Security News > 2004 > June > ESORICS 2004 - Call for Participation

ESORICS 2004 - Call for Participation
2004-06-21 17:25

[Apologies for multiple copies of this announcement] CALL FOR PARTICIPATION ESORICS 2004 9th European Symposium on Research in Computer Security Sponsored by SAP and @sec Institut Eurecom, Sophia Antipolis, French Riviera, France September 13-15, 2004 http://esorics04.eurecom.fr ESORICS 2004 will be collocated with RAID 2004 ============================================================================== IMPORTANT NOTICE: special hotel rates have been negotiated, but the deadline for some hotels is June 30. Please check the hotel information at: http://esorics04.eurecom.fr/Hotels.htm ============================================================================== ******************************************* EARLY REGISTRATION DEADLINE: July 20, 2004 ******************************************* Since 1990, ESORICS has been confirmed as the European research event in computer security, attracting audience from both the academic and industrial communities. The symposium has established itself as one of the premiere, international gatherings on Information Assurance. This year's three days program will feature a single technical track with 27 full papers selected from almost 170 submissions. PRELIMINARY PROGRAM ------------------- Monday, September 13th ====================== 09:15 - 09:30 opening remarks 09:30 - 10:30 invited talk 10:30 - 11:00 coffee break 11:00 - 12:30 Access control -------------- Incorporating Dynamic Constraints in the Flexible Authorization Framework Shiping Chen, Duminda Wijesekera, Sushil Jajodia Access-Condition-Table-driven Access Control for XML Database Naizhen Qi, Michiharu Kudo An Algebra for Composing Enterprise Privacy Policies Michael Backes, Markus Duermuth, Rainer Steinwandt 12:30 - 14:00 lunch 14:00 - 15:30 Cryptographic protocols ----------------------- Deriving, attacking and defending the GDOI protocol Catherine Meadows, Dusko Pavlovic Better Privacy for Trusted Computing Platforms Jan Camenisch A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol Michael Backes 15:30 - 16:00 coffee break 16:00 - 17:30 Anonymity and information hiding -------------------------------- A Formalization of Anonymity and Onion Routing Sjouke Mauw, Jan Verschuren, Erik de Vink Breaking Cauchy Model-based JPEG Steganography with First Order Statistics Rainer Böhme, Andreas Westfeld Comparison between two practical mix designs Claudia Diaz, Len Sassaman, Evelyne Dewitte Tuesday, September 14th ======================= 09:00 - 10:30 Distributed data protection --------------------------- Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun, Maithili Narasimha, Gene Tsudik Towards a theory of data entanglement James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong Portable and Flexible Document Access Control Mechanisms Mikhail Atallah, Marina Bykova 10:30 - 11:00 coffee break 11:00 - 12:30 Information flow and security properties ---------------------------------------- Possibilistic Information Flow Control in the Presence of Encrypted Communication Dieter Hutter, Axel Schairer Information flow control revisited: Noninfluence = Noninterference + Nonleakage David von Oheimb Security Property Based Administrative Controls Jon A. Solworth, Robert H. Sloan 12:30 - 14:00 lunch 14:00 - 15:30 Authentication and trust management ----------------------------------- A Vector Model of Trust for Developing Trustworthy Systems Indrajit Ray, Sudip Chakraborty Parameterized Authentication Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Bulent Yener, Seyit A. Camtepe 15:30 - 16:00 coffee break 16:00 - 17:30 Cryptography ------------ IPv6 Opportunistic Encryption Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann On the role of key schedules in attacks on iterated ciphers Lars R. Knudsen, John E. Mathiassen A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts Bodo Moller Wednesday, September 15th ========================= 09:00 - 10:30 Operating systems and architecture ---------------------------------- A Host Intrusion Prevention System for Windows Operating Systems Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini Re-establishing Trust in Compromised Systems: Recovering from Rootkits that Trojan the System Call Table Julian Grizzard, John Levine, Henry Owen ARCHERR: Runtime Environment Driven Program Safety Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya 10:30 - 11:00 coffee break 11:00 - 12:30 Intrusion detection ------------------- Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data John McHugh Redundancy and diversity in security Bev Littlewood, Lorenzo Strigini Discover Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin, Wenke Lee ORGANIZING COMMITTEE -------------------- General Chair Refik Molva Institut Eurecom email: Refik.Molva () eurecom fr Program Chairs Peter Ryan Pierangela Samarati University of Newcastle upon Tyne University of Milan email: Peter.Ryan () newcastle ac uk email: samarati () dti unimi it Publication Chair Publicity Chair Dieter Gollmann Yves Roudier TU Hamburg-Harburg Institut Eurecom email: diego () tuhh de email: roudier () eurecom fr Sponsoring Chair Marc Dacier Institut Eurecom email: dacier () eurecom fr PROGRAM COMMITTEE ----------------- Vijay Atluri, Rutgers University, USA Joachim Biskup, Universitaet Dortmund, Germany Jan Camenisch, IBM Research, Switzerland David Chadwick, University of Salford, UK Ernesto Damiani, University of Milan, Italy Sabrina De Capitani di Vimercati, University of Milan, Italy Yves Deswarte, LAAS-CNRS, France Alberto Escudero-Pascual, Royal Institute of Technology, Sweden Simon Foley, University College Cork, Ireland Dieter Gollmann, TU Hamburg-Harburg, Germany Joshua D. Guttman, MITRE, USA Sushil Jajodia, George Mason University, USA Sokratis K. Katsikas, University of the Aegean, Greece Peng Liu, Pennsylvania State University, USA Javier Lopez, University of Malaga, Spain Roy Maxion, Carnegie Mellon University, USA Patrick McDaniel, AT&T Labs-Research, USA John McHugh, CERT/CC, USA Catherine A. Meadows, Naval Research Lab, USA Refik Molva, Institut Eurecom, France Peng Ning, NC State University, USA LouAnna Notargiacomo, The MITRE Corporation, USA Eiji Okamoto, University of Tsukuba, Japan Stefano Paraboschi, University of Bergamo, Italy Andreas Pfitzmann, TU Dresden, Germany Jean-Jacques Quisquater, Microelectronic laboratory, Belgium Steve Schneider, University of London, UK Christoph Schuba, Sun Microsystems, Inc., USA Michael Steiner, IBM T.J. Watson Research Laboratory, USA Paul Syverson, Naval Research Laboratory, USA Moti Yung, Columbia University, USA VENUE / TRAVEL -------------- ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice and 15 km Northeast of Cannes. The conference will take place at Institut Eurecom / CICA, in the Sophia Antipolis science park, which can easily be reached thanks to the nearby Nice international airport. For more information, refer to: http://esorics04.eurecom.fr/visitor_information.html IMPORTANT DATES --------------- Special rates for hotels: see http://esorics04.eurecom.fr/Hotels.htm Early registration before: July 20, 2004 (see http://esorics04.eurecom.fr/register.html) _________________________________________ ISN mailing list Sponsored by: OSVDB.org - For 15 cents a day, you could help feed an InfoSec junkie! (Broke? Spend 15 minutes a day on the project!)


News URL

http://esorics04.eurecom.fr