|
Past Conferences and Journal Special Issues
Last Modified:01/13/05
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
ACSAC'98 Fourteenth Annual
Computer Security Applications Conference, "Applying Practical
Security Solutions", Scottsdale, Arizona, USA, December 7-11, 1998.
(Submissions due: May 29, 1998). [posted here: March 3, 1998]
The conference solicits papers, panels, vendor presentations, and
tutorials that address practical approaches to solving security
problems in federal, state, local governments, departments of
defense, and commercial environments. Selected papers will be those
that present examples of in-place or attempted solutions to real
problems; lessons learned; original research analyses, and
approaches to securing our information infrastructure. A complete
list of topics, and instructions for submitting a paper or a
proposal for a tutorial or vendor display can be found on the
conference web page at www.acsac.org.
SETA'98 Conference on Sequences and their Applications, National
University of Singapore, December 14-17 1998. (submissions due:
August 10, 1998) [posted here: 2/23/98]
Sequences have important applications in ranging systems, spread
spectrum communication systems, multi-terminal system
identification, code division multiple access communications
systems, global positioning systems, software testing, circuit
sting, computer simulation, and stream ciphers. There is also an
interaction between sequences and error-correcting codes. The
purpose of this series of international conferences is to bring
together experts from different areas, and to bridge advances in
different areas. A complete list of topics and submission
instructions can be found on the conference web page at
www.iscs.nus.edu.sg/~dingcs/callfor.html
ICS'98 1998
International Computer Symposium, National Cheng Kung University,
Tainan, TAIWAN, R.O.C, December 17-19, 1998. (submissions due: July
15, 1998) [posted here: 6/16/98]
ICS'98 consists of eight separate workshops, each focusing on a
specific area. Workshop duration will be from one day up to 3 days,
depending on the number of selected papers. Of particular interest
to this list is the workshop on cryptology and information security.
Topics include: Cipher System Design and Theory, User and Message
Authentication, Key Distribution and Management, Secret Sharing,
Digital Signatures, Zero-Knowledge Protocols, Secure Broadcasting
and Electronic Conferencing, Network Security, Database Security,
Distributed System Security, Open System Security, Secure Electronic
Voting, One-way Functions, Applications of and Information Security
Technology. Information Center: E-mail: ics98@csie.ncku.edu.tw
Additional Information on ICS'98 is available on the conference WWW
homepage at
www.iie.ncku.edu.tw/ics98.
HASE'98 3rd IEEE* High-Assurance Systems Engineering Symposium
Washington, DC, USA, November 13-14, 1998. [posted here: 7/6/98]
The primary focus of the Symposium is on innovative research results
in the area of high-assurance (highly reliable, highly available,
safety-critical, real-time, and secure) systems. Complex systems'
engineering issues, including hardware design, software engineering
(both formal and informal methods), performance evaluation, and
system assessment are particular focus of the Symposium. Of special
interests are the integrated system design principles that consider
multiple aspects of high assurance systems. The purpose of this
Symposium is for public dissemination of such research results from
academia, industry, and government. More information can be obtained
from the conference web page at
kel7.eecs.uic.edu/hase98/.
AT'98
Workshop on Agent Technologies, University of Maryland Baltimore
County, November 17-18, 1998. (Submissions due: October 23, 1998)
[posted here 10/8/98].
The goal of the workshop is to provide a forum where researchers and
developers can meet to exchange ideas and report on leading-edge
developments in the area of agent technologies. If you wish to
participate, please provide a short abstract describing research or
ideas which you would be willing to present. Submit abstracts to
mctr@cs.umbc.edu no later than October 23, 1998. Please see the web
page at
www.mctr.umbc.edu/Workshop/wat98 for more details.
IIIS'98 Second Annual IFIP WG 11.5 Working Conference on
Integrity and Internal Control in Information Systems. Warrenton,
Virginia, USA, November 19-20, 1998. (submissions due: April 1,
1998). [posted here: 12/22/97]
Second Annual IFIP WG 11.5 Working Conference on Integrity and
Internal Control in Information Systems. Papers solicited describing
original ideas and results on foundations and applications related
to the subject of integrity and internal control in information
systems. Six copies of papers up to 5000 words due before 1 April to
Prof. Sushil Jajodia, jajodia@isse.gmu.edu. See web page for
details.
25th Annual
Computer Security Conference and Exhibition, Conference:
November 2-4, 1998 Exhibition: November 1-3, 1998, Chicago Hilton
Towers, Chicago, IL. [posted here 10/31/98]
The 25th Annual Computer Security Conference and Exhibition is
sponsored by the Computer Security Institute and provides timely and
informative security technology briefings through technical tracks
and vendor exhibits. For more information see the conference web
page at
www.gocsi.com/25_conf.htm.
Third Nordic
Workshop on Secure IT Systems, Trondheim, Norway, November 5-6,
1998. Organized by Norwegian University of Science and Technology (NTNU).
[posted here 10/31/98]
The theme of the workshop is applied security, i.e., all kinds of
security issues for all kinds of information technology systems. We
are in particular looking for contributions that deal with the
interface between research and applications, rather than a specific
technical area. Thus, papers that present research that can easily
be applied to existing industrial problems or papers based on
industrial applications, are especially welcome, without ruling out
papers that present ongoing academic research into information
security. More information can be found on the conference web page
at
www.item.ntnu.no/Nordsec98/.
CCS-5 Preliminary call for papers for the Fifth Conference on
Computer and Communications Security, San Francisco, California,
USA, November 3-5, 1998 (Tutorials on November 2, 1998).
(submissions due: April 3, 1998). [posted here: 10/1/97]
Papers offering novel research contributions in any aspect of
computer security are solicited for submission to the Fifth ACM
Conference on Computer and Communications Security. Papers may
present theory, technique, applications, or practical experience; a
complete list of topics of interest can be found in the
call for papers. Instructions for authors: Submitted papers must
not substantially overlap papers that have been published or that
are simultaneously submitted to a journal or a conference with a
proceedings. Papers should be at most 15 pages excluding the
bibliography and well-marked appendices (using 11-point font and
reasonable margins on letter-size paper), and at most 20 pages
total. Committee members are not required to read the appendices,
and so the paper should be intelligible without them. Submission
instructions for papers, as well as for panel proposals and tutorial
proposals, will be posted at
www.research.att.com/~reiter/ccs5/ and circulated in the final
call for papers.
MOBILCOM'98
The Fourth Annual ACM/IEEE International Conference on Mobile
Computing and Networking, Dallas, Texas, USA, October 25-30, 1998.
[posted here 10/8/98]
The wireless communication revolution is bringing fundamental change
to telecommunication and computing. Wide-area cellular systems and
wireless LANs promise to make integrated networks a reality and
provide fully distributed and ubiquitous mobile computing and
communications, thus bringing an end to the tyranny of geography.
Furthermore, services for the mobile user are maturing and are
poised to change the nature and scope of communication. This
conference, the fourth of an annual series, serves as the premier
international forum addressing networks, systems, algorithms, and
applications that support the symbiosis of mobile computers and
wireless networks. See the conference web page at
www.mobicom98.utdallas.edu/ for more information.
ISW'98
Information Survivability Workshop 1998 ("Protecting Critical
Infrastructures and Critical Applications"), Wyndham Safari Resort,
Orlando, Florida USA, October 28-30, 1998. (submissions due: July
15, 1998) [posted here: 6/8/98]
The second Information Survivability Workshop (ISW'98) will focus on
the domain-specific survivability requirements and characteristics
of up to four different critical infrastructure and critical
application areas (e.g., banking, transportation, electric power,
and telecommunications). The primary goal of the workshop is to
foster cooperation and collaboration between domain experts and the
survivability research community to improve the survivability of
critical, real-world systems. Another important goal is to continue
to identify and highlight new survivability research ideas that can
contribute to the protection of critical infrastructures and
critical applications. Attendance at the workshop will be limited to
50 participants, and will be by invitation only, based on the
submission of a short position paper (of up to 4 pages in length,
single-spaced, 12 pt.). Additional information will be posted
periodically in the workshop home
www.cert.org/research/isw98.html.
WSLSDS'98 Workshop on Security in Large-Scale Distributed
Systems, Purdue University, West Lafayette, Indiana, USA, October
20-23, 1998. (submissions due: April 10, 1998) [posted here:
2/23/98]
This workshop is intended to promote discussion of new and promising
approaches to the definition, management, enforcement, and recovery
of security-relevant properties in wide-scale distributed systems.
We invite contributions in all areas of information security,
including especially: policy definition in heterogeneous networks,
software engineering for security and reliability, change management
in large-scale systems, auditing and audit reduction in the large,
insider misuse definition and detection in large networks, intrusion
detection in the large, incident response and recovery in the large,
authentication and access control in large-scale systems, protection
of quality of service, software forensics and investigation,
defining and tolerating acceptable loss, mobile agents and active
content issues, topological segmentation and firewall clustering,
perimeter definition and defense, the role of standards, the role of
COTS (commercial off-the shelf) systems. The program committee
solicits abstracts of up to 5 pages for presentations on the above
and related topics, and panel proposals detailing topics of
discussion and 3-6 suggested panel members. 10 paper copies of
proposals are due by April 10 to the program chair: Professor Eugene
Spafford/ COAST Laboratory/ Department of Computer Sciences/ Purdue
University/ W. Lafayette, IN 47907-1398/ spaf@cs.purdue.edu.
Alternatively, PDF format abstracts can be emailed to the program
chair no later than April 8. More details may be found online at
www.cs.purdue.edu/homes/spaf/ws-cfp.html.
RBAC'98 Third ACM Workshop on Role-based Access Control, George
Mason University, Arlington, VA, USA, October 22-23, 1998. [posted
here: 7/6/98]
The essence of Role-Based Access Control (RBAC) is that permissions
are assigned to roles rather than to individual users. Users acquire
these permissions by virtue of being authorized to act in these
roles. The driving motivation for RBAC is to simplify security
policy administration while facilitating the definition of flexible,
customized policies. The ACM workshop on RBAC brings together
researchers, developers, and practitioners to discuss the
application of RBAC to both traditional and emerging systems and the
development of new modeling paradigms for future applications. The
workshop invites participation from the database, network,
distributed systems, operating system, security and application
communities. Attendance is limited to 40 participants to foster a
workshop atmosphere. For further information about the workshop,
contact Srinivas Ganta at sganta@cygnacom.com or consult our web
site at
www.list.gmu.edu/confrnc/rbac/rbac98.html
ASIACRYPT'98 Fourth conference of theory and applications of
cryptologic techniques, Beijing, People's Republic of China, October
18-22, 1998. [posted here 7/6/98]
It is sponsored by the State Key Laboratory of Information Security
(SKLOIS) and Asiacrypt Steering Committee (ASC), in cooperation with
the International Association for Cryptologic Research (IACR).
Original papers are solicited on all technical aspects of
cryptology. Please send a cover letter and 16 copies of the
submission to Prof. Dingyi Pei, one of the Program Co-chairs, at
SKLOIS, Graduate School of USTC, #19A Yu Quan Road, Beijing 100039,
P.R.China no later than May 9, 1998 (or postmarked by May 1, 1998,
and sent via airmail or courier). Further information can be found
on the conference web page at at
www.bta.net.cn/csp/isdata/index.htm.
IRW-FMP'98
International Refinement Workshop and Formal Methods Pacific 1998,
The Australian National University, September 29-October 2, 1998.
(submissions due: April 3, 1998). [posted here: 2/16/98]
IRW/FMP'98 will provide a forum for discussion of current research
on mathematically-based techniques for the design and development of
computer systems. The program committee welcomes submissions
relating to all aspects of mathematically-based techniques for the
design and development of computer systems. A complete list of
topics can be found on the workshop web page, along with guidelines
for submission.
FMLDO7 Foundations of Models and Languages for Data and Objects,
Seventh International Workshop on Foundations of Models and
Languages for Data and Objects, Ostfriesland, Germany, October 5-9,
1998. (submissions due: Abstract by March 27, 1998). [posted here:
2/5/98]
This international workshop will be the seventh in a series focusing
on foundations of models and languages for data and objects. In
order to stimulate extensive discussions, the time for the
presentation of a long (short) paper is 60 (30) minutes followed by
about 30 (15) minutes of discussion. Furthermore, another
participant will be asked in advance to prepare a response to the
work presented. Due to the special character of the workshop, every
participant is expected to stay for the complete duration of the
workshop. Typical, but not exclusive topics of interest are:
distributed and federated databases, object oriented databases,
deductive databases, temporal aspects, logics and semantics,
database and information systems design, integrity and security,
query languages and optimization, databases in world-wide nets, and
database dynamics. Authors are cordially invited to submit four
copies of their contribution (extended abstract) preferably in
electronic form (uuencoded gzipped PostScript) by March 27, 1998 to:
Klaus-Dieter Schewe / Institut f"ur Informatik / Technische
Universit"at Clausthal / Erzstr. 1 / 38678 Clausthal-Zellerfeld /
Germany. Email: schewe@informatik.tu-clausthal.de. Papers should not
exceed 10 pages (single-spaced, 12pt, US letter or A4 paper) for
long presentations, and 5 pages for short presentations and for
working group proposals.
COMSAC'98 Twenty-second Annual International Computer Software
and Applications Conference, Vienna, Austria, August 17-21.
(submissions due: January 15, 1998) [posted here: 12/22/97]
Topics of interest include all aspects of software security and
safety. Six copies of original papers (3000-5000 words) due to
program co-chairs (by area, see web page) by January 15, 1998.
Further information on web page or: thura@mitre.org, ako@aqu.hitachi-sk.co.jp,
boasson@signaal.nl
NBIS'98 International Workshop on Network-Based Information
Systems Vienna, August 24-28, 1998. (Submissions due: February 20,
1998) [posted here 2/5/98]
The main objective of this workshop is to bring together researchers
from both network systems and information systems with the aim of
encouraging the exchange of ideas and experience between these two
communities. It will represent an international forum to give an
overview of the most recent trending. Topics of interest include but
are not limited to: Communication Networks, Internet Applications,
Web-based database systems, Distributed Cooperating Information
Systems, Groupware, Distributed and Parallel Algorithms, Multimedia
Computing Systems, Mobile Computing Systems, Distributed
Object-Oriented Systems, Interoperable Systems, Electronic Commerce,
and Security and Privacy. All submitted papers MUST be formatted
according to the author guidelines provided by IEEE Computer Society
Press and MUST NOT be longer than FIVE pages. The author guidelines
can be found at
www.ifs.univie.ac.at/~ww/format.html. Complete instructions for
paper submission are detailed on the conference web page. For any
further questions or inquiries please contact: Professor Makoto
Takizawa/ Dept. of Computers and Systems Engineering/ Tokyo Denki
University/Ishizaka, Hatoyama, Saitama 350-0311, Japan/ Tel.
+81-492-96-2911 ext.2507 Fax. +81-492-96-6185 (or 0501)/ e-mailtaki@takilab.k.dendai.ac.jp
URL
http://www.takilab.k.dendai.ac.jp/
VLDB'98
24th International Conference on Very Large Data Bases, New York,
NY, August 24-27, 1998. (Submissions due: February 16 & 23, 1998)
[posted here 12/22/97]
Topics of interest include authorization and security. Submissions
in various categories due by February 23, 1998, with abstracts of
original research papers due 16 February to Jennifer Widom, widom@cs.stanford.edu,
or Oded Shmueli, oshmu@cs.technion.ac.il. Details available on web
page.
ECOMM,
International Workshop on Business Process Reengineering and
Supporting Technologies for Electronic Commerce, Vienna, August
24-28, 1998. (submissions due: March 15, 1998). [posted here:
3/2/98] The purpose of this workshop is to bring together
researchers and practitioners who are working in technology areas of
business process reengineering and electronic commerce in order to
discuss recent research findings and address complementary research
and development issues. Of particular interest are papers describing
reengineering of existing business processes to address the rapid
growth of the internet market and cross the chasm between
organizational structures and e-commerce. Papers describing
technologies and systems to support such reengineering efforts are
also solicited. A complete list of topics and detailed instructions
for submitting a paper are given on the conference web page at
www.di.uoa.gr/~dexa98/e-commerce.html>.
MDDS'98 International workshop on Mobility in databases and
Distributed Systems, Vienna, Austria, August 24-28, 1998.
(submissions due: March 10, 1998). [posted here: 2/9/98] The
objective of this workshop is to bring together researchers and
practitioners with mobile communications background, database
research interests, advanced applications and distributed computing
systems research and development skills to discuss all aspects of
emerging mobile computing paradigm. A complete list of topics of
interest can be found on the conference web page. Papers should be
in English and must not exceed 6000 words. The cover page should
include the name and affiliation of the author(s), contact address/es,
e-mail, fax and telephone. Authors are invited to send either 5
copies of their paper by courrier mail or an electronic submission
(PostScript, Adobe Acrobat PDF, Microsoft Word) to Arkady Zaslavsky
/ DEXA'98 MDDS Workshop / Monash University / School of Computer
Science and Software Engineering / 900 Dandenong Road, Caulfield
East / VIC 3145 Australia / (e-mail): A.Zaslavsky@Monash.edu.au /
(phone): +61-3-9903-2479 / (fax): +61-3-9903-1071. Authors of
accepted papers will be expected to present their work at the work
shop. All attendees must register for the DEXA'98 conference.
Details about the DEXA'98 conference can be found at
http://www.ifs.tuwien.ac.at/de xa98.
DEXA-SIDIA'98
International Workshop on Security and Integrity of Data Intensive
Applications, Vienna, Austria, August 26-28, 1998. (Submissions due
March 15, 1998) [posted here 12/22/97]
Submissions (short papers up to 2500 words or full papers up to 5000
words) due March 15, 1998. Electronic submission preferred; contact
dexa98ws@wi-inf.uni-essen.de and see web page for full details
http://www.wi-inf.uni-essen.de/~dexa98ws.
USENIX'983rd
USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA,
August 31 - September 3, 1998. (extended abstracts due: March 6,
1998) [posted here: 2/5/98] The Workshop on Electronic Commerce
will begin with tutorials which offer in-depth instruction in
essential technologies. The one day of tutorials will be followed by
three days of refereed papers and panel presentations examining
topics in electronic commerce as well as the invited sessions
exploring Public Key Infrastructures. A list of areas of interest
for tutorials, papers, and panel sessions, along with instructions
for submission, are given on the conference web page. Questions
about topics should be addressed to the program chair via electronic
mail to ec98chair@usenix.org.
Technical paper submissions and proposals for panels must be
received by March 6, 1998. Work-In-Progress reports must be received
by March 20, 1998.
IFIP/SEC'98
International Information Security Conference, Vienna and Budapest,
Austria and Hungary, August 31-September 4, 1998. (submissions due:
January 16, 1998) [posted here 7/7/97]
SEC '98 covers a wide range of security related topics. It comprises
both emphasis in technical as well as commercial aspects of
information security. The conference is held within the framework of
the IFIP World Computer
Congress. Contact: Prof. Dr. Reinhard Posch; IAIK
Klosterwiesgasse 32/I A-8010 Graz, AUSTRIA Tel: +43 316 8735510 Fax:
+43 316 873520. e-mail: rposch@iaik.tu-graz.ac.at.
CIA'98 2nd International Workshop, Cooperative Information
Agents- Learning, Mobility and Electronic Commerce for Information
Discovery in the Internet, Cite de Sciences - La Vilette, Paris,
France, July 3-8, 1998. (Submissions due: February 6, 1998) [posted
here: 12/22/97].
The research and application area of cooperative information agents
is of rapidly increasing importance. The development of cooperative
information agents requires expertise from several different
research areas, especially AI, DAI, Databases, and CSCW. The
interdisciplinary CIA workshop series covers the whole thematic
range of cooperative information agents. The CIA-98 workshop will
build on the success of CIA-97 ('DAI meets Databases') and mainly
focus on the themes 'learning', 'mobility' and 'electronic commerce'
in the context of cooperativer information discovery. A complete
list of topics and detailed instructions on paper submission is
given on the conference web page, or you may contact: Matthias
Klusch/Technical University of Chemnitz/Computer Science Department/Strasse
der Nationen 62/Phone: +49-371-531-1511, Fax: +49-371-531-1530/EMail:
klusch@informatik.tu-chemnitz.de
ACISP'98
Third Australasian Conference on Information Security and Privacy,
Brisbane, Australia, July 13-15, 1998. (Submissions due: February
20, 1998) [posted here 12/22/97]
Papers solicited pertaining to all aspects of information security
and privacy are solicited. Papers may present theory, techniques,
applications and practical experiences on any relevant topic.
Electronic submissions (preferred) or seven copies of hard copy
anonymized submissions due February 20, 1998, to acispsubmit@isrc.qut.edu.au
or A/Prof Ed Dawson, Queensland University of Technology. Details
available on web page.
IFIP WG11.3 Twelfth Annual IFIP WG 11.3 Working Conference on
Database Security, Porto Carras Complex, Chalkidiki, Greece, July
15-17, 1998. (submissions due: March 10, 1998). [posted here:
7/7/97]
The conference provides a forum for presenting original unpublished
research results, practical experiences, and innovative ideas in
database security. Papers and panel proposals are solicited. The
conference is limited to about forty participants so that ample time
for discussion and interaction may occur. Preliminary conference
proceedings will be distributed to participants; revised papers and
an account of the discussions at the meeting will be published by
IFIP as the next volume in the ``Database Security: Status and
Prospects'' series. Authors are invited to submit five copies of
their papers to the program chair. Manuscripts must be in English,
typed in double spaced format in 12 point font, and not more than
5000 words. Each copy should have a cover page with name, title, and
address (including e-mail address) of authors, and an abstract of no
more than 200 words. Electronic or fax submissions will not be
accepted. Proposals for panels should include a one-page description
of the subject matter and should be submitted electronically.
Program chair: Professor Sushil Jajodia, Mail Stop 4A4, George Mason
University, Fairfax, VA 22030-4444, USA. Tel: 703-993-1653, Fax:
703-993-1638, email: jajodia@gmu.edu
http://www.isse.gmu.edu/~csis/faculty/jajodia.html More
information about the conference and about IFIP WG 11.3 can be found
at URL:
http://www.cs.rpi.edu/ifip/.
WFMSP'98
Workshop on Formal Methods and Security Protocols, Indianapolis,
Indiana, (following LICS'98) June 25, 1998. (Submissions due March
13) [posted here 12/22/97]
Correspondence and submissions to nch@research.bell-labs.com and
wing@cs.cmu.edu. Details available on web page.
ISCC'98The Third IEEE Symposium on Computers and Communications,
Athens, Greece, June 30-July 2, 1998. [posted here 11/9/97]
The fast growing convergence between communications and computer
technologies is having an increasingly profound impact on
information and networking systems. This third annual event will
provide a technical forum for experts from industry and academia to
exchange ideas and present results of ongoing research in the areas
listed on the conference web page at
www.cs.bu.edu/ftp/amass/ISCC/.
Euro-PDS'98
The Second European Conference on Parallel and Distributed Systems,
Vienna, Austria, July 1-3, 1998. [posted here 2/16/98].
The purpose of the Second European Conference on Parallel and
Distributed Systems is to bring together developers and researchers
from universities, industry and government to advance the field of
parallel and distributed computing. A complete list of topics is
given on the conference web page. Of particular interest to readers
of this listing is the area of "Interoperability and Security."
SICON'98 6th IEEE Singapore International Conference on
Networks, Singapore, July 1-4, 1998. [posted here 7/7/97]
The National University of Singapore and Computer Chapter (IEEE
Singapore Section) are pleased to announce the 6th IEEE Singapore
International Conference On Networks (SICON'98) in Singapore. The
conference will start with two days of tutorials, and will continue
with two days of technical presentations. As with the previous
conferences, SICON'98 will provide a forum to bring together
International and regional researchers, who are actively involved in
research in computer networks and communications area. A complete
list of topics of interest is given in the
call for papers and on the conference web page at
http://www.iscs.nus.edu.sg/~sicon.
SIGMOD'98ACM SIGMOD/PODS '98 Joint Conference, Seattle,
Washington, USA, June 1-4, 1998 (submissions due: abstract by
October 27, 1997; full paper by November 3, 1997) [posted here
9/29/97]
The 1998 ACM-SIGMOD Conference will bring together researchers,
practitioners, developers and users to explore new concepts, tools,
and techniques for database management systems. The conference will
provide a forum for the dissemination of original research
contributions as well as contributions related to practical system
design, implementation, and evaluation. A complete list of topics of
interest can be found on the conference web page at
http://www.boeing.com/sigmod98/ All submissions (including
technical papers, panels, demos, tutorials and industrial
submissions) must be received by November 3, 1997. Submissions
should be sent to the program chair: Laura M. Haas, IBM Almaden
Research Center K55/B1, 650 Harry Road, San Jose, CA 95120-6099 USA.
e-mail: sigmod98@almaden.ibm.com phone: 408-927-1722 fax:
408-927-3215. For research papers, submit six copies of an original
manuscript to the program chair. It should be less than 25 pages,
double-spaced, in no smaller than 10 point font (and with normal
margins). The address, telephone number, FAX number, and electronic
address of the contact author should be given on the title page of
the submission. In addition, you must submit to the program chair by
electronic mail a PLAIN ASCII file (no postscript, no LaTex)
containing the title of the paper, the authors, and an abstract of
250 words or less by October 27, 1997. There are additional
guidelines for submitting tutorial proposals. Please see the
call-for-papers.
EUROCRYPT'9816th Annual IACR Eurocrypt Conference, Helsinki,
Finland, May 31-June 4, 1998. (submissions due November 11, 1997)
[posted here 2/9/98]
General Information: Original papers on all technical aspects of
cryptology are solicited for submission to Eurocrypt '98, the 16th
Annual IACR Eurocrypt Conference. Eurocrypt '98 is organized by the
International Association for Cryptologic Research (IACR) and in
cooperation with the Helsinki University of Technology. For more
information, access
http://www.iacr.org/ Instructions for authors: A submission must
contain a cover letter, one title page and 20 copies of the paper
(double-sided copies preferred). The paper should be at most 12
pages excluding the bibliography and clearly marked appendices, and
at most 15 pages in total. Submissions must be received by the
program chair at the address given below no later than November 11,
1997 (or postmarked by November 3, 1997, and sent via airmail or
courier). Detailed directions regarding the cover letter and the
apper are given on the conference web page. For additional
information, please contact: Arto Karila, General Chair Eurocrypt
'98 / Helsinki University of Technology / Telecommunications
Software and Multimedia Lab / P.O.Box 1100 / FIN-02015 HUT, Finland
/ Phone: +358-9-451-2173 / Fax: +358-9-451-3293 / E-mail:
Arto.Karila@hut.fi
PODS'98ACM SIGMOD/PODS '98 Joint Conference, Seattle,
Washington, USA, June 1-4, 1998 [posted here 9/29/97]
The Symposium on Principles of Data Base Design will focus on new
developments in the fundamental aspects of databases. Original
research papers on the theory, design, specification, or
implementation of databases are solicited. Papers emphasizing new
topics or foundations of emerging areas are especially welcomed. A
complete list of topics of interest can be found on the conference
web page at
http://www.boeing.com/sigmod98/ Submissions of extended
abstracts can be sent, in twelve copies, to one of the following two
addresses, to be received before the deadline of 17 November 1997:
Jan Paredaens, University of Antwerp (UIA), Universiteitsplein 1,
B-2610 Antwerp, Belgium (email: pods98@uia.ua.ac.be); or Dan Suciu,
AT&T Labs-Research, 180 Park Avenue room B294, Florham Park, NJ
07932-0971 (email: sucui@research.att.com). No electronic
submissions will be accepted. The address, telephone number, FAX
number, and e-mail address of the contact author should be given on
the title page of the submission. A limit of 10 pages is placed on
submissions. Font size should be at least 10 points. The abstract
must provide sufficient detail to allow the program committee to
assess its merits and should include appropriate references to and
comparisons with the literature.
CAiSE*'98
10th Conference on Advanced Information Systems Engineering, Pisa,
Italy, June 8-12, 1998. [posted here: 2/16/98].
CAiSE*98 is the 10th in the series of CAiSE Conferences which
provide a forum for presentation and exchange of research results
and practical experiences within the field of Information Systems
Engineering. A special theme of the CAiSE*98 Conference is
"Information Systems Engineering in Public Administrations". The
scientific programme consists of paper presentations, workshops,
tutorials, and interactive panel sessions. A complete list of topics
and up-to-the-minute information is given on the conference web page
at
www.pianosa.cnuce.cnr.it/caise98. Questions regarding the
Program of the Conference can be sent to: caise98@elet.polimi.it.
Questions regarding the Organisation of the Conference can be sent
to: G.Mainetto@cnuce.cnr.it.
CSFW11 11th IEEE Computer Security Foundations Workshop,
Rockport, Massachusetts, USA, 9-11 June, 1998. (Submissions due:
February 6, 1998) [posted here: 10/22/97].
This workshop brings together researchers in computer science to
examine foundational issues in computer security. We are interested
both in papers that describe new results in the theories of computer
security and in papers and panels that explore open questions and
raise fundamental concerns about existing theories. The paper
submission deadline is February 6, 1998. See the web page, or email
Program Chair (snf22@ccsr.cam.ac.uk) for full details.
WETICE'98 IEEE Seventh International Workshops on Enabling
Technologies: Infrastructure for Collaborative Enterprises, Stanford
University, California, USA, June 17-19, 1998. (Submissions due:
January 30, 1998) [posted here 12/22/97]
Topics include mobile agents, mobile objects, mobile computing,
security and mobility, locating mobile entities, and communicating
with mobile entities (see the web page for details). Papers
submitted for the workshop should not be more than 15 pages in
length. Submission should be mailed to the workshop chair, or made
available for downloading over the Web.
IEEE-S&P'981998 IEEE Symposium on Security and Privacy, Oakland,
California USA, May 3-6, 1998. (submissions due: November 24, 1997)
[posted here 9/29/97]
The Symposium on Security and Privacy has, for 18 years, been the
premier forum for the presentation of developments in computer
security and for bringing together researchers and practitioners in
the field. Last year, we began to re-emphasize work on engineering
and applications while maintaining our interest in theoretical
advances. The continued effort to broaden the scope of the
conference (along with the topics of interest) are described in the
call for papers. Papers should be submitted by mail or the various
express carriers. Papers will NOT be accepted by fax. Papers should
include an abstract, must not exceed 7500 words, and must report
original work that has not been published previously and is not
under consideration for publication elsewhere. The names and
affiliations of authors should appear on a separate cover page only,
as "blind" refereeing is used. If authors remove bibliographic
citations for "blind" refereeing, those citations should also be
included on the separate cover page only, so that the program
co-chairs can verify the citations, without compromising the "blind"
refereeing by the program committee members. Panel proposals should
include a title, an abstract which describes the topic(s) to be
discussed, the names of all proposed participants and assurances
that the participants agree to serve on the panel, a proposed length
and format for the panel and any other information that the panel
proposer thinks would support their proposal. Paper or panel
proposals should be sent to: Paul A. Karger, Program Co-Chair, IBM
Corporation, Thomas J. Watson Research Center, 30 Saw Mill River
Road, Hawthorne, NY 10532, USA. Please mark the envelope "IEEE
Security and Privacy Symposium." We would also like to have an
electronic, ascii text version of the abstract sent seperately to
secprv98@watson.ibm.com. The electronic version of the abstract
should include the title and the abstract as it appears in the
paper. Authors who submit an abstract for a 5-minute talk should
include a title, all authors names and their affiliations, where
appropriate, and text. The whole should fit easily on one 8.5" by
11" page. Abstracts for 5-minute talks should be sent to Paul A.
Karger at the above U.S. Postal address to be received no later than
Friday, April 10, 1998 at 6:00 P.M (EST). Please mark the envelope
"IEEE Security and Privacy Symposium - 5 minute Abstracts" If you
have questions about the submission procedures, please contact Paul
Karger by electronic mail at secprv98@watson.ibm.com or by telephone
at +1 (914) 784-7294. The call-for-papers is at
www.research.att.com/~reiter/oakland98.html
DOCS'98 Second
Workshop on Distributed Object Computing Security, Baltimore,
Maryland, USA. May 5-7, 1998, (submissions due: January 9, 1998)
[posted here 12/22/97]
Topics of interest include DOC security standards, product design
issues, security integration issues, and security operational
issues. One page position statement to be submitted by 9 January
1998 to secws-submissions@omg.org. Further information from web page
or co-chairs Richard Soley, OMG, soley@omg.org, or David Chizmadia,
NSA, dmc@tycho.ncsc.mil.
WebDB'98 International Workshop on the Web and Databases,
Valencia, Spain, March 27-28 1998 (in conjunction with EDBT '98,
http://mistral.dsic.upv.es/~edbt98/). (submissions due: January
12, 1998) [posted here 12/22/97]
Topics of interest include security and integrity issues. Submit
extending abstract, 6pp (3000 words) or less, by January 12 in
Postscript or HTML by e-mail to webdb98@inf.uniroma3.it.
ETAPS'98 European Joint Conferences on Theory and Practice of
Software, Lisbon, Portugal, March 30-April 3, 1998. [posted here
7/7/97]
The European Joint Conferences on Theory and Practice of Software (ETAPS)
is a new annual meeting covering a wide range of topics in Software
Science which will take place in Europe each spring in the slot
currently occupied by CAAP/ESOP/CC and TAPSOFT. ETAPS is a loose and
open confederation of existing and new conferences and other events
which aims to become the primary European forum for academic and
industrial researchers working on topics relating to Software
Science. The call for papers is now open for the five main
conferences of ETAPS'98. See the ETAPS web page
http://www.di.fc.ul.pt/~llf/etaps98/ for more details about the
scope and submission instructions of each individual conference.
Prospective authors who have no access to WWW should use the e-mail
address given for each conference to obtain further information.
- Foundations of Software Science and Computation Structures (FoSSaCS):
E-mail address: Maurice.Nivat@litp.ibp.fr
- Fundamental Approaches to Software Engineering (FASE): E-mail
address: fase98@disi.unige.it
- European Symposium On Programming (ESOP): E-mail address: clh@doc.ic.ac.uk
- International Conference on Compiler Construction (CC): E-mail
address: koskimie@cs.uta.fi
- Tools and Algorithms for the Construction and Analysis of
Systems (TACAS): E-mail address: tacas98@fmi.uni-passau.de
AGENTS-EMCSR'98
From agent theory to agent implementation: A Symposium at the 14th
European Meeting on Cybernetics and Systems Research (EMCSR'98)
Vienna, Austria, April 14-17, 1998. (submissions due: November 8,
1987) [posted here 2/9/98]
The main objective of this symposium is to foster the exchange of
ideas and experience among researchers working on theoretical and
practical issues of agent technology, covering both the micro and
macro aspects of agent design. Topics of intrest include: Agent
languages and architectures, Applications, Communication, Conceptual
and theoretical foundations, Development and engineering
methodologies, Learning and adaptability, Safety, security, and
responsibility issues, Single vs. multi-agent systems, Social issues
in agent societies, Testbeds and evaluations, and User interface
issues. For details of how to prepare the draft final paper, see the
guidelines for the main EMCSR conference published on the EMCSR web
server. Draft final papers should not exceed 10 single-spaces A4
pages, final papers must not exceed 6 pages (10 point, two column).
For any further information on this symposium please contact the
local co-chair: Paolo Petta / Austrian Research Inst. for Artificial
Intelligence / Schottengasse 3 / A-1010 Vienna Austria, Europe /
email: paolo@ai.univie.ac.at / Fax: +43 1 5336112-77.
IH Workshop Workshop on Information Hiding, Portland, Oregon,
USA. April 15-17, 1998. (submissions due: December 31, 1997) [posted
here 10/1/97]
Many researchers are interested in hiding information or in stopping
other people doing this. Current research themes include copyright
marking of digital objects, covert channels in computer systems,
subliminal channels in cryptographic protocols,
low-probability-of-intercept communications, broadcast encryption
schemes, and various kinds of anonymity services ranging from
steganography through location security to digital elections. These
closely linked areas of study were brought together in 1996 by a
workshop on information hiding held at the Isaac Newton Institute in
Cambridge. This second international workshop on information hiding
will be held in Portland, Oregon from the 15th to the 17th April
1998. Interested parties are invited to submit papers on research
and practice which are related to these areas of interest.
Submissions can be made electronically (latex or postscript;
preferred format is latex using llncs.sty) or in paper form; in the
latter case, send eight copies suitable for blind refereeing (the
authors' names should be on a separate cover sheet and there should
be no obvious references). Papers should not exceed fifteen pages in
length. Submit papers to: David Aucsmith, Intel Architecture Labs,
5200 N. E. Elam Young Parkway, Hillsboro, OR 97124-6497, USA.
(email: awk@ibeam.intel.com)
WWCA'98Second International Conference on World Wdie Computing
and its Applications, Tsukuba Daiichi Hotel, Tsukuba, Japan, March
3-4, 1997. [posted here 11/9/97]
Conference information can be found on the web page at
http://ci.etl.go.jp/wwca98
EUROMED-NET'98
Special Track on Electronic Commerce on the Internet, Nicosia,
Cyprus, March 4-7, 1998. [posted here 2/9/98]
Topics to be covered by the track are listed below, split into two
categories, namely horizontal and vertical areas. The horizontal
areas to be addressed are: Dataweb Technology; Database systems and
multimedia systems in support of electronic commerce; Workflow
technology in support of electronic commerce; Transaction management
and electronic commerce; Intelligent agents and electronic commerce;
Security and electronic commerce; Electronic payment systems;
Standards in middleware and data exchange; Methodologies for
multimedia e-commerce systems; Mobile computing platforms, access
and standards; Distributed Systems and Applications and Support
Infrastructure; Middleware platforms and languages (CORBA, Java,
etc.); Coordination Models and Frameworks for seamless integration
of various components. The vertical areas to be addressed include
but are not limited to: Tourism; Healthcare; Transport; Textiles;
Maritime Industry; Chemicals; Distance Learning; Legal aspects of
electronic commerce. See the conference web page for details.
SNDSS'98The Internet Society Symposium on Network and
Distributed System Security, Catamaran Resort, San Diego,
California, March 11-13, 1998. [posted here 7/7/97]
The symposium will foster information exchange between hardware and
software developers of network and distributed system security
services. The intended audience is those who are interested in the
practical aspects of network and distributed system security,
focusing on actual system design and implementation, rather than
theory. Encouraging and enabling the Internet community to apply,
deploy, and advance the state of available security technology is
the major focus of symposium. A complete list of topics of interest
is given in the call for papers. The program committee invites
technical papers and panel proposals, for topics of technical and
general interest. Technical papers should be 10-20 pages in length.
Panel proposals should be two pages and should describe the topic,
identify the panel chair, explain the format of the panel, and list
three to four potential panelists. Each submission must contain a
separate title page with the type of submission (paper or panel),
the title or topic, the names of the author(s), organizational
affiliation(s), telephone and FAX numbers, postal addresses,
Internet electronic mail addresses, and must list a single point of
contact if more than one author. The names of authors, affiliations,
and other identifying information should appear only on the separate
title page. Submissions must be received by August 1, 1997, and
should be made via electronic mail in either PostScript or ASCII
format. All submissions and program related correspondence (only)
should be directed to the program chair: Matt Bishop, Department of
Computer Science, University of California at Davis, Davis CA
95616-8562, Email: sndss98-submissions@cs.ucdavis.edu. Phone: +1
(916) 752-8060, FAX: +1 (916) 752-4767. Dates, final call for
papers, advance program, and registration information will be
available at the URL:
http://www.isoc.org/conferences/ndss98
ICDE'98 The 14th International Conference on Data Engineering,
Orlando, Florida, USA, February 23-27, 1998.
Data Engineering deals with the use of engineering techniques and
methodologies in the design, development and assessment of
information systems for different computing platforms and
application environments. The 14th International Conference on Data
Engineering will continue in its tradition of being a premier forum
for presentation of research results and advanced data-intensive
applications and discussion of issues on data and knowledge
engineering. The mission of the conference is to share research
solutions to problems of today's information society and to identify
new issues and directions for future research and development work.
The complete list of topics, instructions for submitting papers or
panel proposals can be found in the
call for papers or the conference
web page.
PKC'98 1998 International Workshop on Practice and Theory in
Public Key Cryptography, Pacific Convention Center, Yokohama, Japan,
February 5-6, 1998. [posted here 9/29/97]
The main purpose of PKC'98 is to bring together both practitioners
and theoreticians who are working on public key encryption, digital
signature, one-way hashing and their applications to share their
experience and research outcomes. A complete list of topics of
interest can be found at
http://hideki.iis.u-tokyo.ac.jp/pkc98/ All correspondences,
including inquiries and submissions (details are on the conference
web page) will be made through e-mail. The official e-mail address
for PKC'98 is pkc98@imailab.iis.u-tokyo.ac.jp
7th USENIX Security Symposium, San Antonio, Texas; January
26-29, 1998.
The goal of this symposium is to bring together researchers,
practitioners, system programmers, and others interested in the
latest advances in security and applications of cryptography. This
will be a four day symposium with two days of tutorials, followed by
two days of refereed paper presentations, invited talks,
works-in-progress presentations, and panel discussions. Tutorials
for both technical staff and managers will provide immediately
useful, practical information on topics such as local and network
security precautions, what cryptography can and cannot do, security
mechanisms and policies, firewalls and monitoring systems. If you
are interested in proposing a tutorial, contact the tutorial
coordinator, Dan Klein: phone (412)421-2332 email
. In addition to the keynote presentation, the
technical program includes refereed papers, invited talks, a work in
progress session, and panel sessions. There will be
Birds-of-a-Feather sessions the last two evenings. You are invited
to make suggestions to the program committee via email to
. See the
conference web page
for details on topics and instructions for submission of work. The
deadline for submission of papers is September 9, 1997.
ADC'98 9th Australasian Database Conference, University of
Western Australia, Perth, Western Australia, February 2-3, 1998.
[posted here May 13, 1997]
The Australasian Database Conference series is an annual forum for
exploring research, development and novel applications of database
systems, particularly research into novel and emerging areas of
database systems and technology. Authors should submit either: four
(4) copies of a paper to the address below or one (1) copy of a
postscript version to adc98@cis.unisa.edu.au. Submitted papers
should be original, no longer than 5,000 words, and both the
submission and the camera ready copy must in A4 two column format,
no more than 10 pages in length, have 25mm margins, single spaced,
and in 10 point font). Papers must include the author's name,
address, e-mail address, a 200 word abstract, and 3 to 6 keywords
identifying the subject area. Papers may be submitted to: John
Roddick / ADC'98 / School of Computer and Information Science /
University of South Australia / The Levels, South Australia 5095 /
Australia / Telephone: +61 8 8302 3463 / Facsimile: +61 8 8302 3381
/ Email: adc98@cis.unisa.edu.au.
OBJ-CSA
OMG-DARPA Workshop on Compositional Software Architectures, Marriott
Hotel, Monterey, California, USA, January 6-8, 1998. [posted here
12/22/97].
The workshop will focus on the interactions between componentware
software architectures, and web and distributed object
architectures. Componentware did not exactly set the world on fire
five years ago. Now we have new languages, maturing visions of
compositional architectures (CORBA, WWW, ActiveX, ....), the web as
a distributed system with a low-entry barrier, and emerging
middleware service architectures. Do we have the critical mass to
jump start the component-based software cottage industry? Even if
the technology enablers are there, what is needed to establish an
effective componentware market? What are the remaining barriers? The
workshop is intended to bring together a mix of leading industry,
government, and university software architects, componentware
framework developers, researchers, standards develpers, vendors, and
customers.
ENCXCS'97
Engineering Complex Computer Systems Minitrack, part of the Emerging
Technologies Track of the 31st Annual, Hawaii International
Conference on Systems Sciences (HICSS), Big Island of Hawaii, HI,
January 6-9, 1998. [posted here 5/12/97]
The purpose of HICSS is to provide a forum for the interchange of
ideas, research results, development activities, and applications
among academicians and practitioners in computer-based systems
sciences. The conference consists of tutorials, advanced seminars,
presentations of accepted papers, open forum, tasks forces, and
plenary and distinguished guest lectures. There is a high degree of
interaction and discussion among the conference participants because
the conference is conducted in a workshop-like setting. More
information about the Minitrack can be obtained from the web page at
http://www.ce.unipr.it/hicss
or via email from Track Chair Ralph H. Sprague, Jr., sprague@hawaii.edu.
For more information, visit the HICSS Web site at:
http://www.cba.hawaii.edu/hicss.
WECS'98 Workshop on Education in Computer Security, Asilomar
Conference Center, Pacific Grove, CA, January 19-21, 1988.
(submissions due: December 15, 1997). [posted here 11/9/97]
The Workshop on Education in Computer Security is intended to bring
together those interested in developing and enhancing instruction in
computer security within undergraduate and graduate computer science
programs. The Workshop's objectives are to provide a forum for
discussion of ideas and techniques in computer security education.
The theme for the 1998 workshop will be the use of laboratory
activities to enhance educational objectives. It is expected that
the outcome of the workshop will be a set of laboratory exercises
that can be used by the participants and others to enhance the
teaching of security objectives. The meeting will also feature a
half-day tutorial on Penetration Testing by Daniel Faigin, of the
Aerospace Corporation. Penetration Testing is a holistic flaw
assessment approach that is applied to expose weaknesses in an
implemented system. This form of system stress testing is likely to
be appealing to students and provides a rigorous framework from
which instructors may fashion laboratory and course material. All
participants must: (a) Submit a laboratory exercise, (b) Make
conference center reservations, and (c) Complete the workshop
registration form. Educators from undergraduate and graduate
programs wishing to participate in the workshop are requested to
submit a laboratory exercise or project description used to provide
instruction on a topic in Computer or Network Security. Exercises
should be submitted on or before 15 December 1997. All exercises
will be organized in a collection which will be prepared for
distribution to participants at the meeting. Submissions should be
sent to: Prof. Cynthia E. Irvine, Computer Science Department, Code
CS/Ic , Naval Postgraduate School, Monterey, CA 93943-5118, USA
Voice: +1 408 656 2461 Fax: +1 408 656 2814 irvine@cs.nps.navy.mil
Hard copy and e-mail submissions are acceptable. Complete submission
instructions and local arrangements can be found on the conference
web page at
www.cs.nps.navy.mil/research/cisr/events/wecs98_announce.html.
ICOIN-12 The 12th International Conference on Information
Networking, Koganei, Tokyo, Japan, January 21-23, 1998. [posted here
10/1/97]
The International Conference on Information Networking (ICOIN) is to
provide an international forum for scientists, engineers, computer
users, and students to exchange and share their experiences, new
ideas, and research results about all aspects of communication
networks and distributed computing systems. This is the fourth
conference with the new name of ICOIN, which succeeds the Joint
Workshop on Computer Communications (JWCC) starting from 1985. A
complete list of topics of interest can be found in the call for
papers. Further Information:
http://takilab.k.dendai.ac.jp/conf/icoin12/ or please contact:
Prof. Makoto Takizawa, Dept. of Computers and Systems Engineering,
Tokyo Denki University, Ishizaka, Hatoyama, Saitama 350 03, Japan,
Tel. +81 492 96 2911 ext. 2507, Fax. +81 492 96 6185.
|