|
Past Conferences and Journal Special Issues
Last Modified:01/13/05
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
PRDC 2000 Pacific Rim International Symposium on Dependable
Computing, University of California at Los Angeles (UCLA), December
18-20, 2000. [posted here 5/29/00]
The Pacific Rim International Symposium on Dependable Computing (PRDC)
is a symposium for dissemination of state-of-the-art research and
engineering practice in dependable computing with particular
emphasis on systems and software. This will be the seventh of this
series of international symposia, and it comes at a fortuitous time
when many computer industries are recognizing dependability to be
one of their top problems due to the demands of the Internet. Topics
of interest include (but are not limited to):
- Design for system dependability
- Fault-tolerant systems and software
- Fault tolerance for parallel and distributed systems
- Software and hardware reliability, verification and testing
- Dependability measurement, modeling and evaluation
- Safety and security of computing systems
- Tools for design and evaluation of dependable systems
- Implications of emerging technologies on dependable system
design (e.g., deep submicron VLSI, pervasive computing)
- Application-specific dependable system (e.g., embedded
systems, WWW servers, transaction processing)
More information can be found on the conference web site at
www.cs.ucla.edu/PRDC2000/
HiPC'2000,
7th IEEE International Conference on High Performance Computing,
special session on performance modeling of mobile telecommunication
networks, December 17-20, 2000, Bangalore, India. [posted here
4/22/00]
The objective of this session is to bring together technologists and
researchers of international reputation to have a forum for
discussions and presentations of their state-of-the-art work in all
aspects of wireless communications and mobile computing, with
particular emphasis on performance modeling and analysis of mobile
communications capability. Authors are invited to submit original
unpublished manuscripts for a special session on Mobile Computing.
Topics of interest include (but not limited to):
* Performance modeling of wireless networks (PCS, Ad hoc, Satellite
Networks)
* Mobility, data, resource management, and scheduling issues in
wireless and mobile networks
* Mobile applications and tools for distributed databases
* Wireless Internet and WWW, simulation of wireless networks
* Mobile Agents
* Quality-of-service (QoS) provisioning
* Wireless multimedia systems
* Routing and location independent information access
* Parallel Simulation of large scale wireless systems
* Security, scalability and reliability for mobile/wireless systems
* Architectures of mobile/wireless networks and systems
* Traffic integration for mobile applications
* Design and analysis of algorithms for mobile environments
* Influence of lower layers on the design and performance of higher
layers
* Scalable Servers Wireless Mobile Computing
Complete submission instructions are given on the conference web
page at: www.hipc.org
ADCOM 2000, 8th
International Conference on Advanced Computing and Communications,
Cochin, India, December 14-16, 2000. [posted here 4/22/00]
The annual conference of ACS is intended to provide a forum for
interaction amongst industry, professionals, researchers and
government policy planners with a view to sharing ideas, report
findings, discuss products and define future directions. The topics
of interest include, but are not limited to:
*High speed networks
* Parallel, distributed and networked computing
* Web based computing
* Business computing
* Parallel and distributed databases and data warehousing
* EDI and e-commerce
* Multimedia systems
* High performance graphics, visualization and virtual
reality
* Secure computing
More information can be found on the conference web page at:
www.adcom2000.homepage.com/
FSTTCS 2000
The 20th Conference on the Foundations of Software Technology and
Theoretical Computer Science, New Delhi, India, December 13-15,
2000. [posted here 5/29/2000]
This annual conference provides a platform for presentation of
original research results in fundamental aspects of computer
science. It also provides an excellent forum for meeting and
exchanging ideas with people who are at the frontline of software
technology and theoretical computer science. The Conference
Proceedings will be published by Springer-Verlag in the series
Lecture Notes in Computer Science (LNCS). Previous proceedings
appeared as LNCS Volumes: 880, 1026, 1180, 1346, 1530, 1738. A
list of topics of interest along with detailed instructions for
submitting a paper can be found at the conference web site at
www.cse.iitd.ernet.in/~fsttcs20/
ACSAC,
16th Annual Computer Security Applications Conference, Sheraton
Hotel, New Orleans, Louisiana, USA, December 11-15, 2000. [posted
here 3/14/00]
[update 9/30/00: The advance program has been published at
www.acsac.org. This year’s
distinguished speaker is Dr. Eugene H. Spafford, and the invited
essayist is Dr Butler Lampson.]
The following topic areas are of potential interest to ACSAC.
Internet technologies |
Intrusion detection and
response / audit and audit reduction |
Mobile computing |
Network management and smart
card applications |
Electronic commerce |
Incident response planning -
governmental and other perspectives |
Legal and ethical concerns
over protecting intellectual property |
New paradigms for protecting
electronic intellectual capital |
Software safety and program
correctness |
Crypto, key management, and
digital signature applications |
Security in health care and
law enforcement |
Defensive information warfare |
Securing very high-speed
telecommunications (e.g., ATM) |
|
We encourage technical papers that relate to
any of the above topics or other applications of computer security.
Papers will be refereed prior to selection and one author will be
expected to present at the conference. Format of submission is
explained on our web site:
www.acsac.org/sub/PaperSubmission.html. Student papers can
compete for best paper prizes and student conference scholarships
are also provided. Panel discussions are always an important part of
the conference since they promote a lively dialogue with all
attendees and the panel members. Be sure to see our discussion page
at
members.boardhost.com/ACSACPanels/ If you have an idea for a
panel or forum, see our web site for details:
www.acsac.org/sub/panels/PanelsFora.html Again this year we
will have a track devoted to actual applications where real world
problems have been solved. Vendors, systems integrators, and users
can share knowledge and we will also have a display area to
complement this portion of the conference. For details, see our web
site:
www.acsac.org/sub/casestudies.html. Tutorials are either full
day (6instruction hours) or half day (3 instruction hours). For
details, see our web page at
www.acsac.org/sub/tutorials/tutsub.html Got a question? See the
FAQ on our web page at www.acsac.org,
or email Publicity_Chair@acsac.org.
INDOCRYPT'2000,
First International Conference on Cryptology in India, Indian
Statistical Institute, Calcutta, India, December 10-13, 2000.
(Submissions due: August 10, 2000) [posted here 3/4/00]
Original papers on all technical aspects of cryptology are
solicited. Please see the conference web page at
www.isical.ac.in/~indocryptr for paper submission details.
Privacy'2000 Information &
Security in the Digital Age, Ohio Supercomputer Center, Columbus,
Ohio, USA, November 29, 2000. [posted here: 3/4/00].
The Technology Policy Group at the Ohio Supercomputer Center will be
hosting a conference entitled Information & Security in the Digital
Age. Privacy2000 is a follow-up to last year's groundbreaking Ohio
Business Privacy Forum, the inaugural event in the TPG's Technology
in Business Series (see
www.osc.edu/techseries/ for information on the 1999 conference).
Expected speakers include Professor Peter P. Swire, Chief Counselor
of Privacy for the Office of Management and Budget for the United
States; Jason Catlett, President Junkbusters; in addition, we are
putting together a moderated roundtable to be televised on public
television. Through interactive workshops and panels, we seek to
inform business, industry, medical and legal personal, government,
and the public on vital privacy issues and possible solutions. We
expect this year's attendance to be between 250-300. For more
information, contact Mike Zandpour at
Zandpour@osc.edu
(614-92-6477).
ICNP'2000
The Eighth International Conference on Network Protocols, Osaka,
Japan, November 14-17, 2000. [posted here 7/30/00]
ICNP deals with all aspects of communication protocols, from design
and specification, to verification, testing, performance analysis,
and implementation. Protocol functions of interest include network
access, switching, routing, flow and congestion control, multimedia
transport, wireless and mobile networks, network security, web
protocols and applications, electronic commerce, network management,
interoperability, internetworking, home computing and networks and
digital broadcasting. See the conference web page at www-ana.ics.es.osaka-u.ac.jp/icnp2000/
for more information.
LCN'2000
The 25th Annual IEEE Conference on Local Computer Networks, Tampa,
FL, USA, November 8-10, 2000. [posted here 7/30/00]
The IEEE LCN conference is the premier conference on leading edge
and practical computer networking. The emphasis of this conference
is on practical solutions to important problems in computer
networking. Topics of interest include: Local Area Networks, Home
Networks, Wireless Networks, Storage Area Networks, Optical
Networks, Real-time Networks, Active Networks, ATM, Gigabit
Ethernet, LAN/WAN Internetworking, DSL Technologies, Network
Management, Network Security, Network Reliability, Multicasting,
Enabling QoS in High-Speed Networks, Always On / Always Connected,
Internet / Intranet, Anything-over-IP, IP-over-Anything, Performance
Evaluation, and Protocol Design and Validation. More information
can be found on the conference web page at
www.ieeelcn.org.
NGC2000 The 2nd International Workshop on Networked Group
Communication, Stanford University, Palo Alto, California, USA,
November 8-10, 2000. [posted here 5/29/2000]
The aim of the Workshop is to allow researchers and practioners to
present the design and implementation techniques for networked group
communication. The focus of the Workshop is strictly on multicast
and networked group communication. This Workshop is the second and
only international event in this area (first workshop was in Pisa,
Italy, in November 1999). Authors are invited to submit papers on
any issue related to networked group communication, including but
not limited to:
- multicast congestion control
- multicast routing, naming, address allocation
- scalability in multicast services
- reliable and semi-reliable multicast protocols
- novel multicast architectures
- multicast security
- multicast deployment related issues
- multicast over heterogeneous media
- multipeer applications (distributed interactive apps,
games, DIS)
- QoS issues with multicast
- Pricing and economic model for multicast traffic
- group management techniques
- network engineering for multicast services
Information on submission of papers, along with additional
information on the conference can be found at the conference web
site at
www.cs.ucsb.edu/ngc2000
WSPEC'00,
1st Workshop on Security and Privacy in E-Commerce, November 4,
2000, Athens, Greece. Held in conjunction with the ACM Conference on
Computers and Communications Security (ACM-CCS'00) [posted here
3/20/00]
The First Workshop on Security and Privacy in E-Commerce seeks to
bring together practitioners and researchers to address the
real-world security and privacy concerns in e-commerce. We are
seeking contributions on topics in security and privacy that will
enable the e-commerce systems of tomorrow to be developed more
securely and robustly without compromising individual privacy
rights. The workshop will focus on group discussion and
collaboration in identifying the important problems and potential
solutions in this important topic area. We are seeking research
papers, business case studies, or system designs that address
security and privacy concerns. Topics of interest include:
* anonymizing e-commerce/Web transactions
* component-based software in e-commerce
* databases access control
* denial of service attacks and countermeasures
* detecting anomalous database transactions
* detection and recovery from Internet-based attacks
* e-commerce protocols
* e-commerce systems
* Internet client risks
* malicious software or Trojan functionality
* mobile agents in e-commerce
* novel attacks and countermeasures
* privacy negotiation/bartering
* privacy risks with cookies/tokens/identifiers
* software analysis and certification.
See
www.rstcorp.com/conferences/WSPEC00/ for the official Call For
Papers.
AMOC 2000, Asian International Mobile Computing Conference,
Penang, Malaysia, November 1-3, 2000. [posted here 11/17/99]
This conference will provide a platform for researchers and experts
primarily from the Asian region to meet and discuss current issues
in this field. The focus on Asia is important because there are
unique regional issues not given attention in typical international
conferences, where technological issues in developed nations receive
centre stage. These unique issues include different infrastructural
and economic requirements; the effect of a more diverse
socio-economic environment on technological specifications; the
wider-ranging impact of wireless communication in rural areas and
the great interest in the rapid deployment of cutting edge
technology due to the high progress rate of technological
implementation in many Asian countries. A complete list of topics
and guidelines for submissions is given on the conference web site
at
www.fsktm.um.edu.my/amoc/, or send email to amoc-submission@fsktm.um.edu.my.
CCS-2000,
7th ACM Conference on Computer and Communication Security, November
1-4, 2000, Athens, Greece. [posted here 11/11/99]
for submission to the 7th ACM Conference on Computer and
Communication Security. Papers may present theory, technique,
applications, or practical experiences on topics including:
|
*Database Security |
*Authentication and key
management |
|
*New threats and attacks |
*Authorization, access
control, audit |
|
*Privacy and anonymity |
*Cryptographic algorithms,
protocols |
|
*Steganography, watermarking |
*New security architectures |
|
*Secure electronic commerce
|
*Intrusion detection and
response |
|
*Security evaluation |
*Licensing and intellectual
property |
|
*Security education |
*Malicious code and
countermeasures |
Details on instructions for papers and panel proposals can be
obtained from www.ccs2000.org
(USA Mirror site:
cimic.rutgers.edu/~atluri/ccs.html) or from Sushil Jajodia
(jajodia@gmu.edu)
ACM-MM'2000 Eighth ACM International Multimedia Conference, Los
Angeles, CA, USA, October 30-November 3, 2000. [posted here
7/30/00]
Technical issues, theory and practice, artistic and consumer
innovations will bring together researchers, artists, developers,
educators, performers, and practitioners of multimedia. The
technical program will consist of plenary sessions and talks with
topics of general interest in three main tracks: (1) multimedia
processing and coding, including multimedia content analysis,
content-based multimedia retrieval, multimedia security,
audio/image/video processing, compression, etc., (2) multimedia
system support and networking, including network protocols,
Internet, operating systems, middleware, servers, QoS, databases,
thin clients, etc., (3) multimedia tools, end-systems and
applications, including hypermedia systems, user interfaces,
authoring, multi-modal interaction and integration, multimedia
education, design and applications of virtual environments, etc. In
addition to technical papers, there will be panel sessions,
demonstrations, tutorials, and poster sessions. For complete
information on the workshop, see the conference web site at
www.acm.org/sigmm/MM2000
or contact one of the general chairs: Shahram Ghandeharizadeh
(shahram@usc.edu), Shih-Fu
Chang (sfchang@ctr.columbia.edu).
Safecomp'2000
Rotterdam, the Netherlands, October 24-27, 2000. [posted here
7/30/00]
Safecomp is an annual 2.5 days-event reviewing the state of the art,
experiences and new trends in the areas of computer safety,
reliability and security regarding dependable applications of
computer systems. Safecomp focuses on critical computer
applications. It is intended to be a platform for technology
transfer between academia, industry and research institutions.
Papers are invited on all aspects of computer systems in which
safety, reliability and security are important. Industrial sectors
include, but are not restricted to medical devices, avionics, space
industry, railway and road transportation, process industry,
automotive industry, power plants and nuclear power plants. More
information can be found on the conference web page at
www.wtm.tudelft.nl/vk/safecomp2000/
ISW'2000,
Third IEEE Information Survivability Workshop, Boston, MA, USA,
October 24-26, 2000. [posted here 8/2/00]
The Information Survivability Workshops provide a forum for
researchers, practitioners, and sponsors to discuss problems
associated with the survivability of mission-critical systems,
and to identify solutions to these problems. A primary goal of
the workshops is to identify and highlight new survivability
research ideas that can contribute to the protection of critical
infrastructures and critical applications. Another important
goal is to foster research collaboration to improve the
survivability of systems that support our global information
society. Participation in the workshop is BY INVITATION ONLY,
based on the submission of a short position paper (of up to 4
pages in length). The position paper should clearly indicate how
the background or interests of the author(s) would contribute to
the goals of the workshop. We are especially interested in
submissions that either: (a) summarize new research results, (b)
describe dependability and fault-tolerance approaches for
enhancing survivability, (c) summarize case studies or
experience with critical applications, or (d) document relevant
policy or other approaches (such as insurance) that contribute
to the survivability of critical applications. A complete list
of topics of interest and instructions for submitting a position
paper are given on the conference web site at
www.cert.org/research/isw2000/cfp.html, or you may contact
the workshop organizers at
isw-2000@cert.org. |
OSDI'2000
Fourth Symposium on Operating System Design and Implementation, San
Diego, CA, USA, October 23-25, 2000. [posted here 7/30/00]
Co-sponsored by IEEE TCOS and ACM SIGOPS. The goal of the fourth
OSDI is to present innovative, exciting work in the systems area.
OSDI brings together professionals from academic and industrial
backgrounds and has become a premiere forum for discussing the
design, implementation, and implications of systems software. OSDI
takes a broad view of what the systems area encompasses and seeks
contributions from all fields of systems practice, including:
operating systems, networking, distributed systems, parallel
systems, mobile systems, embedded systems, and the influence of
hardware developments on systems and vice-versa. For more
information, see the symposium Web site,
www.usenix.org/events/osdi2000/, or e-mail
osdi2000chairs@usenix.org.
PROMS2000 Protocols for Multimedia Systems, Cracow, Poland,
October 22-25, 2000. [posted here 5/29/00]
The PROMS2000 conference is intended to contribute to a scientific,
strategical and practical cooperation between research institutes
and industrial companies in the area of distributed multimedia
applications, protocols, and intelligent management tools, with
emphasis on their provision over broadband networks. An extensive
list of topics of interest, along with instructions for submitting a
paper, can be found on the conference web page at
PROMS2000.kt.agh.edu.pl/
Mathematical Sciences Research Institute
Number-Theoretic Cryptography Workshop, Berkeley, CA, USA, October
16-20, 2000. [posted here: 7/30/00].
Organizers: Eric Bach, Dan Boneh, Cynthia Dwork, Shafi Goldwasser,
Kevin McCurley, and Carl Pomerance.
This workshop will focus on number-theoretic aspects of
cryptography, and will be cross-cultural, where the the cultures in
question are ``mathematics'' and ``computer science. ''
We will be sufficiently flexible to accommodate anything exciting
that arises between now and the fall of 2000, so any plans are
tentative. We will have several survey talks on the state of the
art of such central topics to number theory in cryptography as:
integer factorization, discrete logarithm algorithms, and elliptic
curves. From the computer science side, we will survey: positive
applications of lattices to cryptography, lattice basis reduction
techniques for cryptanalysis, and "new'' number-theoretic
assumptions in vogue in 2000. A final survey talk will discuss two
historical tracks that met in 1998: practical cryptosystems (RSA,
El-Gamal, OAEP, and Cramer-Shoup), and the theory that lead to
increasingly stronger notions of security and cryptosystems
satisfying these notions (Goldwasser and Micali's construction for
semantic security, Naor and Yung's construction for chosen-ciphertext
security in the pre-processing mode, Dolev, Dwork and Naor's
construction for non-malleability against chosen-ciphertext in the
post-processing mode, and Cramer-Shoup's efficient non-malleable cca-post
construction). The program committee for the cryptography conference
is: Eric Bach, Dan Boneh, Cynthia Dwork, Shafi Goldwasser, Kevin
McCurley, and Carl Pomerance. Additional information about the
conference and registration can be found at
/www.msri.org/calendar/workshops/0001/Algorithmic_Number_Theory/number/
IC3N'2000,
Ninth International Conference on Computer Communications and
Networks, Las Vegas, Nevada, USA, October 16-18, 2000. [posted
here: 7/30/00].
ICCCN is a major international forum to present original and
fundamental advances in the field of Computer Communications and
Networks. It also serves to foster communication among researchers
and practitioners working in a wide variety of scientific areas with
a common interest in improving Computer Communications and
Networks. Topics of interest include:
* Optical Communication Networks Wireless/Mobile/Satellite Comm
Networks
* ATM Networking Internet Services/Applications
* Wireless Multimedia Applications Real-time Communications
* Quality of Services (QoS) Issues LAN/WAN Internetworking
* Network Interoperability Personal Communication Services
* Network Control Management Broadband Networks
* Intelligent Networks Multicast and Routing Protocols
* Network Security Media Access Control/Mobility Algorithms
* Network Reliability High Speed Network OAM/Protocols
* Video-on-Demand Data Traffic Engineering
* Network Management/Billing Global Infrastructure Network
Evolution
* Network Processor Technology Performance Modeling/Analysis
* Communication Software Protocol Design/Validation/Testing
* Networked Databases Network Architectures
* Terabit optical switching/routing architectures and signaling
More information can be found on the conference web site at
icccn.cstp.umkc.edu.
NORDSEC'2000, Fifth Nordic Workshop on Secure IT Systems -
Encouraging Cooperation, Reykjavik, Iceland, October 12-13, 2000.
[posted here 3/14/00]
The NORDSEC workshops were started in 1996 with the aim to bring
together researchers and practitioners within IT security in the
Nordic countries. These workshops have remained a forum for
co-operation between the Nordic research organizations, industry and
the computer societies. The emphasis of the workshop is to encourage
interchange and cooperation between the research community and the
industrial and software development community. The theme of the
workshop is applied security, i.e., all kinds of security issues for
all kinds of information technology systems. We are in particular
looking for contributions that deal with technology transfer and
application of research in development. Furthermore, this year's
NORDSEC will look more specifically at several Special Topics that
are closely related to Computer Security, but are not often
discussed in the same forum: Software Engineering, Virus Protection,
and Privacy Protection. Details are to be found on the conference
website at
www.ru.is/nordsec2000/
SOFTCOM'2000,
Eighth International Conference on Software, Telecommunications and
Computer Networks (co-sponsored by the IEEE Communications Society),
held aboard the luxury ship "Marko Polo", October 10-14, 2000.
[posted here 7/30/00].
SoftCOM 2000 provides an open forum for communication technology
researchers and engineers to discuss new and emerging systems,
standards and services, and their applications in telecommunication
and information systems. Topics to be addressed include, but are not
limited to the following:
* Telecommunication Software Production, Tools, Evaluation and
Languages
* Object and Component Technologies in Telecommunication
Software
* Telecommunication Services Design and QoS
* Internet Environments and Service
* IP Based Networks and Services
* High-Speed Protocols and Networks
* Wireless Communications
* Multimedia Systems and Services
* Computer Telephone Integration
* Information Security
* AI and Recognition Methods
* Virtual Environments
* Computer Methods in Biomedicine
* Electromagnetic Compatibility
More information can be found on the conference web site at
www.fesb.hr/SoftCOM/2000/NS/Call_For_Papers.htm
DISC'2000, 14th International Symposium on DIStributed
Computing, Toledo, Spain, October 4-6, 2000. [posted here January
27, 2000].
Original contributions to theory, design, analysis, implementation,
or application of distributed systems and networks are solicited.
Topics of interest include, but are not limited to: distributed
algorithms and their complexity, fault-tolerance of distributed
systems, consistency conditions, concurrency control, and
synchronization, multiprocessor/cluster architectures and
algorithms, cryptographic and security protocols for distributed
systems, distributed operating systems, distributed computing issues
on the internet and the web , distributed systems management,
distributed applications, such as databases, mobile agents, and
electronic commerce, communication network architectures and
protocols, specification, semantics, and verification of distributed
systems. A "brief announcement track" has been set up for ongoing
work for which full papers are not ready yet or recent results
published elsewhere are suitable for submission as brief
announcements. More information on submissions can be found at the
conference web page at is available at
www.disc2000.org/
ECC'2000 The 4th
Workshop on Elliptic Curve Cryptography, University of Essen, Essen,
Germany, October 4-6, 2000. [posted here: 3/4/00].
ECC' 2000 is the fourth in a series of annual workshops dedicated to
the study of elliptic curve cryptography and related areas. The main
themes of ECC'2000 will be:
* The discrete logarithm and elliptic curve discrete logarithm
problems.
* Provably secure discrete log-based cryptographic protocols
for
encryption, signatures and key agreement.
* Efficient software and hardware implementation of elliptic
curve cryptosystems.
* Deployment of elliptic curve cryptography.
There will be approximately 15 invited lectures (and no contributed
talks), with the remaining time used for informal discussions. There
will be both survey lectures as well as lectures on latest research
developments. A list of confirmed speakers can be found on the
conference web page (see below). If you did not receive this
announcement by email and would like to be added to the mailing list
for the second announcement, please send email to ecc2000@math.uwaterloo.ca.
The announcements are also available from the web sites:
www.cacr.math.uwaterloo.ca and
www.exp-math.uni-essen.de/~galbra/ecc2000.html
ESORICS
2000, 6th European Symposium on Research in Computer Security
Toulouse, France, October 4-6, 2000. [posted here 11/4//99]
We solicit papers describing original ideas and new results on the
foundations and applications of computer security. The primary focus
is on high-quality original unpublished research, case studies and
implementation experiences. We encourage submissions of papers
discussing industrial research and development. Suggested topics
include but are not limited to:
|
* Distributed Systems |
* Theoretical Foundations of Security
|
|
* Operating Systems Security |
* Telecom. and High Speed Network Security
|
|
* Network Security |
* Security and mobile systems |
|
* Internet Security |
* Security in Data and Knowledge Bases
|
|
* Electronic Commerce |
* Development of Secure Systems |
|
* Security of small systems |
* Management of Secure Systems |
|
* Intellectual Property Protection
|
* Multimedia and Digital Libraries
|
|
* Security Evaluation |
* Security versus other Requirements
|
|
* New applications of Cryptography
|
|
Details on submissions of papers and panel proposals and other
information available at
www.cert.fr/esorics2000/ and from
Frederic.Cuppens@cert.fr
.
RAID' 2000 Third
International Workshop on the Recent Advances in Intrusion Detection
(in conjunction with ESORICS 2000), Toulouse, France, October 2-4,
2000. [posted here February 7, 2000]
This workshop, the third in an ongoing annual series, will bring
together leading figures from academia, government, and industry to
discuss state-of-the-art intrusion detection technologies and issues
from the research and commercial perspectives. RAID 2000 will
welcome full papers in addition to extended abstracts and panel
proposals, and has organized peer review to publish hardcopy
proceedings. Regarding paper submissions, submissions to RAID 2000
can be either a full-length paper or an extended abstract. Full
papers are intended for the presentation of mature research results,
while extended abstracts are intended for work-in-progress
presentations. It is expected that more time will be allocated to
full paper presentations. Panel submissions are also sought in the
same areas. This year, we are emphasizing the following topic areas
(see the workshop web page for a more detailed list):
|
* Assessing, measuring and
classifying intrusion-detection systems |
|
* IDS in High Performance and
Real-Time Environments |
|
* Vulnerabilities and Attacks |
|
* IDS Integration |
|
* Innovative Approaches |
|
* Practical Considerations
|
Full papers must be limited to 6000 words,
full page figures being counted as 300 words. Authors should follow
the instructions given by Springer Verlag (www.springer.de/comp/lncs/authors.html)
for the preparation of the manuscript. Extended abstracts must be
original contributions and are limited to 1200 words in length.
Panel proposals must be limited to 400 words in length. Please see
the workshop web page at
www.raid-symposium.org/Raid2000/cfp2000.html for a detailed list
of topics of interest along with instructions for authors.
ISSE' 2000, Barcelona, September 27-29,
2000. [posted here 1/27/00].
ISSE is the European institution for the presentation and discussion
of technical, organizational, legal and political concepts for
information security and data protection. The conference provides
presentations and panel discussions about existing and future
information security solutions for large scale corporations,
enterprises, especially SMEs, commerce, financial & public sector,
healthcare, legal practitioners and security professionals. An
extensive list of topics and submission instructions are given in
the full
call-for-papers.
Workshop on Telecommunications Security,
The University of Tulsa, Tulsa, Oklahoma, USA, September 27-28,
2000. [posted here 6/9/00]
The purpose of the workshop is to identify the security issues and
solutions emerging as telecommunications and information networks
converge and support telephony and data services. Of particular
interest are issues related to convergence, the Next Generation
Network, active networks, voice over Internet Protocol (IP), unified
messaging systems, multi-service networks, and universal broadband
access. The workshop will integrate the needs of the industry, the
current state of research in academia, and the relevant government
research programs. Presentations are solicited in three areas:
1.How will the telecommunications world change and what security
issues will arise?
2.What is the state of current telephony security research?
3.What is the appropriate role of government in addressing these
problems?
Industry representatives are encouraged to submit position papers on
their view of the emerging public and private infrastructures and
any proposed architectures, especially security architectures, to
provide services over those infrastructures. Descriptions of current
and future security threats, vulnerabilities, and requirements are
encouraged. Academic representatives are encouraged to submit papers
of their current security research in public and private
telecommunications networks. Of particular interest are the areas of
fraud prevention, intrusion detection, availability solutions,
privacy, and secure management schemes. Differences between security
issues and solutions for emerging telecommunications networks,
computer data-oriented and infrastructure operations networks should
be emphasized. This is a self-supporting workshop, and each
attendee's (including speakers) organization is expected to provide
the necessary support for attendance. All attendees are expected to
participate in the discussions and presentations. There will be
relatively few slots available for those who are not presenting. For
additional information on submissions , please call Dr. Paul Brusil
at 978-922-6586 or visit
niap.nist.gov/telecomm/
EDOC'2000
Fourth International Enterprise Distributed Object Computing
Conference, Makuhari, Japan, September 25-28, 2000 [posted here
7/30/00]
The goal of EDOC 2000 is to provide a forum for leading researchers
and industry experts to discuss problems, solutions, and experiences
in meeting practical enterprise computing needs. EDOC 2000 will
include industrial experience sessions for which practitioners are
encouraged to submit experience reports stating the problems
addressed, methods used, results and
lessons learned. EDOC 2000 addresses generic issues relating to the
context in which enterprise systems are built and deployed as well
as the distributed object and component technologies needed to
deploy systems for specific application domains. EDOC 2000
encourages submissions on applications and industry experience in
such domains as electronic commerce, enterprise application
integration, supply-chain management, and web-based distributed
applications. More information can be found on the conference web
site at
www.iijima.ae.keio.ac.jp/edoc/cfp.html or send email to
edoc-info@soft.flab.fujitsu.co.jp.
WISAC Workshop on Innovations in Strong Access Control,
Monterey, California, September 25-27, 2000 [posted here 6/16/00]
WISAC is an invitational workshop whose goal is to increase the
understanding of the different communities with an interest in
Strong Access Control (SAC) technology; to develop statements of
requirements for communities by bringing together customers with a
need for SAC solutions with vendors, developers and researchers; and
to determine the next steps for growth of SAC technology. WISAC is
an invitational workshop. This format has been selected to keep the
workshop size down and to keep the discussions focused. To request
an invitation, please submit (by 11:59 PM PDT, Monday, June 26,
2000) a description of your organization and its involvement with or
needs for information technology for security policy enforcement to
faigin@aero.org. Please mark
this submission clearly as WISAC RFI. More information can be found
at the workshop web page at
cisr.nps.navy.mil/events/WISAC/WISAC_index.html
CARDIS 2000,
IFIP CARDIS 2000 Fourth Smart Card Research and Advanced Application
Conference HP Labs, Bristol, UK, September 20-22, 2000. [posted
here: 11/8/99].
Smart cards or IC cards offer a huge potential for information
processing purposes. The portability and processing power of IC
cards allow for highly secure conditional access and reliable
distributed information systems. The research challenges range from
electrical engineering on the hardware side to tailor-made
cryptographic applications on the software side, and their
synergies. The CARDIS conferences aim to bring together researchers
who are active in all aspects of design of IC cards and related
devices and environment, such as to stimulate synergy between
different research communities and to offer a platform for
presenting the latest research advances. Additional information at
www.cardis.org.
PKS' 2000 Catch the Perfect Wave of the New Mobile World, San
Jose, CA, USA, September 19-21, 2000. [posted here 7/30/00]
PKS 2000 is a forum where developers, security architects, product
managers and business leaders will learn about and discuss such
topics as: What new business opportunities will arise from the
convergence of wireless voice communication, remote data access and
the Internet? Which of the emerging standards and protocols will
drive the next generation wireless data systems and services? How
are powerful new public-key systems, such as the Elliptic Curve
Cryptosystem, facilitating the new world of wireless/mobile
e-business? See the conference web site at
www.certicom.org/sitemap_frames/news_pks_fs.html for more
information the presentation topics.
NSPW' 2000
New Security Paradigms Workshop 2000, Ballycotton, County Cork,
Ireland, September 19-21, 2000. [posted here 1/27/00]
For eight years, the New Security Paradigms Workshop has provided a
productive and highly interactive forum in which innovative new
approaches (and some radical older approaches) to computer security
have been offered, explored, refined, and published. The workshop
offers a constructive environment where experienced researchers and
practitioners work alongside newer participants in the field. The
result is a unique opportunity to exchange ideas. Because these are
new paradigms, we cannot predict what subjects will be covered. Any
paper that presents a significant shift in thinking about difficult
security issues or builds on a previous shift will be welcomed. To
participate, please submit your paper, justification, and attendance
statement, preferably via e-mail, to both Program Chairs -- Cristina
Serban (cserban@att.com) and Brenda Timmerman (btimmer@ecs.csun.edu)
-- by Friday, March 31, 2000 (hardcopy submissions must be received
by Friday, March 24, 2000). Further details on the required format
of submissions are available on the NSPW web site at
www.nspw.org/
International School on
Foundations of Security Analysis and Design, September 18-30,
2000, Bertinoro, Italy.
The school covers two weeks (from Monday 18 to Saturday 30,
September 2000)and alternates four lecturers per week on
monographic courses of about 6/8 hours each. Saturdays are
reserved for presentations given by those participants that
intend to take advantage of the audience for discussing their
current research in the area. The school is organised at the
Centro Residenziale Universitario of the University of Bologna,
situated in Bertinoro, a small village on a scenic hill with a
wonderful panorama, in between Forli' and Cesena (about 50 miles
south-east of Bologna, 15 miles from the Adriatic sea). The
school offers eight main courses, each composed of 3/4 seminars
(on different days), each seminar of 2 hours. In alphabetic
order, the lecturers of the eight main courses are the
following: Li Gong (Javasoft - Sun Microsystems, Palo Alto),
Java Security; Andrew D. Gordon (Microsoft Research, Cambridge)
Process Calculi for Security and Mobility; Roberto Gorrieri
(University of Bologna)Classification of Security Properties;
Joshua Guttman (Mitre, Bedford) Security Goals: Packet
trajectories and strand spaces; Peter Ryan (SRI, Cambridge)
Mathematical Models of Computer Security; Pierangela Samarati
(University of Milano)Access Control: Policies, Models,
Architectures and Mechanisms; Paul Syverson (Naval Research
Lab, Washington) The Logic of Security Protocols; Moti Yung (CertCo
Inc., New York)Cryptographic Technology and Protocols in
E-Commerce. Further short courses will be given by: Carlo Blundo
(Univ. of Salerno)Introduction to Cryptography; Luigia Carlucci
Aiello and Fabio Massacci (Univ. of Roma "La Sapienza")Planning,
Logic Programs and Security Protocols; Pierpaolo Degano (Univ.
of Pisa)Control Flow Analysis for security; Rocco De Nicola
(Univ. of Firenze) Testing for spi Processes; Fausto
Giunchiglia (Univ. of Trento)Model Checking Using a Logic of
Belief;- Roberto Segala (Univ. of Bologna) Applied
Cryptography. More information can be foune on the course web
page at
www.cs.unibo.it/~gorrieri/fosad. |
Biometric Consortium 2000 Conference "Biometric
Technologies...Emerging into the Mainstream", NIST, Gaithersburg,
MD, USA, September 13-14, 2000. [posted here 8/ 2/00]
Some of the topics that will be examined include:
- What are the technological issues and challenges looming
ahead?
- What are the user requirements?
- What standards are available or are being developed?
- How is interoperability achieved?
- How assurance is achieved?
-What novel applications of biometrics does the industry
envision for secure personal authentication and identification?
More information on the conference can be found at
www.nist.gov/bc2000, or
contact Fernando L. Podio of the Information Technology Laboratory
of NIST at bc2000@biometrics.org or at (301) 975-2947.
ASA/MA 2000 Second International Symposium on Agent Systems and
Applications, Fourth International Symposium on Mobile Agents, ETH
Zurich, Switzerland, September 13-15, 2000. [posted here 1/ 27/00]
Areas of interest are: agent applications, agent systems,
multi-agent systems, mobile agents, and mobile code. Possible
topics include: development tools, security, scalability, fault
tolerance, communication, collaboration and coordination, languages,
standards, design patterns, applications in mobile computing and
wireless networks, applications in electronic markets and commerce,
applications in active networks, market-based control, resource
management, agent societies and ensembles, World-wide-web
integration. Submission guidelines are at
www.inf.ethz.ch/ASA-MA/submit.html; additional workshop
information can be found at:
www.inf.ethz.ch/ASA-MA/
or
www.cs.dartmouth.edu/ASA-MA/
ICECCS'2000 Sixth IEEE International Conference on Engineering
of Complex Computer Systems, Boissonade Tower, Ichigaya Campus,
Hosei University, Tokyo, Japan, September 11-15, 2000. [posted
here 1/27/00]
The goal of this conference is to bring together industrial,
academic, and government experts, from a variety of user domains and
software disciplines, to determine how the disciplines' problems and
solution techniques interact within the whole system. The scope of
interest includes long-term research issues, near-term complex
system requirements and promising tools, existing complex systems,
and commercially available tools. Papers are solicited in all areas
related to complex computer-based systems, including the causes of
complexity and means of avoiding, controlling, or coping with
complexity. Topic areas include, but are not limited to:
- System and Software Architecture and Systems Engineering
- Tools, Environments, and Languages for Complex Systems
- Complex Data Management, including Distributed, Real-Time,
and Mobile Databases
- Formal Methods and Approaches to Achieving Dependability in
Complex Systems
- Integration of Heterogeneous Technologies
- Software and System Development Processes for Complex
Systems
- Human Factors and Collaborative ("Groupware") Aspects
- Interoperability and Standardization
- System and Software Safety and Security
Detailed instructions for submitting a paper, a panel proposal, or a
tutorial proposal are given on the conference web page at
www.polimi.it/iceccs2000.
WECS'2000 Practicum Workshop on Education in Computer Security,
Center for Information Systems Security Studies and Research, Naval
Postgraduate School, Monterey, California, USA, September 11-13,
2000.
This workshop helps those new to computer security teach a
well-organized comprehensive Computer and Network Security course or
update CS and IT courses with relevant security information. The
workshop will clarify confusing topics and will address important
information often not found in introductory texts. The workshop is
organized and conducted by experienced security educators. Topics
covered will include:
- A scientific or engineering approach to security (as opposed to
patches and ad hoc solutions).
- Debunking many popular computer security and cryptography
myths.
- Many real life simple and beautiful examples that illustrate
important concepts.
- Subtle important issues that are often overlooked or
misunderstood.
- Analogies and projects that are useful in teaching difficult
topics.
- Ideas for demonstrations and laboratory exercises.
More information can be found on the workshop web page at
cisr.nps.navy.mil/events/wecs/wecs2000_announce.html
ISSSTA
2000, IEEE Sixth International Symposium on Spread Spectrum
Techniques and Applications, Sheraton Tara, Parsippany, NJ, USA,
September 6-8, 2000. [posted here: 9/3/99].
Prospective authors are cordially invited to submit papers in
particular but not exclusively on the following topics:
THEORY (Spreading codes and sequences, waveform design,
spectral shaping; synchronization, acquisition, tracking; coding and
modulation for SS; direct sequencing, frequency hopping, hybrid
concepts; digital and analog SS signal processing, estimation
theory; CDMA, SSMA, interference cancellation, joint (multiuser)
detection, capacity; information security, ECM, EVCCM, LPI; antennas
for SS, propagation effects, channel modelling, anti-fading
techniques, RAKE; coexistence SS/other systems, overlay systems,
EMC; networking; power control, AGC, amplifier nonlinearities.
SYSTEM DESIGN: Tools for SS system design,
modeling and simulation, application of AI; frequency allocation;
networking aspects, handover, dynamic channel allocation; SS
techniques in education. COMMUNICATIONS: Mobile &
cellular, CDMA, SSMA, satellite; digital broadcasting; power line
communications; radio relay; optical SS communications; wireless
LANs; SS bus systems, consumer applications, remote control;
packetized data & voice networks. NAVIGATION, RANGING,
CHANNEL SOUNDING: GPS, GLONAS, radar, lidar, pulse
compression; wideband channel sounding; deep-space applications;
correlation techniques to measure flow and speed; SS time domain
reflectometry. DEVICES AND CIRCUITS:
ASICs for SS, chip sets, digital correlators, frequency
synthesizers, all digital transmitter and receiver implementations,
SAW, CCD, neural networks. Please submit five double-spaced copies
of original papers to the ISSSTA 2000 Technical Program Committee
Chairman as per schedule. Detailed submission instruction and other
information can be found on the conference web page at:
www.ISSSTA2000.org.
CoopIS'2000
In Cooperation with VLDB'2000, Neptune Hotel, Eilat, Israel,
September 6-8, 2000. [posted here 5/29/2000]
CoopIS'2000 is the seventh conference in the series and the fifth
conference organized by the International Foundation on Cooperative
Information Systems (IFCIS). It is sponsored by the International
Foundation in Cooperative Information Systems (IFCIS), and the IBM
Research Laboratory in Haifa (other sponsors pending). It replaces
the erstwhile international workshops on Interoperability in
Multidatabase Systems (IMS) and the conference series on Cooperative
Information Systems (CoopIS & ICICIS). The conference web page is
at
www.haifa.il.ibm.com/coopis2000.html
MDDS'2000
Third International Workshop on Mobility in Databases and
Distributed Systems (in conjunction with DEXA'2000), Greenwich, UK,
September 6-8, 2000. [posted here 7/30/2000]
The focus of this workshop is on mobility issues in distributed
systems and databases. The objective of this workshop is to bring
together researchers and practitioners with mobile networking
background, database research interests, advanced applications and
distributed computing systems research and development skills to
discuss all aspects of emerging mobile computing paradigm. Both the
theoretical papers and papers reporting implementation and practical
results will be presented. Details about DEXA'2000 can be found at
www.dexa.org; the MDDS'2000
workshop web page is at
www.ct.monash.edu.au/DPMC/mdds/mdds2000/
DEXA2000 11th International Conference and Workshop on Database
and Expert Systems Applications, London - Greenwich, United Kingdom,
September 4- 8, 2000. [posted here 5/29/00]
The aim of DEXA 2000 is to present both research contributions in
the area of data and expert systems and a large spectrum of already
implemented or just being developed applications. DEXA will offer
the opportunity to extensively discuss requirements, problems, and
solutions in the field. The workshop and conference should inspire a
fruitful dialogue between developers in practice, users of database
and expert systems, and scientists working in the field. The
conference web page is at
www.dexa.org/dexa00/
NBIS2000 The Third International Workshop on Network-Based
Information Systems in conjunction with the 11th International
Conference on Database and Expert Systems Applications (DEXA'2000),
Greenwich, United Kingdom, September 4-8, 2000. [posted here
5/29/00]
The main objective of this workshop is to bring together researchers
from both network systems and information systems with the aim of
encouraging the exchange of ideas and experience between these two
communities. Topics of interest include but are not limited to:
* Communication Networks and Protocols
* Internet Applications
* Web-based database systems
* Distributed Cooperating Information Systems
* Groupware
* Distributed and Parallel Algorithms
* Multimedia Computing and Communication Systems
* Mobile Computing Systems
* Distributed Object-Oriented Systems
* Interoperable Systems
* Electronic Commerce
* Security and Privacy
* Distributed Fault-Tolerant Systems
More information can be found on the conference web page at
www.takilab.k.dendai.ac.jp/conf/dexa2000/nbis/
CRYPTO 2000,
Santa Barbara, California, USA, August 20-24, 2000. [posted here
5/29/00]
Crypto 2000 is organized by the International Association for
Cryptologic Research (IACR), in cooperation with the IEEE Computer
Society Technical Committee on Security and Privacy, and the
Computer Science Department of the University of California, Santa
Barbara. For other information contact
Mathew Franklin, General Chair, Crypto 2000
Xerox Parc
3333 Coyote Hill Road
Palo Alto, CA 94304 USA
Phone: 650-812-4228 ; FAX: 650-812-4471 ;
E-mail:
crypto2000@iacr.org
CHES'2000,
Workshop on Cryptographic Hardware and Embedded Systems, Worcester
Polytechnic Institute, Worcester, Massachusetts, USA., August 17-18,
2000. [posted here 2/4/00]
The focus of this workshop is on all aspects of cryptographic
hardware and embedded system design. Of special interest are
contributions that describe new methods for efficient hardware
implementations and high-speed software for embedded systems. The
topics of interest include but are not limited to:
* Computer architectures for public-key cryptosystems
* Computer architectures for secret-key cryptosystems
* Reconfigurable computing and applications in
cryptography
* Cryptographic processors and co-processors
* Modular and Galois field arithmetic architectures
* Tamper resistance on the chip and board level
* Architectures for smart cards
* Tamper resistance for smart cards
* Efficient algorithms for embedded processors
* Special-purpose hardware for cryptanalysis
* Fast network encryption
* True and pseudo random number generators
If you want to receive emails with subsequent Call for Papers and
registration information, please send a brief mail to
ches@ece.orst.edu. Complete
instructions for authors can be found on the workshop web page at
www.ece.WPI.EDU/Research/crypt/ches. You may also contact the
Program Chairs Cetin Kaya Koc
(Koc@ece.orst, +1 541 737 4853) or Christof Paar
(christof@ece.wpi.edu, +1
508 831 5061).
USENIX, 9th
USENIX Security Symposium, Denver, Colorado, USA, August 14-17,
2000. [posted here: 9/20/99].
The USENIX Security Symposium brings together researchers,
practitioners, system administrators, system programmers, and others
interested in the latest advances in security and applications of
cryptography. Please see the conference web site at
www.usenix.org/events/sec2000 for more information on the
symposium, a detailed list of topics of interest, and the procedure
for submitting a paper.
SAC'2000, Seventh Annual
Workshop on Selected Areas in Cryptography, August 14-15, 2000,
Waterloo, Ontario, Canada. [posted here 3/20/00]
Workshop Themes: - Design and analysis of symmetric key
cryptosystems.
- Primitives for private key cryptography, including block and
stream ciphers, hash functions and MACs.
- Efficient implementations of cryptographic systems in public
and private key cryptography.
- Cryptographic solutions for web/internet security.
Details on submitting a paper are given on the conference web page
at
www.cacr.math.uwaterloo.ca/conferences/2000/SAC2000/announcement.html
4th International Workshop on Discrete
Algorithms and Methods for Mobile Computing & Communications,
Boston, Massachusetts, USA, August 11, 2000. In conjunction with ACM
MobiCom 2000. [posted here 1/27/00].
The introduction of mobility raises a number of new research issues.
This workshop is devoted to discrete algorithms and methods in the
context of mobile and wireless computing and communications.
Contributions are solicited in all areas related to mobile computing
and communications where discrete algorithms and methods are
utilized, including, but not limited to:
* distributed algorithms frequency allocation
* scheduling location tracking
* site allocation multi-hop packet radio networks
* wireless networks synchronization
* cryptography and security error correcting codes
* handover (handoff) telecommunications
* modeling optimization
* routing satellite communication
Instructions for submitting a paper or a panel proposal are given on
the conference web page at
www.cis.udel.edu/~elloyd/dialm.d/home.htm. Since deadlines
overlap, dual submission of papers to MobiCom and DIALM is
encouraged. Any paper accepted for MobiCom will automatically be
removed from consideration for DIALM.
MSWiM'2000, Third ACM
International Workshop on Modeling, Analysis and Simulation of
Wireless and Mobile Systems, in conjunction with MobiCom 2000,
August 6-11, 2000, Boston, MA, USA. [posted here 4/22/00]
This workshop will focus on all aspects of wireless systems,
particularly modeling analysis and simulation in wireless
communication. In its third year, the 2000 International ACM
Workshop on Modeling and Simulation of Wireless and Mobile Systems,
will take place in Boston, MA, just after the International
Conference on Mobile Computing and Networking (MobiCom 2000) to be
held in Boston, August 6-11, 2000. This is an excellent opportunity
to partake in two events covering a wide range of research in
wireless and mobile systems. Authors are encouraged to submit both
theoretical and practical results of significance. Demonstration of
new tools/simulation languages are very welcome. A complete list of
topics of interest, along with directions for submitting a paper are
given on the workshop web page at:
www.tlc.polito.it/mswim
RBAC'2000
Fifth ACM Workshop on Role-Based Access Control, Technical
University of Berlin, Berlin, Germany, July 26-28, 2000. [posted
here 1/27/00]
The ACM workshops on RBAC bring together researchers, developers,
and practitioners to discuss the application of RBAC to both
traditional and emerging systems and the development of new modeling
paradigms for future applications. The workshop invites
participation from the database, network, distributed systems,
operating systems, security and application communities. See the
workshop web page at
www.acm.org/sigsac/rbac2000.html for information on submitting a
paper or panel proposal.
FMCS'2000 Workshop on Formal Methods and Computer Security,
Chicago, Illinois, USA, July 20, 2000. [posted here March 13, 2000]
Computer security protocols are notoriously difficult to get right.
Surprisingly simple problems with some well known protocols have
been found years after the original protocol was published and
extensively analyzed. Our workshop goal is to bring together the
formal methods and security communities. Security is a current hot
topic in the formal methods community, and we hope that this
workshop can help focus these energies. Topics of interest include
descriptive techniques (specification languages, models, logics) and
analysis techniques (model checking, theorem proving, and their
combination), as applied to protocols for authentication, fair
exchange, electronic commerce, and electronic auctions. However,
this list is not exclusive. We particularly want to hear about new
approaches, new problems, new security properties, and new protocol
bugs. Reports on work in progress are welcome. The program of the
workshop will include a keynote address by Doug Tygar, a number of
technical sessions (with talks of about 15-20 minutes duration), and
a panel discussion. An extended abstract (about 5-10 pages)
explaining recent research results or work in progress should be
mailed electronically to fmcs-2000@cs.cmu.edu, to be received by
April 14, 2000. More information can be found at the conference web
site at
www.cs.cmu.edu/~veith/fmcs/
PODC'2000,
Nineteenth Annual ACM SIGACT-SIGOPS Symposium on Principles of
Distributed Computing, Portland, Oregon, USA, July 16-19, 2000.
[posted here: 8/30/99].
Research contributions on the theory, design, specification,
implementation or application of distributed systems are solicited.
This year PODC will be held in conjunction with a workshop on
middleware (information concerning the workshop will be posted on
the PODC web site once it is available). In light of this, PODC
especially encourages papers addressing distributed computing issues
in building and using middleware. Topics of interest include, but
are not limited to:
* distributed algorithms and their complexity,
* specification, semantics and verification of distributed
systems,
* issues relating to the design and use of middleware
platforms,
* fault tolerance of distributed systems,
* cryptographic and security protocols for distributed
systems,
* mobile computing,
* distributed computing issues in the Internet, including the
Web,
* communication network protocols and architectures,
* multiprocessor/cluster architectures and algorithms,
* distributed operating systems and databases,
* consistency conditions, concurrency control and
synchronization,
* distributed object-oriented computing.
Conference presentations will have two formats: "Regular
presentations" of approximately 25 minutes accompanied by papers of
up to 10 pages in the proceedings, and "Brief announcements" of
approximately 10 minutes accompanied by one page abstracts in the
proceedings. Details on the conference and submission procedure can
be found on the conference web site at
www.podc.org/podc2000/,
or contact the program chair, Jim Anderson, by email, anderson@cs.unc.edu,
or phone, 1-919-962-1757.
ACISP'2000, Fifth
Australasian Conference on Information Security and Privacy,
Brisbane, Australia, July 10-12, 2000. [posted here 9/13/99]
Papers pertaining to all aspects of information security and privacy
are solicited. Papers may present theory, techniques, applications
and practical experiences on any relevant topic including:
authentication and identification, database security, mobile
communications security, secure operating systems, security and
cryptography policy, security management, commercial applications,
key management and auditing, secure electronic commerce, security
architectures and models, distributed system security, evaluation
and certification, cryptology, access control, network security,
smart cards, risk assessment and copyright protection. Please see
the conference web page at
www.isrc.qut.edu.au/acisp2K for details.
WITS'2000, Workshop on Issues in the Theory of Security, Geneva,
Switzerland, July 7-8, 2000 [posted here January 27, 2000]
The members of The IFIP WG 1.7 on "Theoretical Foundations of
Security Analysis and Design" will hold their annual workshop as an
open event to which all researchers working on the theory of
computer security are invited. The W/S will be co-located with ICALP
'00 (cuiwww.unige.ch/~icalp/).
Its program will encourage discussions by all attendees, both during
and after scheduled presentations on participants' ongoing work.
Topics of interest include:
* |
formal definition and
verification of the various aspects of security:
confidentiality, integrity, authentication and availability; |
* |
new theoretically-based techniques for the
formal analysis and design of cryptographic protocols and their
manifold applications (e.g., electronic commerce); |
* |
information flow modeling and
its application to the theory of confidentiality policies, |
* |
composition of systems, and
covert channel analysis; |
* |
formal techniques for the
analysis and verification of mobile code; |
* |
formal analysis and design
for prevention of denial of service. |
Details on the conference and submission procedure can be found on
the conference web site at
www.dsi.unive.it/IFIPWG1_7/wits2000.html, or contact the program
chair, Pierpaolo Degano, by email,
degano@di.unipi.it, or
phone, +39 050 887257, or fax, +39 050 887226.
IRISH2000 4th Irish Workshop on Formal Methods National
University of Ireland, Maynooth, July 5-6, 2000. [posted here
5/29/2000]
The fourth in a series of annual Irish Workshops on Formal Methods
will be held in the National University of Ireland, Maynooth. We
are now seeking submissions of work in progress papers in the area
of formal methods, theoretical computer science, and mathematics
covering the topics listed above. There will be opportunity for
these papers to be submitted and reviewed as full papers, after the
workshop has completed. For the theoretical day the Programme
Committee seeks submissions of papers in the general area of formal
methods, theoretical computer science, and mathematics, covering,
but not restricted to, the following topics: formal systems, proof
systems, mathematical models of computing, semantics, tools,
industrial and teaching experiences. For the industrial day it is
planned to offer industry-oriented tutorials. The idea is that these
will provide an introduction to formal methods, and be tailored to
meet specific needs. The conference web site is at
www.cs.may.ie/IWFM00/
CSFW-13,
13th IEEE Computer Security Foundations Workshop, Cambridge,
England, July 3-5, 2000. [posted here: 11/10/99].
This workshop series brings together researchers in computer science
to examine foundational issues in computer security. We are
interested both in new results in theories of computer security and
also in more exploratory presentations that examine open questions
and raise fundamental concerns about existing theories. Both papers
and panel proposals are welcome. Possible topics include, but are
not limited to:
|
*Access Control |
*Authentication |
*Data and System Integrity |
|
*Database Security |
*Network Security |
*Distributed Systems Security |
|
*Anonymity |
*Privacy |
*Security for Mobile
Computing |
|
*Security Protocols |
*Security Models |
*Formal Methods for Security |
|
*Information Flow |
*Executable Content |
|
Workshop attendance is limited to about 40
participants. Complete instructions for submitting a paper or panel
proposal are provided on the workshop web page at
www.csl.sri.com/csfw/
IC'2000, Special session at IC'2000, the First International
Conference on Internet Computing, Monte Carlo Resort, Las Vegas,
Nevada, USA, June 26-29, 2000. [posted here 2/15/00]
This special session, New Paradigms in Computer Security, at IC'2000
is to present recent advances in computer system security. The main
focus will be on new approaches for less vulnerable program
generation and intrusion detection. Papers are solicited on the
topic areas include, but are not limited to:
* Analysis tools |
* Cases in Practice |
* Course or Lab development |
* Distributed System Architecture |
* Emerging Curricula |
* Intrusion Detection System Integration |
* IDS in distributed client-server computing |
* Processor and Software Architecture |
* Standards |
|
Submit extended abstracts in PDF or postscript format, limited to
1200 words in length, to ghlee@iastate.edu. The due date for the
extended abstract is March 17, 2000. For more information on
IC'2000, visit the conference web site at
www.cs.umanitoba.ca/~iwic/.
FIRST'2000, The 12th Annual FIRST Conference on Computer
Security and Incident Handling, Chicago, Illinois, USA, June 25-30,
2000. [posted here: 10/27/99].
The Forum of Incident Response and Security Teams (FIRST,
www.first.org ) brings security
incident response teams together including government, commercial,
and academic organizations. The conference is a five day event, two
days of tutorials and three days of technical sessions including
refereed paper presentations, invited talks, and panel discussions.
The focus of the FIRST'2000 conference is on the most recent
practical advances in computer security in all its aspects. The
Program Committee is soliciting original papers analyzing, among
other topics, methodologies for drafting security policies, recent
intrusion techniques, describing experiences in building incident
response capabilities, working security architectures, pros and cons
of both commercial and experimental pro-active security tools. The
deadline for submissions is NOVEMBER 15, 1999. The full call for
papers is at
www.first.org/conference/2000.
CITSS12
Canadian Information Technology Security Symposium,
Ottawa, Canada, June 19-23, 2000. [posted here 5/29/00]
We invite you to attend Building Trust for a Secure Global
Economy, the 12th Annual Information Technology Security
Symposium. This annual event is sponsored by the Communications
Security Establishment (CSE), a Canadian Federal Government lead
agency responsible for information technology security. This year's
symposium takes you inside some of the most important security
issues facing businesses and governments today. CSE's weeklong
symposium features one and a half days of tutorials, a one-day
plenary session and more than 36 in depth presentations
by Canadian and international experts in their fields. An industry
leading vendor trade show with more than 40 booths completes the
program. Presentations will focus on:
- PKI issues and solutions
- e-commerce/e-business
- Critical Information Infrastructure Protection
- Intrusion detection
- Security in open source software
More info on the symposium web page at
www.cse-cst.gc.ca/cse/english/annual.html
20th Biennial Symposium on Communications, Department of
Electrical and Computer Engineering, Queen's University, Kingston,
Ontario, Canada, May 28-31, 2000. [posted here: 2/8/2000].
This symposium is intended to provide a forum for engineers and
researchers in the area of communications and signal
processing. Original papers are encouraged from new areas of
research on communications, as well as those
traditionally associated with this conference. A complete list of
topics of interest (which includes cryptography and security) as
well as submission instructions is provided on the conference web
page at
www.ece.queensu.ca/dept/sympcomm.html
NCISSE'2000 Fourth Colloquium for Information Systems Security
Education, Washington D.C., USA, May 23-25, 2000. (Papers due March
29, 2000) [posted here February 12, 2000]
It is the task of American higher education to provide an
information-literate work force and to prepare information
technology professionals. To meet this urgent need, higher education
must be informed of the knowledge, skills and attitudes to be taught
in the general curricula and in the information curricula of its
colleges and universities. Industry and government must understand
their role in supporting higher education, not simply expecting
higher education to be responsive and informed about information
security and assurance.
The National Colloquium for Information Systems Security Education
(the Colloquium) is established to serve as a living body to
bring government, industry and academia together to meet those
challenges. This year the colloquium introduces two paper tracks,
one general submission, the other restricted to student
participation. The papers in both tracks should discuss course or
lab development, INFOSEC curricula, standards, existing or emerging
programs, and related issues. This year, we are particularly
interested in addressing the question, "what is academia’s
response to the shortfall of INFOSEC workers?" To achieve this
goal, we are particularly interested in topics such as the
following:
|
* Assessment of need for
information security workers/researchers/faculty
|
|
* Integrating information
assurance topics in existing curricula
|
|
* Experiences with course or
laboratory development
|
|
* Alignment of curriculum
with existing information assurance education standards
|
|
* Emerging programs or
centers in information assurance
|
|
* Late breaking topics (see
the complete call for papers)
|
Papers which fall into the topic areas outlined above are
particularly welcome, although contributions outside those topics
may also be of interest. See the complete
call for papers for more information on submitting a paper, and
the conference web site at
www.infosec.jmu.edu/ncisse/
for general information on the colloquium.
ICCC First International Common Criteria Conference, Baltimore,
Maryland, USA, May 23-25, 2000. [posted here January 27, 2000].
The ICCC will bring together the signatories to the Mutual
Recognition Arrangement, their national implementation scheme
administrators, accredited commercial testing laboratories,
producers and consumers of information technology products,
acquisition authorities and information assurance professionals from
government, industry and academia throughout the world. There will
be four tracks at the ICCC geared towards providing you with the
most up to date, accurate and complete information on the Common
Criteria process. Track A will focus on general information about
the Common Criteria testing programs in countries around the world.
Track B will take a more technical approach suited for evaluators,
certifiers or validators looking for detailed technical information
on the specifics of testing under the Common Criteria. Track C will
look at the latest protection profiles and the types of tools and
documents available to help you use the Common Criteria more
effectively. Track D will be a tutorial for those wanting to become
more familiar with the Common Criteria, the Common Evaluation
Methodology and the Common Criteria Toolbox. For more detailed
information on the ICCC or to register for the conference, visit the
National Information Assurance Partnership (NIAP) web site:
www.niap.nist.gov/iccc.
For information on the vendor exhibits to be held in conjunction
with the ICCC on May 23 and 24, contact Janin Hardin or Stephanie
King at the Federal Business Council, (800) 878-2940 or log on to:
www.fbcinc.com/specialeventspage.htm.
S&P'2000,2000 IEEE Symposium on Security and Privacy, Oakland
CA, USA, May 14-17, 2000. [posted here: 8/17/99].
See the full CFP above or on the Cipher Web page or at
www.bell-labs.com/user/reiter/sp2000/index.html.
WWW9, 9th
International World Wide Web Conference, Amsterdam, The Netherlands,
May 15-19, 2000. [posted here: 8/17/99].
Topics: E-Commerce, XML, Multimedia, Web Server Performance,
Searching and Querying, Protocols, Web Document Management, Java,
Web Site Design, Web Security, RDF, Database and Directory Services,
Collaboration, Accessibility, Metadata, New Languages Submitted
papers should present original reports of substantive new work in
areas that can be theoretical (models, analyses, techniques,
semantics), empirical (experiments, case studies), or
implementation-oriented (new systems, tools, methodologies, user
interfaces). Tutorial proposals are desired for both half-day and
full-day sessions on topics of current relevance to Web design,
services, operation, and use. Subjects of interest include XML, DOM,
Multimedia, E-commerce, Java, Dynamic HTML, Security, Accessibility,
Graphics and the Web, and other areas expected to be of special
interest in spring 2000. WWW9 workshops are intended to provide a
forum for highly interactive discussion on focused topics. Workshop
proposals should address current web-related issues which can
benefit from small-group information exchange and discussion.
Attendance at workshops will be limited. Submission details are
available at www9.org.
MFPS, The
Sixteenth Workshop on the Mathematical Foundations of Programming
Semantics, Stevens Institute of Technology, Hoboken, NJ, USA, April
13-16, 2000. [posted here 11/4/99].
The MFPS conferences are devoted to those areas of mathematics,
logic and computer science which are related to the semantics of
programming languages. The series particularly has stressed
providing a forum where both mathematicians and computer scientists
can meet and exchange ideas about problems of common interest. We
also encourage participation by researchers in neighboring areas,
since we strive to maintain breadth in the scope of the series. The
invited speakers for MFPS 16 are:
Samson Abramsky University of Edinburgh
Rance Cleaveland Stony Brook
Andy Gordon Microsoft Cambridge
Robin Milner University of Cambridge
Peter O'Hearn Queen Mary - Westfield
Dana Scott CMU
In addition to the invited talks, there will be special sessions
devoted to security and model checking. Those interested in
contributing a talk at the meeting should send a title and short
abstract to mfps@math.tulane.edu. The available slots will be
allocated on a first come, first served basis. As with other MFPS
workshops, the Proceedings for MFPS 16 will consist of a special
issue of the journal Theoretical Computer Science. All participants
at the meeting (whether they present a talk or not) will be invited
to submit a paper for the Proceedings; these submissions will be
refereed to the usual TCS standards. Additional information
available at
www.math.tulane.edu/mfps16.html or from
mfps@math.tulane.edu.
AES3, Third
Advanced Encryption Standard (AES) Candidate Conference, New York,
New York, USA, April 13-14, 2000. (Submissions due: January 15,
2000) [posted here: 9/23/99]
In the summer of 1999, NIST began Round 2 of the technical analysis
of five candidate algorithms that have been selected as finalists
for the AES development effort. Near the end of Round 2, the 3rd AES
Candidate Conference (AES3) will focus on discussion of the
technical resuts of Round 2 and views on candidates for Round 3. A
complete call-for-papers is given on the conference web page at
csrc.nist.gov/encryption/aes/round2/conf3/aes3conf.htm.
CFP'2000,
Computers, Freedom, and Privacy. CFP 2000 Challenging the
Assumptions, Toronto, Ontario, Canada, April 4-7, 2000. [posted
here 8/17/99].
The theme of the tenth CFP conference
is 'Challenging the Assumptions'. After a decade of CFP conferences,
it's time to examine what we have learned. At CFP2000 we want to
re-examine the assumptions we have been making and consider which
ones still make sense as we move forward. Proposals are welcomed on
all aspects of computers, freedom, and privacy. We strongly
encourage proposals that challenge the future, tackle the hard
questions, look at old issues in new ways, articulate and analyze
key assumptions, and present complex issues in all their complexity.
We are seeking proposals for tutorials, plenary sessions, workshops,
and birds-of-a-feather sessions. We are also seeking suggestions for
speakers and topics. Sessions should present a wide range of
thinking on a topic by including speakers from different viewpoints.
Complete submission instructions appear on the CFP2000 web site at
www.cfp2000.org/submissions/.
IETF
March 27-31, 2000, 47th IETF, Adelaide,
Australia
[from the IETF Web page at
www.ietf.org
The Internet Engineering Task Force (IETF) is a large open
international community of network designers, operators, vendors,
and researchers concerned with the evolution of the Internet
architecture and the smooth operation of the Internet. It is open to
any interested individual. The actual technical work of the IETF is
done in its working groups, which are organized by topic into
several areas (e.g., routing, transport, security, etc.). Much of
the work is handled via mailing lists. The IETF holds meetings three
times per year. Future IETF Meeting Sites:
|
Summer 1999 - 45th IETF, July 12-16, 1999,
Oslo, Norway, Host: Uninett |
|
Fall 1999 - 46th IETF, November 8-12, 1999,
Washington, DC, Host: Nortel |
|
March 2000 - 47th IETF, March 27-31, 2000,
Adelaide, Australia, Host: Sellnet and connect.com.au
|
OPENARCH'2000, The Third IEEE Conference on Open Architectures
and Network Programming, Tel Aviv, Israel, March 26-27, 2000.
[posted here: 12/6/99]
The Third IEEE Conference on Open Architectures and Network
Programming invites participation in this international forum on
open programmable networks. Advances in open signaling and control,
active networks, mobility management, transportable software,
Web-based services access, and distributed systems technologies are
driving a reexamination of existing network software architectures
and the evolution of control and management systems away from
traditional constrained solutions. OPENARCH 2000 will foster a
better understanding of network software architecture and the
techniques becoming available to make it simpler, more flexible, and
more robust. In the spirit of the first and second conferences,
OPENARCH 2000 will provide researchers and developers with a focused
opportunity to present and discuss current work and future
directions in the systems, techniques, and performance of open
architectures. More information can be found on the conference web
page at
comet.columbia.edu/activities/openarch2000.
FC'2000,
Fourth Annual International Conference on Financial Cryptography,
Anguilla, British West Indies, February 21-24, 2000. [posted here:
12/6/99]
The annual Financial Cryptography conference is organized by the
International Financial Cryptography Association (IFCA) to explore
all aspects of cryptography for financial applications. The
conference has international participation from business, legal and
technology communities. For more information, see the conference web
page at www.fc00.ai/.
NDSS'2000 Network and Distributed System Security Symposium San
Diego, California, USA, February 2-4, 2000. [posted here: 2/20/99]
Technical papers and panel proposals are invited for the Internet
Society's Year 2000 Network and Distributed System Security
Symposium (NDSS 2000), tentatively scheduled for 2-4 February 2000
in San Diego, California. The symposium will foster information
exchange among researchers and practitioners of network and
distributed system security services. The audience includes those
who are interested in the practical aspects of network and
distributed system security, focusing on actual system design and
implementation rather than theory. A major goal of the symposium is
to encourage and enable the Internet community to apply, deploy, and
advance the state of available security technology. Proceedings will
be published by the Internet Society. A best paper award will be
presented at the symposium to the authors of the best paper to be
selected by the program committee. The deadline for electronic
submission is 16 JUNE 1999. The complete call is available at
www.isoc.org/ndss00/.
|