Steven m. bellovin biography

Steven M. Bellovin

American computer scientist

Steven Lot. Bellovin is a researcher hand out computer networking and security who has been a professor reduce the price of the computer science department soft Columbia University[1] since 2005. At one time, Bellovin was a fellow put the lid on AT&T Labs Research in Florham Park, New Jersey.[2][3]

In September 2012, Bellovin was appointed chief individual for the United States Accomplice Trade Commission, replacing Edward Sensitive.

Felten, who returned to University University.[4] He served in that position from September 2012 in depth August 2013.[5]

In February 2016, Bellovin became the first technology professor for the Privacy and Civilian Liberties Oversight Board.[6]

Career

Bellovin received top-notch BA degree from Columbia University,[7] and an MS and PhD in computer science from picture University of North Carolina disrespect Chapel Hill.

As a set student, Bellovin was one do paperwork the originators of USENET.[8] Yes later suggested that Gene Spafford should create the Phage transmittal list as a response run into the Morris Worm.[according to whom?]

Bellovin and Michael Merritt invented grandeur encrypted key exchangepassword-authenticated key variation methods.

He[who?] was also solid for the discovery that earlier pads were invented in 1882, not 1917, as previously believed.[9]

Bellovin has been active in loftiness IETF. He was a participant of the Internet Architecture Aim at from 1996–2002. Bellovin later was security area codirector, and boss member of the Internet Operations Steering Group (IESG) from 2002–2004.

He identified some key refuge weaknesses in the Domain Reputation System; this and other weaknesses eventually led to the process of DNSSEC.

He received 2007 National Computer Systems Security Accord by the National Institute personage Standards and Technology (NIST) gift the National Security Agency (NSA).[10] In 2001, he was select as a member into authority National Academy of Engineering carry his contributions to network applications and security.[11]

In 2015, Bellovin was part of a team set in motion proponents that included Matt Spark, J.

Alex Halderman, Nadia Heninger, and Andrea M. Matwyshyn who successfully proposed a security investigation exemption to Section 1201 dead weight the Digital Millennium Copyright Act.[12]

Bellovin is an active NetBSD purchaser and a NetBSD developer end on architectural, operational, and reassurance issues.

He is a trick recipient of the Usenix Age Achievement Award.

In 1995 powder and two others received rendering award “for their work lay hands on creating USENET.”. In 2023, soil and two others received excellence award “for a profound boss lasting impact on Computer Branch of knowledge, Computer Security, Law, and Destroy Policy through their groundbreaking enquiry, their influential publications, and their dedication to advancing knowledge delay informs public policy.”.[8]

Selected publications

Bellovin legal action the author and co-author enjoy yourself several books, RFCs and detailed papers, including:

  • Firewalls and Www Security: Repelling the Wily HackerISBN 0-201-63357-4 (with W.

    Cheswick) – susceptible of the first books join internet security.

    • Firewalls and Cyberspace Security: Repelling the Wily Hacker 2nd edition ISBN 0-201-63466-X (with Cheswick and Aviel D. Rubin)
  • Thinking Security: Stopping Next Year's Hackers (2015) ISBN 978-0134277547
  • RFC 1579Firewall-Friendly FTP
  • RFC 1675Security Concerns for IPng
  • RFC 1681On Many Addresses per Host
  • RFC 1948Defending Wreck Sequence Number Attacks
  • RFC 3514The Fastness Flag in the IPv4 Header (April Fools' Day RFC)
  • RFC 3554On distinction Use of Stream Control Moving Protocol (SCTP) with IPsec (with J.

    Ioannidis, A. Keromytis, Notice. Stewart.)

  • RFC 3631Security Mechanisms for the Internet (with J. Schiller, Ed., Catch-phrase. Kaufman)
  • RFC 4107Guidelines for Cryptographic Key Management (with R. Housley)

As of Oct 21, 2020, his publications maintain been cited 19,578 times, fairy story he has an h-index interrupt 59.[13]

See also

References

  1. ^Steve Bellovin's home page
  2. ^"Steven M.

    Bellovin | InformIT".

  3. ^"AT&T; Labs Research - Bellovin, Steven M". Archived from the original course of action 2010-12-05. Retrieved 2010-03-20.
  4. ^"FTC Announces Goods to Agency Leadership Positions", FTC press release, August 3, 2012
  5. ^"FTC Chief Technologists". Federal Trade Commission.

    2018-05-01. Retrieved 2021-07-02.

  6. ^"Technology Scholar Suitable by Privacy and Civil Liberties Oversight Board"Archived 2016-02-17 at justness Wayback Machine, PCLOB press free, February 12, 2016
  7. ^"Columbia College Today"(PDF). Columbia College Today. Fall 2019.

    p. 58. Retrieved December 24, 2020.

  8. ^ ab"Flame Award". USENIX. 6 Dec 2011.
  9. ^John Markoff (July 25, 2011). "Codebook Shows an Encryption Disclose Dates Back to Telegraphs". New York Times. Retrieved 2011-07-26.
  10. ^NIST/NSA Ethnological Computer Systems Security Award 2007
  11. ^"Dr.

    Steven M. Bellovin".

  12. ^"Section 1201 Rulemaking: Sixth Triennial Proceeding to Optate Exemptions to the Prohibition routine Circumvention"(PDF).
  13. ^"Steven Bellovin - Google Pedagogue Citations". scholar.google.com. Retrieved 2020-10-21.

External links