Steven M. Bellovin

Steven M. Bellovin

Steven M. Bellovin is a researcher on computer networking and security. He is currently a Professor in the Computer Science department at Columbia University, having previously been a long time employee at AT&T Labs Research in Florham Park, New Jersey.

As a graduate student, Bellovin was one of the originators of USENET. He later suggested that Gene Spafford should create the [http://securitydigest.org/phage Phage mailing list] as a response to the Morris Worm.

Bellovin and Michael Merritt invented the Encrypted key exchange password-authenticated key agreement methods.

Bellovin has been active in the IETF. He was a member of the Internet Architecture Board from 1996-2002. Bellovin later was Security Area co-director, and a member of the Internet Engineering Steering Group (IESG) from 2002-2004. He identified some key security weaknesses in the Domain Name System; this and other weaknesses eventually led to the development of DNSSEC.

Bellovin received 2007 National Computer Systems Security Award by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA).

Bellovin is the author and co-author of several books, RFCs and technical papers, including:
* "Firewalls and Internet Security: Repelling the Wily Hacker" ISBN 0-201-63357-4 (with W. Cheswick) - one of the first books on internet security.
* RFC 1579 "Firewall-Friendly FTP"
* RFC 1675 "Security Concerns for IPng"
* RFC 1681 "On Many Addresses per Host"
* RFC 1948 "Defending Against Sequence Number Attacks"
* RFC 3514 "The Security Flag in the IPv4 Header" (April fools joke)
* RFC 3554 "On the Use of Stream Control Transmission Protocol (SCTP) with IPsec" (with J. Ioannidis, A. Keromytis, R. Stewart.)
* RFC 3631 "Security Mechanisms for the Internet" (with J. Schiller, Ed., C. Kaufman)
* RFC 4107 "Guidelines for Cryptographic Key Management" (with R. Housley)

Bellovin is an active NetBSD user and has been a NetBSD developer focusing on architectural, operational, and security issues.

ee also

* Computer security
* Cryptography

External links

* [http://www.cs.columbia.edu/~smb Steve Bellovin's home page]
* [http://www.wilyhacker.com/ Wily hacker web page]
* [http://www.acsac.org/2006/ncss-pr.html NIST/NSA National Computer Systems Security Award 2007]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Steven Bellovin — Steven M. Bellovin (* in Brooklyn, USA) ist ein US amerikanischer Forscher im Bereich Computernetzwerke und sicherheit. Zurzeit ist er Professor in der Informatik Fakultät der Columbia University und war vorher Mitarbeiter bei AT T Labs Research… …   Deutsch Wikipedia

  • Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… …   Wikipedia

  • Interlock protocol — The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an …   Wikipedia

  • Sender Policy Framework — TOC In computing, Sender Policy Framework (SPF) allows software to identify messages that are or are not authorized to use the domain name in the SMTP HELO and MAIL FROM (Return Path) commands, based on information published in a sender policy of …   Wikipedia

  • Encrypted key exchange — (also known as EKE) is a family of password authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt. [cite conference|author=S. M. Bellovin|coauthors=M. Merritt|title=Encrypted Key Exchange: Password Based… …   Wikipedia

  • TCP sequence prediction attack — A TCP sequence prediction attack is an attempt to predict the sequence number used to identify the packets in a TCP connection.The attacker hopes to correctly guess the sequence number to be used by the sending host. If they can do this, they… …   Wikipedia

  • List of Stuyvesant High School people — This article lists notable people associated with Stuyvesant High School in New York City, New York, organized into rough professional areas and listed in order by their graduating class. MathematicsStuyvesant High School has produced a steady… …   Wikipedia

  • IP traceback — is a name given to any method for reliably determining the origin of a packet on the Internet. The datagram nature of the Internet makes it difficult to determine the originating host of a packet – the source id supplied in an IP packet can be… …   Wikipedia

  • Password-authenticated key agreement — In cryptography, a password authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party s knowledge of a password. Contents 1 Types 2 Brief history 3 See also …   Wikipedia

  • Firewall (computing) — This article is about the network security device. For other uses, see Firewall. An illustration of where a firewall would be located in a network …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”