Subject: RISKS DIGEST 14.71 REPLY-TO: risks@csl.sri.com RISKS-LIST: RISKS-FORUM Digest Tuesday 8 June 1993 Volume 14 : Issue 71 FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Contents: RISKS Summer Slowdown Time (PGN) Phone Company Malfunction (Brinton Cooper) NIST Official Says Private Crypto May Be Outlawed (Mark Seecof, Marc Rotenberg) NIST CSSPAB Resolutions, 4 June 1993 (Dave Banisar) Fuzzy subway control used successfully (so far) in Sendai, Japan (Paul Eggert) French Fry Robots! (Dwight D. McKay) My grocery store is not dumb (Martin Minow) Radio smartcards (Gary McClelland) Formal Methods in Safety-Critical Standards (Jonathan Bowen) 2nd Call for Papers - ISOC Symp. on Net. and Dist. Sys. Security (Dan Nessett) Workshop on Digital Systems Reliability and Nuclear Safety (John Camp) AMAST'93 (Algebraic Methodology and Software Technology) (Pippo Scollo) The RISKS Forum is a moderated digest discussing risks; comp.risks is its Usenet counterpart. Undigestifiers are available throughout the Internet, but not from RISKS. Contributions should be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome. CONTRIBUTIONS to RISKS@CSL.SRI.COM, with appropriate, substantive "Subject:" line. Others may be ignored! Contributions will not be ACKed. The load is too great. **PLEASE** INCLUDE YOUR NAME & INTERNET FROM: ADDRESS, especially .UUCP folks. REQUESTS please to RISKS-Request@CSL.SRI.COM. Vol i issue j, type "FTP CRVAX.SRI.COMlogin anonymousAnyNonNullPW CD RISKS:GET RISKS-i.j" (where i=1 to 14, j always TWO digits). Vol i summaries in j=00; "dir risks-*.*" gives directory; "bye" logs out. The COLON in "CD RISKS:" is essential. "CRVAX.SRI.COM" = "128.18.10.1". =CarriageReturn; FTPs may differ; UNIX prompts for username, password. For information regarding delivery of RISKS by FAX, phone 310-455-9300 (or send FAX to RISKS at 310-455-2364, or EMail to risks-fax@vortex.com). ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY. Relevant contributions may appear in the RISKS section of regular issues of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise. ---------------------------------------------------------------------- Date: Tue, 8 Jun 93 11:16:19 PDT From: "Peter G. Neumann" Subject: Summer Slowdown Time Our annual RISKS Summer Slowdown Time is about to start. I will be within fingershot of the Internet only on selected occasions for the next four weeks, so do not be surprised if there are not many RISKS issues. However, please continue to send in any horror stories (or even wonderful success stories --- we have not had very many of those lately). The rate of BARFmail resulting from RISKS mailings has increased painfully in recent weeks. Some of that may be due to students leaving for the summer and general job instabilities. Last Friday, when I put out three issues on one day, I cleaned up the mess of newly rejected addresses after each mailing; the second and third mailings each generated still *MORE* newly rejected addresses, all on the same day. (I ignore directory overflows, which have also increased dramatically, assuming some of you are away; I regret if RISKS is exhausting your directories!) The BARFmail situation never converges, probably because the Internet is incredibly dynamic and the number of flaky sites remains large. Even more annoying is the persistence of E-Mail messages whose FROM: addresses are unanswerable. ------------------------------ Date: Tue, 8 Jun 93 14:10:21 EDT From: Brinton Cooper Subject: Phone Company Malfunction >From the BALTIMORE SUN, Tuesday, 8 June: BALTIMORE -- Chesapeake & Potomac Telephone's "intercept" system -- the recordings and artificial voices activated by calls to disconnected or changed numbers -- was knocked out yesterday by a computer glitch in Richmond, Va., the company said. As a result, customers dialing numbers not in service were connected to a recorded message that all circuits were busy, according to C&P spokesman Paul G. Wood. The problem was caused by "redundant" computer databases at a center in Richmond, which are alternately in service as new information on telephone-number changes is loaded five times a day. The changeover was being made about 11:30 a.m. when a computer processing problem occurred, cutting off access to the system, Mr. Wood said. The problem was expected to be resolved last night, he said. ------------------------------ Date: Mon, 7 Jun 93 14:57:26 -0700 From: Mark Seecof Subject: NIST Official Says Private Crypto May Be Outlawed I read in the new Network World (Network World; vol. 10, no. 23; June 7, 1993) at page 6, in a story headlined "Clipper Chip Foes Denounce Scheme Over Cost Issues" by Ellen Messmer which begins on page 2, that: --> NIST Deputy Director Ray Kammer said the government is considering --> banning all other encryption and making Clipper Chip mandatory. Assuming that this quote is accurately reproduced (a typo such as the inadvertent excision of the word "not" could change the meaning completely) it would appear to me to be a most inflammatory statement, given the discussion of the issue I've been reading in RISKS Digest and elsewhere. Perhaps someone could check into this? Mark Seecof ------------------------------ Date: Tue, 8 Jun 1993 10:05:54 EST From: Marc Rotenberg Subject: Re: NIST Official Says Private Crypto May Be Outlawed (Seecof) Kammer spoke yesterday at the CPRS crypto conference. While he did say that government was considering all options (including presumably restrictions on non-government technology), the possibility of making private uses of crypto illegal seems very unlikely. And John Podesta from the White House said later during the day that the White House was not considering such restrictions. Marc ------------------------------ Date: Fri, 4 Jun 1993 20:46:59 EST From: Dave Banisar Subject: NIST CSSPAB 6/4/93 Resolutions Computer System Security and Privacy Advisory Board, June 4, 1993 Resolution #1 At Mr. Kammer's request we have conducted two days of hearings. The clear message of the majority of input was that there are serious concerns regarding the Key Escrow Initiative and the Board concurs with these concerns. Many of these issues are still to be fully understood and more time is needed to achieving that understanding. Accordingly, this Board resolves to have an additional meeting in July 1993 in order to more completely respond to Mr. Kammer's request and to fulfill its statutory obligations under P.L. 100-235. The Board recommends that the inter-agency review take note of our input collected, our preliminary finding, and adjust the timetable to allow for resolution of the significant issues and problems raised. Attached to this resolution is a preliminary distillation of the serious concerns and problems. Resolution #2 Key escrowing encryption technology represents a dramatic change in the nation's information infrastructure. The full implications of this encryption technique are not fully understood at this time. Therefore, the Board recommends that key escrowing encryption technology not be deployed beyond current implementations planned within the Executive Branch, until the significant public policy and technical issues inherent with this encryption technique are fully understood. [Attachment to Resolution #1]] - A convincing statement of the problem that Clipper attempts to solve has not been provided. - Export and important controls over cryptographic products must be reviewed. Based upon data compiled from U.S. and international vendors, current controls are negatively impacting U.S. competitiveness in the world market and are not inhibiting the foreign production and use of cryptography (DES and RSA) - The Clipper/Capstone proposal does not address the needs of the software industry, which is a critical and significant component of the National Information Infrastructure and the U.S. economy. - Additional DES encryption alternatives and key management alternatives should be considered since there is a significant installed base. - The individuals reviewing the Skipjack algorithm and key management system must be given an appropriate time period and environment in which to perform a thorough review. This review must address the escrow protocol and chip implementation as well as the algorithm itself. - Sufficient information must be provided on the proposed key escrow scheme to allow it to be fully understood by the general public. It does not appear to be clearly defined at this time and, since it is an integral part of the security of the system, it appears to require further development and consideration of alternatives to the key escrow scheme (e.g., three "escrow" entities, one of which is a non-government agency, and a software based solution). - The economic implications for the Clipper/Capstone proposal have not been examined. These costs go beyond the vendor cost of the chip and include such factors as customer installation, maintenance, administration, chip replacement, integration and interfacing, government escrow systems costs, etc. - Legal issues raised by the proposal must be reviewed. - Congress, as well as the Administration, should play a role in the conduct and approval of the results of the review. [NIST Resolutions on Key Escow Issues and Clipper provided by CPSR Washington office, 666 Pennsylvania Ave., SE Suite 303, Washington, DC 20003 rotenberg@washofc.cpsr.org] ------------------------------ Date: Sat, 5 Jun 93 13:49:11 PDT From: eggert@spot.twinsun.com (Paul Eggert) Subject: Fuzzy subway control used successfully (so far) in Sendai, Japan David Kahaner (US ONR Asia) recently reported on the predictive fuzzy control system used in the Sendai, Japan subway. This system, designed in 1982 by Seiji Yasunobu, has been in commercial operation since 1987, and now operates in a 15-km subway containing 17 stations, serving nearly 1 million persons daily. It was implemented entirely by replacing traditional Proportional-Integral-Derivative (PID) control software in each train's onboard minicomputer. It reportedly outperforms even skilled human operators in both smoothness and accuracy of stopping, and consumes 10% less energy than expected with PID control. No accidents have been reported since it was installed. The system is being copied in several places, notably Tokyo. Kahaner writes: The commitment of Sendai City to this new technology seems not to be only in the trust of Japanese engineers, but also in successful tests prior to the actual production of control systems for commercial use. We were told that when the system was put into operation it ran smoothly, to everyone's satisfaction, and has required neither modification nor improvements. On the down side, the system was designed in an ad-hoc manner. Even though it is relatively simple, it needed extensive testing before use, and the overall system relies on human backup. To produce desirable properties like robustness, safety, and stability in more ambitious fuzzy systems, much better design and verification methods are needed. Kahaner's report can be FTPed from cs.arizona.edu in the file japan/kahaner.reports/fuzzy5.93; it also appeared on 1993-06-04 in comp.research.japan <1up4gi$b56@optima.cs.arizona.edu>. ------------------------------ Date: Mon, 7 Jun 1993 20:14:44 -0500 From: mckay!dwight@ecn.purdue.edu (Dwight D. McKay) Subject: French Fry Robots! A while back you may recall a message I posted about a local fast food place installing a robotic soft drink machine. The machine filled drink orders as they were entered into the cash register terminals. Now there's a device for handling french fries! I saw one at a fast food place my family stopped at on the way to North Carolina last week. The device consisted of the usual side-by-side set of hot oil fryers, with a vertically moving, overhead arm added. The arm moved along an overhead track between the fryers, a feed hopper and the serving area. The cycle consisted of picking a bin from a storage area, filling it at the feed hooper and dropping it into the fryer. When a bin finished frying, the arm picked up the bin, shook the bin, then dumped the frys into the serving area. There was no obvious sign that this system was hooked into the rest of the store's ordering system. I was pleased to see that there was some sort of big red shutoff button near the serving end of the system, however the machine is not enclosed in any way. The risks? When the drink robot fails to work some soft drink gets spilt, but what happens if there's a problem with a machine that is working around hot oil? Dwight D. McKay -- mckay!dwight@ecn.purdue.edu ------------------------------ Date: Fri, 4 Jun 93 17:48:17 -0700 From: Martin Minow Subject: My grocery store is not dumb At my local supermarket (which has wonderful food and excellent service, by the way), I usually pay with a Visa card. Like most San Francisco supermarkets, they have a customer "terminal" with a magnetic card reader: you run your card through it and sign the receipt that the cash register prints out. Couldn't be simpler. Yesterday, the clerk asked me for the card so she could run it through the "old-style" card imprinter. Apparently, enough people have been re-writing the magnetic stripes on their cards (so the billing goes somewhere else) that the clerks now sight-verify the receipt, making sure that the number embossed on the plastic card matches the number read from the magnetic stripe. Sigh, isn't progress wonderful? Martin Minow minow@apple.com ------------------------------ Date: Tue, 8 Jun 1993 11:02:31 -0600 From: USENET News System From: mcclella@yertle.Colorado.EDU (Gary McClelland) Subject: radio smartcards The Business Focus section of the Boulder Daily Camera (6/8/93) describes the product of a local start-up company. I _think_ this is a new variation on smartcards. Each card contains an antenna that allows communication with a "paperback book sized" transceiver. The card contains a 256-bit FRAM (stable memory requiring no power supply) to take the place of the usual magnetic strip. One would buy the card for preset amounts like other smartcards. Using the card would only require flashing the card in the vicinity of the reader; the reader then sends a signal back to the card altering the information stored in the FRAM. Intended uses are high volume transactions where physical contact between the card and scanner is too time consuming. Suggested uses include road tolls (more privacy than the fixed transmitter on the car), mass transit, student cafeteria payments, dorm security, etc. Another suggestion was "per-use" charges for things like ski lifts (will be tested at a Japanese ski area next year) and amusement park rides which are now usually charged on a "per-day" pass basis. No mention in the article of how many bits are reserved for encryption keys or whether each card will have its own Clipper chip :-). Although the same section of the newspaper had a decent discussion of ATM risk issues, the article on this smartcard didn't mention any risks. The cost of an annual ski pass would surely motivate someone to build one's own radio device for resetting the FRAM. And would using a portable computer with a mouse cord on an airplane reset my FRAM? :-) gary mcclelland, univ of colorado, mcclella@yertle.colorado.edu ------------------------------ Date: Mon, 7 Jun 93 22:06:31 BST From: Jonathan.Bowen@prg.ox.ac.uk Subject: Formal Methods in Safety-Critical Standards You may be interested in a recent paper on the recommendations concerning the use of formal methods for safety-critical systems in current and emerging standards: "Formal Methods in Safety-Critical Standards" by J.P. Bowen. To appear in Proc. Software Engineering Standards Symposium (SESS'93), Brighton, UK, 1-3 September 1993. IEEE Computer Society Press, 1993. A copy in PostScript format is available via anonymous FTP under ftp.comlab.ox.ac.uk:/pub/Documents/techpapers/Jonathan.Bowen/sess93.ps (192.76.25.2) if you wish to retrieve a copy. Jonathan Bowen, Oxford University ------------------------------ Date: Mon, 7 Jun 1993 12:37:14 -0800 From: nessett@ocfmail.ocf.llnl.gov (Dan Nessett) Subject: 2nd Call for Papers - ISOC Symp. on Net. and Dist. Sys. Security CALL FOR PAPERS The Internet Society Symposium on Network and Distributed System Security 3-4 February 1994, Catamaran Hotel, San Diego, California The symposium will bring together people who are building software and hardware to provide network or distributed system security services. The symposium is intended for those interested in practical aspects of network and distributed system security, rather than in theory. Symposium proceedings will be published by the Internet Society. Topics for the symposium include, but are not limited to, the following: * Design and implementation of services--access control, authentication, availability, confidentiality, integrity, and non-repudiation --including criteria for placing services at particular protocol layers. * Design and implementation of security mechanisms and support services--encipherment and key management systems, authorization and audit systems, and intrusion detection systems. * Requirements and architectures for distributed applications and network functions--message handling, file transport, remote file access, directories, time synchronization, interactive sessions, remote data base management and access, routing, voice and video multicast and conferencing, news groups, network management, boot services, mobile computing, and remote I/O. * Special issues and problems in security architecture, such as -- very large systems like the international Internet, and -- high-speed systems like the gigabit testbeds now being built. * Interplay between security goals and other goals--efficiency, reliability, interoperability, resource sharing, and low cost. GENERAL CHAIR: Dan Nessett, Lawrence Livermore National Laboratory PROGRAM CHAIRS: Russ Housley, Xerox Special Information Systems Rob Shirey, The MITRE Corporation PROGRAM COMMITTEE: Dave Balenson, Trusted Information Systems Tom Berson, Anagram Laboratories Matt Bishop, Dartmouth College Ed Cain, U.S. Defense Information Systems Agency Jim Ellis, CERT Coordination Center Steve Kent, Bolt, Beranek and Newman John Linn, Geer Zolot Associates Clifford Neuman, Information Sciences Institute Michael Roe, Cambridge University Rob Rosenthal, U.S. National Institute of Standards and Technology Jeff Schiller, Massachusetts Institute of Technology Ravi Sandhu, George Mason University Peter Yee, U.S. National Aeronautics and Space Administration SUBMISSIONS: The committee seeks both original technical papers and proposals for panel discussions on technical and other topics of general interest. Technical papers should be 10-20 pages in length. Panels should include three or four speakers. A panel proposal must name the panel chair, include a one-page topic introduction authored by the chair, and also include one-page position summaries authored by each speaker Both the technical papers and the panel papers will appear in the proceedings. Submissions must be made by 16 August 1993. Submissions should be made via electronic mail to 1994symposium@smiley.mitre.org. Submissions may be in either of two formats: ASCII or PostScript. If the committee is unable to read a PostScript submission, it will be returned and ASCII requested. Therefore, PostScript submissions should arrive well before 16 August. If electronic submission is absolutely impossible, submissions should be sent via postal mail to Robert W. Shirey, Mail Stop Z202 The MITRE Corporation McLean, Virginia 22102-3481 USA All submissions must include both an Internet electronic mail address and a postal address. Each submission will be acknowledged through the medium by which it is received. If acknowledgment is not received within seven days, please contact either Rob Shirey or Russ Housley , or telephone Mana Weigand at MITRE in Mclean, 703-883-5397. Authors and panelists will be notified of acceptance by 15 October 1993. Instructions for preparing camera-ready copy for the proceedings will be postal mailed at that time. The camera-ready copy must be received by 15 November 1993. ------------------------------ Date: Thu, 3 Jun 93 16:23:24 EDT From: John Camp Subject: Workshop on Digital Systems Reliability and Nuclear Safety First Announcement, Workshop on Digital Systems Reliability and Nuclear Safety September 13-14, 1993, Rockville Crowne Plaza Hotel, Rockville, Maryland U.S. Nuclear Regulatory Commission U.S. Department of Commerce Technology Administration National Institute of Standards and Technology WORKSHOP CO-CHAIRS Leo Beltracchi, U.S. Nuclear Regulatory Commission Dolores Wallace, National Institute of Standards and Technology SPONSORED BY: The United States Nuclear Regulatory Commission IN COOPERATION WITH: The National Institute of Standards and Technology As analog hard-wired process control systems and safety systems within nuclear power plants wear out, they are being replaced with systems using digital technology. There are many unique design and safety issues for digital systems. The Nuclear Regulatory Commission is developing regulations and guidelines to address these issues. This workshop will provide state of the art information to the Nuclear Regulatory Commission staff and to the nuclear industry. The purposes of this workshop are to: - provide feedback to the NRC from outside experts regarding potential safety issues, proposed regulatory positions, and research associated with the application of digital systems in nuclear power plants, and - continue the in-depth exposure of the NRC staff to digital systems design issues related to nuclear safety by discussions with experts in the state of the art and practice of digital systems. September 13, 1993 OPENING SESSION 8:30 Welcome Commissioner E. Gail de Plenque U.S. Nuclear Regulatory Commission 8:45 Welcome and Opening Statement Mr. Eric Beckjord, Director, Office of Nuclear Regulatory Research U.S. Nuclear Regulatory Commission 9:00 Welcome and ACRS Perspective Dr. J. Ernest Wilkins, Advisory Committee on Reactor Safeguards U.S. Nuclear Regulatory Commission ISSUE PERSPECTIVE FOR NUCLEAR POWER PLANTS 9:15 Presentation on NRC Regulatory Positions and Guidelines Mr. William Russell Associate Director for Inspection and Technical Assessment Office of Nuclear Reactors, U.S. Nuclear Regulatory Commission 9:45 Presentation on NRC Research Activities Mr. Leo Beltracchi, Senior Project Manager Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Comm. 10:15 Industry Perspective, Mr. Richard Blauw, Commonwealth Edison Company 10:45 Break 11:00 Experiences from Application of Digital Systems in a NPP Mr. Paul Joannou, Ontario Hydro TECHNICAL SESSION: DIGITAL SAFETY SYSTEMS FOR NUCLEAR POWER PLANTS 11:30 Hardware Aspects for Safety-Critical Systems Mr. Al Sudduth, Duke Power Company 11:50 Software Aspects for Safety-Critical Systems Dr. Susan Gerhart, University of Houston, Clear Lake 12:10 Human Aspects for Safety-Critical Systems Dr. Lewis Haines, Nuclear Industry Independent Consultant 12:30 Discussion 1:00 Lunch TECHNICAL SESSION: SOFTWARE ENGINEERING FOR HIGH INTEGRITY SYSTEMS 2:30 System and Software Hazard Analysis for Nuclear Applications Dr. Nancy Leveson, ICS Department, University of California 2:55 Formal Methods for Requirements, Specifications Dr. John McHugh, University of North Carolina 3:20 Software Test Cases Derived from Formal Requirements Mr. Robert Poston, Interactive Development Environments 3:45 Break 4:00 Object Oriented Design for Safety-Critical Systems Dr. Barbara Cuthill, National Institute of Standards and Technology 4:25 Questions and Discussions on Technical Session September 14, 1993 TECHNICAL SESSION: METHODS FOR REDUCING RISKS IN SOFTWARE SYSTEMS 8:30 Automated Tools for Safety-Critical Software Ms. Anne-Marie Lapassant, Commissariate a L'Energie Atomique 8:55 Risks of Safety-Critical Software Dr. Winston Royce, TRW, Incorporated 9:20 Software Metrics for Safety-Critical Applications Mr. Kyle Rone, IBM Houston, Texas 9:45 Software Reliability for Safety-Critical Applications Mr. Jon Musa, AT&T Bell Laboratories 10:10 Break 10:25 Software Configuration Management for Safety-Critical Applications Mr. Ron Berlack, Configuration Management International 10:50 How Much Software Verification and Validation is Adequate for Nuclear Safety? Mr. Roger Fujii, Logicon, Incorporated 11:15 Software Verification and Validation for New Technology in Nuclear Settings, Dr. Lance Miller, Science Applications International Corp. 11:40 Certification of Software for Reuse into Safety-Critical Applications Ms. Charlotte Scheper, Research Triangle Institute 12:05 Questions and Discussions on Technical Session 1:00 Lunch 2:30 PANEL: Application of Workshop to NRC activities Moderators: Mr. John Gallagher - Office of Nuclear Reactor Regulation Mr. Leo Beltracchi - Office of Nuclear Regulatory Research Panel Members Dr. John McHugh, National Academy of Science Dr. Joseph Naser, Electric Power Research Institute Dr. Susan Gerhart, University of Houston, Clear Lake Dr. Winston Rouce, TRW Incorporated Mr. Frank McGarry, NASA Goddard Space Flight Center Panel Issues: - Are the proper issues being addressed? - What other issues need to be addressed? - Are proposed NRC regulatory positions complete and correct? - What are the considerations for further research? 4:30 NRC Closing Remarks LOCATION The Workshop will be held at the Holiday Inn Crowne Plaza, Rockville, Md. Three airports are easily accessible to the Rockville area: Washington National Airport, Baltimore-Washington International Airport, and Dulles International Airport. REGISTRATION Registration will begin at 8:00 a.m. The Workshop will run from approximately 8:30 a.m. to 5:00 p.m. each day. The registration fee of $75 covers workshop materials and proceedings that will be mailed to participants after the workshop. A registration form is enclosed and may be duplicated; a separate form must be forwarded for each attendee. For pre-registration, the registration form must be mailed to the NIST Office of the Comptroller or faxed to Lori Phillips by September 1, 1993. All requests for cancellations and refunds must be submitted to Lori Phillips (see address and fax number at the end of the General Information section of this brochure) in writing prior to September 1, 1993. For answers to your registration questions contact: - Lori Phillips, NIST, Telephone: 301/975-4513, Fax: 301/948-2067 ACCOMMODATIONS Workshop registration does not include your hotel reservation. A block of rooms has been reserved at: - The Holiday Inn Crowne Plaza 1750 Rockville Pike Rockville, Md. 20852 USA Telephone: 301/468-1100 $98 single or $108 double. Please add 12% tax to this rate. To register for a room, please use the enclosed hotel reservation form and send it directly to the hotel no later than August 27, 1993. After that date the rooms will be released for general sale at the prevailing rates of the hotel. TRANSPORTATION BWI Limo, 301/441-2345, offers commercial van service from Baltimore-Washington Airport to the Rockville area. Call for reservations. Montgomery Airport Shuttle, 301/990-7005, is available from Dulles International and Washington National Airports to Rockville. >From Washington National Airport The Washington Metro has subway service to Rockville from National Airport. Take a Yellow Line train marked ~Gallery Place~ to Metro Center and transfer to a Red Line train marked ~Shady Grove~ to ~Twinbrook~. Service is every 6 to 15 minutes depending on the time of day. The time from National to the Rockville, Twinbrook Metro stop is about 50 minutes. The hotel is adjacent to the Twinbrook Metro stop, toward Rockville Pike. >From Dulles International Airport Take Dulles Access Road to the Washington Beltway I495. Go toward Maryland (signs may say Bethesda/Rockville). Take the I270 spur off of I495. Go about 3-4 miles into Maryland. Take the Montrose Road Exit off of I270 (2nd exit on cloverleaf). Go about one mile and turn left on to Rockville Pike (Rt. 355). The Crowne Plaza will be one-half mile on the right. COFFEE BREAKS AND LUNCHES Refreshments will be provided at the morning, mid-morning and afternoon breaks. Attendees are on their own for lunch. TECHNICAL CONTACTS - Leo Beltracchi, NRC Telephone: 301/492-3549 Email: lxb@nrc.gov - Dolores Wallace, NIST Telephone: 301/975-3340 Email: wallace@swe.ncsl.nist.gov [FOR WORKSHOP AND HOTEL RESERVATION FORMS, CONTACT Lori Philips or request on-line forms from John Camp . TOO LONG TO INCLUDE IN RISKS.] ------------------------------ Date: Tue, 8 Jun 93 23:58:07 +0200 From: scollo@cs.utwente.nl (Pippo Scollo) Subject: AMAST'93 (Algebraic Methodology and Software Technology) Starting Thursday 10 June, the AMAST'93 Advance Programme and Registration Information are available by anonymous ftp (with any password) on the machine ftp.cs.utwente.nl in plain text form as well as LaTeX sources. You can get these files from directory pub/doc/amast93, which has the following contents: AdvaProg.asc : AMAST'93 Advance Programme (plain text) RegInfo.asc : AMAST'93 Registration Information (plain text) AdvaProg.tex : AMAST'93 Advance Programme (LaTeX source) RegInfo.tex : AMAST'93 Registration Information (LaTeX source) Requests of further information should be sent to the Conference Secretariat: Mrs. Joke Lammerink, Mrs. Charlotte Bijron, Mrs. Alice Hoogvliet-Haverkate University of Twente, Fac. Informatica P.O. Box 217, NL-7500AE Enschede phone: + 31 53 893680, fax: + 31 53 315283 e-mail: {lammerin | bijron | hoogvlie}@cs.utwente.nl ------------------------------ End of RISKS-FORUM Digest 14.71 ************************