TC-11 Report to Council and TA 2006 21 February 2006 Leon Strous Chairman IFIP TC-11

Total Page:16

File Type:pdf, Size:1020Kb

Load more

TC-11 Report to Council and TA 2006 21 February 2006 Leon Strous Chairman IFIP TC-11 PART I. General Assembly a. Meetings held and scheduled. • TC-11 held its' annual meeting on Sunday 29 May 2005 in Chiba, Japan, preceding the SEC2005 conference. Attendance: 20 members, 1 representative, 2 observers. Apologies: 21 members, 1 observer. Absent: 2 members. Resigned: 1 member. • The next annual TC meeting is scheduled for Sunday 21 May 2006 in Karlstad, Sweden, preceding the SEC2006 conference. b. Changes in membership and officers Changes in officers No changes in officers since GA 2005. At the annual meeting in May, the second term of the chairman of wg 11.4 Network & distributed systems security will end. TC membership changes since GA 2005: • Korea: Seung-Won Sohn (new member country) • Portugal: Pedro Manuel Barbosa Veiga (succeeding Luis Sousa Cardoso) Currently TC-11 is missing representatives of the following IFIP full members (list of January 2006): Andorra, Botswana, Brazil, Bulgaria, Canada, Croatia, Ethiopia, Ireland, Israel, Lithuania, Malaysia, Mauritius, Nigeria, Oman, Poland, Russia, Sri Lanka, Syria and Thailand. The representatives of Egypt, India and Singapore have not attended three consecutive meetings and the GA members of these countries will be contacted in order to get active participation. c. Working groups In previous meetings of TC-11, the membership and membership rules of working groups has been extensively discussed. Slow but steady progress is being made by the working groups in establishing sound, international and active membership lists. In order to focus the approach in this respect, the strategy questions that have been sent to all TCs, have also been sent to all TC-11 working groups. TC- 11 expects to discuss the results during the annual meeting in May. 1. Wg 11.1 Information Security Management Officers: Chair: Steven Furnell, University of Plymouth, UK (first term, 2004 – 2007) Vice-Chair: Gurpreet Dhillon, Virginia Commonwealth University, Richmond, VA, USA (first term, 2004 – 2007) Secretary: Paul Dowland, University of Plymouth, UK (first term, 2004 – 2007) 1 Membership: The membership of the wg has been reconfirmed, and per end of January 2006 there are 30 members from 11 countries. Around a third of these are new members, not previously affiliated to wg 11.1. Activities: A new website for the working group has been established, http://ted.see.plymouth.ac.uk/ifip, with some additional content and functionality compared to the previous incarnation. From the perspective of providing a useful contribution to the security community, the new site includes the facility for registered WG members to post articles online for public download. This provides a means for WG members to further promote their work, as well as the potential for the website itself become a useful resource for those interested in information security management topics. At the time of writing the facility is not being widely supported by the full WG membership, but further promotion will hopefully encourage this to increase. The most significant activity undertaken to date has been the organisation of a joint working conference with WG11.5. The event, a Working Conference on Security Management, Integrity, and Internal Control in Information Systems, took place from 1-2 December 2005 in Fairfax, Virginia, USA, and associated proceedings have been published by Springer. Further details can be found at http://www.cs.uvm.edu/ifip11.1.5/ A collaboration has also been established with WG11.8, with whom we are running a Security Culture Workshop as part of SEC 2006. A successful call for papers has been issued, and six short papers selected for presentation and inclusion in the main SEC proceedings. 2. Wg 11.2 Small Systems Security Officers: Chair: Jan Verschuren, Ministry of the Interior, The Hague, Netherlands (second term, 2004 – 2007) Vice-chair: Erik Poll, University of Nijmegen, Netherlands Secretary: Erik de Vink, University of Eindhoven, Netherlands Membership: The membershiplist of wg 11.2 is under revision. Activities: Together with WG 8.8, WG 11.2 organises the 6th Conference on Smart Card Research and Advanced Applications (CARDIS), taking place 19 – 21 April 2006 in Tarragona, Spain. 3. Wg 11.3 Data and Application Security Officers: Chair: Pierangela Samarati, Universita degli Studi di Milano, Crema, Italy (second term, 2004 – 2007) Vice-chair: Secretary: Membership: 2 The complete list of members and observers is available at: http://cimic.rutgers.edu/ifip113/ Activities: The proceedings of the annual conferences have been published in the form of a book by Kluwer. In 2004, for the 18th conference the working group switched from having post-conference proceedings to have proceedings available at the time of the conference. This solution made management of the publication easier and less expensive (not requiring pre-proceedings and mailing of the final books). Last year’s proceedings were published in the LNCS series. 4. Wg 11.4 Network & distributed systems security Officers: Chair: Bart De Decker, K.U. Leuven, Belgium (second term, 2003 – 2006) Vice-chair: Secretary: Michalis Georgiou, Cyprus College, Nicosia, Cyprus (first term, 2005 – 2008) Membership: The membership list is under revision. Activities: The wg will organize a workshop as part of SEC 2006. 5. Wg 11.5 Systems Integrity and Control Officers: Chair: Sushil Jajodia, George Mason University, Fairfax, VA, USA (second term, 2004 – 2007) Vice-chair: Michael Gertz, University of California, Davis, CA, USA Secretary: Sabrina de Capitani di Vimercati, Universita degli Studi di Milano, Crema, Italy Membership: The membershiplist of wg 11.5 is under revision. Activities: A joint 11.1 and 11.5 working conference on security Management, Integrity, and Internal Control in Information Systems was organized. It was held at George Mason University, Fairfax, Virginia, December 1-2, 2005. For additional info, go to http://www.cs.uvm.edu/ifip11.1.5/ 6. Wg 9.6 / 11.7 Information Technology: Mis-use and the law Officers: Chair: Kai Rannenberg, Goethe University, Frankfurt, Germany (second term, 2005 – 2008, * in 2005 the wg changed from a situation with two co-chairs in 2002 to a situation with a chair and a vice- chair in 2005) Vice-chair: Albin Zuccato, Karlstad University, Karlstad, Sweden (first term, 2005 – 2008) Secretary: Judith Valdivia, Spain (first term, 2005 – 2008) Although the current chair is representing TC-11, TC-9 will remain the TC with the administrative responsibility for this joint working group as agreed in September 2001 between the TC-9 and TC-11 3 chairs at that time. For an extensive report on this joint working group reference is made to the TC-9 report. 7. Wg 11.8 Information Security Education Officers: Chair: Daniel Ragsdale, United States Military Academy, West Point, NY, USA (first term, 2005 – 2008) Vice-chairs: Natalia Miloslavskaya, Moscow Physics Engineering Institute, Russia (first term, 2005 – 2008) Lynn Futcher, Nelson Mandela Metropolitan University, South Africa (first term, 2005 – 2008) Secretary: Ronald Dodge, United States Military Academy, West Point, NY, USA (first term, 2005 – 2008) Membership: The issue of membership rules and establishing an active membership list will be taken up in the forthcoming period. Activities: WG 11.8 organized a successful working conference in cooperation with wg 11.5 on 1-2 November 2005 in Fairfax, Virginia, USA. WG 11.8 organizes in cooperation with wg 11.1 a workshop on security culture during SEC 2006. The wg will have the Fifth World Conference in Information Security Education WISE5 in the USA, to be hosted by the Westpoint Military Academy, New York, in May 2007. The Chair of the conference will be Daniel Ragsdale. 8. Wg 11.9 Digital forensics Officers: Chair: Indrajit Ray, Colorado State University, Fort Collins, Colorado, USA (first term, 2004 – 2007) Vice-chair: Mark Pollitt, Digital Evidence Professional Services, Ellicott City, Maryland, USA (first term, 2004 – 2007) Secretary / Treasurer: Sujeet Shenoi, University of Tulsa, Tulsa, Oklahoma, USA (first term, 2004 – 2007) Membership: IFIP Working Group 11.9 has two membership categories, members and observers. IFIP WG 11.9 has 50 members as of February 2006. The majority of the members (35) are from the United States; the others are from Australia (1), France (2), Japan (1), Norway (1), South Africa (9) and the United Kingdom (1). More non-US members are expected to join the group in the forthcoming years. IFIP WG 11.9 has 25 observers as of February 2006. Most of the observers (17) are from the United States; the others are from Japan (4), South Africa (1), Taiwan (2) and the United Kingdom (1). Activities: The working group organizes annual conferences for the research community. In addition it hosts technology transfer workshops to showcase advances in digital forensics research and practices to the 4 law enforcement, inspector general and intelligence communities and to solicit input on research trends and needs. The proceedings of the first annual international conference were published in November 2005. Advances in digital forensics. First IFIP WG 11.9 International conference on Digital forensics, Mark Pollitt / Sujeet Shenoi, Springer (SSBM), ISBN 0 387 30012 0, 332 pages. The 2005 Technology Transfer Workshop on Digital Forensics was held at Johns Hopkins University (Columbia, Maryland, USA) on June 9-10, 2005. This two-day workshop included seven presentations delivered by wg members. In addition, a moderated discussion
Recommended publications
  • SECURITY and PRIVACY in the AGE of UBIQUITOUS COMPUTING IFIP - the International Federation for Information Processing

    SECURITY and PRIVACY in the AGE of UBIQUITOUS COMPUTING IFIP - the International Federation for Information Processing

    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress held in Paris the previous year. An umbrella organization for societies working in information processing, IFIP's aim is two-fold: to support information processing within its member countries and to encourage technology transfer to developing nations. As its mission statement clearly states, IFIP1s mission is to be the leading, truly international, apolitical organization which encourages and assists in the development, exploitation and application of information technology for the benefit of all people. IFIP is a non-profitmaking organization, run almost solely by 2500 volunteers. It operates through a number of technical committees, which organize events and publications. IFIP's events range from an international congress to local seminars, but the most important are: The IFIP World Computer Congress, held every second year; Open conferences; Working conferences. The flagship event is the IFIP World Computer Congress, at which both invited and contributed papers are presented. Contributed papers are rigorously refereed and the rejection rate is high. As with the Congress, participation in the open conferences is open to all and papers may be invited or submitted. Again, submitted papers are stringently refereed. The working conferences are structured differently. They are usually run by a working group and attendance is small and by invitation only. Their purpose is to create an atmosphere conducive to innovation and development. Refereeing is less rigorous and papers are subjected to extensive group discussion.
  • Europe and North America Regional GCED Network Meeting Final Report

    Europe and North America Regional GCED Network Meeting Final Report

    Europe and North America Regional GCED Network Meeting Final Report 21-22 November 2018 Lisbon, Portugal 120, Saemal-ro, Guro-gu, Seoul, Republic of Korea, 08289 Tel.02-774-3956 Fax.02-774-3957 www.unescoapceiu.org Europe and North America Regional GCED Network Meeting Final Report 21-22 November 2018, Lisbon, Portugal Table of Contents List of Acronyms 4 Universities 23 Introduction 5 Observations and General Comments 25 Opening 6 Session 3: Session 1: Addressing the Remaining Gaps on GCED Implementation GCED Global and Regional Overview 8 in Europe and North America 26 • GCED in the Global Education Agenda, and Ministries of Education and National Commissions for UNESCO 27 UNESCO’s Efforts to Realize GCED/ SDG 4.7 9 Universities and Research Institutions 27 • GCED in the Global Agenda, Global Activities of APCEIU 9 Civil Society Organizations 28 • Regional GCED Networks 10 Intergovernmental Organizations 28 GCED in Asia-Pacific 10 Development and Cooperation Agencies and Ministries of Foreign Affairs 29 GCED in Latin America and the Caribbean 11 Discussion and Summary by the Moderator 29 GCED in Sub-Saharan Africa and the Arab States 11 • Regional GCED implementation (Europe and North America) 12 Session 4: Global Education Network 12 Strengthening GCED Implementation Globally and European NGO Confederation for Relief and Development 12 Regionally through Networking 31 Canadian National Commission for UNESCO 13 Recommendations to Improve GCED Networking in UNESCO Venice Office 13 Europe and North America 32 Bridge 47 14 Discussion 33
  • ICAO's MRTD Report

    ICAO's MRTD Report

    ICAOINTERNATIONAL CIVIL AVIATION ORGANIZATION MRTD REPORT Stressing Security As ePassport technology defies its critics and privacy groups begin to better understand the scope and purpose of the biometric chip, more and more States are continuing to implement the world’s most secure solution to the interoperable travel document. Also in this Issue: ePassport PKI and the ICAO PKD, Interoperability Overview, EAC Roll-out, In-House MRTD Training, CSCA Certificates Overview List, Maldives Implementation, ICAO’s role in MRTD advancement Vol. 2, No 2 Contents Editorial: Taking an Active Role . 3 Mauricio Siciliano discusses the more proactive role being taken by ICAO and industry stakeholders in communicating the facts behind MRTD and ePassport technology. ICAO MRTD REPORT VOLUME 2, NUMBER 2, 2007 Editorial Managing Editor: Mauricio Siciliano MRTD Programme—Specifications and Guidance Material Section Tel: +1 (514) 954-8219 ext. 7068 E-mail : [email protected] ePassports: The Secure Solution . 4 ISO Task Force on New Technologies Chair Barry Kefauver confronts recent media Anthony Philbin Communications and hacker claims surrounding the security and privacy of contactless chips, Senior Editor: Anthony Philbin Copy Editor: Robert Ronald detailing the unprecedented multilateral and technological achievement represented Tel: +01 (514) 886-7746 by ePassport interoperability. E-mail: [email protected] Web Site: www.philbin.ca ePassport PKI and the ICAO PKD: The Australian Perspective . 12 Production and Design Australian passport official Ross Greenwood, Chairman of the 2007 ICAO PKD Bang Marketing board, describes the reasons for supporting ePassport validation at border clearance Stéphanie Kennan and makes the business case for Member State participation in the ICAO PKD.
  • Executive Summary

    Executive Summary

    6th European Conference on Rare Diseases & Orphan Products A better future for Patients: Shaping together the Agenda 2020 Executive Summary A conference organised by Co-organised by The European Conference on Rare Diseases and Orphan Products The European Conference on Rare Diseases & Orphan Products is the unique platform/forum across all rare diseases, across all European countries, bringing together all stakeholders - academics, health care professionals, industry, policy makers, patients’ representatives. It is a biennial event, providing the state-of-the-art of the rare disease environment, monitoring and benchmarking initiatives. It covers research, development of new treatments, health care, social care, information, public health and support at European, national and regional levels. It is synergistic with national and regional conferences, enhancing efforts of all stakeholders. There is no competition with them, but efforts are complementary, fully respecting initiatives of all. Speaker presentations and poster abstracts can be found in the Programme section of the official Conference website at: http://www.rare-diseases.eu/ Find out the latest news about the rare disease community on eurordis.org Sign up to EURORDIS eNews to receive weekly updates Now available in English, French, German, Spanish, Italian, Portuguese and Russian! Table of Contents Acknowledgements and credits ................................................................................................................ 1 Credits, support and legal information
  • TC-11 Factsheet WG 11.2 Pervasive Systems Security

    TC-11 Factsheet WG 11.2 Pervasive Systems Security

    International Federation for Information Processing TC-11 Security and Privacy Protection in Information Processing Systems Factsheet WG 11.2 Pervasive Systems Security Version: 28 August 2020 Website : http://wg112.ifiptc11.org/ Introduction Established in 1985 as the working group on Office Automation, known until 2009 as the working group on Small Systems Security, we have refocussed ourselves as the working group on Pervasive Systems Security. Est. 1985, revised 1992, 1995, 2009 Pervasive systems shall be defined to be large scale systems that are comprised of nodes ranging from RFID tags, through embedded systems, to personal mobile devices, interconnected by a mixture of short range wireless and wide are wired networks. The typical characteristics of a pervasive system are: resource constrained nodes, often physically unreachable or without user interface, whose interconnections often span a large number of administrative domains with conflicting interests. Security of such systems is therefore an emergent property. Aims and scope (last reconfirmed1: 08-2009) To investigate methods and issues in the area of information security related to pervasive systems; and to advance knowledge and awareness of the subject through publications, conferences and other means. The aim is to address pervasive systems security from both a functional, technical, and societal perspective. The scope of the working group shall be to: • Promote the design of the new information security techniques and methods in pervasive systems. • Investigate and report on the information security aspects of information technology products and information services for pervasive systems. • Design guidelines and promote methodologies for the implementation of information security in pervasive systems. • Investigate intelligent token and smart card applications in information security with the aim of making the user less dependent on a single fixed environment.
  • Programme Structure

    Programme Structure

    Contents Welcome to WCC 2004 .............................................................................................................. 3 Congress Committees ................................................................................................................ 4 Organisers, Sponsors and Partners ......................................................................................... 6 Programme Structure ................................................................................................................ 8 Programme Overview ............................................................................................................... 9 Programme Highlights ............................................................................................................. 10 Plenary Keynote Addresses .................................................................................................... 11 Schedule of Conferences ........................................................................................................ 16 Schedule of Topical Days ........................................................................................................ 18 Schedule of Workshops ........................................................................................................... 19 Schedule of Tutorials ................................................................................................................ 20 Schedule of Student Forum ...................................................................................................
  • CARDIS'04 Will Bring Together Researchers and Practitioners in the Development and Deployment of Smart Card Technologies and Applications

    CARDIS'04 Will Bring Together Researchers and Practitioners in the Development and Deployment of Smart Card Technologies and Applications

    Sixth Smart Card Research and C A R D I S ' 0 4 Advanced Application IFIP Conference WG 8.8 — Smart Cards WG 11.2 — Small System Security Since 1994, CARDIS has been the premier international research conference dedicated to smart cards and their applications. Every two years the scientific community meets together for the conference. Ten years after, like its predecessors and back to Europe and France, CARDIS'04 will bring together researchers and practitioners in the development and deployment of smart card technologies and applications. The smart card, or, by extension, smart device with its processing power and link to its owner, is the good candidate for the person representation in the Information Society. Smart card or smart device will be the potential human representation or delegate in Ambient Intelligence (Pervasive Computing), where every appliances and computers will be connected, and where control and trust of your environment will be the next decade challenge. Smart card research is of increasing importance as the need for information security increases rapidly, especially in response to new and urgent demands. Smart card with its security features is a seed of secure system and will play a huge role in ID management. In many computer science areas, smart cards introduce new dimensions and disciplines. Disciplines like hardware design, operating system, modelling system, cryptography or distributed systems find new areas of applications or issues but also smart cards create new challenge for these domains. Unlike events devoted to commercial and application aspects of smart cards, CARDIS conferences gather researchers and technologists who are focused in all aspects of the design, development, deployment, validation and application of smart cards or smart personal devices.