[ISN] ESORICS 2004 - Call for Participation

From: Yves.Roudier@private
Date: Mon Jun 21 2004 - 10:25:25 PDT

  • Next message: Yves.Roudier@private: "[ISN] RAID 2004 - Call for Participation"

             [Apologies for multiple copies of this announcement]
    
                            CALL FOR PARTICIPATION
    
                                 ESORICS 2004
            9th European Symposium on Research in Computer Security 
    
                          Sponsored by SAP and @sec
    
          Institut Eurecom, Sophia Antipolis, French Riviera, France
                            September 13-15, 2004 
                         http://esorics04.eurecom.fr  
                 ESORICS 2004 will be collocated with RAID 2004
    
    ==============================================================================
    IMPORTANT NOTICE: special hotel rates have been negotiated, but the deadline
    for some hotels is June 30. Please check the hotel information at:
    http://esorics04.eurecom.fr/Hotels.htm
    ==============================================================================
    
                  *******************************************
                  EARLY REGISTRATION DEADLINE:  July 20, 2004
                  *******************************************
    
    
    Since 1990, ESORICS has been confirmed as the European research event in
    computer security, attracting audience from both the academic and industrial
    communities. The symposium has established itself as one of the premiere,
    international gatherings on Information Assurance. This year's three days
    program will feature a single technical track with 27 full papers selected
    from almost 170 submissions.
    
    
                              PRELIMINARY PROGRAM
                              -------------------
    
    Monday, September 13th
    ======================
    
    09:15 - 09:30   opening remarks
    
    09:30 - 10:30   invited talk
    
    10:30 - 11:00   coffee break
    
    11:00 - 12:30   Access control
                    --------------
    
      Incorporating Dynamic Constraints in the Flexible Authorization Framework
      Shiping Chen, Duminda Wijesekera, Sushil Jajodia
    	
      Access-Condition-Table-driven Access Control for XML Database
      Naizhen Qi, Michiharu Kudo
    
      An Algebra for Composing Enterprise Privacy Policies
      Michael Backes, Markus Duermuth, Rainer Steinwandt
    	
    12:30 - 14:00   lunch
    	
    14:00 - 15:30   Cryptographic protocols
                    -----------------------
    
      Deriving, attacking and defending the GDOI protocol
      Catherine Meadows, Dusko Pavlovic
    
      Better Privacy for Trusted Computing Platforms
      Jan Camenisch
    
      A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees
      Protocol
      Michael Backes
    	
    15:30 - 16:00   coffee break
    	
    16:00 - 17:30   Anonymity and information hiding
                    --------------------------------
    
      A Formalization of Anonymity and Onion Routing
      Sjouke Mauw, Jan Verschuren, Erik de Vink
    
      Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
      Rainer Böhme, Andreas Westfeld
    
      Comparison between two practical mix designs
      Claudia Diaz, Len Sassaman, Evelyne Dewitte
    
    
    Tuesday, September 14th
    =======================
    
    09:00 - 10:30    Distributed data protection
                     ---------------------------
    
      Signature Bouquets: Immutability for Aggregated/Condensed Signatures
      Einar Mykletun, Maithili Narasimha, Gene Tsudik
    
      Towards a theory of data entanglement
      James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
    
      Portable and Flexible Document Access Control Mechanisms
      Mikhail Atallah, Marina Bykova
    	
    10:30 - 11:00   coffee break
    	
    11:00 - 12:30   Information flow and security properties
                    ----------------------------------------
    
      Possibilistic Information Flow Control in the Presence of Encrypted
      Communication
      Dieter Hutter, Axel Schairer
    
      Information flow control revisited: Noninfluence = Noninterference +
      Nonleakage
      David von Oheimb
    
      Security Property Based Administrative Controls
      Jon A. Solworth, Robert H. Sloan
    	
    12:30 - 14:00   lunch
    	
    14:00 - 15:30   Authentication and trust management
                    -----------------------------------
    
      A Vector Model of Trust for Developing Trustworthy Systems
      Indrajit Ray, Sudip Chakraborty
    
      Parameterized Authentication
      Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran
    
      Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor
      Networks
      Bulent Yener, Seyit A. Camtepe
    	
    15:30 - 16:00   coffee break
    	
    16:00 - 17:30   Cryptography
                    ------------
    
      IPv6 Opportunistic Encryption
      Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
    
      On the role of key schedules in attacks on iterated ciphers
      Lars R. Knudsen, John E. Mathiassen
    
      A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
      Bodo Moller
    
    Wednesday, September 15th
    =========================
    
    09:00 - 10:30   Operating systems and architecture
                    ----------------------------------
    
      A Host Intrusion Prevention System for Windows Operating Systems
      Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini
    
      Re-establishing Trust in Compromised Systems: Recovering from Rootkits
      that Trojan the System Call Table
      Julian Grizzard, John Levine, Henry Owen
    
      ARCHERR: Runtime Environment Driven Program Safety
      Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya
    	
    10:30 - 11:00   coffee break
    	
    11:00 - 12:30   Intrusion detection
                    -------------------
    
      Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
      John McHugh
    
      Redundancy and diversity in security
      Bev Littlewood, Lorenzo Strigini
    
      Discover Novel Attack Strategies from INFOSEC Alerts
      Xinzhou Qin, Wenke Lee
    
    
                               ORGANIZING COMMITTEE
                               --------------------
    
    General Chair
     Refik Molva
     Institut Eurecom
     email: Refik.Molva@private 
    
    Program Chairs 
     Peter Ryan                              Pierangela Samarati 
     University of Newcastle upon Tyne       University of Milan 
     email: Peter.Ryan@private       email: samarati@private 
        
    Publication Chair                       Publicity Chair 
     Dieter Gollmann                         Yves Roudier 
     TU Hamburg-Harburg                      Institut Eurecom 
     email: diego@private                    email: roudier@private 
        
    Sponsoring Chair                        
     Marc Dacier
     Institut Eurecom
     email: dacier@private
    
    
                                  PROGRAM COMMITTEE
                                  -----------------
    
     Vijay Atluri,  Rutgers University, USA
     Joachim Biskup, Universitaet Dortmund, Germany
     Jan Camenisch, IBM Research, Switzerland 
     David Chadwick, University of Salford, UK 
     Ernesto Damiani, University of Milan, Italy 
     Sabrina De Capitani di Vimercati, University of Milan, Italy 
     Yves Deswarte, LAAS-CNRS, France 
     Alberto Escudero-Pascual, Royal Institute of Technology, Sweden 
     Simon Foley, University College Cork, Ireland 
     Dieter Gollmann, TU Hamburg-Harburg, Germany 
     Joshua D. Guttman, MITRE, USA 
     Sushil Jajodia, George Mason University, USA 
     Sokratis K. Katsikas, University of the Aegean, Greece 
     Peng Liu, Pennsylvania State University, USA 
     Javier Lopez, University of Malaga, Spain
     Roy Maxion, Carnegie Mellon University, USA
     Patrick McDaniel, AT&T Labs-Research, USA 
     John McHugh, CERT/CC, USA
     Catherine A. Meadows, Naval Research Lab, USA 
     Refik Molva, Institut Eurecom, France
     Peng Ning, NC State University, USA
     LouAnna Notargiacomo, The MITRE Corporation, USA 
     Eiji Okamoto, University of Tsukuba, Japan 
     Stefano Paraboschi, University of Bergamo, Italy 
     Andreas Pfitzmann, TU Dresden, Germany 
     Jean-Jacques Quisquater, Microelectronic laboratory, Belgium 
     Steve Schneider, University of London, UK 
     Christoph Schuba, Sun Microsystems, Inc., USA 
     Michael Steiner, IBM T.J. Watson Research Laboratory, USA 
     Paul Syverson, Naval Research Laboratory, USA 
     Moti Yung, Columbia University, USA 
    
    
                                  VENUE / TRAVEL
                                  --------------
    
    ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice
    and 15 km Northeast of Cannes. The conference will take place at Institut
    Eurecom / CICA, in the Sophia Antipolis science park, which can easily be
    reached thanks to the nearby Nice international airport. For more
    information, refer to: http://esorics04.eurecom.fr/visitor_information.html
    
    
                                  IMPORTANT DATES
                                  ---------------
    
     Special rates for hotels: see http://esorics04.eurecom.fr/Hotels.htm
     Early registration before: July 20, 2004
       (see http://esorics04.eurecom.fr/register.html)
    _________________________________________
    ISN mailing list
    Sponsored by: OSVDB.org - For 15 cents a day, you could help feed an InfoSec junkie!
    (Broke? Spend 15 minutes a day on the project!)
    



    This archive was generated by hypermail 2b30 : Tue Jun 22 2004 - 04:33:10 PDT