Information Technology Seminar II: Schedule

Protocols and Trust

Aoyama Gakuin University, Winter 2005/06, Martin J. Dürst (updated 2005-10-13)

(links to presentations and minutes are only accessible with a password)

September 28
Introduction
October 5
Introduction to Cryptography: The Basics of Cryptography, from PGP 6.5.1 documentation (at http://www.pgpi.org/doc/pgpintro/). Presentation: 福山 (talk); Minutes: 水野。
October 12
How Email Works: SMTP, POP, IMAP, and spam: need to decide on materials. Presentation: 杉下; Discussion: 小林照峰、山田; Minutes: 宮内。
S/MIME and PGP: need to decide on materials. Presentation: 梶川 (talk); Discussion: 川上、田川; Minutes: 小林聖人。
October 19
Sender Policy Framework: Sender Policy Framework (SPF) for Authorizing Use of Domains in E-MAIL, version 1, Internet Draft draft-schlitt-spf-classic-02 (work in progress). Presentation: 渡辺; Discussion: 杉下、水野; Minutes: 小林照峰。
Trust Metrics: Avogato's trust metric & Raph Levien, Attack Resistant Trust Metrics, draft Ph.D. thesis in compact formatting (at http://www.levien.com/thesis/compact.pdf). Presentation: 矢口; Discussion: 福山、宮内; Minutes: 山田。
October 26
Personal Password Management: J. Alex Halderman, Brent Waters, and Eduard W. Felten, A Convenient Method for Securely Managing Passwords, Proceedings of the 14th International World Wide Web Conference (WWW2005), Chiba, Japan, May 2005, pp. 471-479, ACM, New York, NY, USA. Presentation: 大塚; Discussion: 梶川、小林聖人; Minutes: 川上。
Limits of security techniques: Carl Ellison and Bruce Schneier: Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure, Computer Security Journal, Volume XVI, Number 1, 2000. Presentation: 佐藤; Discussion: 渡辺、矢口; Minutes: 田川。
November 2
Extensible Messaging and Presence Protocol (XMPP, Jabber): need to decide on materials. Presentation: 水野; Discussion: 山田、川上、田川; Minutes: 福山。
November 9
Blogs and Feeds: Atom Publishing Format: need to decide on materials. Presentation: 宮内; Discussion: 大塚、矢口、梶川、佐藤; Minutes: 杉下。
(November 16: Founding Day)
(November 23: Labor Thanksgiving Day)
November 30
HTTP Security: Haidong Xia and José Carlos Brustoloni, Hardening Web Browsers Against Man-in-the-Middle and Eavesdropping Attacks, Proceedings of the 14th International World Wide Web Conference (WWW2005), Chiba, Japan, May 2005, pp. 489-498, ACM, New York, NY, USA. Presentation: 小林聖人; Discussion: 佐藤、大塚、渡辺; Minutes: 梶川。
December 7
Phishing and Unicode Security: Mark Davis and Michel Suignard, Unicode Technical Report #36: Unicode Security Considerations (at http://www.unicode.org/reports/tr36/). Presentation: 小林照峰; Discussion: 水野、福山、杉下; Minutes: 渡辺。
December 14
Jeremy J. Carroll, Christian Bizer, Pat Hayes, and Patrick Stickler: Named Graphs, Provenance and Trust, Proceedings of the 14th International World Wide Web Conference (WWW2005), Chiba, Japan, May 2005, pp. 613-622, ACM, New York, NY, USA. Presentation: 山田; Discussion: 宮内、大塚、佐藤; Minutes: 矢口。
December 21
Daniel J. Weitzner, Jim Hendler, Tim Berners-Lee, and Dan Connolly: Creating a Policy-Aware Web: Discretionary, Rule-based Access for the World Wide Web (to appear in: Web and Information Security, E. Ferrari and B. Thuraisingham, Eds., Idea Group Inc., Hershey, PA, USA). Presentation: 川上; Discussion: 小林聖人、梶川、渡辺; Minutes: 大塚。
(December 28, January 4: Winter holidays)
January 11
[研究室紹介]
January 17 (Tuesday!)
Japanese Cash Card Scandal: Newspaper articles, further research. Presentation: 田川; Discussion: 小林照峰、杉下、矢口; Minutes: 佐藤。
(January 18: supplementary lectures)
(January 25, February 1: end-of-term examinations)