Steven M. Bellovin
Home * People * Steven M. Bellovin

Steven Michael Bellovin,
an American computer scientist, researcher on computer networking, cryptography and security, and professor in the Computer Science department at Columbia University. He earned a BA degree from Columbia University in 1972, and managed an MSc. and Ph.D. in computer science from the University of North Carolina at Chapel Hill, and has been fellow at AT&T Labs Research.
Contents
CCCP
From 1970 to 1971, as undergraduate student at Columbia, along with Aron Eisenpress, Andrew Koenig, and Ben Yalow, he co-authored the chess program CCCP, which competed at the ACM 1971, and was initially based on Hans Berliner's program J. Biit, which played one year before [2] [3]. Andrew Koenig on the individual roles of CCCP's programming team [4]:
I designed the overall structure of the program and coded much of the human interface. Steve wrote the tree searching and pruning routines, Ben did the move generation and evaluation routines, and Aron wrote the part of the human interface that made it possible to enter moves at a 2250 display with a light pen ...
Usenet
Later, as graduate student, Steven Bellovin helped create the Usenet, along with Tom Truscott and Jim Ellis awarded with the 1995 Usenix Lifetime Achievement Award, known, appropriately enough, as "The Flame" [5] [6] .
Photos
ACM 1970 round 1: Chess 3.0 - Coko III, from left: Jacques Dutka (Tournament Director), unknown,
Keith Gorlen operating Chess 3.0, Monty Newborn, Steven M. Bellovin with phone, unknown back of head [7]
Selected Publications
1990 ...
- Steven M. Bellovin, Michael Merritt (1991). Limitations of the Kerberos authentication system. In USENIX Conference Proceedings, pp 253-267, Dallas, TX, pdf [10]
- David A. Wagner, Steven M. Bellovin (1994). A Programmable Plaintext Recognizer.
- William R. Cheswick, Steven M. Bellovin (1994). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, MA, First Edition [11]
- Steven M. Bellovin (1996). Problem areas for the IP security protocols. In Proceedings of the Sixth Usenix Unix Security Symposium, pp 205-214. pdf
- Steven M. Bellovin (1998). Cryptography and the Internet. CRYPTO '98, pdf
2000 ...
- William R. Cheswick, Steven M. Bellovin and Avi Rubin (2002). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Second Edition, ISBN: 0-201-63466-X
- Steven M. Bellovin (2004). A Look Back at "Security Problems in the TCP/IP Protocol Suite". ACSAC 2004, pdf
- Steven M. Bellovin (2005). Security and Privacy: Enemies or Allies? IEEE Security & Privacy, Vol. 3, No. 3, pdf
- Steven M. Bellovin (2006). Virtual machines, virtual security? Communications of the ACM, Vol. 49, No. 10
- Steven M. Bellovin, Eric Rescorla (2006). Deploying a New Hash Algorithm. NDSS 2006, pdf
2010 ...
- Steven M. Bellovin (2010). Perceptions and reality. [[IEEE#SecurityPrivacy|IEEE Security & Privacy], Vol. 8, No. 5, [[1]]
- Steven M. Bellovin (2011). Security Think. [[IEEE#SecurityPrivacy|IEEE Security & Privacy], Vol. 9, No. 6, [[2]]
- Steven M. Bellovin (2012). Fighting the Last War. IEEE Security & Privacy, Vol. 10, No. 3
- Steven M. Bellovin (2013). Military Cybersomethings. IEEE Security & Privacy, Vol. 11, No. 3
- Steven M. Bellovin (2013). Walls and Gates. IEEE Security & Privacy, Vol. 11, No. 6
- Steven M. Bellovin (2014). Dr. Strangecode. IEEE Security & Privacy, Vol. 12, No. 3
- Steven M. Bellovin (2014). By Any Means Possible: How Intelligence Agencies Have Gotten Their Data. IEEE Security & Privacy, Vol. 12, No. 4
- Steven M. Bellovin (2015). What a Real Cybersecurity Bill Should Address. IEEE Security & Privacy, Vol. 13, No. 3
- Steven M. Bellovin (2015). The Key to the Key. IEEE Security & Privacy, Vol. 13, No. 6
- Steven M. Bellovin (2016). Attack Surfaces. IEEE Security & Privacy, Vol. 14, No. 3
- Steven M. Bellovin (2017). Who Are You? IEEE Security & Privacy, Vol. 15, No. 6
Postings
- Sideways Add / Population Count by Jitze Couperus, Steve Bellovin and Axel H. Horns, cryptography@c2.net, January 28, 1999 » Population Count, CDC 6600
External Links
- Steven M. Bellovin from Wikipedia
- Steven Bellovin - WikiCU, the Columbia University wiki encyclopedia
- Steven M. Bellovin
- Steven M. Bellovin - Informal Bio
- Steve Bellovin's Pseudo-Random Blog
- Steven Bellovin on CircleID
- Internet pioneers plead with Congress to preserve net neutrality - GameSSec, December 11, 2017 [12]
References
- ↑ Photo Credit: Computer Science department, Columbia University, Steven Bellovin - WikiCU, the Columbia University wiki encyclopedia
- ↑ Computing at Columbia Timeline - Aug 3-5, 1971
- ↑ Recollections of CUCC 1968-70 -The CCCP Chess Program
- ↑ Andrew Koenig (1978). Light-Pen used in game. Personal Computing, Vol. 2, No. 5, pp. 112
- ↑ Steven M. Bellovin - Informal Bio
- ↑ USENIX Awards
- ↑ John C. Devlin (1970). Chess Computer Loses Game in a King‐Size Blunder. New York Times, September 02, 1970, Thanks to Monty Newborn for recognizing people
- ↑ Steven M. Bellovin - Publications
- ↑ DBLP: Steven M. Bellovin
- ↑ Kerberos (protocol) from Wikipedia
- ↑ Markus Hess from Wikipedia
- ↑ Net neutrality in the United States - Wikipedia