From owner-ssh-l@cert.org  Thu Feb  4 13:19:43 1999
Received: from po1.cert.org (po1.cert.org [192.88.209.10])
	by ietf.org (8.8.5/8.8.7a) with ESMTP id NAA06076
	for <ssh-archive@odin.ietf.org>; Thu, 4 Feb 1999 13:19:42 -0500 (EST)
Received: from smtp.cert.org (Wmvvihk0jqj1ZXJrIXhQRYtfA2TmrhMf@smtp.cert.org [192.88.210.47])
	by po1.cert.org (8.8.8/8.8.8) with ESMTP id NAA07334;
	Thu, 4 Feb 1999 13:19:18 -0500 (EST)
Received: from pollywog.cert.org (RYn+nRh4Q+INdmfZZlK3NiLGbvQ6q55T@unix1.cert.org [192.88.210.35])
	by smtp.cert.org (8.8.8/8.8.8) with SMTP id NAA19722
	for <ssh@cert.org>; Thu, 4 Feb 1999 13:14:36 -0500 (EST)
Message-Id: <199902041814.NAA19722@smtp.cert.org>
X-Sender: byf@127.0.0.1
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.2 
Date: Thu, 04 Feb 1999 13:16:13 -0500
To: ssh@cert.org
From: Barbara Fraser <byf@cert.org>
Subject: WG officially closed
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

With the publication of our last document, FYI 34: RFC 2504: , our work has
been completed! A huge thanks to everyone who has been involved over the
years. Your work will continue to impact the community for years to come. I
regularly receive email from folks who have found the site security
handbook very useful and I fully expect the user's handbook to be equally
well received. See you at the IETF meetings. I'll discontinue the mailing
list next week.

Best regards,
Barbara




From owner-ssh-l@cert.org  Thu Feb  4 13:29:05 1999
Received: from po1.cert.org (po1.cert.org [192.88.209.10])
	by ietf.org (8.8.5/8.8.7a) with ESMTP id NAA06521
	for <ssh-archive@odin.ietf.org>; Thu, 4 Feb 1999 13:29:03 -0500 (EST)
Received: from smtp.cert.org (Lik6qiyt/5RUActUTA5xV7Wtw81+RYxG@smtp.cert.org [192.88.210.47])
	by po1.cert.org (8.8.8/8.8.8) with ESMTP id NAA07617;
	Thu, 4 Feb 1999 13:28:56 -0500 (EST)
Received: from po1.cert.org (po1.cert.org [192.88.209.10])
	by smtp.cert.org (8.8.8/8.8.8) with ESMTP id NAA20156;
	Thu, 4 Feb 1999 13:25:46 -0500 (EST)
Received: from archimedes.nasa.gov (archimedes.arc.nasa.gov [128.102.92.30])
	by po1.cert.org (8.8.8/8.8.8) with ESMTP id NAA07472;
	Thu, 4 Feb 1999 13:25:44 -0500 (EST)
Received: from archimedes.nasa.gov (archimedes.arc.nasa.gov [128.102.92.30])
	by archimedes.nasa.gov (8.9.2/8.9.ARCHIMEDES) with SMTP id KAA19424;
	Thu, 4 Feb 1999 10:25:39 -0800 (PST)
X-Time-In: 19990204182539
Date: Thu, 4 Feb 1999 10:25:39 -0800 (PST)
From: April Marine <amarine@globe.arc.nasa.gov>
X-Sender: amarine@archimedes.nasa.gov
To: Barbara Fraser <byf@cert.org>
cc: ssh@cert.org
Subject: Re: WG officially closed
In-Reply-To: <199902041814.NAA19722@smtp.cert.org>
Message-ID: <Pine.GSO.3.96.990204102517.19034Z-100000@archimedes.nasa.gov>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

My thanks too!  Great work!

(Bet you're happy it's finally DONE too! :-)

April

On Thu, 4 Feb 1999, Barbara Fraser wrote:

> Date: Thu, 04 Feb 1999 13:16:13 -0500
> From: Barbara Fraser <byf@cert.org>
> To: ssh@cert.org
> Subject: WG officially closed
> 
> With the publication of our last document, FYI 34: RFC 2504: , our work has
> been completed! A huge thanks to everyone who has been involved over the
> years. Your work will continue to impact the community for years to come. I
> regularly receive email from folks who have found the site security
> handbook very useful and I fully expect the user's handbook to be equally
> well received. See you at the IETF meetings. I'll discontinue the mailing
> list next week.
> 
> Best regards,
> Barbara
> 
> 
> 

-------------------------------------------------------------------
April Marine			1-650-604-0762  --> me
GLOBE Program			1-800-858-9947  --> GLOBE Help Desk
(Raytheon ITSS)			amarine@globe.arc.nasa.gov
NASA Ames Research Center, MS 204/14, Moffett Field, CA 94035-1000
(and IETF User Services Area Director http://archimedes.nasa.gov/usv/)



From owner-ssh-l@cert.org  Wed Feb 24 21:23:59 1999
Received: from po1.cert.org (po1.cert.org [192.88.209.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA11075
	for <ssh-archive@odin.ietf.org>; Wed, 24 Feb 1999 21:23:57 -0500 (EST)
Received: from smtp.cert.org (Ptt6BNw0erkGN4Nk91Mu0IYkgO3EMM6+@smtp.cert.org [192.88.210.47])
	by po1.cert.org (8.8.8/8.8.8) with ESMTP id VAA27600;
	Wed, 24 Feb 1999 21:23:42 -0500 (EST)
Received: from po1.cert.org (po1.cert.org [192.88.209.10])
	by smtp.cert.org (8.8.8/8.8.8) with ESMTP id VAA11059
	for <ssh@smtp.cert.org>; Wed, 24 Feb 1999 21:19:16 -0500 (EST)
Received: from mbunix.mitre.org (mbunix.mitre.org [129.83.20.100])
	by po1.cert.org (8.8.8/8.8.8) with ESMTP id VAA27476
	for <ssh@cert.org>; Wed, 24 Feb 1999 21:19:15 -0500 (EST)
Received: from FUZZY (fuzzy.mitre.org [129.83.20.83])
	by mbunix.mitre.org (8.8.8/8.8.8/mitre.0) with ESMTP id VAA24190;
	Wed, 24 Feb 1999 21:15:21 -0500 (EST)
Received: from m23066-mac.mitre.org (128.29.230.9) by fuzzy.mitre.org with SMTP id 767434; Wed, 24 Feb 1999 21:05:17 EST
X-Sender: vreed@silig.mitre.org
Message-Id: <v04003a0db2fa5e44bb28@[128.29.230.9]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Date: Wed, 24 Feb 1999 20:05:13 -0600
From: vreed@mitre.org (Vince Reed)
Subject: 15th ACSAC Call for Papers
Apparently-To: <ssh@cert.org>

CALL FOR PAPERS AND PARTICIPATION

15th Annual Computer Security Applications Conference
December 6-10, 1999; Phoenix, Arizona
http://www.acsac.org

PRACTICAL SOLUTIONS TO REAL WORLD SECURITY PROBLEMS

Sponsored by the Applied Computer Security Associates (ACSA) in cooperation
with the ACM Special Interest Group on Security, Audit and Control

           "Renowned Hacker Breaks Into Security Expert's Computer."
           "Teenage Boy Breaks Into Military Computer System."

Familiar headlines? ... Unfortunately, they are all too familiar. Nearly
everyone today is dependent upon computers for everything from electronic
commerce to military command and control. The very technology that created
this dependence is its greatest weakness: the infrastructure is
fundamentally insecure to attacks from individuals, organizations, or
nation-states that can easily deny service or compromise the integrity of
information. This has left us extremely vulnerable to fraud, crime, and
espionage.

If you are developing practical solutions to problems relating to
protecting your country's information infrastructure or a commercial
enterprise, consider submitting a paper to the Annual Computer Security
Applications Conference. This internationally recognized conference
provides a forum for experts in information system security to exchange
practical ideas about solving these critical problems. We are looking for
papers, panels and tutorials that address:

      Internet security and electronic commerce technologies
      Health care privacy and security
      Crypto, key management, and digital signature applications
      Network management and smart card applications
      Mobile computing
      Law enforcement, legal, and ethical concerns
      Incident response planning - governmental and other perspectives
      Audit; audit reduction, and intrusion detection
      New paradigms for protecting electronic intellectual capital
      Securing very high-speed telecommunications (e.g., ATM)
      Defensive information warfare
      Software safety and program correctness

The conference solicits papers, panels, case studies presentations, and
tutorials that address practical approaches to solving these problems in
both governmental (whether multi-national, national, or local) and
commercial environments. Selected papers will be those that present
examples of in-place or attempted solutions to real problems, lessons
learned, original research analyses, and approaches to securing the
information infrastructure.

Panels of interest include those that present alternative/controversial
viewpoints or those that encourage lively discussion of relevant issues.
Panels that are collections of unrefereed papers will not be considered.
Case studies presentations of interest should emphasize innovative product
implementations, especially implementations involving the integration of
multiple products. Case studies that simply describe product features will
not be selected.

Conference Papers will be judged for best paper awards. A prize will be
given for Outstanding Conference Paper and the Best Student Paper. For the
Best Student Paper, expenses to attend the conference will also be
provided.

Instructions for All Types of Submissions:
=============================
All papers, panel/forum proposals, case studies, and tutorial proposals
must be received no later than May 28, 1999. Authors will be notified of
acceptance by August 6, 1999. Camera-ready copies are due not later than
September 24, 1999.

Papers substantially identical to those that have been previously published
or are under consideration for publication elsewhere should not be
submitted. We provide for blind refereeing of papers and therefore we ask
that you put author names and affiliations on a separate cover page only.
If appropriate, this lead page should also indicate that a student is
submitting the paper. Completed papers should be in Microsoft Word, html,
rich text format (rtf) or ASCII text format. Word in uuencoded format is
acceptable. Postscript is discouraged. Papers should not exceed 7500 words
or 10 pages. Accepted papers will be published in the Conference
Proceedings and electronically published on the ACSAC web site at:
http://www.acsac.org.

Send papers electronically to Program_chair@acsac.org. If electronic
submission is not possible, please send a message to
Program_chair@acsac.org for further instructions.

Panel/Forum proposals should be sent to Panel_chair@acsac.org. Proposals
should be a maximum of 2 pages describing the panel theme and
appropriateness for this conference. They should identify intended speakers
or organizations to be represented and their respective viewpoints.

Case studies should be sent to Case_studies@acsac.org. Presentations by
vendors, systems integrators and architects in both the private and public
sectors are encouraged. Presentation proposals should include vendor
solutions as well as an abstract that describes the product and example
applications.

Tutorial proposals should be sent to Tutorial_chair@acsac.org. Proposals
should consist of a one to two paragraph abstract of the tutorial, an
outline of the material to be presented, and an indication of the desired
tutorial length (full day or half day).

Additional Instructions for Students:
========================
Student papers must be authored 100% by students; no faculty authors are
permitted. On the author's page, please identify your paper as "Authored by
Student." Send your e-mail submission to student_chair@acsac.org to ensure
that your paper is considered for the Best Student Paper Award. This award
includes expenses for the student to travel to the conference and present
the paper.

ACSA, the conference sponsor, offers a conferenceship to enable students to
attend the Annual Computer Security Applications Conference. The
conferenceship will pay for the conference and tutorial expenses, including
travel, for selected students. Additional information will be in the
Advance Program or can be obtained by sending a message to
student_chair@acsac.org.

ACSA had its genesis in the first Aerospace Computer Security Applications
Conference in 1985. That conference was a success and evolved into the
Annual Computer Security Applications Conference (ACSAC). Several years ago
the word "Aerospace" was dropped from the name to promote a wider range of
government and commercial applications. ACSA was incorporated in 1987 as a
non-profit association of computer security professionals who have a common
goal of improving the understanding, theory, and practice of computer
security. ACSA continues to be the primary sponsor of the annual
conference.

In 1989, ACSA began the Distinguished Lecture Series at the annual
conference. Each year, an outstanding computer security professional is
invited to present a lecture of current topical interest to the security
community. In 1991, ACSA began a Best Paper by a Student Award, presented
at the Annual conference. This award is intended to encourage active
student participation in the annual conference. The award winning student
author receives an honorarium and all expenses to the conference.

ACSA continues to be committed to serving the security community by finding
additional approaches for encouraging and facilitating dialogue and
technical interchange. ACSA is always interested in suggestions from
interested professionals and computer security professional organizations
on how to achieve these goals.

To be added to the Annual Computer Security Applications Conference Mailing
List, visit our World Wide Web site at http://www.acsac.org. This Call for
Papers is also available at that site.

The Conference Chair:
General_chair@acsac.org
Dee Akers
The MITRE Corporation
1820 Dolley Madison Boulevard
Mail Stop CHAN
McLean, VA 22102
+1 703 808-1264

ACSAC Conference Proceedings and Videos! A limited number of videos and
proceedings from prior conferences can still be purchased. For further
information, visit our web site.

Vince Reed, CISSP
Publicity Chair
Annual Computer Security Applications Conference
1500 Perimeter Pkwy., Suite 310, Huntsville, AL 35806-3578
Phone: +1.256.890.3323, FAX: +1.256.830.2608
publicity@acsac.org
http://www.acsac.org/





