From proff Mon Aug 26 21:14:41 1996 Received: (proff@localhost) by suburbia.net (8.7.4/Proff-950810) id VAA24411 for best-of-security; Mon, 26 Aug 1996 21:14:41 +1000 Received: from pdx1.world.net (pdx1.world.net [192.243.32.18]) by suburbia.net (8.7.4/Proff-950810) with ESMTP id UAA22002 for ; Mon, 26 Aug 1996 20:53:23 +1000 Received: from relay5.UU.NET (relay5.UU.NET [192.48.96.15]) by pdx1.world.net (8.7.5/8.7.3) with ESMTP id UAA29423 for ; Sun, 25 Aug 1996 20:42:53 -0700 (PDT) Received: from miles.greatcircle.com by relay5.UU.NET with ESMTP (peer crosschecked as: miles.greatcircle.com [198.102.244.34]) id QQbejl04992; Sun, 25 Aug 1996 23:29:46 -0400 (EDT) Received: (majordom@localhost) by miles.greatcircle.com (8.7.1-lists/Lists-960417-1) id TAA26114 for firewalls-outgoing; Sun, 25 Aug 1996 19:55:25 -0700 (PDT) Received: from ns.gte.com (ns.gte.com [132.197.8.9]) by miles.greatcircle.com (8.7.4/Miles-951221-1) with ESMTP id TAA26096 for ; Sun, 25 Aug 1996 19:55:14 -0700 (PDT) Received: from [132.197.64.22] by ns.gte.com (8.7.5/) X-Sender: tmc0@pophost.gte.com Message-Id: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Sun, 25 Aug 1996 22:55:15 -0400 To: firewalls@GreatCircle.COM, www-security@ns2.Rutgers.EDU, ietf@cnri.reston.va.us, ieft-tls@w3.org From: tmc0@gte.com (Tom Chen) Subject: call for papers: IEEE Network issue on network security Sender: proff Precedence: bulk Apologies if you receive multiple copies of this call-for-papers. ---------------------------------------------------------------- IEEE NETWORK MAGAZINE Call for Papers Feature Issue on Network and Internet Security The May 1997 issue of IEEE Network will feature the topic of network and Internet security. Private and public organizations are increasingly dependent on distributed computer systems and computer networks such as the global Internet. However, the commercialization and escalating popularity of the Internet have been accompanied by a rising level of network-related security attacks despite firewalls, encryption, anti-virus programs, and other security measures. Today, security attacks can originate from a greater number of sources in more varied forms. New networking technologies (e.g., fiber optics, ATM) enable data to be moved at rates of gigabits/s, where security breaches and data transmissions can occur on timescales much faster than human intervention. In addition, computer technology is being used for increasingly sophisticated, automated tools that allow any non-expert to perpetrate serious security attacks. As the issue of security gains prominent attention in scientific, political, and commercial arenas, it poses a potential hindrance to the continued growth of the Internet and other computer networks. Contributions are invited to the feature issue of IEEE Network which will represent the current state of the art covering all aspects of network and internetwork security. Topics may include, but are not limited to: - cryptography and privacy; - viruses, worms, and intruding software; - Internet commerce; - firewalls and access control; - authentication and digital signatures; - key management and exchange; - certificates and certification authorities; - secure e-mail; - secure network management. Contributions should be submitted by November 1, 1996 to the guest editor: Thomas M. Chen GTE Laboratories, Inc. 40 Sylvan Road Waltham, MA 02254 USA tel: 617-466-2758 fax: 617-890-9320 email: tchen@gte.com