[ISN] DISC 98 (security/seminar/mexico)

From: mea culpa (jerichoat_private)
Date: Fri Jun 05 1998 - 10:12:35 PDT

  • Next message: mea culpa: "[ISN] Hackers Find More Ways In"

    Forwarded From: Area de Seguridad en Computo <ascat_private>
                        Computer Security Area (ASC) / DGSCA
                                      DISC    98
                               "Individual Responsability"
                         Fifth Computer Security Event In Mexico
                          Mexico, D.F.     November 2-6, 1998
                            C A L L   F O R   P A P E R S
    The goal of DISC 98 event is to create  a conscience about the strategies 
    of security to protect information between the community who uses computers.
    This year the DISC belongs to the most important events of Mexico.  
    The computing general congress (http://www.org.org.mx/cuarenta) 
    celebrates forty years of computing in Mexico and convoques those 
    specialist in computer sucurity to participate on this as lecture.
    "Individual responsability" is the slogan of this year and suggest 
    that the security of an organization should be totally supported 
    by directive, security responsables, managers, and system's users.
    The community is convocated to participate at DISC 98 event through 
    the performance of theorics, technical, and applyed documents and 
    those who presents practical experience in the following topics: 
                    o Applied Cryptography
                    o Cryptograhic Protocols
                    o Intrusion Detection
                    o Electronic Commerce 
                    o Privacy
                    o Protection of software and Intellectual Property
                    o Security Architecture and Models
                    o Security Protocols
                    o Incident Handling and the Internet
                    o Security on Large Networks other than the Internet
                    o New Tools for Incident Handling
                    o Preventing Incidents
                    o Intrusion/Vulnerability Detection Tools
                    o System/Network Monitoring Tools
    		o Analysis of malicious code
    	        o Applications of cryptographic techniques
           		o Attacks against networks and machines
           		o Detecting attacks, intrusions, and computer misuse
           		o Developing secure systems
           		o File and file system security
           		o Network security
           		o New firewall technologies
           		o Public key infrastructure
           		o Security in heterogeneous environments
           		o Security incident investigation and response
    Who should attend ?
            * All the systems administrators who are interested in computer
            * All the people who are working into the field of Computer
    Security, and handling  the Computer Security Incident.
            * Any person who is interested on Computer Security area, and wants 
    to meet another expert on it. Consequently, it will help him or her to improve
    security programs, security plans, and security tools by sharing and getting
    a wide experience and knowladgement.
            * Those persons who want to stablish a groups of people who response
    computer security incidents.
            * All of the who have a particular interest in configurating network
    security, tools, Firewalls and related.
    Important Dates:
    Paper submission:       August 30 
    Acceptance decision:    September 12
    Final papers due:       September 26
    Event's Date:           November 2-6
    Conference Location
    Hotel Royal, Mexico D.F.
    Workshop Format:
    We are going to perform tha parallel tutorial style presentations during
    November 2,3 and 6. On November 4 and 5 will consist of conference paper
    and workshop style presentations, as well as business sessions.
    Two evenings are allocated for participants to hold events devoted to subjects
    of particular interest ("birds of a feather" sessions).
    Contributions should follow the following guidelines:
    1. Tutorials:      Half or full day tutorial proposals will be considered.
    2. Papers:         Written papers may be as long as desired, but
                       presentations must be limited to 30 minutes.
    3. Workshop:       These informal sessions should either follow a more
                       "hands-on" approach or provide for a high degree of
                       audience participation. They should be tailored to
                       address specific issues and should be from 60 to 90 minutes
                       in duration. Panel Sessions on a particular topic are
    Instruction for authors:
    Under the following guidelines we will receive papers about conferences, worksho
    p, and tutorials:
            * The documents should be delivered during the indicated date.
            * The documents should be contented high quality and original. It also s
    hould include a summary that describes the content and style of the presentation. 
            * We will evaluate the papers depending upon the author's proporsal, in 
    which it has to contain:
                    - workshop title
                    - workshop format (workshop, tutorials or conference)
                    - workshop summary has to be less than two quarter sheets
                    - requirements for the presentation (pc, datashow, etc.)
                    - author's datum
                            = name
                            = adress
                            = curriculum vitae
                            = fax and telephone number
                            = e-mail
            * Is necessary include the next points in case of tutorials
                    - goal
                    - presentation and summary
                    - the table of content
                    - duration (half or full day)
                    - tutorial stuffs (transparencies)
    Accepted formats
            Those papers, which were selected, must present the complete paper of 
    the conference to be include into the DISC 98 memories.  
    Submmision should be accepted such as:
                    - TeX/LaTex
                    - Postcript
                    - Word for Windows
                    - ASCII 
                    - Please contact the committe (disc98at_private) in case to us
    e another format.
            Note: The specifications of the papers such as: margen, letter size, bla
    nk spaces, etc. will be indicated in the DISC 98 page
    Workshop Submissions 
    Submissions will be delivered :
            o By E-mail (disc98at_private)
            o By Mail to the following adress:
                    Area de Seguridad en C'omputo
                    Direcci'on General de C'omputo Acad'emico
                    Circuito Exterior, Ciudad Universitaria
                    ZIP 04510
                    Mexico, D.F.
    Further Information
    E-mail :        disc98at_private
    WWW    :        http://www.asc.unam.mx/disc98
    Adress :
                    Area de Seguridad en C'omputo
                    Direcci'on General de C'omputo Acad'emico
                    Circuito Exterior, Ciudad Universitaria
                    ZIP 04510
                    Mexico, D.F.
    Telephone Number : (52-5) 622 81 69 and  (52-5) 685 22 29
    Facsimile        : (52 5) 6 22 80 43
                       Subject: DISC 98 
    Juan Carlos Guel Lopez
    Area de Seguridad en C'omputo   E-mail: ascat_private
    DGSCA, UNAM                     Tel. (5) 622-81-69  Fax (5) 622-80-43
    Circuito Exterior, C. U.        WWW: http://www.super.unam.mx/asc/
    04510 Mexico D. F.              PGP: finger ascat_private
    Subscribe: mail majordomoat_private with "subscribe isn".
    Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]

    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 12:55:24 PDT