[ISN] ESORICS 2004 - Call for Participation

From: Yves.Roudier@private
Date: Mon Jun 21 2004 - 10:25:25 PDT

  • Next message: Yves.Roudier@private: "[ISN] RAID 2004 - Call for Participation"

             [Apologies for multiple copies of this announcement]
                            CALL FOR PARTICIPATION
                                 ESORICS 2004
            9th European Symposium on Research in Computer Security 
                          Sponsored by SAP and @sec
          Institut Eurecom, Sophia Antipolis, French Riviera, France
                            September 13-15, 2004 
                 ESORICS 2004 will be collocated with RAID 2004
    IMPORTANT NOTICE: special hotel rates have been negotiated, but the deadline
    for some hotels is June 30. Please check the hotel information at:
                  EARLY REGISTRATION DEADLINE:  July 20, 2004
    Since 1990, ESORICS has been confirmed as the European research event in
    computer security, attracting audience from both the academic and industrial
    communities. The symposium has established itself as one of the premiere,
    international gatherings on Information Assurance. This year's three days
    program will feature a single technical track with 27 full papers selected
    from almost 170 submissions.
                              PRELIMINARY PROGRAM
    Monday, September 13th
    09:15 - 09:30   opening remarks
    09:30 - 10:30   invited talk
    10:30 - 11:00   coffee break
    11:00 - 12:30   Access control
      Incorporating Dynamic Constraints in the Flexible Authorization Framework
      Shiping Chen, Duminda Wijesekera, Sushil Jajodia
      Access-Condition-Table-driven Access Control for XML Database
      Naizhen Qi, Michiharu Kudo
      An Algebra for Composing Enterprise Privacy Policies
      Michael Backes, Markus Duermuth, Rainer Steinwandt
    12:30 - 14:00   lunch
    14:00 - 15:30   Cryptographic protocols
      Deriving, attacking and defending the GDOI protocol
      Catherine Meadows, Dusko Pavlovic
      Better Privacy for Trusted Computing Platforms
      Jan Camenisch
      A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees
      Michael Backes
    15:30 - 16:00   coffee break
    16:00 - 17:30   Anonymity and information hiding
      A Formalization of Anonymity and Onion Routing
      Sjouke Mauw, Jan Verschuren, Erik de Vink
      Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
      Rainer Böhme, Andreas Westfeld
      Comparison between two practical mix designs
      Claudia Diaz, Len Sassaman, Evelyne Dewitte
    Tuesday, September 14th
    09:00 - 10:30    Distributed data protection
      Signature Bouquets: Immutability for Aggregated/Condensed Signatures
      Einar Mykletun, Maithili Narasimha, Gene Tsudik
      Towards a theory of data entanglement
      James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
      Portable and Flexible Document Access Control Mechanisms
      Mikhail Atallah, Marina Bykova
    10:30 - 11:00   coffee break
    11:00 - 12:30   Information flow and security properties
      Possibilistic Information Flow Control in the Presence of Encrypted
      Dieter Hutter, Axel Schairer
      Information flow control revisited: Noninfluence = Noninterference +
      David von Oheimb
      Security Property Based Administrative Controls
      Jon A. Solworth, Robert H. Sloan
    12:30 - 14:00   lunch
    14:00 - 15:30   Authentication and trust management
      A Vector Model of Trust for Developing Trustworthy Systems
      Indrajit Ray, Sudip Chakraborty
      Parameterized Authentication
      Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran
      Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor
      Bulent Yener, Seyit A. Camtepe
    15:30 - 16:00   coffee break
    16:00 - 17:30   Cryptography
      IPv6 Opportunistic Encryption
      Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
      On the role of key schedules in attacks on iterated ciphers
      Lars R. Knudsen, John E. Mathiassen
      A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
      Bodo Moller
    Wednesday, September 15th
    09:00 - 10:30   Operating systems and architecture
      A Host Intrusion Prevention System for Windows Operating Systems
      Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini
      Re-establishing Trust in Compromised Systems: Recovering from Rootkits
      that Trojan the System Call Table
      Julian Grizzard, John Levine, Henry Owen
      ARCHERR: Runtime Environment Driven Program Safety
      Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya
    10:30 - 11:00   coffee break
    11:00 - 12:30   Intrusion detection
      Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
      John McHugh
      Redundancy and diversity in security
      Bev Littlewood, Lorenzo Strigini
      Discover Novel Attack Strategies from INFOSEC Alerts
      Xinzhou Qin, Wenke Lee
                               ORGANIZING COMMITTEE
    General Chair
     Refik Molva
     Institut Eurecom
     email: Refik.Molva@private 
    Program Chairs 
     Peter Ryan                              Pierangela Samarati 
     University of Newcastle upon Tyne       University of Milan 
     email: Peter.Ryan@private       email: samarati@private 
    Publication Chair                       Publicity Chair 
     Dieter Gollmann                         Yves Roudier 
     TU Hamburg-Harburg                      Institut Eurecom 
     email: diego@private                    email: roudier@private 
    Sponsoring Chair                        
     Marc Dacier
     Institut Eurecom
     email: dacier@private
                                  PROGRAM COMMITTEE
     Vijay Atluri,  Rutgers University, USA
     Joachim Biskup, Universitaet Dortmund, Germany
     Jan Camenisch, IBM Research, Switzerland 
     David Chadwick, University of Salford, UK 
     Ernesto Damiani, University of Milan, Italy 
     Sabrina De Capitani di Vimercati, University of Milan, Italy 
     Yves Deswarte, LAAS-CNRS, France 
     Alberto Escudero-Pascual, Royal Institute of Technology, Sweden 
     Simon Foley, University College Cork, Ireland 
     Dieter Gollmann, TU Hamburg-Harburg, Germany 
     Joshua D. Guttman, MITRE, USA 
     Sushil Jajodia, George Mason University, USA 
     Sokratis K. Katsikas, University of the Aegean, Greece 
     Peng Liu, Pennsylvania State University, USA 
     Javier Lopez, University of Malaga, Spain
     Roy Maxion, Carnegie Mellon University, USA
     Patrick McDaniel, AT&T Labs-Research, USA 
     John McHugh, CERT/CC, USA
     Catherine A. Meadows, Naval Research Lab, USA 
     Refik Molva, Institut Eurecom, France
     Peng Ning, NC State University, USA
     LouAnna Notargiacomo, The MITRE Corporation, USA 
     Eiji Okamoto, University of Tsukuba, Japan 
     Stefano Paraboschi, University of Bergamo, Italy 
     Andreas Pfitzmann, TU Dresden, Germany 
     Jean-Jacques Quisquater, Microelectronic laboratory, Belgium 
     Steve Schneider, University of London, UK 
     Christoph Schuba, Sun Microsystems, Inc., USA 
     Michael Steiner, IBM T.J. Watson Research Laboratory, USA 
     Paul Syverson, Naval Research Laboratory, USA 
     Moti Yung, Columbia University, USA 
                                  VENUE / TRAVEL
    ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice
    and 15 km Northeast of Cannes. The conference will take place at Institut
    Eurecom / CICA, in the Sophia Antipolis science park, which can easily be
    reached thanks to the nearby Nice international airport. For more
    information, refer to: http://esorics04.eurecom.fr/visitor_information.html
                                  IMPORTANT DATES
     Special rates for hotels: see http://esorics04.eurecom.fr/Hotels.htm
     Early registration before: July 20, 2004
       (see http://esorics04.eurecom.fr/register.html)
    ISN mailing list
    Sponsored by: OSVDB.org - For 15 cents a day, you could help feed an InfoSec junkie!
    (Broke? Spend 15 minutes a day on the project!)

    This archive was generated by hypermail 2b30 : Tue Jun 22 2004 - 04:33:10 PDT