[ISN] Computer Security Mexico 2001

From: InfoSec News (isnat_private)
Date: Tue Sep 04 2001 - 23:16:22 PDT

  • Next message: InfoSec News: "[ISN] Beware That Company Box You Took"

    Forwarded from: Seguridad en Computo - UNAM <seguridadat_private>
    
    -----BEGIN PGP SIGNED MESSAGE-----
    
    > -----------------------------------------------------------------------------
    >                               Call for papers
    > 
    >                            Centro Mascarones-UNAM
    >                      November 24th-November 27th, 2001
    > 
    >                       Antiguo Colegio de San Ildefonso
    >                      November 28th-November 30th, 2001
    > 
    > 			  Old Downtown,Mexico City
    > - -----------------------------------------------------------------------------
    > 
    > The goal  of Computer Security 2001 Mexico (www.seguridad2001.unam.mx) and
    > the International Computer Security Day(www.disc2001.unam.mx) is to
    > create awareness among the computer user community about security
    > strategies and mechanisms used to protect information systems.
    > 
    > Computer Security 2001  will be an event for all the people who are involved
    > in the  use, design and administration of computer systems.  DISC 2001 is an
    > annual  world-wide  celebration  led  by   ACM  (Association  for  Computing
    > Machinery).
    > 
    > Since 1994, Mexico has participated of this celebration through the Computer
    > Security Department (DSC-UNAM, www.seguridad.unam.mx) and UNAM-CERT
    > (www.unam-cert.unam.mx). This year, DISC 2001 will take place
    > along with Computer Security 2001 on November 30th.
    > 
    > The community  is invited to  participate in Computer  Security 2001 through
    > the  presentation of theoretical,  technical, and  applied works as  well as
    > those that  present practical  experiences in the following  topics (but not
    > limited to them):
    > 
    >    * Electronic commerce
    >         o Certification
    >         o Digital cash
    >         o New protocols
    >         o Secure transactions
    >         o New technologies
    >    * New firewall technologies
    >         o Hybrids FW
    >         o New generations of FW
    >    * World Wide Web security
    >         o Secure Sockets Layer (SSL)
    >         o Secure schemes
    >    * Legislation about Computer Security
    >         o Advances in legislation 1999-2000
    >         o Regulation of domain names
    >         o Copyright and industrial property
    >    * Network security
    >         o New network technology applied to security (ATM, Fast Ethernet)
    >         o Router security
    >    * Cluster security
    >    * Software development security
    >    * Distributed systems security
    >    * Database security
    >    * Security of agents and multi-platform languages
    >    * Incident response teams
    >    * Computer security incident handling, prevention and coordination
    >    * Administrative and legal issues on incident handling
    >    * Software protection and intellectual property
    >    * New tools for incident handling
    >    * Intrusion detection
    >    * Computer attacks
    >    * Privacy and cryptography protocols
    >    * Security policies
    >    * Computer viruses
    >    * DDOS
    > 
    >              --------------------------------------------------
    > 
    >                              Who should attend ?
    > 
    >    * System administrators who are interested in Computer Security.
    > 
    >    * People working in the field of Computer Security who do handle Computer
    >      Security incidents.
    > 
    >    *  Anybody  who is  interested  in  Computer Security  and wants  to  meet
    >      another  interested people.  This event  will help  him or  her improve
    >      security programs, plans, and tools by listening to the speakers and by
    >      sharing and interacting with the attendees.
    > 
    >    * People who want to establish incident response teams.
    > 
    >    * Anybody  who has a particular  interest in network security, monitoring
    >      tools, intrusion detection and firewalls.
    > 
    >    * Managers  of enterprises who are  interested in secure transactions via
    >      the Internet and that need to improve the security of their systems.
    > 
    >              --------------------------------------------------
    > 
    >                            Why should you assist?
    > 
    > Because it  is the opportunity to find out about  what is being developed in
    > the  computer security  field  and it  is also  a chance  to share  your own
    > experience and interests with people of the field.
    > 
    > You can learn about how to manage and respond to computer security incidents
    > without exposing your resources.
    > 
    >      Important Dates
    > 
    >           Paper submissions: October 12th
    > 
    >           Acceptance notifications: October 26th
    > 
    >           Final papers: November 2th
    > 
    >           Event: November 24th - November 30th.
    > 
    >      Workshop Format
    > 
    > There will  be  tutorial-style and workshop-style presentations  on November
    > 24,25,26  and 27 .  On  November 28,  29  and 30 , there  will be  technical
    > conferences and business sessions only.
    > 
    > All contributions should follow the next guidelines:
    > 
    >      1. Tutorials  and workshops:  Half or full  day tutorial proposals
    >      will be considered.
    > 
    >      2. Conference  papers: Written  papers may be as  long as desired,
    >      but presentations must be limited to 30 minutes.
    > 
    >      3.  Panel  Sessions:  These  are informal  sessions  that  should,
    >      either,   follow  a   "hands-on"   approach,  or   encourage  more
    >      participation from the audience.
    > 
    > They should  be tailored to address specific issues  and should be take from
    > 60 to 90 minutes  of duration. Panel Sessions on a particular topic are also
    > acceptable.
    > 
    >              --------------------------------------------------
    > 
    >                           Instructions for authors
    > 
    > We will  receive proposals  for presentations, workshops  and tutorials that
    > follow these guidelines:
    > 
    >    * The documents should be submitted by the date indicated above.
    >    * The  contents of  the documents should  be of high-quality  and must be
    >      original.
    > 
    >    * They should include an abstract with the description of the content and
    >      style of the presentation.
    > 
    >    *  The papers  will be  evaluated using  the actual  proposal, which  must
    >      contain:
    > 
    >         o title
    >         o format (workshop, tutorial or conference)
    >         o extended abstract (more than one but less than two pages)
    >         o requirements for the presentation (computing equipment,
    >         o datashow projector, slide projector, etc.)
    >         o author information
    >              + name
    >              + address and affiliation
    >              + brief resume
    >              + fax and telephone number
    >              + e-mail address
    > 
    > For tutorials, the following information should also be included:
    > 
    >    * Goal
    >    * Introduction and summary
    >    * Outline of the presentation
    >    * Duration (half or full day)
    >    * Presentation material (e.g., slides, datashow)
    > 
    >      Accepted formats
    > 
    > Authors whose  papers are  accepted must submit  the complete version  to be
    > included into the proceedings of the event.
    > 
    > Submissions will be accepted in the following formats:
    > 
    >    * TeX/LaTeX
    >    * PostScript
    >    * Word for Windows
    >    * ASCII
    >    * HTML
    > 
    > Please contact the committee  (comiteat_private ) should you need to
    > use a different format.
    > 
    > Note: For images and graphics use GIF, PCX, BMP, JPEG and JPG formats.
    > 
    >      Submissions
    > 
    > Presentations can be sent using the following means:
    > 
    >         * e-mail:
    > 
    >                comiteat_private
    > 
    >         * Post mail to the following address:
    > 
    >                Departamento de Seguridad en Cómputo
    >                Dirección General de Cómputo Académico
    >                Circuito   Exterior,  Ciudad   Universitaria  04510
    >                México, D.F. México
    > 
    >              --------------------------------------------------
    > 
    >                              Program Committee
    > 
    > The papers will be evaluated and selected by a scientific committee.
    > 
    > The  committee  will  be  integrated  by  investigators  and  profesionistas
    > recognized in the field of the computer security worldwide.
    > 
    >              --------------------------------------------------
    > 
    >                             Further Information:
    > 
    > 	* Web:	  http://www.seguridad2001.unam.mx
    > 		  http://www.disc2001.unam.mx
    > 
    >         * e-mail: comiteat_private
    > 
    > 
    >         * Address:
    > 
    >                Departamento de Seguridad en Cómputo
    >                Dirección General de Cómputo Académico
    >                Circuito   Exterior,  Ciudad   Universitaria  04510
    >                México, D.F. México
    >                Phone  : (52)  56 22  81 69  and (52)  56 85  22 29
    >                Fax : (52) 56 22 80 43
    > 	       http://www.seguridad.unam.mx
    > 	       http://www.unam-cert.unam.mx
    > 
    > 
    > Juan Carlos Guel
    > --
    > Departamento Seguridad en Computo
    > UNAM-CERT
    > DGSCA, UNAM			E-mail:seguridadat_private
    > Circuito Exterior, C. U.        Tel.: 5622-81-69  Fax: 5622-80-43
    > Del. Coyoacan			WWW: http://www.seguridad.unam.mx
    > 04510 Mexico D. F.	        WWW: http://www.unam-cert.unam.mx
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3i
    Charset: cp850
    
    iQEVAwUBO5TovXAvLUtwgRsVAQHbyAf8DGJDQfUYs7/dYnsA2QKIBZqaYyG6IBjl
    ZkqVg1jduqFU3NtG1WAqKbOU1DuFQ+W8J/Xyjs/4aqf48QESO7rEDJoa+8tkCzuL
    Hn5X8z+w47vJcbcRKIpXoIe45WwX/rPPHGrVuwaE3CPCmyyJUS1yZkV4H9/8sTh7
    nI/7OwM1hi1lEln0St5aKbsxHG4upUpk4cwDPYQX+qBGmg1PsLqad68wS94TMUNb
    EwyDk3o8Zz+7h97Wgw/JbYt8Tp9IQQQxAvEiCSar58/5WCBQFAChOrU5GS/jey1U
    2eX+Gq6wpe8mrYhqD8Jp9mTSqCWrHtMbmBLlvmWVEt8BQsq+PEyqXg==
    =2bQ6
    -----END PGP SIGNATURE-----
    
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY
    of the mail.
    



    This archive was generated by hypermail 2b30 : Wed Sep 05 2001 - 01:17:40 PDT