Download presentation
Presentation is loading. Please wait.
Published byAustin Warren Modified over 9 years ago
1
Security Area Advisory Group 9 November 2006 Russ Housley Sam Hartman
2
Agenda ● WG Reports ● BOF Reports ● Invited Presentations – Embedding Security Knowledge in RFCs (Venkat Pothamsetty) – Real Attacks and Threat Models (Steve Bellovin) – How Not To Protect PC’s From Power Analysis (Russ Housley on behalf of Adi Shamir) ● Open Microphone
3
EMU (EAP Methods Update) ● Joe Salowey
4
MSEC (Multicast Security) ● Ran Canetti ● Lakshminath Dondeti
5
BTNS (Better-Than-Nothing Security) ● Love Hörnquist Åstrand ● Pekka Nikander
6
DKIM (Domain Keys Identified Mail) ● Stephen Farrell ● Barry Leiba
7
KRB-WG (Kerberos) ● Jeffrey Hutzelman
8
Kitten (GSS-API Next Generation) ● Jeffrey Altman
9
NEA ( Network Endpoint Assessment ) ● Steve Hanna ● Susan Thomson
10
HOKEY ( Handover Keying ) ● Charles Clancy ● Glen Zorn
11
SASL (Simple Authentication and Security Layer) ● Tom Yu ● Kurt Zeilenga
12
PKIX (Public-Key Infrastructure using X.509) ● Steve Kent ● Stefan Santesson
13
S/MIME (Secure MIME) ● Blake Ramsdell ● Sean Turner
14
ISMS (Integrated Security Model for SNMP) ● Juergen Schoenwaelder ● Juergen Quittek
15
LTANS (Long-Term Archive and Notary Services) ● Tobias Gondrom ● Carl Wallace
16
TLS (Transport Layer Security) ● Pasi Eronen ● Eric Rescorla
17
SPKM BOF (NFSv4 and Low Infrastructure Public Key Based GSS Security Mechanisms) ● Jeff Hutzelman
18
KeyProv (Provisioning of Symmetric Keys BOF) ● Phillip Hallam-Baker ● Susan Cannon
19
Invited Presentations ● Embedding Security Knowledge in RFCs – Venkat Pothamsetty ● Real Attacks and Threat Models – Steve Bellovin ● How Not To Protect PC’s From Power Analysis – Russ Housley on behalf of Adi Shamir
20
Open Microphone ● Concern? ● Issue? ● Plea for help? ● Soap box?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.