Information Technology Seminar II: Schedule
Protocols and Trust
Aoyama Gakuin University, Winter 2005/06, Martin J. Dürst (updated
2005-10-13)
(links to presentations and minutes are only accessible with a
password)
- September 28
- Introduction
- October 5
- Introduction to Cryptography: The Basics of
Cryptography, from PGP 6.5.1 documentation (at
http://www.pgpi.org/doc/pgpintro/). Presentation: 福山 (talk); Minutes:
水野。
- October 12
- How Email Works: SMTP, POP, IMAP, and spam: need to decide on
materials. Presentation: 杉下; Discussion:
小林照峰、山田; Minutes:
宮内。
- S/MIME and PGP: need to decide on materials. Presentation: 梶川 (talk); Discussion: 川上、田川; Minutes: 小林聖人。
- October 19
- Sender Policy Framework: Sender
Policy Framework (SPF) for Authorizing Use of Domains in E-MAIL,
version 1, Internet Draft draft-schlitt-spf-classic-02 (work in
progress). Presentation: 渡辺;
Discussion: 杉下、水野; Minutes:
小林照峰。
- Trust Metrics: Avogato's trust
metric & Raph Levien, Attack Resistant Trust
Metrics, draft Ph.D. thesis in compact formatting (at
http://www.levien.com/thesis/compact.pdf). Presentation: 矢口; Discussion:
福山、宮内; Minutes: 山田。
- October 26
- Personal Password Management: J. Alex Halderman, Brent Waters, and
Eduard W. Felten, A Convenient Method for Securely Managing Passwords,
Proceedings of the 14th International World Wide Web Conference
(WWW2005), Chiba, Japan, May 2005, pp. 471-479, ACM, New York, NY, USA.
Presentation: 大塚; Discussion:
梶川、小林聖人; Minutes:
川上。
- Limits of security techniques: Carl Ellison and Bruce Schneier: Ten
Risks of PKI: What You're not Being Told about Public Key
Infrastructure, Computer Security Journal, Volume XVI, Number 1, 2000.
Presentation: 佐藤; Discussion:
渡辺、矢口; Minutes: 田川。
- November 2
- Extensible Messaging and Presence Protocol (XMPP, Jabber): need to
decide on materials. Presentation: 水野;
Discussion: 山田、川上、田川; Minutes: 福山。
- November 9
- Blogs and Feeds: Atom Publishing Format: need to decide on materials.
Presentation: 宮内; Discussion:
大塚、矢口、梶川、佐藤; Minutes:
杉下。
- (November 16: Founding Day)
- (November 23: Labor Thanksgiving Day)
- November 30
- HTTP Security: Haidong Xia and José Carlos Brustoloni, Hardening Web
Browsers Against Man-in-the-Middle and Eavesdropping Attacks,
Proceedings of the 14th International World Wide Web Conference
(WWW2005), Chiba, Japan, May 2005, pp. 489-498, ACM, New York, NY, USA.
Presentation: 小林聖人; Discussion:
佐藤、大塚、渡辺; Minutes:
梶川。
- December 7
- Phishing and Unicode Security: Mark Davis and Michel Suignard, Unicode Technical Report
#36: Unicode Security Considerations (at
http://www.unicode.org/reports/tr36/). Presentation: 小林照峰; Discussion:
水野、福山、杉下; Minutes:
渡辺。
- December 14
- Jeremy J. Carroll, Christian Bizer, Pat Hayes, and Patrick Stickler:
Named Graphs, Provenance and Trust, Proceedings of the 14th
International World Wide Web Conference (WWW2005), Chiba, Japan, May
2005, pp. 613-622, ACM, New York, NY, USA. Presentation: 山田; Discussion:
宮内、大塚、佐藤; Minutes:
矢口。
- December 21
- Daniel J. Weitzner, Jim Hendler, Tim Berners-Lee, and Dan Connolly:
Creating a Policy-Aware Web: Discretionary, Rule-based Access for the
World Wide Web (to appear in: Web and Information Security, E. Ferrari
and B. Thuraisingham, Eds., Idea Group Inc., Hershey, PA, USA).
Presentation: 川上; Discussion: 小林聖人、梶川、渡辺; Minutes: 大塚。
- (December 28, January 4: Winter holidays)
- January 11
- [研究室紹介]
- January 17 (Tuesday!)
- Japanese Cash Card Scandal: Newspaper articles, further research.
Presentation: 田川; Discussion: 小林照峰、杉下、矢口;
Minutes: 佐藤。
- (January 18: supplementary lectures)
- (January 25, February 1: end-of-term examinations)