DOD prepares for credentialing pilot

2003-12-03 Thread R. A. Hettinga

--- begin forwarded text


Status:  U
Date: Wed, 03 Dec 2003 02:55:44 -0700
From: [EMAIL PROTECTED]
Subject: DOD prepares for credentialing pilot
To: 'internet-payments' [EMAIL PROTECTED]
List-Post: mailto:[EMAIL PROTECTED]
List-Subscribe: http://ls.fstc.org/ob/adm.pl,
 mailto:[EMAIL PROTECTED]
List-Archive: http://ls.fstc.org/archives/internet-payments/
List-Help: http://ls.fstc.org/elists/admin.shtml,
 mailto:[EMAIL PROTECTED]
List-Id: internet-payments.ls.fstc.org






http://www.washingtontechnology.com/news/1_1/daily_news/22265-1.html
http://www.gcn.com/vol1_no1/daily-updates/24319-1.html

There were a couple talks on this in a seesion at yesterday's e.gov
conference.
http://www.e-gov.com/events/2003/hls/conference/plenary.asp

Some of the things said were very similar to comments I made at NISSC
meeting five years ago (although at the time, some number of the audience
and possibly other session presenters blanched at the time). See
http://www.garlic.com/~lynn/index.html#aads
and scroll down to 21st National Information Systems Security Conference.

e.gov presentation pointed to
http://www.fegc.org/
for more details on DCIS/FiXs program

The initial phase is authentication. Somewhat similar to FSTC's FAST and
some of the non-financial authentication demo's done at BAI four years ago
as well as NACHA pilot. FAST reference:
http://www.fstc.org/projects/fast/index.cfm

BAI reference::
http://www.garlic.com/~lynn/99.html#224

NACHA pilot references:
http://www.garlic.com/~lynn/index.html#aadsnacha

Presentation at e.gov session mentioned that follow-on phases can have
authorization as well as authentication and the DOD switch will not only be
able to route requests between different back-end servers but also
interface into NACHA.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Fwd: NSF ANNOUNCES $30 MILLION PROGRAM IN CYBER TRUST

2003-12-03 Thread K.Ellis

From: Smith, Julie A. [EMAIL PROTECTED]
To: NSF News [EMAIL PROTECTED]
Subject: NSF ANNOUNCES $30 MILLION PROGRAM IN CYBER TRUST
Date: Wed, 3 Dec 2003 08:58:34 -0500
X-Mailer: Internet Mail Service (5.5.2657.72)
List-Unsubscribe: mailto:[EMAIL PROTECTED]
National Science Foundation
4201 Wilson Blvd.
Arlington, VA 22230
Where discoveries begin
For Immediate Release
December 3, 2003
NSF Media Contact: David Hart, (703) 292-7737, 
mailto:[EMAIL PROTECTED][EMAIL PROTECTED]

NSF ANNOUNCES $30 MILLION PROGRAM IN CYBER TRUST

ARLINGTON, Va.-The risks of identity theft, e-mail viruses,
denial-of-service attacks, system glitches and other online
hazards often make the average person's reliance on computer
systems more of a leap of faith than a bond of trust.  To promote
research into more dependable, accountable and secure computer
and network systems, the National Science Foundation (NSF) has
issued a solicitation for the Cyber Trust program, which expects
to fund up to $30 million in awards.
Cyber Trust goes beyond protecting your computer from the next e
mail virus, although that is certainly part of the goal, said
NSF program director Carl Landwehr.  People need computer
systems they can rely on.  They should perform as promised in
critical situations, protect sensitive information, and help
everyone use them securely-and with confidence.
The Cyber Trust program will support up to three research center-
level efforts as well as single-investigator and team awards,
subject to NSF's merit-review process and the availability of
funds.  NSF expects that Cyber Trust research centers will
involve collaborations among academic, industry and other
partners.
Interconnected computer systems are part of the nation's
critical infrastructure as well as part of people's homes, cars
and offices, said noted computer security expert Eugene H.
Spafford of Purdue University, who recently joined NSF as a
senior advisor. The goal for Cyber Trust research is to make
these systems-and their successors-not only less vulnerable to
attacks, but also less likely to corrupt data, expose private
information or fail when subjected to unexpected inputs.
The Cyber Trust program is seeking innovative proposals in three
broad areas: fundamental research, multi-disciplinary research
and education and workforce development.  Fundamental research is
needed to advance the state of the art in knowledge and
technology about trustworthy computing.  This covers such areas
as security and privacy models and metrics, evaluation and
certification methods, denial-of-service prevention, long-lived
data archiving methods, privacy protection and network and
application forensics.
Multi-disciplinary research is needed to improve understanding of
the social, legal, ethical and economic trade-offs that affect
the design and operation of trusted information systems.
Finally, the Cyber Trust program encourages proposals that
encompass education and workforce development to ensure that
those who produce, operate and use trusted systems can put the
technological advances into practice.
Deadlines and additional information for proposals are available
in the official solicitation, which can be found at
http://www.nsf.gov/pubsys/ods/getpub.cfm?nsf04524http://www.nsf.gov/pubsys/ods/getpub.cfm?nsf04524.
###

NSF PR03-133

NSF Science Experts: Carl Landwehr, Program Director, (703) 292-8950, 
mailto:[EMAIL PROTECTED][EMAIL PROTECTED]
  Eugene Spafford, NSF Senior Advisor, 
(703) 292-8900, mailto:[EMAIL PROTECTED][EMAIL PROTECTED]

NSF Cyber Trust program: 
http://www.cise.nsf.gov/funding/pgm_display.cfm?pub_id=6476http://www.cise.nsf.gov/funding/pgm_display.cfm?pub_id=6476

The National Science Foundation is an independent federal agency
that supports fundamental research and education across all
fields of science and engineering, with an annual budget of
nearly $5.3 billion.  National Science Foundation funds reach all
50 states through grants to nearly 2,000 universities and
institutions.  Each year, NSF receives about 30,000 competitive
requests for funding, and makes about 10,000 new funding awards.
The National Science Foundation also awards over $200 million in
professional and service contracts yearly.
Receive official National Science Foundation news electronically
through the e-mail delivery system, NSFnews.  To subscribe, send
an e-mail message to 
mailto:[EMAIL PROTECTED][EMAIL PROTECTED]  In the body of
the message, type subscribe nsfnews and then type your name.
(Ex.:  subscribe nsfnews John Smith)

Useful National Science Foundation Web Sites
NSF Home Page: http://www.nsf.gov/http://www.nsf.gov/
News Highlights: http://www.nsf.gov/od/lpahttp://www.nsf.gov/od/lpa
Newsroom: 
http://www.nsf.gov/od/lpa/news/media/start.htmhttp://www.nsf.gov/od/lpa/news/media/start.htm
Science Statistics: 
http://www.nsf.gov/sbe/srs/stats.htmhttp://www.nsf.gov/sbe/srs/stats.htm
Awards Searches: