|
Past Conferences and Journal Special Issues
Last Modified:01/13/05
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
ACSAC'99 15th Annual
Computer Security Applications Conference, PRACTICAL SOLUTIONS TO
REAL WORLD SECURITY PROBLEMS, December 6-10, 1999, Phoenix, Arizona,
USA. (submissions due: May 28, 1999) [posted here: 2/18/99]
Sponsored by the Applied Computer Security Associates (ACSA) in
cooperation with the ACM Special Interest Group on Security, Audit
and Control Nearly everyone today is dependent upon computers for
everything from electronic commerce to military command and control.
The very technology that created this dependence is its greatest
weakness: the infrastructure is fundamentally insecure to attacks
from individuals, organizations, or nation-states that can easily
deny service or compromise the integrity of information. This has
left us extremely vulnerable to fraud, crime, and espionage. If you
are developing practical solutions to problems relating to
protecting your country's information infrastructure or a commercial
enterprise, consider submitting a paper to the Annual Computer
Security Applications Conference. We are looking for papers, panels
and tutorials that address:
- Internet technologies
- Electronic commerce
- Crypto, key management, and digital signature applications
- Network management and smart card applications
- Mobile computing
- Legal and ethical concerns over protecting intellectual
property
- Incident response planning - governmental and other
perspectives
- Audit and audit reduction/Intrusion detection
- New paradigms for protecting electronic intellectual capital
- Securing very high-speed telecommunications (e.g., ATM)
- Defensive information warfare
- Software safety and program correctness
The complete Call for Papers is available at
www.acsac.org/, or you may
contact the publicity chair, Vince Reed, at Phone: +1.256.890.3323,
FAX: +1.256.830.2608, publicity@acsac.org.
Mobile'99,
Foundations of Mobile Computation: A Post-Conference Satellite
Workshop of FST & TCS 99, Chennai, India, December 16-17, 1999.
(Submissions due: September 15, 1999) [posted here: 8/17/99]
The workshop will address fundamental principles in the definition,
analysis and implementation of languages and models for mobile
distributed programming. The theme of the workshop is formal
operational foundations of mobile computation, including semantics,
equivalences and program logics. Issues include: typing and type
safety, security, mobility, architectures and protocols, active
networks, proof-carrying code, protocol analysis and verification,
concurrent constraint solving, as well as numerous interesting
applications such as switchware, programmable hybrid systems, and
reactive systems. The aim of the workshop is to introduce
operational frameworks to potentially interested researchers (the
tutorial aspect) as well as provide a forum for researchers active
in the area to report on recent results or ongoing work. Additional
information at:
www.cse.iitd.ernet.in/~mobile99 and
www.imsc.ernet.in/~fsttcs99. email: mobile99@cse.iitd.ernet.in
HASE'99, Fourth
IEEE Symposium on High Assurance Systems Engineering, Washington, DC
Metropolitan Area, USA, November 17-19, 1999. (DEADLINE EXTENDED TO
APRIL 21, 1999) [posted here: 12/14/98].
The HASE Symposium is a forum for discussion of systems engineering
issues specifically for high-assurance systems. The focus this year
is on embedded systems, although submissions will be welcomed in all
areas related to high assurance issues. Submissions are due April 7,
1999, to Catherine Meadows, Program Chair, meadows@itd.nrl.navy.mil.
More information may be found at
www.eng.umd.edu/hase99.
IICIS99, Third Annual IFIP TC-11 WG 11.5 Working Conference on
Integrity and Internal Control in Information Systems: Strategic
views on the need for control, Amsterdam, The Netherlands G November
18-19, 1999. (submissions due: April 1, 1999) [posted here:
12/13/98].
Confidentiality, integrity and availability are high-level
objectives of IT security. IFIP TC-11 Working Group 11.5 has been
charged with exploring the area of the integrity objective within IT
security and the relationship between integrity in information
systems and the overall internal control systems that are
established in organizations to support corporate governance codes.
The goals for this conference are to find an answer to the following
questions: what precisely do business managers need to have
confidence in the integrity of their information systems and their
data; what is the status quo of research and development in this
area; where are the gaps between business needs on the one hand and
research and development on the other and what needs to be done to
bridge these gaps. We solicit papers describing original ideas and
research results on foundations and applications related to the
subject of integrity and internal control in information systems.
Also business cases are explicitly solicited. A complete list of
topics of interest along with instructions for authors can be found
on the conference web page at
www.ifip.tu-graz.ac.at/TC11/CONF/IICIS99 or you may contact Leon
Strous, tel.: +31 20 5242748 / +31 492 548636 (also fax), e-mail:
strous@iaehv.nl.
CQRE CQRE
[Secure] Exhibition & Congress, Duesseldorf, Germany, November
30-December 2, 1999. (submissions due: May 14th 1999.) [posted here
2/18/99]
We are looking for papers and panel discussions covering:
- electronic commerce (new business processes, secure business
transactions, online merchandising, electronic payment /
banking, innovative applications)
- network security (virtual private networks, security aspects
in internet utilization, security aspects in
multimedia-applications, intrusion detection systems)
- legal aspects (digital signature acts, privacy and
anonymity, crypto regulation, liability)
- corporate security
- access control
- secure teleworking (enterprise key management, IT-audit risk
/ disaster management, security awareness and training,
implementation, accreditation, and operation of secure systems
in a government, business, or industry environment)
- security technology
- cryptography (public key infrastructures, chip card
technology, biometrics)
- trust management (evaluation of products and systems,
international harmonization of security, evaluation criteria)
- standardization
- future perspectives
Authors are invited to submit an extended abstract of their
contribution to the program chair (R.Baumgart@secunet.de). Complete
instructions are given on the conference web page at
www.secunet.de/forum/cqre.html.
NISSC'99
22nd Annual National Information Systems Security Conference, Hyatt
Regency Hotel, Crystal City, VA, USA, week of October 18, 1999.
(papers and session proposals due February 15, 1999) [posted here:
1/20/99]
The National Information Systems Security Conference (NISSC)
welcomes papers, panels, and tutorials on all topics related to
information systems security. Papers and panel discussions typically
cover:
- research and development for secure products and systems,
presenting the latest thinking and directions
- electronic commerce
- legal issues such as privacy, ethics, investigations, and
enforcement
- practical solutions for government, business and industry
information security concerns
- network security issues and solutions;
- management activities to promote security in IT systems
including security planning, risk management, and awareness and
training
- implementation, accreditation, and operation of secure
systems in a government, business, or industry environment
- international harmonization of security criteria and
evaluation
- evaluation of products, systems and solutions against trust
criteria
- tutorials on security basics and advanced issues
- security issues dealing with rapidly changing information
technologies
- highlights from other security forums
- implementing policy direction
For more details see
csrc.nist.gov/nissc/call.htm.
NATO Symposium:
Protecting NATO Information Systems in the 21st Century October
25-27, 1999, Naval Research Laboratory, Washington, D.C. (Abstracts
due December 15, 1998; papers due March 31, 1999). [posted here:
11/5/98].
This Symposium will deal with the common NATO interest in
information defense. Abstracts and papers are sought of several
kinds:
- Survey, tutorial, and operational papers that expose
relevant issues or practices of operational and information
assurance. Papers addressing either technology areas or measures
taken to protect particular NATO and NATO allied information
systems and networks are appropriate.
- Papers describing current research results in relevant
technology areas.
- Papers projecting requirements and solutions for protecting
information in future, 21st century NATO computer systems and
networks.
Topics of interest include, but are not limited to:
- Information Warfare threats to NATO and NATO allied
information systems and infrastructures.
- Vulnerabilities of COTS components.
- Authentication in mobile and distributed systems.
- Emissions security, including "Soft TEMPEST".
- Security analysis of crypto and communication protocols.
- Information system survivability and architecture.
- Co-ordinated threat analysis, incident detection, and
response.
- Maintaining data origin in NATO and NATO allied information
systems.
- Role of Information Warfare and Information Protection in
future military conflicts.
Abstracts of up to 350 words in either English or French are due
by e-mail (ascii preferred) by 15 DECEMBER 1998. U.S. authors should
e-mail abstracts to Landwehr@itd.nrl.navy.mil; non-U.S. authors
should follow submission guidelines found in the full call for
papers available at:
www.baesema.co.uk/rfp/rfp.htm or send e-mail to gouaya@agard.nato.int
requesting the full call for papers. The conference is being
organized under the auspices of the Information Systems Technology
Panel of NATO's Research and Technology Organization.
RBAC'99 Fourth ACM
Workshop on Role-based Access Control, George Mason University,
Fairfax, Virginia, USA, October 28-29, 1999. (Submissions due: May
15, 1999) [posted here: 2/9/99]
The ACM workshop on RBAC bring together researchers, developers, and
practitioners to discuss the development of new access control
paradigms and their application. Topics of interest include, but are
not limited to, new access control modeling concepts, verification
of access control model properties, and case studies in a variety of
areas, such as operating systems, language systems, groupware,
databases, and enterprise systems. Please see the workshop web page
at www.list.gmu.edu/rbac/
for complete submission instructions or contact Sylvia Osborn at
sylvia@csd.uwo.ca.
NORDSEC'99 The
fourth Nordic Workshop on Secure IT systems - Encouraging
Co-operation, Stockholm, Sweden, November 1-2, 1999. (Submissions
due: August 16, 1999) [posted here: 4/1/99]
The NORDSEC workshops were started in 1996 with the aim to bring
together researchers and practitioners within IT security in the
Nordic countries. NORDSEC'99 is organised by the Department of
Computer and Systems Sciences, DSV, Stockholm University & the Royal
Institute of Technology, the Swedish Defence Materiel Administration
and Telia AB. This is the theme our workshop addressed:
knowledgeable and maturing use, applications, developments and
research of IS/IT security in order to provide individuals,
companies & organisations and societies with a reliable, safe and
secure, and changing world. A complete list of topics can be found
at the workshop's website at
www.telia.se/nordsec99. The workshop will consist of paper
sessions, panel discussions and invited talks. We also welcome the
submission of application-oriented papers focusing on new or
difficult problems, pilots, and experiences. Authors are requested
to submit an extended abstract (4-5 pages) or a full paper (up to 15
pages) to Dr. Louise Yngstrvm (louise@dsv.su.se) by August 16, 1999.
ECC'99, The
3rd workshop on Elliptic Curve Cryptography, University of Waterloo,
Waterloo, Ontario, Canada, November 1-3, 1999. [posted here:
7/12/99]
ECC '99 is the third in a series of annual workshops dedicated to
the study of elliptic curve cryptography. ECC '99 will have a
broader scope than ECC '98 and ECC '97, which focussed primarily on
the elliptic curve discrete logarithm problem. The main themes of
ECC '99 will be:
- Provably secure discrete log-based cryptographic protocols
for encryption, signatures and key agreement.
- Efficient software and hardware implementation of elliptic
curve cryptosystems.
- The discrete logarithm and elliptic curve discrete logarithm
problems.
There will be approximately 15 invited lectures (and no
contributed talks), with the remaining time used for informal
discussions. For further information or to return your Registration,
please contact: Mrs. Frances Hannigan / Department of Combinatorics
& Optimization / University of Waterloo / Waterloo, Ontario, Canada
N2L 3G1 / e-mail: ecc99@math.uwaterloo.ca / Fax: (519) 725-5441 /
Phone: (519) 888-4027 /
www.cacr.math.uwaterloo.ca/
ISW'99. 1999
Information Security Workshop, Kuala Lumpur, Malaysia, November 6-7,
1999. [posted here: 6/15/99]
ISW'99, the second workshop in the international workshop series on
information security, will be held in Monash University's Sunway
Campus which is about 20km to the south west of downtown Kuala
Lumpur. The focus of ISW'99 will be on the following emerging areas
of importance in information security:
- multimedia watermarking
- electronic cash
- secure software components and mobile agents
- protection of software
ISW'99 will be co-located with the 6th ACM Conference on Computer
and Communications Security, 1-4, November, 1999, and Asiacrypt'99,
15-18, November 1999. Both the ACM conference and Asiacrypt will be
held in Singapore which is only a short distance to the venue of
ISW'99. The WWW homepage of ISW'99 is:
www.musm.edu.my/BusIT/isw99.
ICICS'99 The
Second International Conference on Information and Communication
Security, Sydney, Australia, November 9-11, 1999. (EXTENDED
submission date: May 17, 1999) [posted here: 11/2/98].
Original papers may present theory, techniques, applications and
practical experiences on a variety of topics including:
|
* Access control |
* Authentication |
|
* Electronic commerce |
* Applied cryptography |
|
* Viruses and worms |
* Distributed system security |
|
* Database security |
* Security policy |
|
* Key management |
* Mobile system security |
|
* Auditing and accounting |
* Network security |
|
* Security protocols |
* Secure operating systems |
|
* Security architectures & models |
* Security management |
|
* Secure intelligent agents |
* Software Protection |
|
* Security evaluation &
certification |
* Smartcards and PDAS |
Detailed submission instructions can be found on the conference
web page at
icics99.nepean.uws.edu.au/.
CCS'99 6th ACM
Conference on Computer and Communications Security,Kent Ridge
Digital Labs, Singapore, November 1-4, 1999. [posted here: 1/11/99].
The ACM Conference on Computer and Communications Security (CCS) is
a premier forum for the presentation of new research results and the
identification of future research directions in the area of computer
and communications security. Papers offering research contributions
in any aspect of computer security are solicited for submission to
CCS'99. Accepted papers will be presented at the conference and
published by the ACM in a conference proceedings. Outstanding papers
will be invited for submission to ACM Transactions on Information
and System Security (TISSEC). For more details, please see the
conference web page at
www.isi.edu/ccs99/.
ISW'99 1999
Information Security Workshop, Kuala Lumpur, Malaysia, November 6-7,
1999, (submissions due: June 4, 1999) [posted here: 2/3/99]
ISW'99, the second workshop in the international workshop series on
information security, will be held in Monash University's Sunway
Campus which is about 20km to the south west of downtown Kuala
Lumpur. ISW'99 will seek a different goal from its predecessor
ISW'97 held in Ishikawa, Japan. More specifically, the focus of
ISW'99 will be on the following emerging areas of importance in
information security:
- multimedia watermarking
- electronic cash
- secure software components and mobile agents
- protection of software
ISW'99 will be co-located with
the 6th ACM Conference on
Computer and Communications Security, November 1-4, 1999, and
Asiacrypt'99,
November 15-18, 1999. Both the ACM conference and Asiacrypt will be
held in Singapore which is only a short distance to the venue of
ISW'99. Complete instructions for authors can be found on the
conference web page at
www.musm.edu.my/BusIT/isw99. You may also send general inquires
to isw99-gen@musm.edu.my.
FM'99 FM99 Mini-track on
Security, Toulouse, France, September 20-24, 1999. (Submission due
February 14, 1999) [posted here 10/29/98].
The FM99 Mini-track on Security is concerned with the role of formal
methods in the development of secure systems. The FM99 security
mini-track will be a unique opportunity for people interested in
computer security to exchange their views with researchers and
members of the industrial community developing new formal methods or
applying them to other critical system properties. The security
mini-track is seeking both technical papers and industrial
experience reports dealing with the application and development of
formal methods for secure systems. All papers submitted in response
to this specific
mini-track Call for Paper should be sent to and reach Dr James
Woodcock by February 14, 1999 (notification of acceptance is May
14,1999). The cover sheet must include the SECURITY key-word. Please
refer to the general
technical symposium Call for Paper for applicable paper
evaluation criteria and submission rules. Mini-track contacts:
P Bieber,
P Y A Ryan
CMS'99
Communications and Multimedia Security, International Federation for
Information Processing, Joint working conference IFIP TC6 and TC11,
Katholieke Universiteit Leuven, Belgium, September 20-21, 1999.
(submissions due: March 15, 1999) [posted here: 1/28/99].
CMS '99 is the fourth in a series of international conferences which
aim at reviewing state-of-the-art issues as well as practical
experiences and new trends in the areas of communications and
multimedia systems security. Topics of interest include, but are not
limited to:
|
*communications systems security |
*mobile communications security |
|
*Internet, intranet and extranet
security |
*security of mobile code |
|
*multimedia systems security |
*applied cryptography |
|
*electronic commerce and digital
signatures |
*security in distributed systems |
|
*secure teleworking,
telecooperation, telemedicine |
*legal, social and ethical
aspects of communication systems security |
|
*standards for communication and
multimedia systems security |
|
Authors are strongly encouraged to submit their papers
electronically. For detailed instructions on submitting a paper,
please see the conference web page at
www.esat.kuleuven.ac.be/cosic/cms99/, or contact: Prof. Bart
Preneel, Program Committee Chair CMS'99, Katholieke Universiteit
Leuven, Dept. Electrical Engineering-ESAT/COSIC, K. Mercierlaan 94,
B-3001 Heverlee, BELGIUM. Email: cms99@esat.kuleuven.ac.be, Tel +32
16 32 10 50, Fax: +32 16 32 19 86.
NSPW'99, New Security
Paradigms Workshop 1999, Caledon Hills, Ontario, Canada, September
22-24 1999. (submissions due: hardcopy by March 26, 1999 or
electronic copy by April 2, 1999) [posted here: 2/5/99].
For seven years, the New Security Paradigms Workshop has provided a
productive and highly interactive forum in which innovative new
approaches (and some radical older approaches) to computer security
have been offered, explored, refined, and published. In order to
preserve the small, intimate nature of the workshop, participation
is limited to authors of accepted papers and conference organizers.
Because these are new paradigms, we cannot predict what subjects
will be covered. Any paper that presents a significant shift in
thinking about difficult security issues will be welcomed. To
participate, please submit (a) a 5-10 page position paper or
discussion topic proposal, (b) a justification for including your
paper in NSPW'99, and (c) who will attend to present the paper. Send
information to to both Program Chairs -- Steven J. Greenwald (sjg6@gate.net)
and Cristina Serban (cserban@att.com) -- by Friday, April 2, 1999
(hardcopy submissions must be received by Friday, March 26, 1999).
More information will be available on a workshop web page.
HUC'99, International
Symposium on Handheld and Ubiquitous Computing Karlsruhe, Germany,
September 27-29, 1999. [posted here: 3/15/99].
The symposium will bring together researchers and practitioners from
different communities to explore links and synergies between
personal and environment-based technologies, in the context of
innovative applications with thematic focus on "Interaction with
Environments", "Information Appliances" and "Handheld CSCW". We
solicit full papers (5000 words) and poster contributions (1500
words) related to the symposium themes. Note, that in addition to
papers and posters, also contributions to workshops are sought. For
further information and a complete list of topics of interest, see
the conference web page at
www.teco.edu/huc/, or contact: Hans-W. Gellersen /
Telecooperation Office (TecO) / University of Karslruhe
Vincenz-Priessnitz-Str. 1 / 76131 Karlsruhe, Germany /
huc@teco.edu
DISC'99, 13th
International Symposium on DIStributed Computing, Bratislava, Slovak
Republic, September 27-29, 1999. (Papers due: April 9, 1999; "Brief
Announcements" due May 10, 1999.) [posted here: 2/15/99].
DISC was formerly known as WDAG. The name change, which took effect
in 1998, reflects the expansion from a workshop to a symposium and
from distributed algorithms to all aspects of distributed computing.
Original contributions to theory, design, analysis, implementation,
or application of distributed systems and networks are solicited.
Topics of interest include, but are not limited to:
- distributed algorithms and their complexity
- fault-tolerance of distributed systems
- consistency conditions, concurrency control, and
synchronization
- multiprocessor/cluster architectures and algorithms
- cryptographic and security protocols for distributed systems
- distributed operating systems
- distributed computing issues on the internet and the web
- distributed systems management
- distributed applications, such as databases, mobile agents,
and electronic commerce
- communication network architectures and protocols
- specification, semantics, and verification of distributed
systems
In addition to regular papers, Brief Announcements are also
solicited this year. Ongoing work for which full papers are not
ready yet or recent results published elsewhere are suitable for
submission as brief announcements. It is hoped that researchers will
use the brief announcement track to quickly draw the attention of
the community to their experiences, insights and results from
ongoing distributed computing projects. Detailed submission
instructions can be found on the conference web page at
www.disc99.sk/. Authors unable
to submit via the web should contact the program chair, Prasad
Jayanti, by email at prasad@cs.dartmouth.edu to receive
instructions.
WIH'99 Third
International Workshop on Information Hiding, Dresden, Germany,
Sept. 29 - Oct. 1, 1999. (submissions due: June 1, 1999) [posted
here: 10/19/98]
Many researchers are interested in hiding information or in stopping
other people doing this. Current research themes include copyright
marking of digital objects, covert channels in computer systems,
detection of hidden information, subliminal channels in
cryptographic protocols, low-probability-of-intercept
communications, and various kinds of anonymity services ranging from
steganography through location security to digital elections.
Interested parties are invited to submit papers on research and
practice which are related to these areas of interest. Submissions
can be made electronically (pdf or postscript) or in paper form; in
the latter case, send eight copies. Papers should not exceed fifteen
pages in length and adhere to the guidelines of the LNCS series
www.springer.de/comp/lncs/instruct/typeinst.pdf. Addresses for
submission: pfitza@inf.tu-dresden.de, Andreas Pfitzmann, Dresden
University of Technology, Computer Science Department, D 01062
Dresden, Germany
DSOM'99, Tenth
IFIP/IEEE International Workshop on Distributed Systems: Operations
& Management, Swiss Federal Institute of Technology ETH, TIK,
Zurich, Switzerland, October 11-13, 1999. (submissions due: April 1,
1999) [posted here: 3/15/99].
The DSOM workshops focus on the latest advancements in operations
and management in networked environments and discuss the impact of
emerging computing and networking technologies on management. Of
specific interest to DSOM'99 will be the current developments in the
field of active and programmable networks. The workshop will be
limited to approximately 100 participants and will follow a single
track program, in order to allow for in-depth discussions and
interaction among workshop participants. Topics of interest include:
- Management of Active and Programmable Networks
- Mobile and Intelligent Agent Technology in Management
- Telecommunication Services Management
- Interdomain Management
- Management of Mobile Systems and Networks
- Management of the Internet and Internet Services
- Enabling Management Platforms: CORBA, Java, Web, etc.
- Integration of Network Control and Management
- Monitoring, Event Handling, and Fault Management of Networks
and Services
- Policy-Based Management
- Security Management
- Management Aspects of Service Pricing and Electronic Commerce
For full instructions on submission of papers, please see the
conference web site at
www.tik.ee.ethz.ch/dsom99.
DEXA'99 10th
International Conference and Workshop on Database and Expert Systems
Applications, University of Florence, Florence, Italy, August
30-September 3, 1999. [posted here 6/14/99].
The aim of DEXA 99 is to present both research contributions in the
area of data and expert systems and a large spectrum of already
implemented or just being developed applications. DEXA will offer
the opportunit to extensively discuss requirements, problems, and
solutions in the field. The workshop and conference should inspire a
fruitful dialogue between developers in practice, users of database
and expert systems, and scientists working in the field. More
information can be found on the conference web page at
www.ifs.tuwien.ac.at/dexa99.
RAID'99 Second International Workshop on the Recent Advances in
Intrusion Detection, West Lafayette, Indiana, USA, September 7-9,
1999. (submissions due: May 21st 1999.) [posted here 4/27/99]
The RAID International Workshop series is intended to further
progress in intrusion detection by promoting the exchange of ideas
in a broad range of topics among researchers, system developers, and
users and by encouraging links between these groups. The program
committee invites submission of both technical and general interest
papers and panels from those interested in formally presenting their
ideas during the workshop. This year, we are emphasizing following
topic areas: Assessing IDS; IDS in High Performance and Real-Time
Environments; Vulnerabilities and Attacks; IDS Integration;
Innovative Approaches; and Practical Considerations. A detailed list
of topics along with instructions for authors of papers and panel
proposals can be found on the conference web page at
www.zurich.ibm.com/pub/Other/RAID/. A preliminary program for
RAID'99 will be available there by July 21, 1999.
8th USENIX Security Symposium, JW Marriott Hotel, Washington,
D.C. , USA, August 23-26, 1999. (submissions due: March 9, 1999)
[posted here 12/11/98].
The USENIX Security Symposium brings together researchers,
practitioners, system administrators, system programmers, and others
interested in the latest advances in security and applications of
cryptography. If you are working in any practical aspects of
security or applications of cryptography, the program committee
would like to urge you to submit a paper by March 9, 1999. This
symposium will last for four days. Two days of tutorials will be
followed by two days of technical sessions including refereed
papers, invited talks, works-in-progress, and panel discussions.
More information can be found on the conference web page at
www.usenix.org/events/sec99/.
WIAPP'99, 1999 IEEE
Workshop on Internet Applications, San Jose, California, USA, July
26-27, 1999. (Submissions due: February 15, 1999) [posted here:
2/3/99]
The goal of this workshop is to bring together application and
network designers to exchange ideas about the problems they are
facing and the functions they are expecting the others to provide.
The list of topics of interest includes, but is not limited to, the
network effects on applications, and the application effects on
networking, of the following:
|
* caching |
* electronic commerce |
|
* information retrieval &
searching |
* Internet telephony |
|
* metacomputing |
* mobile computing |
|
* monitoring |
* performance |
|
* quality of service issues |
* security |
|
* reliability and high
availability |
* traffic measurement |
|
* traffic models & statistics |
* Web interfaces to databases |
Submitted manuscripts should not exceed 5000 words. Please see
the conference web page at
wia99.ibm.park.org/ for complete submission instructions, or
contact Arun Iyengar, aruni@watson.ibm.com.
IFIP 13th IFIP
WG11.3 Working Conference on Database Security, Seattle, Washington,
USA, July 26-28, 1999. (papers are panel proposals due: February 15,
1999) [posted here 10/28/98].
The conference provides a forum for presenting original unpublished
research results, practical experiences, and innovative ideas in
database security. Papers and panel proposals are solicited. Submit
PostScript version of papers up to 5000 words and panel proposals by
February 15, 1999 to Vijay Atluri (atluri@andromeda.rutgers.edu),
MS/IS Department, Rutgers University, 180 University Ave., Newark,
NJ 07102, USA. Details on IFIP WG11.3 and the conference available
at www.cs.rpi.edu/ifip/.
IDA Information
Domain Workshop, Alexandria, VA USA, August 5-6, 1999. (submissions
due: May 8, 1999) [posted here 2/18/99]
The intent of this workshop is to bring together computer system
security architects, researchers, and users interested in exploring
the use and implementation of information domains. The goal is to
enhance our understanding of the potential for security within a
shared-resource environment, as offered by information domains. We
seek descriptions of work on the definition, implementation, and
real-world application of information domains. We are especially
interested in work-in-progress, including prototypes. Case studies
and experience papers are also of interest. This will be a two-day
workshop consisting of work-in-progress reports and discussion. An
electronic proceedings will be published at the conclusion. Topics
of interest include, but are not limited to:
- Information Domain architecture descriptions
- Expression of enterprise-level policy using information
domains
- Implementation of information domains
- Associations between incarnations of a domain on multiple end
systems
- Inter-domain interactions
- Management of information domains
- Granularity of information domains
- Separation of security policy definition and enforcement
- Multidomain objects
Please see the web page at
atlas.ida.org:8500/idw/
for detail on submitting a paper, or contact: Ed Schneider (eschneider@ida.org).
SAC'99, Sixth
Annual Workshop on Selected Areas in Cryptography, Queen's
University, Kingston, Ontario, Canada, August 9-10, 1999.
(Submissions due: April 30, 1999) [posted here: 2/5/99].
Original papers related to the following themes are solicited.
- Design and Analysis of Symmetric Key Cryptosystems
- Efficient Implementations of Cryptographic Systems
- Cryptographic Solutions for Web/Internet Security
The Proceedings will be published by Springer-Verlag in the
Lecture Notes in Computer Science (LNCS) series. Detailed
instructions for submitting papers are available at
www.engr.mun.ca/~sac99/cfp. As well, general information on the
Workshop will be available on the SAC '99 web page at
www.engr.mun.ca/~sac99.
Email inquiries may be directed to sac99@engr.mun.ca.
CHES'99
Workshop on Cryptographic Hardware and Embedded Systems, Worcester
Polytechnic Institute, Worcester, Massachusetts, USA, August 12-13,
1999 (precedes CRYPTO'99). (Papers due: April 30, 1999) [posted
here: 1/7/99].
The focus of this workshop is on all aspects of cryptographic
hardware and embedded system design. We hope that the workshop will
help to fill the gap between the cryptography research community and
the application areas of cryptography. The topics of interest
include but are not limited to:
|
* Computer architectures for
public-key cryptosystems |
* Architectures for smart cards |
|
* Computer architectures for
secret-key cryptosystems |
* Tamper resistance for smart
cards |
|
* Reconfigurable computing and
applications in cryptography |
* Tamper resistance on the chip
and board level |
|
* Cryptographic processors and
co-processors |
* Fast network encryption |
|
* Modular and Galois field
arithmetic architectures |
* Efficient algorithms for
embedded processors |
|
* Special-purpose hardware for
cryptanalysis |
* True and pseudo random number
generators |
Please see the conference web site at
ece.WPI.EDU/Research/crypt/ches
for additional information and submission instructions.
CRYPTO'99 Nineteenth Annual
IACR Crypto Conference, Santa Barbara, California, USA, August
15-19, 1999. [posted here: 12/11/99]
Original papers on all technical aspects of cryptology are solicited
for submission to Crypto'99. Authors are strongly encouraged to
submit their papers electronically (see
www.iacr.org/conferences/c99/submit.html for details). Other
information, including contacts and a procedure for submitting a
paper through FAX or mail, is given on the conference web page at
www.iacr.org.
MobiCom'99,
The Fifth Annual International Conference on Mobile Computing and
Networking, Seattle, Washington, USA, August 15-19, 1999. (papers,
tutorial and panel proposals: January 15, 1999) [posted here
12/9/98].
Technical papers describing previously unpublished, original,
completed research, not currently under review by another conference
or journal, are solicited on topics related to mobile computing.
(Please see the call-for-papers web site for detailed areas of
interest along with submission instructions). Additionally, MobiCom
solicits short papers (8 pages max.) for the new "Next Century
Challenges" session, along with proposals for tutorials and panel
sessions. Information can be found at
www.acm.org/sigmobile/,
or you can contact the Program Co-Chairs, Tomasz Imielinski,
imielins@cs.rutgers.edu, Tel: +1 732 445-3546, Fax: +1 732 445-1003;
and Martha Steenstrup, msteenst@bbn.com; Tel: +1 617 873-3912, Fax:
+1 617 873-6091; or the Local Chair, Randy Granovetter, randygr@microsoft.com,
Tel: +1 425 703-7446, Fax: + 1 425 936-7329.
IMACS-IEEE'99, Special Session on Applied Coding, Cryptology and
Security, Athens, Greece, July 4-8, 1999. (One page abstracts due
January 4, 1999, Full papers due February 25, 1999). [posted here
12/17/98].
Coding and Cryptology have become essential tools in the security of
our computer systems, networks, Web applications and technologies.
The Special Session "Applied Coding, Cryptology and Security" is
aimed to explore the importance of these fields in the pursuit of a
secure Information Society for the 21st Century. Prospective authors
are invited to submit original papers in any of the following
subject categories:
- Implementation of coding schemes and cryptosystems
- Applied Cryptanalytic and Decoding Techniques
- Network Security and Encryption
- Security for Web technologies and applications
Contact Details for the Special Session: Dr. Nineta Polemi,
Institute of Communications & Computer Systems(ICCS), National
Technical University of Athens (NTUA), Heroon Polytechniou 9,
Zografou 157 73, Athens, Greece, tel: 30-1-772 2466, mobile: 30-94
783685, e-mail: polemi@softlab.ece.ntua.gr, URL: http://secgroup.iccs.ntua.gr/
WFMSP'99,
1999 Workshop on Formal Methods and Security Protocols, Trento,
Italy, July 5, 1999 (part of FLOC'99). (submissions due: March 26,
1999) [posted here: 2/4/99].
Topics of interest include descriptive techniques (specification
languages, models, logics) and analysis techniques (model checking,
theorem proving, and their combination), as applied to protocols for
authentication, fair exchange, electronic commerce, electronic
auctions, etc. The program will consist of a keynote lecture by
Catherine Meadows (NRL), technical sessions, and a panel discussion.
Extended abstracts (about 5-10 pages) explaining recent research
results or work in progress should be mailed electronically to both
organizers, nch@research.bell-labs.com and Edmund.Clarke@cs.cmu.edu,
to be received by March 26, 1999. Submissions should be formatted as
a PostScript file in USLetter size. See
www.cs.bell-labs.com/who/nch/fmsp99/ for more information.
ISCC'99, The Fourth IEEE Symposium on Computers and
Communications, Sharm El Sheikh, Red Sea, Egypt, July 6-8, 1999.
[posted here: 12/12/98].
This year, special focus will be on the challenging issues related
to the global reach of the Internet and its applications, that
include the creation, management, dissemination, and communication
of information. A complete list of topics emphasized can be found on
the conference web page at
www.rennes.enst-bretagne.fr/~afifi/iscc99.html.
The
Black Hat Briefings'99, Las Vegas, Nevada, USA, July 7-8, 1999.
[posted here: 3/16/99]
The Black Hat Briefings conference series was created to fill the
need of computer professionals to better understand the security
risks to their computer and information infrastructures by potential
threats. Spanning two days with three separate tracks, The Black Hat
Briefings will focus on the vital security issues facing
organizations with large Enterprise networks and mixed network
operating systems. Topics will Include Intrusion Detection Systems
(IDS), Computer Forensics (CF) systems, Incident Response, secure
programming techniques and tool selection for creating and
effectively monitoring your networks. This year, there will be a
third track for CEOs and CIOs who manage technology. More
information about the conference can be found at
www.blackhat.com/html/bh-3/bh3-index.html.
FIRST 11th
FIRST Conference on Computer Security Incident Handling and
Response, Brisbane, Australia, June 13-18, 1999. (Submissions due:
November 1, 1998) [posted here 10/8/98].
The Forum of Incident Response and Security Teams (FIRST) was formed
in November 1990 to address the problem of an ever increasing number
of computer and network security related incidents, affecting
thousands of systems around the world. The Forum is made up of
government, private and academic Computer Security Incident Response
Teams (CSIRTs) from around the globe. Its primary goal is to
coordinate the efforts of its members in order to increase both
their individual and collective effectiveness. The FIRST Conference
is a unique opportunity for those involved in computer security to
get together and discuss all aspects of the subject. The conference
will provide the opportunity to listen to experts in the fields of
computer security incident response and vulnerability analysis. They
will share their valuable expertise by speaking about their
experience in dealing successfully with the coordination of
incidents traversing international boundaries, highlighting
particular problems where appropriate. There will also be the
opportunity to hear how other organizations have addressed some
popular problems related to building protection infrastructures such
as security policies, firewalls, net wide antivirus or intrusion
detection systems etcetera. The emphasis of the conference is on
practice and experience as opposed to experiment and prototype.
Please see the conference web page at
www.first.org/conference/1999/ for a complete list of topics and
for submission details.
Conference on User Identification and Privacy Protection -
Applications in Public Administration and Electronic Commerce June
14-15, 1999, Stockholm, Sweden. (Extended deadline: Submissions due
February 8, 1999). [posted here 11/20/98].
The conference will focus on legal, social, technical and
organisational aspects of information infrastructures and of new
applications particularly in the area of Electronic Commerce and
Public Administration. Invited topics include, but are not limited
to the following:
- Digital Signature Schemes:
Public Key Infrastructures, Implementation of Pseudonyms, TTP
Certification / Regulation, Liability of TTPs, Law Enforcement
Implications / Activities, Applications in Public Administration
or Electronic Commerce
- Protection of Privacy and Confidentiality in the GII:
IT Misuse and Risks, Confidentiality vs. Identification of
Communication Partners, Anonymity: A right to ?, Legislation,
Implications (e.g., potential misuse by criminals), Technical
solutions: Privacy Enhancing Technologies, State Regulations vs.
Self-Regulation, Cryptographic Policies and Crypto Debate,
Applications in Public Administration or Electronic Commerce
We especially welcome the submission of general papers discussing
these topics or application-oriented papers focusing on problems and
solutions for the application areas Public Administration and
Electronic Commerce. Authors are requested to submit either an
extended abstract (4-5 pages) or a full paper (up to 15 pages). Each
paper must have an abstract and a list of keywords. Papers or
extended abstracts must be written and presented in English and
should be sent to: Dr. Simone Fischer-H=FCbner; Department of
Computer and Systems Sciences (DSV); Stockholm University / KTH;
Electrum 230; S- 164 40 Kista; Tel.: +46 -8-161606; Fax: +46-8-703
90 25; Email: simone@dsv.su.se The conference web page is at
www.dsv.su.se/IFIP-WG-9.6/Cfp-ws85-96.htm.
WET-ICE'99, Fourth International Workshop on Enterprise
Security, Stanford University, California, USA, June 16-18, 1999.
(DEADLINE FOR PAPERS HAS BEEN EXTENDED TO APRIL 12, 1999) [posted
here: 12/18/98].
This workshop will focus on the problems and challenges relating to
enterprise security in inter-organizational systems. We aim to bring
together principal players from both the internetwork and the
enterprise security community and will provide plenty of time for
discussion. Topics include: INTERNET SECURITY(security protocols for
the Internet, the work and efforts of IETF security groups, global
key infrastructures), DISTRIBUTION (distributed database security,
secure transactions, inter- and intra-organizational security,
security of collaborative applications), SECURE INFRASTRUCTURES
(secure applications and environments, object-oriented and CORBA
security, secure enterprise infrastructures, security algorithms,
public key infrastructures), and SECURITY MANAGEMENT (role-based
access control, enterprise security policies, security in workflow
processes). Instructions for authors can be found on the conference
web page at
www.ida.liu.se/conferences/WETICE/SECWK/.
WISE1 1st
World Conference on Information Security Education, June 17-19,
1999, Stockholm, Sweden. (Submissions due: January 30, 1999
Extended Deadline) [posted here: 10/1/98].
IFIP Working Group 11.8 (IT Security Education) invites you to
contribute to their activities by submitting papers and panel
suggestions for the first world conference, to be held at the
Department of Computer and System Sciences (DSV), Stockholm
University. Potential topics include teaching (and assessment) of
computer security education for audiences in academia, industry, the
military, and IT professionals. Please see the conference web page
at
www.dsv.su.se/WISE1/cfp.htm for a detailed list of topics and
for instructions for submitting an original paper.
ICATM'99,
2nd International IEEE Conference on ATM, Technical Institute,
Colmar, France, June 21-23, 1999. (Extended abstracts due: December
10, 1998) [posted here: 10/3/98].
In order to encourage closer interaction between academic and
industrial ATM research communities, we solicit both academic
research papers and industrial contributions. Papers should describe
significant research as well as innovative development and
applications relating to ATM. A complete list of topics of interest,
along with detailed submission instructions can be found on the
conference web page at
iutsun1.colmar.uha.fr/ICATM99.html.
WSS'99 Fourth Workshop on Self-Stabilizing Systems, Hyatt
Regency Hotel, Austin, Texas, USA, June 5, 1999. [posted here
12/9/98].
WSS'99 provides a forum for the presentation of new research
results, and the identification of future directions in its rapidly
growing area of research. Topics include:
- Stabilization in distributed and networked systems
- Stabilization in the context of system fault-tolerance
- Stabilization in the context of system security
- Stabilization in the context of real-time systems
- Design, analysis and implementation methods for stabilization
- Impossibility results and lower bounds for stabilizing systems
- Applications of stabilization, experience reports
For further Information, see the conference web page at
www.cis.ohio-state.edu/~anish/wss99.html, or contact Prof. Anish
Arora, Department of Computer and Information Science, The Ohio
State University, 2015 Neil Avenue, Columbus, Ohio 43210-1277,
U.S.A. Tel: (614)292-1836, Fax: (614) 292-2911, E-mail: anish@cis.ohio-state.edu
USENIX'99
Annual Technical Conference, Monterey, California, June 6-11, 1999.
(Papers due: December 2, 1998) [posted here: 10/31/98].
The USENIX Technical Conference Program Committee seeks original and
innovative papers about the applications, architecture,
implementation, and performance of modern computing systems. As at
all USENIX conferences, papers that analyze problem areas and draw
important conclusions from practical experience are especially
welcome. Some particularly interesting application topics are:
|
* Availability |
* Distributed caching and
replication |
|
* Embedded systems |
* Extensible operating systems |
|
* File and storage system |
* Interoperability of
heterogeneous systems |
|
* Mobile code and computing |
* Multimedias |
|
* New algorithms and applications |
* Personal digital assistants |
|
* Quality of service |
* Reliability |
|
* Quality of service |
* Reliability |
|
* Security and Privacy |
* Web technologies |
|
* Ubiquitous computing and
messaging |
Detailed submission instructions can be found on the conference
web page at
www.usenix.org/events/usenix99/.
Federal Computer Security Conference on Threats,
Vulnerabilities and Promising Practices For Meeting The Challenge,
Hyatt Regency Inner Harbor, Baltimore Maryland, May 10-11, 1999.
[posted here: 3/15/99].
Topics include: cyberterrorism, winning top management support for
security improvements, intrusion detection, presidential decision
directive 63 and the critical infrastructure assurance office,
certification and accreditation-how to do it right, windows NT
security, federal security resources: what works?, and the new
levelone initiative to protect federal computers from known network
threats. More information can be found on the workshop web page at
www.cio.org/fcsc.htm.
SMARTCARD'99 USENIX Workshop on Smartcard Technology, McCormick
Place, Chicago, Illinois, USA, May 10-11, 1999, [posted here:
10/12/98].
Review the full program and register online at
www.usenix.org/events/smartcard99/. Save when registering before
Friday, April 16, 1999. You'll hear reports of the latest research,
developments, and deployments in:
- smart card hardware
- smart card software
- system issues
- strengths and weaknesses of smart cards
- smart cards' role in operating systems
- smart cards as a base technology in cryptographic systems
Sponsored by the USENIX Association; Co-sponsored by CardTech/SecureTech
and held in conjunction with CardTech/SecureTech - May 11-14, 1999 [www.ctst.com]
Workshop for researchers & practitioners to learn from each other
the state of the art in practical applications and deployment of
technology that extends the use of smart cards for authentication,
electronic commerce, and secure personal data storage.
CFP'99 The Ninth Annual
Conference on Computers, Freedom + Privacy, Omni Shoreham Hotel,
Washington, DC, USA, April 6-8, 1999. [posted here: 3/15/99].
CFP is the leading Internet policy conference. Topics include:
access, anonymity, censorship, civil society, consumer protection,
copyright, crime, culture, democracy, diversity, electronic
commerce, encryption, free expression, freedom, governance, human
rights, legislation, privacy, security, standards, and surveillance.
More information can be found on the conference web page at
www.cfp99.org/.
ACISP'99 The Fourth Australasian Conference on Information
Security and Privacy, University of Wollongong, NSW, Australia,
April 7-9, 1998. (Papers due: December 7, 1998) [posted here:
11/1/98].
Theoretical and practical papers on all aspects of Information
Security are invited. The profile of the conference includes (but is
not limited to): Access control, Authentication & identification,
Authorization, Computer security, Copyright protection,
Cryptography, Database security, Evaluation and certification,
Intrusion detection, Key management, Key establishment protocols,
Mobile system security, Network & communication security, Secure
electronic commerce, Secure operating systems, Secure protocols,
Smartcards, and Viruses. Authors are invited to submit extended
abstracts of original papers. Complete submission instruction can be
found on the conference web page at
www.itacs.uow.edu.au/ccsr/proceedings/acisp99.html.
WECWIS'9,
International Workshop on Advance Issues of E-Commerce and Web-based
Information Systems, April 8-9, 1999, Santa Clara, California, USA.
[posted here 3/15/99].
The pervasive connectivity of the Internet and the powerful
architecture of WWW have created a tremendous opportunity for
conducting business on Internet. The terms e-commerce and e-business
have been used to describe those systems and technologies that make
conducting business on Internet possible. The purpose of this
workshop is to identify and to explore the technical issues and
solutions for future e-commerce and web-based information systems.
An agenda, registration and other important information is provided
at
www.eng.uci.edu/~klin/Wecwis.html.
USENIX 1st USENIX
Workshop on Intrusion Detection and Network Monitoring, April 11-12,
1999, Santa Clara, California, USA. (extended abstracts due November
1, 1998) [posted here 10/3/98].
The goal of this workshop is to bring together network managers,
engineers and researchers interested in deploying and developing
intrusion detection systems (IDS) and network monitoring
technologies for security, traffic analysis, or forensics. The
emphasis is on practical results, case studies, and real-world
large-scale deployment. This will be a two-day workshop, consisting
of refereed papers, invited talks, and work-in-progress reports.
Topics of interest include:
|
* Case studies of IDS in practice |
* Statistical models for IDS |
|
* Anomaly detection systems |
* Misuse detection systems |
|
* Host based approaches to IDS |
* Network based approaches to IDS |
|
* Application based approaches to
IDS |
* IDS in cryptographically
protected networks |
|
* Distributed IDS in large
networks |
* Correlation techniques |
|
* Event thresholding |
* Reducing false positives |
|
* Alternative approaches |
|
More information, including detailed submission instructions, can
be found on the conference web page at
www.usenix.org/events/detection99/.
AIPA'99,
Advanced Information Processing & Analysis, Ronald Reagen
International Trade Center, Washington, D.C., USA, March 23-24,
1999. (Abstracts due: February 1, 1999) [posted here: 1/23/99]
Theme: Shaping Intelligence Processes: Next Generation Information
Services. The AIPA Steering Group is seeking Paper Presentations and
Vendor Exhibits with the following characteristics:
- Specifically relate to applications or technologies that will
support Intelligence Community analysts.
- Provide high-interest presentations for information analysts,
technologists and decision makers.
- Provide those analysts and technologists with the most usable
information services.
Each paper will be given 30 minutes for presentation and
discussion. Technology demonstrations are encouraged. The AIPASG
welcomes presenters from government, industry, and academia.
Potential paper presenters should submit a one-page abstract of the
proposed topic describing how the presentation relates to the AIPA99
theme. Please see the conference web page at
www.aipasg.org/aipasg99/index.html for submission details and
registration information.
AES'99, Second Advanced Encryption Standard (AES) Candidate
Conference, Hotel Quirinale, Rome, Italy, March 22-23, 1999.
(submissions due: February 1, 1999) [posted here: 12/9/98]
This conference is for an international audience consisting of
cryptographers and other interested parties, who wish to participate
in the evaluation and analysis of the fifteen candidate algorithms
for the Advanced Encryption Standard (AES). This conference is being
held immediately preceding the Fast Software Encryption Workshop
1999 (FSE6) scheduled for March 24-26, 1999 at the same venue. The
format is Primarily panel presentations and discussion by experts
who have analyzed the candidate algorithms for security, efficiency,
and other characteristics. Audience members and algorithm submitters
will have an opportunity to question the panel regarding their
findings. Simply put, the purpose of this conference will be to help
answer the question: "Which algorithms merit selection for Round 2
and why?" Registration Contact: Lori Phillips Buckland, NIST,
Building 101, Room B116, Gaithersburg, MD 20899-0001, phone:
301/975-4513, fax: 301/948-2067, email: Lori Phillips. Technical
Contact: Miles Smid, NIST, Building 820, Room 426, Gaithersburg,
MD 20899-0001, phone: 301/975-2938, fax: 301/948-1233, email: Miles
Smid; or Jim Foti, NIST Building 820, Room 426, Gaithersburg, MD
20899-0001, phone: 301/975-5237, fax: 301/948-1233, email: Jim Foti.
More information can be found on the conference web page at
csrc.nist.gov/encryption/aes/round1/conf2/aes2cfp.htm.
FSE6, Fast Software Encryption Workshop 1999, Rome, Italy, March
24-26, 1999. (Submissions Due December 14, 1998) [posted here:
12/8/98].
The workshop concentrates on all aspects of fast secret key ciphers,
including the design and cryptanalysis of block and stream ciphers,
as well as hash functions. Instructions for Authors Interested
parties are invited to submit original unpublished papers on the
design and analysis of fast encryption algorithms and hash
functions. In particular we encourage submissions containing
proposals for and analysis of candidates for the future Advanced
Encryption Standard (AES). It is strongly preferred that submissions
be processed in LaTeX according to
www.springer.de/comp/lncs/authors.html since this will be a
mandatory requirement for the final papers. The paper must not
exceed 15 pages in length. The LaTeX files are to be sent
electronically, together with the email and physical addresses of
the sender. If papers are submitted in paper form, 11 copies are
required. The papers must not be submitted simultaneously to other
workshops or conferences with proceedings. Preproceedings will be
available at the meeting and the final proceedings will be published
in the Springer-Verlag Lecture Notes in Computer Science. Address
for Submission: lars.knudsen@ii.uib.no or Lars Knudsen, University
of Bergen, Dept. of Informatics, Hi-techcenter, 5020-Bergen, Norway
.
ASSET'99 IEEE Symposium on Application-Specific Systems and
Software Engineering Technology, Richardson, Texas, USA, March
25-27, 1999. (submissions due: August 31, 1998) [posted here:
7/15/98]
The main focus of this symposium is on application-specific system
engineering and software engineering issues encountered in the
design and development of complex systems. The symposium will
consist of technical papers, panels, and tutorials. Participation
from both industry and academia is sought. The topics of interests
include, but are not limited to:
- Experiences in software design, development, and validation
for telecommunication, embedded, multimedia, wireless, and mobile
systems.
- Specialized systems and software engineering techniques,
including specification, design, and development techniques for
telecommunication, embedded, and transaction processing systems.
- Integrated system design and assessment techniques that
consider multiple systems requirements, such as security,
real-time, reliability, availability, survivability, etc.
- Techniques and algorithms in network security, real-time
communication, network management, telecontrol, and high speed
networks.
- CASE tools for application-specific systems development.
- Simulation environments for integrated design and assessment.
- Quality of service analysis for various application systems.
- Performance modeling and evaluation for application-specific
systems.
- Application-specific verification, validation, and assessment
techniques.
Papers are due Aug 31. See the Web page at
www.utdallas.edu/~ravip/asset99/index.html for details or
contact the program chair at ilyen@utdallas.edu. For tutorial
proposals contact rmili@utdallas.edu.
ICEIS'99, 1st
International Conference on Enterprise Information Systems, March
27-30, 1999, Setubal, Portugal. (Abstracts are due by November 6,
1998) [posted here 10/28/98].
The main purpose of the conference is to address real world problems
and practical solutions, based on the use of information systems
Preferentially, the articles should present new ideas on how to
solve management and decision problems using information
technologies. Articles describing innovative architectures of
decision support systems, database search engines, artificial
intelligence techniques, distributed computing, etc. are also
welcomed. A complete list of topics, along with detailed submission
instructions, can be found on the conference web page at
www.est.ips.pt/iceis.
FC'99
3rd Annual Conference on Financial Cryptography, February 22-25,
1999, Anguilla, BWI. (submissions due: September 25, 1998) [posted
here: 2/23/98]
Original papers are solicited on all aspects of financial data
security and digital commerce in general for submission to the 3rd
Annual Conference on Financial Cryptography (FC99). FC99 aims to
bring together persons involved in both the financial and data
security fields to foster cooperation and exchange of ideas.
Relevant topics include: Anonymous Payments, Auditability,
Authentication, Copyright Protection, Credit/Debit Cards, Currency
Exchange, Digital Cash, Digital Receipts, Economic Implications,
Electronic Funds Transfer, Electronic Purses, Identification,
Implementations, Loss Tolerance, Loyalty Mechanisms, Micropayments,
Network Payments, Privacy Issues, Regulatory Issues, Smart Cards.
Complete submision instructions can be found on the conference web
page at
www.rsa.com/rsalabs/fc99/html/cfp.html or contact Matthew
Franklin, FC99 Program Chair; AT\&T Labs, Room A281, 180 Park
Avenue, Florham Park, NJ 07932, USA email:
franklin@research.att.com
phone: 973-360-8353, fax: 973-360-8809.
PKC'99
1999 International Workshop on Practice and Theory in Public Key
Cryptography, Kanto, Japan, March 1-3, 1999. (Submissions due:
September 25, 1998) [posted here 5/26/98].
Both original research papers and high quality surveys pertaining to
all aspects of public key encryption, digital signature and one-way
hashing are solicited. Submissions may present theory, techniques,
applications and practical experience on topics including, but not
limited to: certification and time-stamping, cryptanalysis,
comparison and assessment, discrete logarithm, elliptic curve
cryptography, encryption data formats, fast implementation, integer
factorization, international standards, key-ed one-way hashing,
lattice reduction, one-way hashing algorithms, provable security,
public key infrastructure, secure electronic commerce, signature
data formats, and signcryption schemes. Complete instruction on
submitting a paper can be found on the conference web page at
hideki.iis.u-tokyo.ac.jp/pkc99/.
IETF 44th IETF Meeting,
Minneapolis, MN, USA, March 15-19, 1999. [posted here February 3,
1999].
[from the IETF Web page at
www.ietf.org
The Internet Engineering Task Force (IETF) is a large open
international community of network designers, operators, vendors,
and researchers concerned with the evolution of the Internet
architecture and the smooth operation of the Internet. It is open to
any interested individual. The actual technical work of the IETF is
done in its working groups, which are organized by topic into
several areas (e.g., routing, transport, security, etc.). Much of
the work is handled via mailing lists. The IETF holds meetings three
times per year. Future IETF Meeting Sites:
- Summer 1999 - 45th IETF, July 12-16, 1999, Oslo, Norway, Host:
Uninett
- Fall 1999 - 46th IETF,November 8-12, 1999, Washington, DC,
Host: Nortel
- March 2000 - 47th IETF, March 27-31, 2000, Adelaide,
Australia, Host: Sellnet and connect.com.au
RSA'99 The
Eighth Annual RSA Data Security Conference and Expo, McEnery
Convention Center, San Jose, California, January 17-21,1999. [posted
here: 10/31/98]
The eighth annual RSA Conference delivers keynote presentations from
industry leaders and national policy makers, plus more than 150
individual break-out sessions on topics ranging from the latest in
cutting-edge cryptographic research to the most current
implementations of enterprise security and secure electronic
commerce. More information can be found on the conference web page
at
www.rsa.com/conf99/home.html.
NDSS'99 The Internet
Society 1999 Network and Distributed System Security Symposium, San
Diego, California, USA, February 3-5, 1999. (submissions due: July
31, 1998) [posted here: 7/16/98]
The Internet Society 1999 Network and Distributed System Security
Symposium (NDSS'99). 3-5 February 1999; San Diego, California, USA.
The symposium will foster information exchange among hardware and
software developers of network and distributed system security
services. The intended audience includes those who are interested in
the practical aspects of network and distributed system security,
focusing on actual system design and implementation, rather than
theory. A major goal of the symposium is to encourage and enable the
Internet community to apply, deploy, and advance the state of
available security technology. Technical papers and panel proposals
for topics of technical and general interest are invited. Deadline
for electronic submission is 31 July 1998. The complete call for
papers is available at the conference web page at
www.isoc.org/ndss99.
WECS'99 Call for participation in a workshop on Education in
Computer Security, Asilomar Conference Center, Pacific Grove,
California, USA, January 4-6, 1999. (Submissions due: November 30,
1998) [posted here: September 16, 1998].
The Workshop on Education in Computer Security is intended to bring
together those interested in developing and enhancing instruction in
computer security within undergraduate and graduate computer science
programs. There will be several themes for the 1999 workshop: the
use of analogies to describe difficult concepts in computer
security; teaching use of commercial-off-the-shelf technologies to
achieve; security solutions and the challenge of using commercially
available products to achieve assurance objectives; applying high
level system design and architectural principles in security
education. It is expected that the outcome of the workshop will be a
set of materials that will permit participants and others to enhance
the teaching of security. We are planning a half-day tutorial on a
topic that will increase our expertise in some important area.
Submissions should be sent to: Prof. Cynthia E. Irvine, Computer
Science Department, Code CS/Ic, Naval Postgraduate School, Monterey,
CA 93943-5118, USA. Voice: +1 408 656 2461. Fax: +1 408 656 2814.
irvine@cs.nps.navy.mil. More information can be found on the
workshop web page at
cisr.nps.navy.mil/events/wecs/wecs99_announce.html.
HICSS-32 Electronic Commerce Technologies Minitrack part of the
Software Technology Track of HICSS-32 32nd Hawaii International
Conference on System Sciences Maui, Hawaii - January 5-8, 1999.
[posted here: 7/16/98].
Electronic Commerce (E-Commerce) is the ability to conduct business
via electronic networks such as the Internet and the World Wide Web.
The purpose of this mini-track is to cover enabling technologies,
critical technical approaches and business-centered design
methodologies that address shortcomings of contemporary E-Commerce
applications and that can have a major impact on the evolution of
business-to-consumer and mainly of business-to-business E-Commerce.
Emphasis is given to distributed systems technologies and in
particular how these meet the requirements of business (vertical)
applications that span locational as well as organizational
boundaries. More information can be found on the minitrack web page
at
www.di.uoa.gr/~hicss32/e-commerce.html or on the HICSS
conference web page at
www.cba.hawaii.edu/hicss, or contact the Track Administrator,
Eileen Dennis, at edennis@uga.edu.
DCCA-7 Seventh IFIP
International Working Conference on Dependable Computing for
Critical Applications, San Jose California, USA, January 6-8, 1999.
(submissions due August 3, 1998) [posted here June 30, 1998]
This is the seventh conference in a series dedicated to advancing
the theory and practice of dependable computing for critical
applications. Previously unpublished papers are sought in all
aspects of dependable computing, including, but not limited to:
- Attributes of dependability such as security, safety,
reliability
- Impairments to dependability such as permanent and transient
faults, intrusions, design flaws, human error
- Algorithms and techniques for fault-tolerant, real-time,
secure, distributed systems
- Design and verification techniques such as formal methods,
model checking, fault injection, stochastic modeling
- Requirements validation, hazard analysis, safety analysis
- Regulatory and certification issues such as standards, safety
cases, reliability assessment
- Critical application areas such as transportation and medical
systems, process and power industries.
Papers that deal with combinations of issues, such as security
and reliability, or combinations of techniques, such as formal
methods and fault injection, are particularly encouraged. Papers
should be submitted electronically according to the instructions
available from the DCCA Web page
www.csl.sri.com/dcca7.
|