory and Project at Purdue University. It is distributed via e-mail to colleagues, sponsors, and friends of COAST. To subscribe or unsubscribe from the newsletter, send mail to the maintainers at . Past issues of the newsletter, as well as information on COAST, may be obtained via WWW at http://www.cs.purdue.edu/coast ---------------------------------------------------------------------- From: spaf (Gene Spafford) Subject: Administrivia Date: Sun Mar 31 21:00:00 EST 1996 See, I said the next issue would come soon! Since our last issue, we had our dedication for the COAST Lab. We'll have some news on that in the next newsletter, along with some other items of possible interest. The second item in this issue is a letter by Carl Landwehr as published in the most recent issue of "Cipher" and reprinted with his permission. I've added some comments as to why I thought it worth reprinting here. Your mileage may vary. Following that, we have a report from COAST'er Christoph Schuba on this year's ISOC SNDSS symposium. And that is followed by a rather unique call for proposals. The remainder of this issue is basically about conferences. Enclosed are several calls for papers and conference programs. All are related to computer or network security and therefore might be of interest. Enjoy spring, and beware of April Fool's security pranks! --spaf PS. In the last issue, I gave a URL for the "Computer Crime" book that was incorrect. The correct URL is . Also, "Practical Unix & Internet Security" went to the printer on March 18, and should be available sometime in the next few days. See COAST Watch 2(1) for details. ------------------------------ From: To: Subject: Electronic CIPHER, Issue 13, March 31, 1996 Date: Sun, 31 Mar 1996 03:06:35 -0500 [The IEEE Technial Committee on Security and Privacy publishes its newsletter, "Cipher," in electronic form. This is a great on-line resource on information security. In issue #13, Cipher's editor, Carl Landwehr, wrote a letter that struck me as capturing a sense of the wide-ranging changes that are on-going in our field. I think it also captures a certain irony -- as Carl notes, we have several reports of major security flaws in widely deployed software, and several significant security problems. Meanwhile, law-makers in the US seem more concerned with pictures of naked people than with some of the more significant security problems. Meanwhile, in many countries, the governments seem to be more concerned with regulating one of our major tools against computer misuse (cryptographic methods) rather than doing anything to support network security. And through it all, several commercial firms seem hell-bent on forging ahead with using the Internet for commerce despite everything else that may be happening. Carl ends with "Any questions?" but I find his snapshot raising many more than it answers. With Carl's permission, I have excerpted his letter here. I have also included the information block on how to subscribe to Cipher and get back issues. --spaf] Dear Readers, Since our Valentine's Day issue, serious security flaws have been reported in Kerberos 4, Java, JavaScript, and Microsoft's Internet Information Server. Los Alamos National Laboratory suffered an(other) embarrassing intrusion when a hacker penetrated a firewall there. But Los Alamos was not alone; the Justice Department identified an Argentinian youth as the intruder in a variety of U.S. systems in the last half of 1995 (his equipment had been confiscated at the end of December). The significance of this case seems to be that it is the first time a wiretap warrant has been obtained on a telephone line connected to a computer. The warrant was needed because the system being monitored did not provide a warning banner that its communications might be monitored. On the legislative front, while a legal challenge to the Communications Decency Act (CDA) is underway in Philadelphia courtroom, a router vendor is planning to market a product that would give Internet service providers a tool for filtering all traffic sent to a given connection. The White House has evidently received lots of e-mail, both legitimate and spam, in the wake of the CDA. Some anti-spamming software installed on the White House mail system has evidently been put to good use. Time Magazine technology writer Philip Elmer-Dewitt could use a copy of it, as he fell victim to a similar assault. New legislation to address the content of Internet communications, cryptography use and export rules, and copyright are in various stages of consideration in the U.S. Most recently, Senator Burns of Montana announced at the Computers, Freedom and Privacy conference that he will introduce legislation to allow unrestricted export of mass market or public domain encryption programs such as PGP and to prohibit the imposition of mandatory key-escrow encryption policies on the domestic market. >From Europe, reports are that Belgium may assume France's role as the country most strictly controlling the use of encryption. As France seems ready to trade its policy permitting the use only of authorized encryption schemes, for one that might only require that keys be deposited with a to-be-specified trusted third party, Belgium turns out to have passed a law over a year ago that includes constraints similar to the former French ones. On the electronic commerce front, American Express has joined Visa and Mastercard in endorsing the SET specifications, which are now available for downloading at . Digicash teamed with European Internet service provider EUnet and Finland's largest bank, Merita, to launch their ecash system. Half a dozen organizations, primarily media-related services, are reported willing to accept ecash as payment. Oracle announced it will collaborate with Verisign, incorporating Verisign Digital IDs in its WebServer release 2.0 in order to provide cryptographically- based authentication of parties to electronic transactions. Cybercash announced several new agreements as well. Any questions? Carl Landwehr Editor, Cipher ======================== SUBSCRIPTIONS: Two options: 1. To receive the full ascii CIPHER issues as e-mail, send e-mail to (which is NOT automated) with subject line "subscribe". 2. To receive a short e-mail note announcing when a new issue of CIPHER is available for Web browsing or downloading from our ftp server send e-mail to (which is NOT automated) with subject line "subscribe postcard". To remove yourself from the subscription list, send e-mail to cipher-request@itd.nrl.navy.mil with subject line "unsubscribe". Those with access to hypertext browsers may prefer to read Cipher that way. It can be found at URL http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher BACK ISSUES: There is an archive that includes each copy distributed so far, in ascii, in files you can download at URL http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/cipher-archive.html There is also an anonymous FTP server that contains the same files. To access the archive via anonymous FTP: 1. ftp www.itd.nrl.navy.mil 2. At prompt for ID, enter "anonymous" 3. At prompt for password, enter your actual, full e-mail address 4. Once you are logged in, change to the Cipher Directory: cd pub/cipher 5. Now you can request any of the files containing Cipher issues in ascii. Issues are named in the form: EI#N.9506 where N is the number of the issue desired and 9506 captures the year and month it first appeared. ------------------------------ From: "Christoph L. Schuba" To: COAST Subject: ISOC SNDSS IV 96 - report Date: Mon, 25 Mar 1996 09:00:40 -0800 Report on the Internet Society Symposium on Network and Distributed System Security by Christoph L. Schuba (schuba@cs.purdue.edu, schuba@parc.xerox.com) The forth symposium on network and distributed system security (SNDSS) was held at the Princess Hotel in San Diego, CA on February 22-23, 1996. This one-track symposium was sponsored by the Privacy and Security Research Group of the Internet Research Task Force with support from the Internet Society (ISOC). The symposium was well attended, with about 300 registered attendees. Thursday consisted of four sessions, two of which were panel discussions. The refereed paper sessions addressed electronic mail security, distributed object systems, and distributed system security. The panels discussed scalability of security in distributed object systems and intellectual property protection. After the dinner banquet, Henry Kluepfel (Vice President, SAIC) was invited to speak about "Security and Fraud on the Information Superhighway". The last scheduled activity for the day was a BOF on security in Java. Friday consisted again of four sessions, the last one was a panel discussion on public-key infrastructure. The other sessions covered aspects of network security, key management, and encryption. The purpose of the symposium is to bring together people who are building software and/or hardware to provide network and distributed system security services. It has a focus on practical aspects, such as actual system design, and implementation. It targets researchers, implementors, and users of network and distributed systems facilities. Forty submissions for refereed papers, panels, and BOFs and the work of the program committee resulted in an outstanding symposium program. Thursday, February 22 Morning James Ellis (general chair, CERT) opened the symposium with welcoming remarks and thanks to the chairs that brought the symposium together: Donna Leggett (registration chair), Thomas Hutton (local arrangement chair), Stephen Welke (publication chair), Clifford Neuman and David Balenson (Program Chairs), the session chairs Stephen Kent, Danny Nesset, Michael Roe, Peter Neumann, Matt Bishop, Burt Kaliski, Avi Rubin, and Warwick Ford, the rest of the Program Committee, and a number of external reviewers. The first session regarding "Electronic Mail Security" was chaired by Stephen Kent (BBN) and featured two talks. The first talk was given by Ceki Gulcu (IBM) (joint work with Gene Tsudik) with the title "Mixing E-mail with BABEL". Gulcu discussed the goals and desired properties of anonymous email, such as availability of the service to anyone, strong guarantee of anonymity, minimal trust in remailers, and a resistant remailer infrastructure against attack. He then introduced the design and salient features of the BABEL anonymous remailer. The basic idea is that the sender repeatedly encrypts the message with the public keys of the remailers that are on the forward path to the destination. Return path information is included in the message to enable replies. This approach has its obvious scalability problems, but is resistant to a number of active and passive attacks, and assumes little trust in intermediate remailers. A prototype implementation is based on freely available software: Perl and PGP. The following presentation was given by Kazuhiko Yamamoto (Nara IST, Japan) who described and demonstrated a design for the "Integration of PGP and MIME". The advantage is obvious: combining PGP's privacy services and MIME's capability of exchanging multipart, multimedia documents offers privacy for any non-textual documents. The design allows for the embedding of PGP objects into MIME with a backward compatibility with PGP. It offers confidentiality and authenticity on a whole MIME message, or only selected parts. A prototype was implemented in Emacs LISP and is operational on various emacs platforms. The second session in the morning was titled "Distributed Object Systems". Dan Nessett (Sun Microsystems) chaired this session that contained one presentation of a refereed paper and one panel discussion. The sole paper in this session was presented by Nicholas Yialelis (joint work with Morris Sloman, both Imperial College London, UK). He described a "Security Framework Supporting Domain Based Access Control in Distributed Systems". Explicit goals of this work are to provide a security platform for distributed applications that makes access control and authentication mechanisms transparent to the application level, and to support the enforcement of access control policies that are specified using management domains. The latter has the advantage that policies can be specified in terms of groups of objects. Therefore it is not necessary to specify policies for possibly millions of individual objects in large scale systems. The architecture provides for a host manager server that is present on all hosts and supports the host manager object, an authentication agent object, and an access control agent object. The provided security is transparent to the applications, and only few modifications are necessary at the applications servers. The components communicate with their remote peers via secure channels. A prototype implementation is underway in the CORBA-compliant Orbix environment. Bret Hartman (BlackWatch Technology), Dan Nessett, and Nicholas Yialelis served on the following panel. The objective of the panel was to discuss the question of "Scalability of Security in Distributed Object Systems". Hartman began with a brief overview of the problem area. To manage a set of objects, rather than the individual objects separately is a powerful mechanism. The challenges include how to compose policies that are specified on sets of objects, if compositions can scale in the presence of complex security requirements, and how different solutions to the previous two challenges might interoperate. Dan Nessett provided three example applications of large scale distributed object systems to explore the applicability and advantages of security policy domains. The examples addressed the question of federated domains, federated domains with transitive trust requirements, and security policy updates. The first two examples centered around the insight that technical solutions are necessary but not sufficient to provide good security. The search for higher level solutions must go on, and a true solution will in addition to technical aspects have many other facets, such as nondisclosure agreements, trust, object domains, ...and lots of lawyers. Afternoon The third session was on "Distributed System Security". Michael Roe (University of Cambridge, UK) chaired this session. Jonathan Trostle (CyberSAFE) spoke first, about "A Flexible Distributed Authorization Protocol" (joint work with Clifford Neuman, ISI). The work is based on the observation that considerable effort has been put into creating interoperability among authentication methods, but authorization methods have received far less attention. Trostle presented a flexible authorization protocol that provides the full generality of restricted proxies while supporting the functionality of and interoperability with existing authorization models, such as OSF DCE, and SESAME V2. Trent Jaeger (University of Michigan) presented "Preserving Integrity in Remote File Location and Retrieval" (joint work with Avi Rubin, Bellcore). Jaeger's work addresses the two problems of locating files and verification of file integrity in the presence of untrusted networks, or mobile systems with little memory. He described a service that provides the capability to automatically locate, retrieve, and verify files specified by a client using a single trusted principal, a certification authority (CA). CAs generate and sign certificates that associate an author with a file and a cryptographic digest of the file. Automated location is possible because all remote files are published with location servers. Takahiro Kiuchi (University of Tokyo) presented the final speech in this session titled "C-HTTP - The Development of a Secure, Closed HTTP-Based Network on the Internet" (joint work with his colleague Shigekoto Kaihara). The components of the system are a client-side proxy, a server-side proxy, and a C-HTTP name server. Client-side proxies and server-side proxies communicate with each other using a secure encrypted protocol while communication between a user agent and its client-side proxy or an origin server and server-side proxy are performed using current HTTP/1.0. The C-HTTP based secure, encrypted name and certification service is used, instead of the DNS. The aim of C-HTTP is to assure institutional level security, in contrast to other secure HTTP protocols currently proposed which are oriented toward secure end-user to end-user HTTP communications. The last session of the day, "Intellectual Property Protection", was chaired by Peter Neumann (SRI). The panel consisted of brief presentations by the panelists and a question and answer session. Olin Sibert (Electronic Publishing Resources) proposed a decentralized approach to electronic publishing of intellectual property. Components of such an approach are decentralized servers, 'crypto (un)lock' technology for making documents (in)accessible, and 'local' participation and enforcement of end systems. Olin also advocated the view that in the business world security requirements differ from military requirements. Russ Housley (Spyrus) represented a vendor of PCMCIA crypto hardware for metering remote use. Dan Boneh (Princeton University) described a method of using public key cryptography to mark complex documents, such as images, to allow the owner of the document to identify each authorized copy and its owner. The scheme can protect against collusion. It fails if automated tools can be utilized to remove the protecting fingerprints, such as spacing in text documents. A number of different topics were addressed during the following question and answer period. Peter Neumann asked if electronic commerce products can be made secure? The joint opinion of all panelists concluded that this is impossible, and that the real question is how to make the publishing systems resilient enough, such that fraud is limited to an acceptable level. The remaining questions centered around Boneh's work on fingerprinting documents. It was asked if the assumption that products can be associated with the initial purchaser is reasonable, and if so, how much this violates personal privacy issues. The last question discussed if there are methods of fingerprinting that do not affect the artistic contents of the work. Friday, February 23 Morning The first session on the second day on "Network Security" was chaired by Matt Bishop (UC Davis). This session included three presentations. Jonathan Stone (Stanford University) described "Designing an Academic Firewall: Policy, Practice, and Experiences with SURF" (joint work with colleagues Michael Greenwald, Sandeep Singhal, and David Cheriton). The interesting premise of this work was that corporate firewall designs are neither effective nor appropriate for academic or corporate research environments. The research group built the Stanford University Research Firewall (SURF). The policy implemented by this firewall allows less restrictive outward information flow than the traditional model. Services, such as e-mail, WWW, and anonymous FTP work transparently for internal users. SURF was constructed using off-the-shelf software and hardware components. Secondly, Sandra Murphy (TIS) described "Digital Signature Protection of the OSPF Routing Protocol" (joint work with colleague Madelyn Badger). The talk reported on work in progress to protect the OSPF routing protocol through the use of cryptography, specifically digital signatures. The routing information is signed with an asymmetric cryptographic algorithm, allowing each router recipient to check the source and integrity of the information. Murphy discussed fundamental issues in security of routing protocols, reviewed the basics of OSPF operation, the proposed design, and remaining vulnerabilities (such as the age field not being protected by the keyed hash). Michael Roe (University of Cambridge, UK) concluded the session by his "Case Study of Secure ATM Switch Booting" in the context of the Fairisle ATM switch environment (joint work with his colleague Shaw-Cheng Chuang). Roe examined a few techniques for booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of the techniques assumed a different trust model. The work assumes an open multi-service network where ATM switches are booted with third party software, possibly even using a third party booting service. In that environment it is important to ensure that the switches are booted with authorized and authenticated boot code. Michael examined the threats and presented schemes of countering the threats. The sixth session of the symposium was on "Key Management", chaired by Burt Kaliski (RSA). Hugo Krawczyk (IBM T.J. Watson) began with a discussion of "SKEME, A Versatile Secure Key Exchange Mechanism for Internet". SKEME constitutes a compact protocol that supports a variety of realistic scenarios and security models over the Internet. It provides clear tradeoffs between security and performance as required by the different scenarios without incurring unnecessary system complexity. The protocol supports key exchange based on public keys, key distribution centers, or manual installation, and provides for fast and secure key refreshment. Additionally, SKEME selectively provides perfect forward secrecy, allows for replaceability and negotiation of the underlying cryptographic primitives, and addresses privacy issues as anonymity and repudiatability. The final talk before lunch was given by Carlisle Adams (BNR, Canada) on "IDUP and SPKM: Developing Public-Key Based APIs and Mechanisms for Communication Security Services". Carlisle discussed the progress in the development of APIs and mechanisms which provide a comprehensive set of security services to application developers. Existing APIs, though similar, are developed for distinct environments: the session API (GSS) is aimed at the on-line real-time messaging environment; the store-and-forward API (IDUP) is particularly suited for electronic-mail types of environments. Both APIs were designed to be easy to use, yet with appropriate public-key-based mechanisms include many necessary services for communication security, such as data origin authentication, data confidentiality, data integrity, and support for non-repudiation. A full key management and certification infrastructure can be provided by implementations of these APIs/mechanisms in a way which is completely transparent to the calling application, thus ensuring maximum flexibility and scalability to future environments. Afternoon Avi Rubin (Bellcore) opened the seventh session on "Encryption", encompassing three presentations. Iskender Agi (SRI) presented "An Empirical Study of Secure MPEG Video Transmissions" (joint work with colleague Li Gong). MPEG is an industrial strength standard for video processing and is widely used in multimedia applications in the Internet. No security provision is specified in the standard. The speakers conducted an experimental study of previously proposed selective encryption schemes for MPEG video security. This study showed that these methods are inadequate for sensitive applications. Agi also discussed the tradeoffs between levels of security and computational and compression efficiency. The second presentation titled "Parallelized Network Security Protocols" described a joint effort by Erich Nahum, David J. Yates (both University of Massachusetts), Sean O'Malley, Hillarie Orman, and Richard Schroeppel (all University of Arizona). The premise is that shared-memory multiprocessors make attractive server platforms. The paper is an experimental performance study that examines how encryption protocol performance can be improved using parallelism. The authors show linear speedup for several different Internet-based cryptographic protocol stacks running on a symmetric shared-memory multiprocessor using two different approaches to parallelism. The last presentation was by David A. Wagner (UC Berkeley) who spoke about a TCP/IP security extension for MS-DOS systems "A 'Bump in the Stack' Encryptor for MS_DOS Systems" (joint work with Steven Bellovin, AT&T Bell Labs). Source code is not readily available for MS-DOS systems. Therefore, Wagner implemented the IP security extensions using the packet driver interface. The IPSEC module sits between the generic Ethernet driver and the hardware driver; it emulates each to the other. The work showed that it is possible to add IP security features by exploiting open interfaces. However, the implementation has several problems, such as the duplication of functionality (IP fragmentation). The final session of the symposium was a panel on "Public-Key Infrastructure". Chair and moderator Warwick Ford (BNR) introduced the panel members and gave brief comments on the importance of the topic. He also acknowledged that the subject was too broad, and restricted it to the question of how many credentials are needed. The panelists gave short presentations and answered several questions from the audience. John Wankmueller (MasterCard International) stressed one point in his presentation: MasterCard and VISA take a different approach to certification than most other other systems: they try to establish that a valid account is used, not the identity of the user. Authenticating account numbers is in a sense obscuring the identity of users. Wankmueller then presented the architecture of a certification hierarchy that was developed to secure MasterCard electronic commerce transactions. Taher ElGamal (Netscape) focussed on the importance of user friendly and transparent security features. It therefore did not matter how many certificates were needed, if all the user has to do is to click on an icon to commit to a transaction, and the software beneath it determines which certificate is needed. There will most likely be a multitude of certificates: identity type, authorization type, and special purpose certificates. Universal certificates are possible to design, but complicated. Different countries have different styles (e.g., phone cards). ElGamal claimed that a likely outcome is to have about as many important certificates as plastic cards in one's wallet. Michael Baum (Verisign) represented the commercial public-key infrastructure service provider perspective. He asked if the lack of a single certificate is really a problem. He focussed on the practices and the legal side. The remainder of the time was spent with questions from the floor. Steve Kent observed that there is no need for multiple credentials not only because of different types of identity, but also because of context of identity. Bob Abbott challenged the trust in the system by asking what recourse customers have against fraudulent merchants. ------------------------------ From: martin@terena.nl (John Martin) To: fsig-europe@procert.cert.dfn.de, first-teams@first.org, wg-all@terena. nl, semper@uetliberg.zurich.ibm.ch, e2s@ansa.co.uk, ice@darmstadt.gmd.de, r ipe-list@ripe.net Subject: Call for Proposals: CERT Co-ordination Centre Date: Wed, 27 Mar 1996 15:53:31 +0000 Dear Security Experts, Apologies if you receive this more than once - please feel free to pass this on to other interested parties. In its meeting of 12 March 1996 the TERENA Executive Committee decided to publish a call for proposals for a 'CERT Co-ordination Centre' to solicit tenders for the operation of a European support unit for Computer Emergency Response Teams (CERTs). The text of the call is available at: http://www.terena.nl/projects/cert/ Proposals are expected before 15 April 1996. For further information please contact Ariel Sobelman at the TERENA Secretariat. Yours sincerely, Karel Vietsch TERENA Interim Secretary-General ------------------------------ From: peter honeyman To: spaf Subject: Call for participation: SDNE'96 Date: Sat, 23 Mar 1996 16:28:41 -0500 This call is available at: http://www.citi.umich.edu/sdne.html or http://www.comp.lancs.ac.uk/computing/research/mpg/calls/sdne/sdne_info.html ============================================================================= CALL FOR PARTICIPATION Third International Workshop on Services in Distributed and Networked Environments (SDNE '96) 3 - 4 June 1996 Hotel Royal, Estrada Da Vitoria Macau ============================================================================= Sponsored by the IEEE Computer Society Technical Committee on Distributed Processing (TCDP) In cooperation with the Faculty of Science and Technology University of Macau The Third International Workshop on Services in Distributed and Networked Environments (SDNE'96) will be held in Macau on June 3-4 1996, immediately after the Sixteenth International Conference on Distributed Computing Systems (ICDCS-16). SDNE workshops augment the ICDCS program by focusing on global, network-based services and addressing the emerging area of service engineering, building on international standards such as ANSA, ODP, DCE, CORBA, and TINA. The SDNE'96 program includes refereed papers on all aspects of services for distributed systems and provides ample time for discussion in an informal and constructive atmosphere. Macau is a Portuguese territory located in the south of China on the West bank of the Pearl River estuary, 64 kilometers from Hong Kong. Travel between Hong Kong and Macau takes about 1 hour by JetFoil. Technical Overview ------------------ Distributed and networked computer environments deployed in academia, business and industry span the globe yet also provide services for individual mobile users and their digital assistants. Usability and usefulness of networked environments of this scale depend upon the kind and quality of software services provided to users, availability of information on existing resources, ease of developing new applications, reliability, and security. The workshop program consists of original papers on software services for networked environments and addresses the architecture, functionality, performance, and mangement of services that are mobile, wide-area, or object-based. The workshop is a forum for the free flow of ideas and includes ample time for structured and informal discussions. Location and Travel Information ------------------------------- A unique blending of Chinese and Portuguese cultures makes Macau a place where visitors will find themselves engrossed and fascinated. A Portuguese territory for the past 400 years, memories can be recalled from the pastel-coloured palaces, baroque churches and exotic temples, menacing fortresses with silent cannons and the narrow cobblestone streets. Macau is a perfect mixture of East and West, traditional and modern, combining aspects of a living museum with round-the-clock casinos, busy nightlife and exciting horse and greyhound races all contributing to Macau's diversity. Eating in Macau is a major attraction, with a variety of Macanese, Portuguese, Chinese, African, and South-East Asian cuisines. Macau can be easily reached from Hong Kong by JetFoil in just one hour. Work-In-Progress Presentations ------------------------------ In keeping with the workshop's informal atmosphere a number of slots have been made available for work-in-progress presentations. If you would like to reserve a slot please send a one or two paragraph abstract to: Peter Honeyman Costs ----- Advance registration costs for SDNE are US$210 for members and US$270 for non-members. The student rate is US$160. All registrants, including students, will receive a copy of the workshop proceedings. The fee also includes lunches during the workshop and tickets to a reception on Sunday, 2 June 1996 and the workshop dinner on Monday, 3 June 1996. Advance registrations must be received by 5 May 1996. Organizing Committee: --------------------- General Chair Nigel Davies Lancaster University, UK Program Chair Peter Honeyman University of Michigan, USA Local Arrangements Robert Biuk-Aghai University of Macau, Macau. Program Committee Jean Bacon Cambridge University, UK Ashley Beitz DSTC, Australia Mark E. Crovella Boston University, USA David De Roure University of Southampton, UK Elmootazbellah Elnozahy Carnegie Mellon University, USA Markus Endler University of Sao Paulo, Brazil Jan Janecek Czech Technical University, Czech Republic Thomas Koch University of Hagen, Germany Rodger Lea Sony Corporation, Japan Gerald Neufeld University of British Columbia, Canada Stephen Pink SICS, Sweden Herman Rao AT&T Bell Labs, USA John Rosenberg University of Sydney, Australia Rich Salz OSF, USA Alexander Schill Technical University of Dresden, Germany Ellen Siegel Sun Microsystems, USA Morris Sloman Imperial College, UK Paulo Verissimo INESC, Portugal ======================================================================== SDNE'96 TECHNICAL PROGRAM ======================================================================== Monday 3 June 1996. 9:00am to 5:30pm ---------------------------------- Opening Remarks Session 1 : Service Management I - Management Policy Service for Distributed Systems Damian A. Marriott, Morris S. Sloman, Nicholas Yialelis Imperial College, UK - A Relational Model for Distributed Systems Monitoring Using Flexible Agents Leander Conradie, Maria-Athina Mountzia Technische Universitat Munchen, Germany BREAK Session 2 : Mobile Services - Application Migration for Mobile Computers S. Pope University of Cambridge, UK - Services to Support Consistency in Mobile Collaborative Applications Keith Cheverst, Nigel Davies, Adrian Friday, Gordon S. Blair Lancaster University, UK - Requirements for Personalized User Environments in Telecommunications Jens-Peter Redlich Humboldt University, Berlin, Germany Dirk Balfanz Princeton University, USA - Towards a general location service for mobile environments Ulf Leonhardt, Jeff Magee Imperial College, UK LUNCH (served in hotel) Session 3 : Performance of Distributed Services - A Scheme for the Quantification of Congestion in Communication Services and Systems Edmundo Monteiro, Goncalo Quadros, Fernando Boavida Universidade de Coimbra, Portugal - Case Study: How Analytic Modeling Can Reveal Performance Problems in Distributed Systems A.M. Khandker, T.J. Teorey University of Michigan, USA - RPC over Advanced Network Technologies: Evaluation and Experiences Sasha Kummel, Alexander Schill, Gerald Volkmann Dresden University of Technology, Germany BREAK Session 4 : Work in Progress - To reserve a work-in-progress presentation slot please contact Peter Honeyman DINNER (time and place to be announced) Tuseday 4 June 1996. 9:00am to 6:00pm ---------------------------------- Session 5 : Service Management II - Group Communication as an Infrastructure for Distributed System Management Yair Amir Johns Hopkins University, USA David Breitgand, Gregory V. Chockler, Danny Dolev Hebrew University of Jerusalem, Israel - An Implementation Model for the Management Functions of the RM-ODP Edmundo Roberto Mauro Madeira, Claudio Martins Garcia University of Campinas, Brazil - Scalable Services for Resource Management in Distributed and Networked Environments Colin Allison, Paul Harrington, Feng Huang, Mike Livesey University of St Andrews, UK BREAK Session 6 : Object-based Services - A Programmable Concurrency Control Service for CORBA P.G. Bosco, E. Grasso CSELT, Italy - Understanding any IDL - Lesson one: DCE and CORBA Andreas Vogel, Brett Gray, Keith Duddy Distributed Sytems Technology Center, Australia - Annotations for Synchronization Constraints in CORBA IDL Gregor Henze, Thomas Koch, Bernd Kramer FernUniversitat Hagen, Germany LUNCH (in hotel) Session 7 : Secure Services - Security and Auditing of VPN Nora Boukari Telis S & C, France Ali Aljane Universite Pierre et Marie Curie, France - Information Distribution by FleaMarket System Osamu Akashi, Kenji Moriyasu, Atsushi Terauchi NTT Software Laboratories, Japan - A Privilege Management System For A Secure Network K.J. Maly, A. Gupta, B Kvande, I.B. Levinstein, R. Mukkamala, M. Olson Old Dominion University, USA BREAK Session 8 : Internet Services - A Distributed Hypermedia Link Service David De Roure, Les Carr, Wendy Hall, Gary Hill University of Southampton, UK - Enabling Customizable World-Wide Web Access To X.500 Directory Kwang-Soo Kim Electronics and Telecommunications Research Institute, Korea - The Multi-Media Telephone: Directory service and session control for multi-media communications Andrew Findlay Brunel University, UK Concluding remarks and workshop close. ------------------------------------------------------------------------ REGISTRATION INFORMATION. IMPORTANT: Please fill out the registration form below and send it to Nigel Davies at the address on the form (email, fax or regular mail) to register for the workshop. ========================= REGISTRATION FORM ================================ Third International Workshop on Services in Distributed and Networked Environments (SDNE'96) 3 - 4 June 1996 Hotel Royal, Estrada Da Vitoria Macau ============================================================================= Sponsored by the IEEE Computer Society Technical Committee on Distributed Processing In cooperation with the Faculty of Science and Technology University of Macau Send by 5 May 1996: Nigel Davies Computing Department Lancaster University Lancaster, LA1 4YR UK ph: +44 1524 594337 fax: +44 1524 583608 EMail: nigel@comp.lancs.ac.uk Please Print or Type: Name:____________________________________________________________________ Last/Family First MI Name on Badge:___________________________________________________________ Affiliation:_____________________________________________________________ Address:_________________________________________________________________ _________________________________________________________________ City:_________________________ State or Region:__________________________ Zip/Postal code:___________________ Country:_____________________________ Daytime Phone:_____________________ Fax Number___________________________ IEEE Membership Number:____________________ Email:_______________________ Do you have any special needs?___________________________________________ (meals, access, etc.) Please circle appropriate fee * Workshop Registration Student IEEE Member Non-member US$160 US$210 US$270 * Late Registration Fees Student IEEE Member Non-member (After 5 May 1996) US$200 US$270 US$340 Hotel Reservation ----------------- Please contact the hotel direct to make your reservation for accomodation. Hotel Royal, Estrada Da Vitoria No. 2-4, Macau ph: +853 552222 (reservation office ext. 156 or 157) fax: +853 563008 To obtain the workshop rate of MOP400 (approx. US$50) please remember to ask for the SDNE/IEEE Computer Society Rate. Other Events ------------ ____ Additional Sunday night reception tickets at US$30 each (one ticket is included in the registration fee) ____ Additional Monday night dinner tickets at US$45 each (one ticket is included in the registration fee) Charges: (please fill out) 1] Registration: ______________ 2] Guest Tickets:______________ Total Enclosed:______________ (US Dollars) PAYMENT MUST BE ENCLOSED: PLEASE MAKE ALL CHECKS OR MONEY ORDERS PAYABLE TO THE IEEE COMPUTER SOCIETY. ALL CHECKS MUST BE IN US DOLLARS DRAWN ON US BANKS Method of Payment ______ Check ______ Travelers/Cashiers Check ______ VISA ______ Master Card ______ American Express ______ Diners Club Credit Card Number:_______________________________________________________ Exp. Date:____________________ Cardholder Name: _________________________________________________________ Exactly as it is printed on the card Signature:_______________________________________________________________ Charges will appear on your credit card statement from the IEEE Computer Society. All no-show registrations will be billed in full. Do not include my mailing address on: ____ Non-Society mailing lists ____ Meeting Attendee Lists -------------------------------------------------------------------------- General Information: -------------------- 1] Meals: The registration fees includes: a reception Sunday night, lunch Monday and Tuesday and the workshop dinner Monday evening. Extra tickets are available for any traveling companions for the reception Sunday night and the dinner Monday night. 2] Travel Information: Macau is a Portuguese territory located in the south of China on the West bank of the Pearl River estuary, 64 kilometers from Hong Kong. Travel between Hong Kong and Macau takes about 1 hour by JetFoil. Macau can be reached by air through its recently opened international airport. Alternatively, visitors may fly to nearby Hong Kong and travel by JetFoil from there to Macau. You can obtain full travel information from: http://www.sftw.umac.mo/~fstrpba/sdne_travel_info.html or by sending an email message to Nigel Davies (nigel@comp.lancs.ac.uk). 3] Nationals of most European countries, the USA and Canada, as well as several other countries do not need a visa to enter Macau. Visitors from many other countries can obtain a 20-day visa upon arrival in Macau. Please check with the Portuguese consulate or embassy near you. SDNE will not be responsible for arranging entry permits. 4] Additional information on SDNE'96 is available from Nigel Davies (nigel@comp.lancs.ac.uk) or Peter Honeyman (honey@citi.umich.edu). ------------------------------ From: vreed@mitre.org (Vince L. Reed) To: TC11-L@iaik.tu-graz.ac.at, critical-sw-assurance@pacific.mitre.org, ri sks@csl.sri.com, infosys@american.edu, cipher@itd.nrl.navy.mil, meadows@itd .nrl.navy.mil, INFSEC-L Information Security List , www-security@ns2.rutgers.edu, best-of-security@suburbia.n et, lacc@suburbia.net, ssh@cert.org, vis@darmstadt.gmd.de, hise-safety-crit ical@minster.cs.york.ac.uk, HEP-request@www.cern.ch Subject: 11th ACSAC Advanced Program Date: Sat, 30 Mar 1996 04:35:01 -0600 The conference committee for the Annual Computer Security Applications Conference (ACSAC) is proud to announce the 96 Call for Papers. It is available on the world wide web at: http://www.isse.gmu.edu/~csis/acsac/acsac96-cfp.html Vince Reed, CISSP Publicity Cochair Annual Computer Security Applications Conference 1500 Perimeter Pkwy., Suite 310, Huntsville, AL 35806-3578 Phone: +1.205.890.3323, FAX: +1.205.830.2608 ------------------------------ From: papers@rpcp.mit.edu (Richard J. Solomon) To: {Recipient List Suppressed} Subject: Internet Security Call for Papers Date: Fri, 15 Mar 1996 12:17:23 -0500 CALL FOR PAPERS INTERNET PRIVACY AND SECURITY WORKSHOP Haystack Observatory, MA May 20-21, 1996 Privacy and Security Working Group Federal Networking Council Research Program on Communications Policy Center for Technology, Policy, and Industrial Development Massachusetts Institute of Technology INVITATION The Privacy and Security Working Group (PSWG) of the Federal Networking Council (FNC) and the Research Program on Communications Policy of the Center for Technology, Policy, and Industrial Development at the Massachusetts Institute of Technology will hold an invitational workshop at the Haystack Observatory outside of Boston, MA, on May 20-21, 1996. This workshop is intended to bring Federal, academic and private sector participants together in collaboration to develop strategies and potential solutions related to Internet privacy and security. Though a principal focus of the workshop will be on the Federal portion of the Internet, the FNC recognizes that the Federal Internet is tightly coupled with the Global Internet, whose security policies, practices, and goals are complementary to those of the Federal Government. To define those practices, procedures and goals, the PSWG has undertaken two major initiatives: - The Federal Internet Security Plan (FISP), which was developed as a scalable, continual improvement process, based on common principles and mechanisms compatible with Internet community values and needs; and - The Collaborations in Internet Security (CIS) project, an effort aimed at testing the strength of agency approaches to security and moving these technologies beyond individual agency networking environments and into both inter-agency and agency-commercial sector communications. The CIS will result in the development of a new and sustainable process for developing, integrating, and deploying security technologies that are interoperable at all levels of the Federal government and within the commercial and academic sectors. These initiatives are intended to highlight the critical interface between Federal and commercial users and developers of Internet services and technologies. OBJECTIVES This workshop will bring together principal players in the Federal and overall Internet community to discuss the problems and challenges of privacy and security on the Internet, and will: - Identify critical issues, requirements, and recommendations related to future Internet privacy and security research and development efforts; - Describe "best practice" approaches to Internet privacy and security; - Develop specific strategies for implementing Internet Security programs involving all sectors of the Internet community; - Extend the Federal Internet Security Plan (FISP) by defining specific implementations; and finally, - Develop specific strategies for the migration of technologies from the individual RFC unit test stage to the integration of a complete functional managed system in the CIS test/demonstration/pilot projects. SUBMISSIONS Abstracts or complete paper drafts related to the topics listed above are welcome. Accepted papers will be a part of the published record of the workshop. All points of view on Federal policies affecting Internet privacy and security are welcome. Please make all electronic submissions in ASCII format. For further information or to submit an abstract or paper contact: Internet Security and Privacy Workshop c/o Joseph Reagle Research Program on Communications Policy Massachusetts Institute of Technology One Amherst St. (E40-218) Cambridge, MA 02139 Voice: (617) 253-4138. Fax: (617) 253-7326 papers@rpcp.mit.edu SCHEDULE and DEADLINES Call for papers - March 14, 1996 Abstracts Due - April 14, 1996 Invitations to Participants - April 20, 1996 Revised/Completed papers due - May 19, 1996 Workshop - May 20-21, 1996 PARTICIPANTS Participation in the workshop is by invitation, based primarily on submitted papers and abstracts. Additional individuals may be invited to ensure that participation reflects a broad cross-section of the Internet community. PROGRAM COMMITTEE Dennis Branstad - Trusted Information Systems (TIS) Rich Pethia - Computer Emergency Response Team (CERT) Jeffrey Schiller - Massachusetts Institute of Technology (MIT) Richard Solomon - Massachusetts Institute of Technology (MIT) Rick Stevens - Department of Energy /Argonne National Labs (DOE) STEERING COMMITTEE Stephen Squires, Defense Advanced Research Projects Agency (FNC/PSWG Co-Chair) Dennis Steinauer, National Institute of Standards and Technology (FNC/PSWG Co-Chair) Tice DeYoung, National Aeronautics and Space Administration (NASA) Phillip Dykstra, Army Research Laboratory (ARL) Mike Green, National Security Agency (NSA) George Seweryniak, Department of Energy (DOE) Walter Wiebe, Federal Networking Council (FNC) ********************* BACKGROUND Federal Internet Security Plan: In September 1995, the PSWG published the draft Federal Internet Security Plan (FISP). The FISP is oriented toward a scalable, continual improvement process, based on common principles and mechanisms compatible with Internet community values and needs. See . The plan addresses Internet security requirements, including interoperability, from the perspective of the goals and objectives outlined in the National Performance Review (NPR), http://www.npr.gov/. The Federal Networking Council developed this framework in conjunction with its Advisory Committee which represents industry, academia, and non-profit sectors. Action Items, from the FISP, to be addressed during the Workshop: Internet Security Policy and Policy Support Activities * Establish overall Internet security policies * Address security in all Federally supported NII pilots * Coordinate Internet community involvement * Establish an ongoing Internet threat database and assessment capability * Identify legal and law enforcement issues Internet Security and Technology Development * Develop an Internet security maturity model * Develop Internet security architecture * Enhance Internet security services and protocols * Develop a "Secure-Out-of-the-Box" endorsement * Enhance application security Internet Security Infrastructure * Establish a set of Internet security interoperability testbeds * Support privacy, authentication, certificate, and security services pilots * Establish Internet security testing and evaluation capabilities * Improve security incident handling capabilities * Develop security self-assessment capabilities * Establish effective secure software and document distribution mechanisms Education and Awareness * Compile Internet user and site profiles * Encourage use of available security technologies * Establish an Internet security information server * Establish an Internet security symposium/workshop series * Establish an Internet security fellowship program Collaborations in Internet Security: With the Federal government's ever-increasing dependency on computers and distributed systems, there is great urgency for it to develop and employ enhanced information system security technologies and practices. At the same time, these Federal technologies must interoperate with those of the broader Internet community (encompassing the private and academic sectors, along with the Federal sector). In recognition of these needs, the Federal Networking Council's Privacy & Security Working Group (FNC/PSWG) has been awarded a National Performance Review (NPR) Innovation Fund grant to compare and validate agency approaches to security. This Collaborations in Internet Security (CIS) project aims to test the strength of these technologies beyond individual agency networking environments, emphasizing the inter-agency and agency-commercial sector communications. The CIS will result in the development of a new and sustainable process for developing, integrating, and deploying security technology that is interoperable at all levels of the Federal Government and within the commercial and academic sectors. The governing principles behind the Security Testbeds include: employment of an open process (with the activities and results open to participation and comment by both public and private sector participants); a focus on multivendor technologies; an emphasis on testing and experimentally deploying security technologies emerging from research and private sectors as well as security technologies currently in use in the commercial environment; and an underlying objective to ensure interoperability among the broad Internet community (federal, private, and academic). Initial tests will include demonstrations of Kerberos v.5, testing of single-use passwords, and digital signatures. For more information, please see (http://www.fnc.gov/cis_page.html) ------------------------------ From: "SANS'96 Conference Office" To: spaf Subject: SANS96 Final Program Date: Sat, 30 Mar 1996 20:50:02 -0500 ************************************** SANS96: The Technical Conference Wednesday, May 15 and Thursday, May 16 Final Program Schedule *************************************** The SANS96 Technical Conference has three parallel tracks: (1) Security, (2) System Administration, and (3) Web and Network Administration Four 90-minute sessions are scheduled each day in each track, except in a few c ases where multiple tracks come together for special sessions. In addition, Wednesday Morning and through lunch, the system and security tools exposition will continue (It begins Tuesday evening with a reception). BOFs are planned each evening. At the end of the schedule, I've added a list of the courses that round out the SANS program. In depth courses taught by top-rated teachers, combined with br iefings on hot topics at the conference, make SANS a unique and valuable learni ng environment. *********************************************************************** DAY ONE Wednesday, May 15 ************************************************************************ 9:00 - 9:30 Opening Remarks, and other stuff 9:30 - 9:45 Break 9:45 - 11:15 Session One 1-1 Security Tools and Procedures ------------------------------------- SAINT: A Security Analysis Integration Tool Diego Zamboni, Direccion General de Servicios de Computo Academico Securing Solaris Peter Galvin, Corporate Technologies ==== 2-1 Useful Tools and Methods -------------------------------- CTMS (Centralized Test Management System) a modular system for tracking system performance and problem reporting system. Robert Tanner, Sterling Software at NASA Ames Commercializing an FTP Service Mike J. Fuller and John Stewart, Cisco Systems, Inc. ==== 3-1 Many Facets of Web Implementations ------------------------------------------- Will Internet Commerce Succeed? (90 minutes) Panel, Chair: Hal Pomeranz, NetMarket Dan Geer, OpenMarket Don Eastlake, Cybercash ==== 11:15 - 11:30 Break 11:30 - 1:00 Session Two 1-2 Security Tools and Procedures ------------------------------------- Security Issues with Mobile Computing Dan Geer, OpenMarket Authentication by Email Reception Don Libes, NIST ==== 2-2 Useful Tools and Methods -------------------------------- xswatch -- A smarter swatch for syslog sniffing Ken Mayer, MRJ, Inc. ==== 3-2 Many Facets of Web Implementations ------------------------------------------ The Ten Most Common Security Mistakes Made By Web Masters John Stewart, Cisco Systems Works in Progress Session for WWW ==== 1:00 - 2:30 Lunch Break 2:30 - 4:00 Session Three 1-3 Security Tools and Procedures ------------------------------------- Current Trends in Intruder Methods Moira West, CERT Adventures in Hackery Matt Bishop, University of California, Davis ==== 2-3 More Useful Tools and Methods -------------------------------------- Making Product Selection Work for You Richard L. Asmuth, Bellcore Implementation of a Highly Available Data Warehouse: Details of Configuration and Lessons Learned Todd Boss, Bell Atlantic ==== 4:00 - 4:15 Break 4:15 - 5:45 Session Four 1-4 Trends in Security --------------------------- Incident Forensics Ron Tencati A Different Perspective on Incident Response Gene Spafford, Purdue University ======= 2-4 Ask The Experts ------------------------ Our Favorite Techniques That Make System Administration Easier (90 minutes) A Panel of Gurus chaired by E. Scott Menter, Enterprise Systems *********************************************************************** DAY TWO, Thursday, May 16th *********************************************************************** 9:00 - 10:30 Session Five 1-5 The Future of Security -------------------------------- Panel on the Future of Network Security (Thursday) (90 minutes) Moderator: Marcus Ranum. Panelist: Christopher Klaus, ==== 2-5 The Human Side of System Administration ----------------------------------------------- Gaining Management Support for System Administration and Security(90 minutes) A Panel chaired by Rob Kolstad, BSDI ==== 3-5 Many Facets of Web Implementations ------------------------------------------ Database Storage for Web Pages Al Haesgen, Oracle The Design and Implementation of a WWW Document Control and Mirroring System Dan Rich, Silicon Graphics ==== 10:30 - 11:00 Break 11:00 - 12:30 Session Six 1-6 Security Tools and Procedures ------------------------------------- Detection And Prevention Of Electronic Intrusion (90 minutes) Alexander O. Yuriev, Temple University ==== 2-6 The Human Side of System Administration ----------------------------------------------- How To Find The Right System Administrator in Ten Easy Questions Michele Crabb, Sterling Software, NAS, NASA What Employers Are Looking For In A Modern System Administrator and What Employees are Looking for in an Employer Ed Taylor, Vice President, Pencom ==== 3-6 WEB Enhancements and Statistics --------------------------------------- What Makes A Great Commercial Web Site? Anders Vinberg, Computer Associates The Wanderer - Statistics about the Web Matthew Gray, Net Genesis === 12:30 - 2:00 Lunch Break 2:00 - 3:30 Session Seven 1-7 The Future of Security ------------------------------ Firewalls Are Dinosaurs: The Great Debate (Thursday 90 minutes) Moderator: Gene Schultz Panelist: Marcus Ranum, Christopher Klaus, against. ==== 2-7 The Human Side of System Administration ----------------------------------------------- Ethics for System Administrators Rob Kolstad, BSDI System Administration Works In Progress Session ==== 3-7 WEB Enhancements and Statistics --------------------------------------- CGI.pm - a perl Module For CGI Development Of Dynamic Web Pages Lincoln Stein, MIT Performance Experience for Web Servers (Thursday afternoon) Brian Buus, XOR ==== 3:30 - 4:00 Break 4:00 - 5:30 Session Eight 1-8 Trends in Security ---------------------- Legal Issues of Computer Security (90 Minutes) Scott Charney, U.S. Department of Justice ==== 3-8 Ask The Web Experts --------------------------- Internet and the World Wide Web: Ask the Experts Lincoln Stein, Al Haesgen, Brian Buus, Anders Vinberg, Dan Rich ******************************************************** COURSES AT SANS ******************************************************** ===== Courses On Sunday, May 12: 9:00 a.m. to 4:30 p.m. ===== Sun-1: UNIX Security: Threats and Solutions (Matt Bishop) Sun-2: Topics In Network Administration: Greatest Hits (Evi Nemeth and Trent Hein) NEW Sun-3: How To Present Your Ideas So People Listen and How To Write For Impact ( Paller/Sherman) Sun-4: Mastering The Web 1: WWW Clients and Servers (Stewart/Kensiski) NEW ===== Courses On Monday, May 13: 9:00 a.m. to 5:00 p.m. ===== Mon-5: Threats & Solutions From The Network & Security in Programs (Matt Bishop) Mon-6: The Most Useful Tools For System Administrators (Bjorn Satdeva) Mon-7: Topics In System Administration (Evi Nemeth and Trent Hein) Mon-8: Building A Successful Security Infrastructure (Michele Crabb) NEW Mon-9: Mastering The Web 2: HTML and CGI Programming (Stewart/Kensiski) NEW ===== Courses On Tuesday, May 14: 9:00 a.m. to 5:00 p.m. ===== Tues-10: UNIX Security Tools: Use and Comparison (Matt Bishop) Tues-11: Achieving Network Security with Kerberos and PEM (Dan Geer) NEW Tues-12: Introduction to UNIX System and Network Performance Tuning (Marcus Ranum) Tues-13: Security on the Web: Client, Server and CGI's (Stewart/Kensiski) NEW Tues-14: Network Management with SNMP (Bill Reiken) NEW ===== Courses On Friday, May 17: 9:00 a.m. to 5:00m ===== Fri-15: JAVA Programming: The Insiders' Course (Matthew Calame) NEW Fri-16: Internet Firewalls 101: Introduction and Theory (Marcus Ranum) Fri-17: Effective Incident Response (Gene Schultz) NEW Fri-18: Introduction To Tcl/Tk Programming (Mark Maretzky) NEW ===== Courses On Saturday, May 18: 9:00 a.m. to 4:30 p.m. ===== Sat-20: Building Internet Firewalls, No Theory, Just Practice (Marcus Ranum) NEW Sat-21: Windows NT Security (Gene Schultz) NEW Sat-22: Managing Industrial-Strength Commercial Web Applications (Bryan Buus) N EW ------------------------------ End of coast Digest [Volume 1 Issue 2] **************************************