Archive

Federal Trade Commission

1/4/2000

Dear Sirs/Madams:

I am nominating myself for service on the "Advisory Committee on Online Access and Security".

I started my technical career at Bell Laboratories as a system administrator and systems programmer. Systems I built for secure administration of groups of machines are described in the technical literature, e.g., [15] in the attached resume. My academic research has often provided new solutions for securing networked systems, and includes Internet and Web technologies.

I have analyzed, designed and implemented a variety of security technologies with applications to privacy, and have several patents on software and hardware systems. Cryptographic software I have implemented has been published [16]. In the attached CV I have included a selected list of my publications in this area. I have served, and continue to serve, in a consulting role to several companies on security topics, such as the design of a single-chip firewall for IP networks.

I believe that my contribution to the committee would be using my engineering experience in evaluating technical feasibility and costs for implementing and operating various security and privacy methods.

Jonathan M. Smith
CIS, University of Penn
200 South 33rd St.
Philadelphia, PA 19104-6389
ms@cis.upenn.edu


Jonathan M. Smith - Curriculum Vitae

Research Areas:

Advanced Computer Communications Networks, Secure Distributed Computing Systems.

Positions Held:

9/89 to present - Department of Computer and Information Science, University of Pennsylvania, Professor (with tenure; Assistant Professor 9/89-6/95, Associate Professor 7/95-6/99).

1/84 to 9/89 - Member of the Technical Staff, Bell Communications Research. Computer Technology Transfer and Small-System Computing Technology Departments. Completed Ph.D. using several 8 month leaves of absence.

9/81 to 1/84 - Member of the Technical Staff, Bell Telephone Laboratories. UNIX Computing Technology Department. M.S. under `One Year on Campus' program.

Professional Service:

NSF CISE Advisory Committee (1999-2001).

National Research Council Committee on Future Technologies for Army Multimedia Communication (1994-1995)

ACM SIGCOMM Conference Program Committee, Member 1990-1995, 1998 (co-chair), 1999.

Consulting Activities:

Chief R&D Consultant, iPrivacy, LLC, New York, NY (1999-); Technical Expert Witness for Communications R&D Organizations (anonymity required) (1992-1995,1998-); IBM Research, Hawthorne, NY (1992-4); Canadian Imperial Bank of Commerce, New York, NY; Telefon Ericsson AB (1997-1998); MUSIC Semi-conductors, Hackettstown, NJ (1996- ); Bell Communications Research, Morristown, NJ (1996-1997).

Professional Memberships:

Institute of Electrical and Electronics Engineers (Senior Member); Association for Computing Machinery (ACM); Sigma Xi.

Education:Ph.D. (Computer Science), 1989, Columbia University, NY, NY; A.B. (Mathematics), 1981, Boston College, Chestnut Hill, MA.

Selected Publications on Security/Privacy Topics:

[1] Ilija Hadzic, Sanjay K. Udani, and Jonathan M. Smith, "Hardware Viruses," in Field Programmable Logic 1999, Springer-Verlag, Edinburgh, UK (1999), pp. 291-300.

[2] D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, and J. M. Smith, "Safety and Security of Programmable Network Infrastructures," IEEE Communications Magazine, Vol. 36(10), pp. 84-92 (October 1998).

[3] D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, and J. M. Smith, "Security in Active Networks," in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, ed. Jan Vitek and Christian Jensen, Springer-Verlag (1999), pp. 433-451.

[4] William A. Arbaugh, James R. Davin, David J. Farber, and Jonathan M. Smith, "Security for Virtual Private Intranets," IEEE Computer (Special Issue on Broadband Networking Security), Vol. 31(9), pp. 48-55, Cover Feature (September 1998).

[5] D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, and J. M. Smith, "A Secure Active Network Environment Architecture: Realization in SwitchWare," IEEE Network Magazine, special issue on Active and Programmable Networks, Vol. 12(3), pp. 37-45 (May/June 1998).

[6] William A. Arbaugh, Angelos D. Keromytis, and Jonathan M. Smith, "DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols," in IEEE GLOBECOM 98, Sydney, AU (November 1998), pp. 59-65.

[7] W. A. Arbaugh, A. D. Keromytis, D. J. Farber, and J. M. Smith, "Automated Recovery in a Secure Bootstrap Process," in Internet Society 1998 Symposium on Network and Distributed System Security, San Diego, CA (1998), pp. 155-167.

[8] Frederick Herz, Marcos Salganicoff, Mitch Marcus, Lyle Ungar, Jonathan Smith, Steven L. Salzberg, and Jason M. Eisner, Pseudonymous Server for System for Customized Electronic Identification of Desirable Objects, U.S. Patent #5754939, May 19, 1998.

[9] William A. Arbaugh, David J. Farber, and Jonathan M. Smith, "A Secure and Reliable Bootstrap Architecture," in IEEE Security and Privacy Conference, Oakland, CA (May, 1997), pp. 65-71. (An early version available as Technical Report MS-CIS-96-35, CIS Dept., University of Pennsylvania, December 2nd, 1996)

[10] Angelos Keromytis, John Ioannidis, and Jonathan M. Smith, "Implementing IPSec," in Proceedings, IEEE GlobeCom Conference, Phoenix, AZ (November, 1997), pp. 1948-1952.

[11] S. Personick, D. Crawford, R. Gallager, J. Jaffe, J. Kurose, D. Leeper, C. Manders, B. McCune, A. McLaughlin, J. M. Smith, L. Streeter, L. Wishart, and B. Zeigler, Commercial Multimedia Technologies for Twenty-First Century Army Battlefields: a Technology Management Strategy, National Academy Press, Washington, DC (1995).

[12] Jonathan M. Smith, C. Brendan S. Traw, and David J. Farber, "Apparatus for Providing Cryptographic Support in a Network," U.S. Patent No. 5,329,623 (July 12th, 1994).

[13] Jonathan M. Smith, C. Brendan S. Traw, and David J. Farber, "Cryptographic Support for a Gigabit Network," in Proceedings, INET '92, Kobe, JAPAN (June 15-18, 1992), pp. 229-237. (Inaugural Conference of the Internet Society)

[14] Albert G. Broscius and Jonathan M. Smith, "Exploiting Parallelism in Hardware Implementation of the DES," in Proceedings, CRYPTO 1991 Conference, ed. Joan Feigenbaum, Santa Barbara, CA (August, 1991), pp. 367-376.

[15] Jonathan M. Smith, "Practical Problems with a Cryptographic Protection Scheme," in Advances in Cryptography - Proceedings of Crypto89, ed. Gilles Brassard, Springer-Verlagn(1990), pp. 64-73.

[16] Jonathan M. Smith, "LUCIFER," in Applied Cryptography: Protocols, Algorithms and Source Code in C, ed. Bruce Schneier,mJohn Wiley & Sons (1994), pp. 485-491. C implementation of Lucifer cipher for UNIX, written in 1991