[ISN] Computer Security Mexico 2003

From: InfoSec News (isnat_private)
Date: Wed Jan 15 2003 - 04:12:05 PST

  • Next message: InfoSec News: "[ISN] Why I should have the right to kill a malicious process on your machine"

    Forwarded from: Seguridad en Computo - UNAM <seguridadat_private>
     		       Computer Security Mexico 2003
     			     Call for papers
                           Antiguo Colegio de San Ildefonso
                              March 6th-March 7th, 2003
      			  Old Downtown,Mexico City
     Since 1994, Mexico has participated of this celebration through the
     Computer Security Department (DSC-UNAM, www.seguridad.unam.mx) and
     UNAM-CERT (www.unam-cert.unam.mx).
     The goal  of Computer Security 2003 Mexico (www.seguridad2003.unam.mx)
     is to create awareness among the computer user community about security
     strategies and mechanisms used to protect information systems.Since 1994,
     Mexico has been organizing this great event through the Computer Security
     Department (DSC-UNAM, www.seguridad.unam.mx) and  UNAM-CERT
     Computer Security 2003  will be an event for all the people who are
     involved in the  use, design and administration of computer systems.
     The community  is invited to  participate in Computer  Security 2003
     through the  presentation of theoretical,  technical, and  applied works
     as  well as those that  present practical  experiences in the following
     topics (but not limited to them):
        * Electronic commerce
             o Certification
             o Digital cash
             o New protocols
             o Secure transactions
             o New technologies
        * New firewall technologies
             o Hybrids FW
             o New generations of FW
        * World Wide Web security
             o Secure Sockets Layer (SSL)
             o Secure schemes
        * Legislation about Computer Security
             o Advances in legislation 1999-2000
             o Regulation of domain names
             o Copyright and industrial property
        * Network security
             o New network technology applied to security (ATM, Fast Ethernet)
             o Router security
        * Cluster security
        * Software development security
        * Distributed systems security
        * Database security
        * Security of agents and multi-platform languages
        * Incident response Teams
        * Computer security incident handling, prevention and coordination
        * Administrative and legal issues on incident handling
        * Software protection and intellectual property
        * New tools for incident handling
        * Intrusion detection
        * Computer attacks
        * Privacy and cryptography protocols
        * Security policies
        * Computer viruses
        * DDOS
                                Who should attend ?
        * System administrators who are interested in Computer Security.
        * People working in the field of Computer Security who do handle Computer
          Security incidents.
        *  Anybody  who is  interested  in  Computer Security  and wants  to  meet
          another  interested people.  This event  will help  him or  her improve
          security programs, plans, and tools by listening to the speakers and by
          sharing and interacting with the attendees.
        * People who want to establish incident response teams.
        * Anybody  who has a particular  interest in network security, monitoring
          tools, intrusion detection and firewalls.
        * Managers  of enterprises who are  interested in secure transactions via
          the Internet and that need to improve the security of their systems.
                                Why should you assist?
      Because it  is the opportunity to find out about  what is being developed in
      the  computer security  field  and it  is also  a chance  to share  your own
      experience and interests with people of the field.
      You can learn about how to manage and respond to computer security incidents
      without exposing your resources.
           Important Dates
     	Paper submissions: February 7th, 2003.
     	Acceptance notifications: February 14th, 2003.
     	Final papers: February 24th, 2003
     	Event: March 1, 2003 - March 7, 2003.
      	Conferences: March 6th and March 7th
           Workshop Format
          On March 6 and 7, there will be technical conferences
       and business sessions only.
         All contributions should follow the next guidelines:
            1. Conference papers: Written papers may be as long as desired,
                but presentations must be limited to 30 minutes.
                              Instructions for authors
      We will  receive proposals  for presentations, that
      follow these guidelines:
         * The documents should be submitted by the date indicated above.
         * The  contents of  the documents should  be of high-quality  and must be
         * They should include an abstract with the description of the content and
           style of the presentation.
         * The papers  will be  evaluated using  the actual  proposal, which  must
              o title
              o format (workshop, tutorial or conference)
              o extended abstract (more than one but less than two pages)
              o requirements for the presentation (computing equipment,
              o datashow projector, slide projector, etc.)
              o author information
                   + name
                   + address and affiliation
                   + brief resume
                   + fax and telephone number
                   + e-mail address
           Accepted formats
      Authors whose  papers are  accepted must submit  the complete version  to be
      included into the proceedings of the event.
      Submissions will be accepted in the following formats:
         * TeX/LaTeX
         * PostScript
         * Word for Windows
         * ASCII
         * HTML
      Please contact the committee  (congresoat_private ) if you need
      to use a different format.
      Note: For images and graphics use GIF, PCX, BMP, JPEG and JPG formats.
      Presentations can be sent using the following means:
              * e-mail:
              * Post mail to the following address:
                     Departamento de Seguridad en Cómputo
                     Dirección General de Cómputo Académico
                     Circuito   Exterior,  Ciudad   Universitaria  04510
                     México, D.F. México
                                   Program Committee
      The papers will be evaluated and selected by a scientific committee.
      The  committee  will  be  integrated  by  investigators  and  profesionistas
      recognized in the field of the computer security worldwide.
                                  Further Information:
      	* Web:	  http://www.seguridad2003.unam.mx
            * e-mail: congresoat_private
            * Address:
                    Departamento de Seguridad en Cómputo/UNAM-CERT
                    Dirección General de Cómputo Académico
                    Circuito   Exterior,  Ciudad   Universitaria  04510
                    México, D.F. México
                    Phone  : (52)  56 22  81 69  and (52)  56 85  22 29
                    Fax : (52) 56 22 80 43
     Juan Carlos Guel
     Departamento Seguridad en Computo
     DGSCA, UNAM			E-mail:seguridadat_private
     Circuito Exterior, C. U.       Tel.: 5622-81-69  Fax: 5622-80-43
     Del. Coyoacan			WWW: http://www.seguridad.unam.mx
     04510 Mexico D. F.	        WWW: http://www.unam-cert.unam.mx
    Version: 2.6.3i
    Charset: cp850
    -----END PGP SIGNATURE-----
    ISN is currently hosted by Attrition.org
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.

    This archive was generated by hypermail 2b30 : Wed Jan 15 2003 - 06:47:43 PST