1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom...

44
1 Industry Canada Industrie Canada CASCON 2005 – Cybersecurity Workshop October 17, 2005 IP Telecom and Security Program Attendees: Lewis Robart and David Gibson IP Telecom and Security Group, Spectrum Engineering Branch, Industry Canada Group’s objective is to ensure reliable telecommunications services, through engineering investigation and analysis of emerging technologies. Program Components Engineering investigation and analysis • Protocol Analysis Lab (PAL) • Industry collaboration Standards development Academic partnerships
  • date post

    18-Dec-2015
  • Category

    Documents

  • view

    212
  • download

    0

Transcript of 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom...

Page 1: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

1Industry Canada Industrie Canada

CASCON 2005 – Cybersecurity WorkshopOctober 17, 2005

IP Telecom and Security Program

• Attendees: Lewis Robart and David Gibson– IP Telecom and Security Group, Spectrum

Engineering Branch, Industry Canada• Group’s objective is to ensure reliable

telecommunications services, through engineering investigation and analysis of emerging technologies.

• Program Components– Engineering investigation and analysis

• Protocol Analysis Lab (PAL)• Industry collaboration

– Standards development– Academic partnerships

Page 2: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Centre for CyberSecurity ResearchCentre for CyberSecurity Researchat University of Toronto at Mississaugaat University of Toronto at MississaugaCentre for CyberSecurity ResearchCentre for CyberSecurity Researchat University of Toronto at Mississaugaat University of Toronto at Mississauga

Stefan SaroiuStefan SaroiuUniversity of TorontoUniversity of Toronto

Page 3: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Stefan Saroiu: Centre for CyberSecurityStefan Saroiu: Centre for CyberSecurity University of Toronto at MississaugaUniversity of Toronto at Mississauga

How do we start addressing the How do we start addressing the problem?problem?

We need modern ways of examining how We need modern ways of examining how Internet and networked information systems Internet and networked information systems work? work? Network traffic vantage pointsNetwork traffic vantage points Mechanisms to replay traffic in controlled Mechanisms to replay traffic in controlled

environmentsenvironments

We need to examine new problems We need to examine new problems introduced by new technologiesintroduced by new technologies Mobile devices + ubiquitous connectivityMobile devices + ubiquitous connectivity

$500/month buys WiMax metropolitan connectivity at $500/month buys WiMax metropolitan connectivity at broadband speeds in Seattlebroadband speeds in Seattle

In 10 years, a $500 PDA will have a 20x faster CPU and In 10 years, a $500 PDA will have a 20x faster CPU and a 30x bigger hard disk than your desktop [Keshav’ 05]a 30x bigger hard disk than your desktop [Keshav’ 05]

Page 4: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Eric YuAssoc. Prof.

Fac. Info. StudiesUniversity of Toronto

Systems design for security and privacy

Software Requirements Engineering, NFRs

Intentional modeling for Software Engineering

Strategic Modeling

Knowledge Management

Enterprise Architecture

www.fis.utoronto.ca/~yu

Page 5: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

The i* framework for strategic actors modeling

Strategic Dependency Model – Smart Card System

Strategic Rationale Model – Card Manufacturer

Page 6: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Michel BarbeauSchool of Computer Science

Carleton UniversityInterests: Wireless security, intrusion detection, threat assessment, radio

frequency fingerprinting, mobility profiling

Page 7: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Recent Work

• WiMax/802.16 Threat Analysis– Paper in Q2SWinet 05

• Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting– Paper CIIT ’04 with J. Hall and E. Kranakis

• Rogue Access Point Detection in Wireless Networks– Patent with J.M. Robert (Alcatel)

• See: www.scs.carleton.ca/~barbeau

Page 8: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Contact infoRené Struik Phone: +1 (905) 501-6083 Certicom Research Email: [email protected]

Research interests

Core crypto • ECDSA signatures: speed-up verification (single, batch) • ECDH key agreement: unbalanced and assisted computations

Adhoc sensor networks• Security models and trust management• Semi-automatic lifecycle management• Configuration and installation• Low implementation cost

- Protocols: re-use building blocks, parallelism flows, etc.- Keying material: key identification, key usage, key size

Security constraints• Decentralized key management• Flexible configuration and trust model• Low impact key compromise• Automatic lifecycle management • Low communication overhead• Low implementation cost

Adhoc networks• No centralized management• Promiscuous behavior• UnreliabilitySensor networks• Low energy consumption• Low manufacturing cost

Page 9: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Cyber-Security Cyber-Security Research and Test Research and Test

FacilityFacilityStephen NevilleStephen NevilleAssistant ProfessorAssistant Professor

Electrical & Computer Engineering DeptElectrical & Computer Engineering Dept..University of VictoriaUniversity of Victoria

Email: [email protected]: [email protected]

Page 10: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Overview Overview Development of a research and test facility for Development of a research and test facility for

accurately simulating corporate-scale network accurately simulating corporate-scale network environments for systems (and systems-of-environments for systems (and systems-of-systems) level cyber-security and privacy systems) level cyber-security and privacy

research.research.

Goals:Goals:a)a) Ability to simulate/re-create arbitrary network Ability to simulate/re-create arbitrary network

environments:environments: Up to full 1 Gbps bandwidths. Up to full 1 Gbps bandwidths. Reproductions down to packet payloads and inter-Reproductions down to packet payloads and inter-

packet timing characteristics.packet timing characteristics. Overlaying of arbitrary attack and normal events.Overlaying of arbitrary attack and normal events. Not based on virtual networksNot based on virtual networks

unlike Iowa State’s ISEAGE system. unlike Iowa State’s ISEAGE system. or, DETER – based on University of Utah’s EmuLab or, DETER – based on University of Utah’s EmuLab

suite.suite.

Page 11: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Overview (cont.)Overview (cont.)b)b) Ability to re-instantiate/re-run experiments on-demandAbility to re-instantiate/re-run experiments on-demand

Exact control over facility’s configurationExact control over facility’s configuration All system OSes (mirrored in at experiment run time)All system OSes (mirrored in at experiment run time) Network traffic data imagesNetwork traffic data images Network switch configurationsNetwork switch configurations Timing and sequencing of overlaid attack and normal traffic eventsTiming and sequencing of overlaid attack and normal traffic events Performed through custom experiment control and management Performed through custom experiment control and management

software:software: Experiment configurationExperiment configuration Data set loadingData set loading Experiment sequencingExperiment sequencing

On-demand isolation from all UVic networksOn-demand isolation from all UVic networks

To meet the goals of scientific repeatability To meet the goals of scientific repeatability To facilitate statistically valid sensitivity and robustness To facilitate statistically valid sensitivity and robustness

researchresearch

Page 12: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Overview (cont.)Overview (cont.)

c)c) Physically isolated & secure facilityPhysically isolated & secure facility

Exact control over all network trafficExact control over all network traffic Physically isolated networks (not virtual networks)Physically isolated networks (not virtual networks) Physically separate laboratory space Physically separate laboratory space

Complete facility behind locked doors.Complete facility behind locked doors.

No internet connection during experimental runsNo internet connection during experimental runs Access restrictions based on a per data set basis Access restrictions based on a per data set basis

Required to meet security and privacy concerns.Required to meet security and privacy concerns.

Page 13: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Equipment: Equipment: 42 dual-Xeon 3.0GHz IBM HS20 blades 42 dual-Xeon 3.0GHz IBM HS20 blades

Each with dual 36 G SCSI drivesEach with dual 36 G SCSI drives 2 dual-Xeon 3.0 GHz 2U x386 servers 2 dual-Xeon 3.0 GHz 2U x386 servers

each with its own 350G 15k SCSI RAIDeach with its own 350G 15k SCSI RAID 12 Nortel Layer 2/3 network switch modules12 Nortel Layer 2/3 network switch modules Cisco 4503 layer 2/3 switchCisco 4503 layer 2/3 switch 4 3.4 Ghz dual-Xeon desktop servers4 3.4 Ghz dual-Xeon desktop servers

2 with quad 2x2 20” LCD displays 2 with quad 2x2 20” LCD displays 9 small form factor 2.8Ghz Xeon PC’s9 small form factor 2.8Ghz Xeon PC’s 4 1 Gbps Ethernet ports per machine4 1 Gbps Ethernet ports per machine 4 independent 1 Gbps networks4 independent 1 Gbps networks

2 attack/simulation networks2 attack/simulation networks 2 experiments control networks 2 experiments control networks

Leverage UVic’s existing petabyte storage facility Leverage UVic’s existing petabyte storage facility 4 Gbps fiber connection to UVic’s research network 4 Gbps fiber connection to UVic’s research network

Page 14: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Physical Architecture:Physical Architecture:

Firewall/VPN

CISCO Catalyst 4503Firewall

(2U Rack Mount dual 3.0GHz Xeon w 2GB mem. Linux Servers )

Control Networks (dual 1 Gbps Cat5E ethernet)

Background

Traffic

Generation

Cluster

(30 3.0GHz dual Xeon Blades

CyberSecurityRisk Analysis

and ManagementCluster

(6 blades + 2 3.4Ghz 2 Gb Mem. 160 GB ATA drive

Real-Time Situational Awareness

displays)

Consoles (2x2 20.1” 1600x1200 LCD

Experiment Controllers

Software

Software Firewall

Software FirewallSoftware Router

Dual 1 Gbps Cat5e ethernet Attack and S imulation Networks

Attacking Hosts(3 blades + 2 2.8 GHz 1GB mem. 160G ATA drive

Target Hos ts

- All hosts except small form factor PC’s are dual processor machines with 4 1 Gbps ethernet ports

- The two desktop risk management clus ter hosts have a 4-head video card to support the 4x4 displays required for the risk management consoles

Note:Managed Internet Connection

Plus 5 small form factor PC’s for off-s ite data collection activities

each with a 5x73.4 GB 15k SCSI RAID

Network Switch

(dual card I/O)

Software

Software Firewall

4Gbps F iber connection to

UVic Research Network

- For clarity network hubs and switches are not shown.

2

1 GB mem. and 36.4 GB SCSIhard drive and 4 1Gbps Cat5eethernet ports)

desktops with 4 head video card and 4 1 Gbps ethernet ports)

small form factor PC’s) (3 blades + 2 2.8 GHz 1GB mem. 160G ATA drive

small form factor PC’s)

Firewall

Firewall

2

to Attack/Simulation Network- All machines except the machines in the target cluster will run a Linux variant- Target machines will run both Window OSes and Linux on a per experiment bas is

- Total facility non-educational cost $545,000.00

Blade Rack KVMConsole

Page 15: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Status Status

Fully funded. Fully funded. CFI New Opportunities grant CFI New Opportunities grant British Columbia Knowledge Development fund.British Columbia Knowledge Development fund. Generous in-kind donation by IBM Canada Inc.Generous in-kind donation by IBM Canada Inc. CFI Infrastructure 5 year Operating grantCFI Infrastructure 5 year Operating grant $550k+ in total funding. $550k+ in total funding.

Equipment on-site and powered (as of Oct. 1)Equipment on-site and powered (as of Oct. 1) Rack mount equipment is secure server room.Rack mount equipment is secure server room. Adjacent secure lab space under renovation.Adjacent secure lab space under renovation. Final network connections in process of being Final network connections in process of being

made.made.

Page 16: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Going ForwardGoing Forward Over next 4 to 8 weeks initial facility capabilities will come Over next 4 to 8 weeks initial facility capabilities will come

on-line.on-line.

Custom facility control and management softwareCustom facility control and management software Position to be filled Nov. 1Position to be filled Nov. 1stst

Completion time: estimated at 8 monthsCompletion time: estimated at 8 months Completion date: Late summer ’06Completion date: Late summer ’06 Interesting research can be undertaken prior to all the Interesting research can be undertaken prior to all the

facility’s capabilities are fully realized.facility’s capabilities are fully realized.

Seeking:Seeking: Representative network traffic data setsRepresentative network traffic data sets Academic and industrial collaboratorsAcademic and industrial collaborators

Not limited to cyber-security related researchNot limited to cyber-security related research Open to general systems and systems-of-systems level researchOpen to general systems and systems-of-systems level research

Ideally also, funding opportunities: Ideally also, funding opportunities: Particularly, student supportParticularly, student support

Page 17: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Securing Computing Systems

David LieDepartment of

Electrical and Computer

Engineering

University of Toronto

Interests: Virtual Machine Monitors to

provide: Isolation Customization Flexibility

Intrusion Detection Automatic Signature Generation Automatic Filter Generation Automatic Recovery

Page 18: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Preventing Information Leakage

SSH-Priv SSH-Unpriv

Minimal OS Operating System

Virtual Machine

Other Applicatio

ns

Private Key

Password File

Even if the Linux system is compromised, the private key and password are safe in a separate Virtual MachineThe adversary cannot get that information

Page 19: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Marsha ChechikUniversity of Toronto, Department of CS

Interests:Automated reasoning about softwareRequirements engineeringVerification and validation

Interests in Cybersecurity:Reasoning about components and their interactions

w.r.t. complex security propertiesSpecifications that allow compositional reasoningAnalysis of code

Automated, precise, scalable

Page 20: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Example: reasoning about sshSplit ssh into two parts (secure kernel and the rest)Prove that the two parts still perform the right functionProve that the splitting did not introduce new problems

In ssh: communication between the two parts could be undermined, allowing access to the rest of info

Prove, using Toronto software model-checker Yasm that secure kernel satisfies its properties

About 30,000 lines of code.

Guarantee, using Virtual Memory Monitors, that the rest of the system is secure

Page 21: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

CISaCcisac.math.ucalgary.ca

H.C. Williams

iCORE Chair, Algorithmic Number Theory & Cryptography

Department of Mathematics and Statistics

University of Calgary

Page 22: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

CISaC’s Mission

CISaC's objective is to conduct multi-disciplinary

research in information protection, including: mathematical foundations, Secure communication and cryptography, Quantum information science, Privacy Security of computer networks, software, and

hardware.

Page 23: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Urs Hengartner

Assistant Professor in the School of Computer Science at University of Waterloo

Ph.D. from Carnegie Mellon (August 2005) [email protected]

Research interests Privacy in future computing environments Uncertainty in access control Credential discovery

Page 24: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Urs Hengartner

Research Interests in Information Privacy Privacy violations caused by naïve

application of access control in pervasive computing Location-based service leaks current

location Calendar entry leaks participants’ location

Privacy for emerging services Bell Canada’s “Seek & Find” service Google’s talk, email,… services

Page 25: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

• Ashraf Matrawy: Assistant Professor, Systems and Computer Engineering, Carleton University

• Background is network reliability, QoS, and security • Security interests

– Mitigation of Network Denial of Service (NDoS) through new network architectures and traffic management techniques. (with DSG at Carleton)

– Establishing trust in collaborative and P2P applications in wireless environments.

– Evaluation of network security: development of metrics that describe the security status of a computer network.

http://www.sce.carleton.ca/faculty/matrawy.html [email protected]

Page 26: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

José M. Fernandez – École Polytechnique

Background M.Sc. Theoretical Crypto

(U of T, 1993) Ph.D. in Quantum Computing

(U of Montreal, 2004) Some government/industry experience in

ITSEC (1993-2004)

École Polytechnique Asst. Prof. Department of Computer

Engineering, since 2004 Teaching :

• 4th-year intro to ITSEC (updated!)• Graduate Network Security course• Graduate “Microprogramme” in

Computer Security in development

Research/training HQP:• Done:

3x M.Sc., 4x B.Sc.• In progress:

1x Ph.D.(co-dir) 8x M.Sc. (3x co-dir)

Current Research Areas1. DDoS Attacks

• Statistical modelling and defensive

strategy optimisation 2x M.Sc.A (EH, AB)

• In ad-hoc networks 2x M.Sc.A. (AM, SMR)

2. Next-generation IDS Mobile-agent based

1x M.Sc.A (ST) Evolutionary methods

1x M.Sc.A (FK) Collaborative strategies

1x M.Sc.A (KA)

3. Malware analysis and optimisation 1x M.Sc.A (PMB)

4. Quantum Stuff … 1x Ph.D.

Page 27: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

José M. Fernandez – École Polytechnique

Funding CFI

• 1 M$ grant (eqpt+SW) • 144x blade cluster for

network emulation• Special-purpose HW

Traffic generator Reconfigurable network

• Research Sensor Network (looking for hosts!!)

• High-security Malware Lab NSERC :

• 15 k$/yr x 3 yr. Polytechnique start-up grants

• 15 k$ (+ 15k$ pending) FQRNT (pending)

• 20k$/yr x 2 yr.

Too many toys, not enough kids !!!

Collaborators & Partnerships DGI-Polytechnique

• John Mullins formal methods in security

• Ettore Merlo & Giuliano Antoniol Software security. Automated

vulnerability discovery by static analysis of source code

• Samuel Pierre Security in ad-hoc networks

CRIMOB • FQRNT research centre proposal

Sureté du Québec/RCMP• Teaching and trg of students (internships)• Possible R&D projects

ASIMM • Local IT Security prof. association

Bank of Montréal• Partner in CFI grant

____(your name here)____

Page 28: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Security and FLOSS

Professor Mark Perry [email protected]

Faculty of LawFaculty of Science

University of Western Ontario

Page 29: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

FLOSS for the ‘paranoid’

• Who can we trust?• Ourselves?

• What are vital systems for democracy?• Voting• Government • Tax• Defense

• What software to use?• FLOSS….

Page 30: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Nadia TAWBINadia TAWBIComputer Science & Software Engineering Computer Science & Software Engineering DepartmentDepartmentLaval UniversityLaval University

Research Interests:• Static Code Analysis• Dynamic Code Analysis• Malicious Code Detection• Formal Verification• Securing & Optimizing Resource Limited Devices

Page 31: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Security Policy Enforcement Security Policy Enforcement MechanismsMechanisms Malicious Code DetectionMalicious Code Detection

– Extracting a model representing program behaviour:Extracting a model representing program behaviour: Type based analysisType based analysis Flow analysisFlow analysis Abstract InterpretationAbstract Interpretation

– Expressing security policy in a modal logicExpressing security policy in a modal logic– Model checkingModel checking– Depending on the result :Depending on the result :

Accept Accept RejectReject Instrument Instrument

Embedded security Embedded security – Optimizing security enforcement mechanisms Optimizing security enforcement mechanisms

Page 32: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

R&D Areas

• intelligent agents for trust communication, handling (personal) data, and computer activity monitoring

• privacy applications and negotiation

• trust: psychological and artificial

• biometrics: face recognition, usability

• human-computer interaction: interfaces and evaluation

• machine translation and data mining for security intelligence

• anonymous ad-hoc mobile networks

• security and privacy for e-services

• engineering software for security

[email protected]

Page 33: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Gord AgnewUniversity of Waterloo

Long term storage of records in large databases (e-health records)

Secure and authenticated end-to-end VoIP Secure Sensor Networks

Page 34: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Patrick C. K. Hung

Faculty of Business and Information Technology

University of Ontario Institute of Technology (UOIT)

Oshawa, Ontario

Research Interests: Security and Privacy, Services Computing, Business Process Integration, Electronic Negotiation and Agreement.

Page 35: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

What I am working on…• Teaching: Introduction to Programming, E-Commerce, E-Business Technologies, E-

Commerce Security Infrastructures, and External Environment of Business• Research:

– "Mobile Network Dynamic Workflow Exception Handling System," U.S. Patent Application Filed to U.S. Patent and Trademark Office, Boeing Phantom Works, USA, 2004-2006

– "M-services computing security and privacy enforcement model," NSERC Discovery Grants Program - Individual, 2005-2007

– “Requirements and Architecture for Healthcare Privacy in Mobile Ad Hoc Networks (MANETs)” with BUL, Bell’s Privacy Center of Excellence, UofT, and Faculty of Health Sciences at UOIT, IN PROGRESS

• Professional Services:– Program Co-chair of the Ninth IEEE EDOC Conference (EDOC 2005) "The

Enterprise Computing Conference" and the General Chair of the tenth IEEE EDOC 2006

– Program Committee Vice-Chair of 2006 IEEE International Conference on Services Computing (SCC 2006)

– Associate Editor of the International Journal of Web Services Research (JWSR) and International Journal of Business Process Integration Management (IJBPIM)

– Executive committee member of the IEEE Computer Society’s Technical Steering Committee for Services Computing (TSC-SC)

Page 36: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

The 2006 International Conference on Privacy, Security and Trust (PST 2006)

Venue: University of Ontario Institute of Technology (UOIT) Oshawa, Ontario, Canada

Theme: Bridge the Gap between PST Technologies and Business ServicesDate: October 30 (Monday) - November 1 (Wednesday), 2006 

Page 37: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Topics of interest include, but are NOT limited to, the following: Privacy Preserving/Enhancing Technologies Critical Infrastructure Protection Identity and Trust management Network and Wireless Security Operating Systems Security Intrusion Detection Systems and Technologies Secure Software Development and Architecture Representations and formalizations of Trust in electronic and physical social systems PST challenges in e-services, e.g. e-Health, e-Government, e-Banking, e-Commerce, and e-Marketing Information filtering, recommendation, reputation and delivery technologies, spam handling technologies Trust technologies, technologies for building trust in e-Business Strategy Observations of PST in practice, society, policy and legislation Digital Rights Management Human Computer Interaction and PST Implications of, and technologies for, Lawful Surveillance Biometrics, National ID cards, identity theft PST in services computing Privacy, traceability, and anonymity Trust and reputation in self-organizing environments Anonymity and privacy vs. accountability Access control and capability delegation Case studies

Page 38: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Important Dates

PapersSubmission Deadline: April 3, 2006Notification of Acceptance: May 15, 2006Final Manuscript Due: June 5, 2006Conference: November 1-2, 2006 Workshop ProposalsSubmission Deadline: January 23, 2006Notification of Acceptance: February 6, 2006Final Workshop Papers Due: June 5, 2006Workshops: October 30, 2006 

Page 39: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Organizing Committee

General ChairGreg Sprague (NRC, Canada)  Program Co-ChairsBernadette Schell (UOIT, Canada)Wilfred Fong (UOIT, Canada)

Workshop ChairScott Knight (Royal Military College, Canada)

Publication & Publicity Co-Chairs:George Yee (National Research Council, Canada)Patrick Hung (UOIT, Canada)

Page 40: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Advisory Committee of PST 2006

Sushil Jajodia (George Mason University, USA) Ravi Sandhu (George Mason University, USA) Elisa Bertino (Purdue University, USA) Vijay Atluri (Rutgers University, USA) Lorrie Cranor (Carnegie Mellon University, USA) Vijay Varadharajan (Macquarie University, Australia) Larry Korba (NRC, Canada) Ian Blake (University of Toronto, Canada) J. Leon Zhao (The University of Arizona, USA) Cunsheng Ding (Hong Kong University of Science and Technology,

Hong Kong) Sylvia Osborn (The University of Western Ontario, Canada) John McHugh (Dalhouse University, Canada)

Page 41: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

Location

Page 42: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

www.uoit.ca

We are hiring faculty members insecurity and computer games!

Page 43: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

The 2006 International Conference on Privacy, Security and Trust (PST 2006) is the FOURTH annual conference focusing on privacy, security and trust technologies and related research issues. PST is a forum for researchers, scientists, educators, business people, technologists, futurists, policy makers, and industry practitioners, who have a vision and an understanding of the large challenges (and accompanying advances), to exchange information re-garding advancements in the state of the art and practice of privacy, security and trust technologies, as well as to identify the emerging research topics and define the future of PST. The theme of PST 2006 is “Bridge the Gap Between PST Technologies and Business Services,” which aims to investigate the research issues of business ser-vices-level security and privacy considerations and objectives to the realization in PST technologies. The program of PST 2006 will continue to feature research papers with a wide range of topics, focusing on different aspects of electronic services and PST technologies. Topics of interest include, but are NOT limited to, the following: Privacy Preserving/Enhancing Technologies

Critical Infrastructure Protection

Identity and Trust management

Network and Wireless Security

Operating Systems Security

Intrusion Detection Systems and Technologies

Secure Software Development and Architecture

Representations and formalizations of Trust in electronic and physical social systems

PST challenges in e-services, e.g. e-Health, e-Government, e-Banking, e-Commerce, and e-Marketing

Information filtering, recommendation, reputation and delivery technologies, spam handling technologies

Trust technologies, technologies for building trust in e-Business Strategy

Observations of PST in practice, society, policy and legislation

Digital Rights Management

Human Computer Interaction and PST

Implications of, and technologies for, Lawful Surveillance

Biometrics, National ID cards, identity theft

PST in services computing

Privacy, traceability, and anonymity

Trust and reputation in self-organizing environments

Anonymity and privacy vs. accountability

Access control and capability delegation All accepted papers will be published in the conference proceedings in hardcopy and on-line version. It is planned to select the best research papers for special issues in top notch journals. There will be awards for winners of the Best Paper and Best Student Paper competitions. Submissions are encouraged as long papers (8-12 pages), short papers (4-5 pages) and posters. Further details will be announced soon. We are also inviting proposals for workshops to be held on October 30, 2006. Workshops provide organizers and participants an opportunity to discuss current topics on PST in a small and interactive atmosphere. Workshops can choose to concentrate in-depth on research topics, but can also be devoted to research, application and industry issues. Proposals should include the workshop, the names and a brief (200 word) biography for each organizer and a summary of the workshop contents (approximately 1-2 pages i.e. 500-1000 words). For any enquires, please contact Dr. Patrick Hung (patrick.hung AT uoit.ca).

Papers Submission Deadline: April 3, 2006 Notification of Acceptance: May 15, 2006 Final Manuscript Due: June 5, 2006 Conference: November 1-2, 2006 Workshop Proposals Submission Deadline: January 23, 2006 Notification of Acceptance: February 6, 2006 Final Workshop Papers Due: June 5, 2006 Workshops: October 30, 2006

Theme: Bridge the Gap between PST Technologies and Business Services Date: October 30 - November 1, 2006 Venue: University of Ontario Institute of Technology (UOIT) Oshawa, Ontario, Canada

Preliminary Call For Contributions The 2006 International Conference on Privacy, Security and Trust (PST 2006)

Supported by Faculty of Business and Information Technology (FBIT) - Version 1.0

Page 44: 1 Industry CanadaIndustrie Canada October 17, 2005 CASCON 2005 – Cybersecurity Workshop IP Telecom and Security Program Attendees: Lewis Robart and David.

See you at PST 2006!