From owner-ietf-ssh@clinet.fi  Tue Feb  3 14:21:03 1998
Return-Path: <owner-ietf-ssh@clinet.fi>
Received: from ssh.fi (muuri.ssh.fi [192.168.2.254])
	by pilari.ssh.fi (8.8.8/8.8.8/EPIPE-1.10) with ESMTP id OAA12368;
	Tue, 3 Feb 1998 14:21:03 +0200 (EET)
Received: from lohi.clinet.fi (majordom@lohi.clinet.fi [194.100.0.7])
	by ssh.fi (8.8.8/8.8.8/EPIPE-1.13) with ESMTP id OAA19039;
	Tue, 3 Feb 1998 14:20:59 +0200 (EET)
Received: (from majordom@localhost)
	by lohi.clinet.fi (8.8.8/8.8.6) id OAA00917
	for ietf-ssh-outgoing; Tue, 3 Feb 1998 14:13:53 +0200 (EET)
X-Authentication-Warning: lohi.clinet.fi: majordom set sender to owner-ietf-ssh@clinet.fi using -f
Received: from portofix.ida.liu.se (portofix.ida.liu.se [130.236.177.25])
	by lohi.clinet.fi (8.8.8/8.8.6) with ESMTP id OAA00912
	for <ietf-ssh@clinet.fi>; Tue, 3 Feb 1998 14:13:51 +0200 (EET)
Received: from mir48.ida.liu.se (mir48.ida.liu.se [130.236.176.78])
	by portofix.ida.liu.se (8.8.6/8.8.6) with SMTP id NAA18610
	for <ietf-ssh@clinet.fi>; Tue, 3 Feb 1998 13:11:24 +0100 (MET)
From: Mats Gustafsson <matgu@ida.liu.se>
Received: by mir48.ida.liu.se (SMI-8.6/ida.slave-V1.0b6d6S2)
	id NAA24272; Tue, 3 Feb 1998 13:11:23 +0100
Date: Tue, 3 Feb 1998 13:11:23 +0100
Message-Id: <199802031211.NAA24272@mir48.ida.liu.se>
To: ietf-ssh@clinet.fi
Subject: Enterprise Security Workshop
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Sender: owner-ietf-ssh@clinet.fi
Precedence: bulk
Content-Length: 6432
Lines: 209

Dear Colleague, 

This mail is to direct your attention to the Third International
Workshop on Enterprise Security, to be held on June 17-19, 1998
at Stanford University, California, USA. Deadline for paper 
submissions is February 27, 1998. 

Please accept my apologies if you receive this message more than once.

Enclosed is the Call For Papers. Your help in distributing the 
CFP to interested parties would be greatly appreciated.


Best regards,
/Mats Gustafsson, M.Sc.                                             
Dept. of Computer and Information Science 
Linkping University 
SE-581 83 Linkping
Sweden 

-----------------------------------------------------------------------

                           CALL FOR  PAPERS
                          *EXTENSION NOTICE*
                Submission deadline: February 27, 1998

         Third International Workshop on Enterprise Security
                           June 17-19, 1998
                 Stanford University, California, USA

       Sponsored by the IEEE Computer Society and CERC at West
    Virginia University. Hosted by the Center for Design Research,
                         Stanford University.


  This document is also available in HTML and Postscript formats as
           http://www.ida.liu.se/labs/iislab/SECWK/cfp.html
                                 and
            http://www.ida.liu.se/labs/iislab/SECWK/cfp.ps



Enterprises are becoming increasingly dependent on their information
systems to support their business and workflow activities.  There is a
need for universal electronic connectivity to support interaction and
cooperation between multiple organizations. This makes enterprise
security and confidentiality more important but at the same time more
difficult to achieve, as the multiple organizations may have
differences in their security policies and may have to interact via an
insecure Internet.

These inter-organizational enterprise systems may be very large,
efficient tools, techniques and methodologies are therefore needed to
support the specification, analysis and implementation of security.

This workshop will focus on the problems and challenges relating to
enterprise security in inter-organizational systems. We aim to bring
together principal players from both the internetwork and the
enterprise security community and will provide plenty of time for
discussion.

Topics to be discussed include:
-------------------------------
Internet security:
* Security protocols for the Internet
* The work and efforts of IETF security groups
* Global key infrastructures

Distribution:
* Distributed database security
* Secure transactions
* Inter- and intra-organizational security
* Security of collaborative applications

Secure infrastructures:
* Secure applications and environments
* Object-oriented and CORBA Security
* Secure enterprise infrastructures
* Security algorithms
* Public key infrastructures

Security management:
* Role-based access control
* Enterprise security policies
* Security in workflow processes

The program committee welcomes both papers and panel proposals
covering these topics.  


SUBMISSIONS
-----------

Authors should submit six copies of an original paper (not submitted
or published elsewhere) to one of the Program Co-Chairs. Electronic
submissions are also accepted via the World Wide Web. Instructions
and forms are availabe at http://iispc2.ida.liu.se/SECWK/ .

Submissions should include the title of the paper, the name and
affiliation of each author, a 150-word abstract, and no more than 8
keywords. Submissions should not exceed 3000 words in length.  The
name, position, address, telephone number, and if possible, fax number
and e-mail address of the author responsible for correspondence must
be included.

A representative selection of accepted papers will published in the
workshop post-proceedings. Papers accepted for publication in the
proceedings are limited to six pages (about 2000-2500 words) in IEEE
format (two columns, single spaced, 10pt Times). Authors are strongly
encouraged to adhere to this format also when submitting
papers. Detailed information on the IEEE format (together with some
templates) is available at http://www.computer.org/cspress/instruct.htm 


PANEL PROPOSALS
---------------

Send six copies of panel proposals to the Program Chair. Include a
title, a 150-word scope statement, proposed session chair and
panelists and their affiliations, the organizer's affiliation,
address, telephone and fax number, and e-mail address.


GENERAL CHAIR
-------------

Yahya Al-Salqan
Sun Microsystems
901 San Antonio Rd
Palo Alto, CA 94303
USA
E-mail: alsalqan@eng.sun.com


PROGRAM CO-CHAIRS
-----------------

Nahid Shahmehri
Dept. of Computer Science
Linkping University
S-581 83 Linkping
SWEDEN
E-mail: nahsh@ida.liu.se

Douglas Maughan
National Security Agency, R23
9800 Savage Rd.
Ft. Meade, Maryland 20755-6000
USA
E-mail: wdm@tycho.ncsc.mil



WORKSHOP PROGRAM COMMITTEE
--------------------------

Takashi Arno, NTT Corp., Japan
William Cheng-Chung Chu, Feng Chia University, Taiwan
Barbara Davis, Applied Knowledge Group, USA
Mourad Debbabi, Laval University, Canada
Germano Caronni, Computer Engineering and Networks Laboratory, 
                 ETH-Zentrum, Switzerland
Dima Hamad, Birzeit University, West Bank
Takeo Hamada, Fujitsu, USA
Adel Jaber, Certicom, USA
Takuro Kubo, NTT America Multimedia Communications Lab, USA
Steve Lloyd, Entrust Technologies, Canada
Jeff Parrett, PeopleSoft, USA
Lisa Pretty, Certicom, Canada
Sumitra Reddy, West Virginia University, USA
Vipin Samar, Oracle, USA
Bill Soley, Sun Microsystems, USA
Robert Thomys, BSI (Federal Department of Security in 
               Information Technology), Germany
Bradley Wood, Sandia National Lab, USA
Felix Wu, North Carolina State University, USA
Qun Zhong, HP, UK
Tatu Ylnen, SSH Communications Security, Finland
Randy Chow, University of Florida, USA




IMPORTANT DATES
---------------

Papers and panel proposals due  February 27, 1998
Authors notified of acceptance  April 6, 1998
Advance Registration            May 17, 1998
Workshop                        June 17-19, 1998
Camera ready manuscripts due    June 30, 1998



INQUIRIES
---------  

Pleas send all inquiries regarding this workshop to the General 
Chair or to one of the co-chairs.

For inquires regarding WET ICE in general, contact 
wetice@cerc.wvu.edu or call (U.S.) +1-304-293-7226.







From owner-ietf-ssh@clinet.fi  Tue Feb  3 19:33:22 1998
Return-Path: <owner-ietf-ssh@clinet.fi>
Received: from ssh.fi (muuri.ssh.fi [192.168.2.254])
	by pilari.ssh.fi (8.8.8/8.8.8/EPIPE-1.10) with ESMTP id TAA14599;
	Tue, 3 Feb 1998 19:32:39 +0200 (EET)
Received: from lohi.clinet.fi (majordom@lohi.clinet.fi [194.100.0.7])
	by ssh.fi (8.8.8/8.8.8/EPIPE-1.13) with ESMTP id TAA19890;
	Tue, 3 Feb 1998 19:32:35 +0200 (EET)
Received: (from majordom@localhost)
	by lohi.clinet.fi (8.8.8/8.8.6) id TAA00684
	for ietf-ssh-outgoing; Tue, 3 Feb 1998 19:30:26 +0200 (EET)
X-Authentication-Warning: lohi.clinet.fi: majordom set sender to owner-ietf-ssh@clinet.fi using -f
Received: from mercury.Sun.COM (mercury.Sun.COM [192.9.25.1])
	by lohi.clinet.fi (8.8.8/8.8.6) with SMTP id TAA00649
	for <ietf-ssh@clinet.fi>; Tue, 3 Feb 1998 19:29:51 +0200 (EET)
Received: from Eng.Sun.COM (engmail4 [129.144.134.6]) by mercury.Sun.COM (SMI-8.6/mail.byaddr) with SMTP id JAA19660; Tue, 3 Feb 1998 09:17:33 -0800
Received: from basilisk.Eng.Sun.COM (basilisk.Eng.Sun.COM [129.144.49.2])
	by Eng.Sun.COM (SMI-8.6/SMI-5.3) with SMTP id JAA03891;
	Tue, 3 Feb 1998 09:17:32 -0800
Received: from alquds by basilisk.Eng.Sun.COM (SMI-8.6/SMI-SVR4)
	id JAA01581; Tue, 3 Feb 1998 09:17:28 -0800
Message-Id: <199802031717.JAA01581@basilisk.Eng.Sun.COM>
Date: Tue, 3 Feb 1998 09:15:49 -0800 (PST)
From: Yahya Al-Salqan <Yahya.Abual-Salqan@Eng.Sun.COM>
Reply-To: Yahya Al-Salqan <Yahya.Abual-Salqan@Eng.Sun.COM>
Subject: Enterprise Security
To: ssl-talk@netscape.com, ipsec@tis.com, ietf-otp@bellcore.com,
        ietf-pkix@tandem.com, ietf-smime@imc.org
Cc: ietf-open-pgp@imc.org, aft@socks.nec.com, cat-ietf@MIT.EDU,
        dns-security@tis.com, ietf-ssh@clinet.fi, spki@c2.net,
        ietf-tls@consensus.com, www-security@ns2.Rutgers.EDU
MIME-Version: 1.0
Content-Type: TEXT/plain; charset=ISO-8859-1
Content-MD5: s65u0q6BDLuzuKezUo+VGQ==
X-Mailer: dtmail 1.2.0 CDE Version 1.2 SunOS 5.6 sun4u sparc 
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from QUOTED-PRINTABLE to 8bit by lohi.clinet.fi id TAA00678
Sender: owner-ietf-ssh@clinet.fi
Precedence: bulk
Content-Length: 6253
Lines: 201

Dear Colleague, 

This mail is to direct your attention to the Third International
Workshop on Enterprise Security, to be held on June 17-19, 1998
at Stanford University, California, USA. Deadline for paper 
submissions is February 27, 1998. 

Please accept my apologies if you receive this message more than once.

Enclosed is the Call For Papers. Your help in distributing the 
CFP to interested parties would be greatly appreciated.

-----------------------------------------------------------------------

                           CALL FOR  PAPERS
                          *EXTENSION NOTICE*
                Submission deadline: February 27, 1998

         Third International Workshop on Enterprise Security
                           June 17-19, 1998
                 Stanford University, California, USA

       Sponsored by the IEEE Computer Society and CERC at West
    Virginia University. Hosted by the Center for Design Research,
                         Stanford University.


  This document is also available in HTML and Postscript formats as
           http://www.ida.liu.se/labs/iislab/SECWK/cfp.html
                                and
            http://www.ida.liu.se/labs/iislab/SECWK/cfp.ps



Enterprises are becoming increasingly dependent on their information
systems to support their business and workflow activities.  There is a
need for universal electronic connectivity to support interaction and
cooperation between multiple organizations. This makes enterprise
security and confidentiality more important but at the same time more
difficult to achieve, as the multiple organizations may have
differences in their security policies and may have to interact via an
insecure Internet.

These inter-organizational enterprise systems may be very large,
efficient tools, techniques and methodologies are therefore needed to
support the specification, analysis and implementation of security.
This workshop will focus on the problems and challenges relating to
enterprise security in inter-organizational systems. We aim to bring
together principal players from both the internetwork and the
enterprise security community and will provide plenty of time for
discussion.

Topics to be discussed include:
-------------------------------
Internet security:
* Security protocols for the Internet
* The work and efforts of IETF security groups
* Global key infrastructures

Distribution:
* Distributed database security
* Secure transactions
* Inter- and intra-organizational security
* Security of collaborative applications

Secure infrastructures:
* Secure applications and environments
* Object-oriented and CORBA Security
* Secure enterprise infrastructures
* Security algorithms
* Public key infrastructures

Security management:
* Role-based access control
* Enterprise security policies
* Security in workflow processes

The program committee welcomes both papers and panel proposals
covering these topics.  


SUBMISSIONS
-----------

Authors should submit six copies of an original paper (not submitted
or published elsewhere) to one of the Program Co-Chairs. Electronic
submissions are also accepted via the World Wide Web. Instructions
and forms are availabe at http://iispc2.ida.liu.se/SECWK/ .

Submissions should include the title of the paper, the name and
affiliation of each author, a 150-word abstract, and no more than 8
keywords. Submissions should not exceed 3000 words in length.  The
name, position, address, telephone number, and if possible, fax number
and e-mail address of the author responsible for correspondence must
be included.

A representative selection of accepted papers will published in the
workshop post-proceedings. Papers accepted for publication in the
proceedings are limited to six pages (about 2000-2500 words) in IEEE
format (two columns, single spaced, 10pt Times). Authors are strongly
encouraged to adhere to this format also when submitting
papers. Detailed information on the IEEE format (together with some
templates) is available at http://www.computer.org/cspress/instruct.htm 


PANEL PROPOSALS
---------------

Send six copies of panel proposals to the Program Chair. Include a
title, a 150-word scope statement, proposed session chair and
panelists and their affiliations, the organizer's affiliation,
address, telephone and fax number, and e-mail address.


GENERAL CHAIR
-------------

Yahya Al-Salqan
Sun Microsystems
901 San Antonio Rd
Palo Alto, CA 94303
USA
E-mail: alsalqan@eng.sun.com


PROGRAM CO-CHAIRS
-----------------

Nahid Shahmehri
Dept. of Computer Science
Linkping University
S-581 83 Linkping
SWEDEN
E-mail: nahsh@ida.liu.se

Douglas Maughan
National Security Agency, R23
9800 Savage Rd.
Ft. Meade, Maryland 20755-6000
USA
E-mail: wdm@tycho.ncsc.mil



WORKSHOP PROGRAM COMMITTEE
--------------------------

Takashi Arno, NTT Corp., Japan
William Cheng-Chung Chu, Feng Chia University, Taiwan
Barbara Davis, Applied Knowledge Group, USA
Mourad Debbabi, Laval University, Canada
Germano Caronni, Computer Engineering and Networks Laboratory, 
                 ETH-Zentrum, Switzerland
Dima Hamad, Birzeit University, West Bank
Takeo Hamada, Fujitsu, USA
Adel Jaber, Certicom, USA
Takuro Kubo, NTT America Multimedia Communications Lab, USA
Steve Lloyd, Entrust Technologies, Canada
Jeff Parrett, PeopleSoft, USA
Lisa Pretty, Certicom, Canada
Sumitra Reddy, West Virginia University, USA
Vipin Samar, Oracle, USA
Bill Soley, Sun Microsystems, USA
Robert Thomys, BSI (Federal Department of Security in 
               Information Technology), Germany
Bradley Wood, Sandia National Lab, USA
Felix Wu, North Carolina State University, USA
Qun Zhong, HP, UK
Tatu Ylnen, SSH Communications Security, Finland
Randy Chow, University of Florida, USA




IMPORTANT DATES
---------------

Papers and panel proposals due  February 27, 1998
Authors notified of acceptance  April 6, 1998
Advance Registration            May 17, 1998
Workshop                        June 17-19, 1998
Camera ready manuscripts due    June 30, 1998



INQUIRIES
---------  

Pleas send all inquiries regarding this workshop to the General 
Chair or to one of the co-chairs.

For inquires regarding WET ICE in general, contact 
wetice@cerc.wvu.edu or call (U.S.) +1-304-293-7226.








From owner-ietf-ssh@clinet.fi  Wed Feb 11 01:38:06 1998
Return-Path: <owner-ietf-ssh@clinet.fi>
Received: from ssh.fi (muuri.ssh.fi [192.168.2.254])
	by pilari.ssh.fi (8.8.8/8.8.8/EPIPE-1.10) with ESMTP id BAA05708;
	Wed, 11 Feb 1998 01:38:06 +0200 (EET)
Received: from lohi.clinet.fi (majordom@lohi.clinet.fi [194.100.0.7])
	by ssh.fi (8.8.8/8.8.8/EPIPE-1.13) with ESMTP id BAA11386;
	Wed, 11 Feb 1998 01:38:05 +0200 (EET)
Received: (from majordom@localhost)
	by lohi.clinet.fi (8.8.8/8.8.6) id BAA12937
	for ietf-ssh-outgoing; Wed, 11 Feb 1998 01:37:06 +0200 (EET)
X-Authentication-Warning: lohi.clinet.fi: majordom set sender to owner-ietf-ssh@clinet.fi using -f
Received: from relay.hq.tis.com (relay.hq.tis.com [192.94.214.100])
	by lohi.clinet.fi (8.8.8/8.8.6) with ESMTP id BAA12931
	for <ietf-ssh@clinet.fi>; Wed, 11 Feb 1998 01:37:05 +0200 (EET)
Received: by relay.hq.tis.com; id SAA02227; Tue, 10 Feb 1998 18:31:28 -0500 (EST)
Received: from clipper.hq.tis.com(10.33.1.2) by relay.hq.tis.com via smap (4.0a)
	id xma002167; Tue, 10 Feb 98 18:31:03 -0500
Received: from balenson.hq.tis.com (balenson.hq.tis.com [10.33.80.11]) by clipper.hq.tis.com (8.7.5/8.7.3) with SMTP id SAA26210; Tue, 10 Feb 1998 18:29:26 -0500 (EST)
Message-Id: <3.0.3.32.19980210183329.03241218@pop.hq.tis.com>
X-Sender: balenson@pop.hq.tis.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.3 (32)
Date: Tue, 10 Feb 1998 18:33:29 -0500
To: balenson@tis.com
From: "David M. Balenson" <balenson@tis.com>
Subject: REMINDER: ISOC 1998 Network and Distributed System Security
  Symposium
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ietf-ssh@clinet.fi
Precedence: bulk
Content-Length: 261
Lines: 7



----------------------------------------------------------------------------
David M. Balenson, AR&E Cryptographic Technologies Group
Trusted Information Systems, 3060 Washington Road, Glenwood, MD 21738  USA
balenson@tis.com; 301-854-5358; fax 301-854-5363

From owner-ietf-ssh@clinet.fi  Wed Feb 11 07:02:21 1998
Return-Path: <owner-ietf-ssh@clinet.fi>
Received: from ssh.fi (muuri.ssh.fi [192.168.2.254])
	by pilari.ssh.fi (8.8.8/8.8.8/EPIPE-1.10) with ESMTP id HAA08366;
	Wed, 11 Feb 1998 07:02:20 +0200 (EET)
Received: from lohi.clinet.fi (majordom@lohi.clinet.fi [194.100.0.7])
	by ssh.fi (8.8.8/8.8.8/EPIPE-1.13) with ESMTP id HAA12467;
	Wed, 11 Feb 1998 07:02:20 +0200 (EET)
Received: (from majordom@localhost)
	by lohi.clinet.fi (8.8.8/8.8.6) id HAA02346
	for ietf-ssh-outgoing; Wed, 11 Feb 1998 07:04:19 +0200 (EET)
X-Authentication-Warning: lohi.clinet.fi: majordom set sender to owner-ietf-ssh@clinet.fi using -f
Received: from relay.hq.tis.com (relay.hq.tis.com [192.94.214.100])
	by lohi.clinet.fi (8.8.8/8.8.6) with ESMTP id HAA02342
	for <ietf-ssh@clinet.fi>; Wed, 11 Feb 1998 07:04:17 +0200 (EET)
Received: by relay.hq.tis.com; id XAA07288; Tue, 10 Feb 1998 23:58:28 -0500 (EST)
Received: from dhcp1.ex.tis.com(192.94.214.121) by relay.hq.tis.com via smap (4.0a)
	id xma007281; Tue, 10 Feb 98 23:57:46 -0500
Message-Id: <3.0.3.32.19980211000023.0070ba90@pop.hq.tis.com>
X-Sender: balenson@pop.hq.tis.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.3 (32)
Date: Wed, 11 Feb 1998 00:00:23 -0500
To: balenson@tis.com
From: "David M. Balenson" <balenson@tis.com>
Subject: REMINDER: ISOC 1998 Network and Distributed Security Symposium
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=====================_887191223==_"
Sender: owner-ietf-ssh@clinet.fi
Precedence: bulk
Content-Length: 2744
Lines: 73

--=====================_887191223==_
Content-Type: text/plain; charset="us-ascii"

Ok, now that I got your attention, here's the missing text ...


--=====================_887191223==_
Content-Type: text/plain; charset="us-ascii"

1998 NETWORK AND DISTRIBUTED SYSTEM SECURITY (NDSS) SYMPOSIUM
March 11-13, 1998
Catamaran Resort Hotel
San Diego, California
Sponsored by the Internet Society
Program Chairs:  Matt Bishop, University of California at Davis
		 Steve Kent, BBN Technologies

ONLINE INFORMATION AND REGISTRATION:  http://www.isoc.org/ndss98
EARLY REGISTRATION DISCOUNT DEADLINE:  February 13, 1998

This 5th annual Symposium brings together researchers, implementers,
and users of network and distributed system security technologies
to discuss today's important security issues and challenges.  The
Symposium provides a mix of technical papers and panel presentations
that describe promising new approaches to security problems that
are practical and, to the extent possible, have been implemented.
NDSS'98 fosters the exchange of technical information and encourages
the Internet community to deploy available security technologies
and develop new solutions to unsolved problems.

KEYNOTE SPEAKER: Howard Gittleson, Director of the Internet Security 
Products Group at Bell Laboratories, Lucent Technologies

THIS YEAR'S TOPICS INCLUDE:
- Internet and Intranet security
- Implementation issues for electronic commerce
- All-optical networks security
- Secure single login
- Timestamping protocols
- Remote password protocols
- Mobile agent systems security
- Java security
- Trust management
- Traffic analysis of TCP gateways
- Secure bootstrapping
- Firewalls and IP security

NEW THIS YEAR!  PRE-CONFERENCE TECHNICAL TUTORIALS:
- Principles of Network Security (Dr. Stephen T. Kent, BBN Technologies)
- Electronic Payment Systems (Dr. B. Clifford Neuman, USC/ISI)
- Kerberos  (Jeffrey I. Schiller, MIT)
- Internet Security with Firewalls  (Fred Avolio, TIS)
- Web Security and Beyond (Dr. B. Clifford Neuman, USC/ISI)

FOR MORE INFORMATION contact the Internet Society:
     Internet Society, 12020 Sunrise Valley Drive, Reston, VA, 20191 USA
     Phone: +1 703 648 9888
     Fax: + 1 703 648 9887
     E-mail: ndss98reg@isoc.org
     URL: http://www.isoc.org/ndss98/

SPONSORSHIP OPPORTUNITIES AVAILABLE!  Take advantage of this high
visibility event.  Contact Torryn P. Brazell at the Internet Society
at +1 703 648 9888 or send e-mail to brazell@isoc.org.  
Sponsorship Chair: George Conrades, GTE Internetworking

THE INTERNET SOCIETY is a non-governmental organization for global
cooperation and coordination for the Internet and its
internetworking technologies and applications.


--=====================_887191223==_--

