Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:01/13/05

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 1997

 

ICICS'97 International Conference on Information and Communications Security, Chinese Academy of Science, Beijing, P. R. China, November 11-13, 1997.
International Conference on Information and Communications Security represents international research and development in the area of information and communications security. The conference is held every two years (during years when Asiacrypt is not held) in different Asian countries, and it attracts audience from the academic, commercial and industrial communities. Areas of interests include but not restricted to the following: Access Control, Authentication, Block Ciphers, Database Security, Electronic Commerce, Fraud Control, Hash Functions, Intellectual Property Protection, Internet and Intranet Security, Intrusion Detection, Key Management, Key Recovery, Network Security, Operating System Security, Personal Mobile Security, Protocols, Public Key Systems, Secret Sharing, Security Evaluation, Signatures, Smart Cards, Stream Ciphers, and Theoretical Foundations of Security. Submission guidelines for papers, panel proposals, and 5-minute talks are included in the full call-for-papers (ICICS'97).

 

CLEI'97 Chilean Computer Science Society, Valparaiso, Chile, November 12-14, 1997.
The conference will take place as part of a bigger event together with the XXIII Latin-American Conference in Informatics and the Fourth South American Workshop on String Processing locally organized by the Technical University Federico Santa Maria. More information can be found on the conference web page.

 

ICCC'97 International Conference for Computer Communications, Cannes, France, November 19-21, 1997.
The conference aims is to provide an integrated perspective and a timely spectrum of computer and communications technologies in the context of present and future applications. Topics include: New technologies, applications, and services; Trends and strategies; and Policy and governmental issues. A complete list of topics can be found in the call for papers and the conference web page.

 

IFIP-IICIS International Federation for Information Processing, First Working Conference on Integrity and Internal Control in Information Systems, Zurich, Switzerland December 4-5, 1997.
IFIP TC-11 Working Group 11.5 has been charged with exploring the area of the integrity objective within IT security and the relationship between integrity in information systems and the overall internal control systems that are established in organisations to support the corporate governance codes. A complete list of conference topics and updated information can be found on the conference web page at http://www.ifip.tu-graz.ac.at/TC11/CONF/CFPINS.html.

 

ACSAC'97Thirteenth Annual Computer Security Applications, December 8-12, 1997, San Diego, CA. [posted here 4/16/97]
This internationally recognized conference provides a forum for the world's experts in information system security to exchange ideas about solving critical problems relating to confidentiality and privacy, availability, and integrity. We are looking for papers, panels and tutorials that address: Emerging security standards for electronic commerce, New directions in cryptography and key management, Network management and smart card applications, New technologies for protecting electronic cache, Audit and audit reduction, New paradigms for protecting electronic intellectual capital, Securing very high-speed telecommunications, Defensive information warfare, Software safety and program correctness, and Security in health care and law enforcement. Information about papers, panel sessions, tutorial proposals, vendor displays, and student papers can be found on the conference web page at http://www.isse.gmu.edu/~acsac, or from the Program Chair at ACSAC_program_chair@smiley.mitre.org.

 

ISCOM'97 1997 International Symposium on Communications, National Tsing Hua University, Hsinchu, Taiwan, December 17-19,1997. [posted here May 27, 1997]
The 1997 International Symposium on Communications (ISCOM-97) is the 4th biennial symposium organized by the academic, research and industrial societies in communications in Taiwan and will be held at National Tsing Hua University, Hsinchu, Taiwan, from Wednesday December 17, 1997 to Friday December 19, 1997. An exhibition will be organized for local industrial companies and development/research institutes. Detailed information on accommodations, travel arrangements, excursions and the technical program will be included in subsequent mailings or can be reached via WWW at http://www.ee.nthu.edu.tw/~iscom97/. Please see the conference web page for the call-for-papers for a complete list of topics and detailed instructions on submitting an abstract.

 

EDOC'97 The 1st International Enterprise Distributed Object Computing Workshop, Marriott Resort, Gold Coast, Australia, October 24-26, 1997. [posted here 5/13/97]
This first International Enterprise Distributed Object Computing Workshop will bring together experts from different backgrounds working on various aspects of Enterprise Distributed Object Computing. A further aim of the event is to promote this important topic within the Asia-Pacific Region. A list of topics can be found on the conference web page at: http://www.dstc.edu.au/events/edoc97/. Please email your enquiries to: edoc-info@dstc.edu.au Further details for the EDOC'97 event and this Call For Papers can be found on the conference web page.

 

ICNP'97Fifth IEEE International Conference on Network Protocols, October 28-31, 1997, Swissotel, Atlanta, GA. [posted here 4/16/97]
ICNP deals with the entire development cycle of communication network protocols, from design and specification, to verification, testing, performance analysis, implementation, and performance tuning. Protocol functions of interest include (but are not limited to) the following: network access, switching, routing, flow and congestion control, multimedia transport, network security and management, interoperability, and internetworking. See the Conference's web page at http://www.cc.gatech.edu/conferences/icnp97 for information.

 

WebNet'97 World Conference of the WWW, Internet, and Intranet, Toronto, Canada, October 31-November 5, 1997.
The second World Conference of the WWW, Internet, and Intranet is an international conference, organized by the Association for the Advancement of Computing in Education (AACE) in cooperation WWW/Internet businesses & industry. This annual conference serves as a multi-disciplinary forum for the exchange of information on the development, applications, and research on all topics related to the Web. This encompasses the use, applications and societal and legal aspects of the Internet in its broadest sense. A list of topics of interest and information on submitting a paper can be found in the call for papers or on the conference web page.

 

RBAC'97 Second ACM Workshop on Role-Based Access Control, George Mason University, November 6-7, 1997.
The central idea of Role-Based Access Control (RBAC) is that users acquire and use permissions based on their current job functions, assignments and activities in an organization. The driving motivation for RBAC is to simplify security policy administration while facilitating the definition of flexible, customized policies. RBAC has been successfully applied since the mainframe era. Modern information systems will continue to use classical RBAC models, but the development of new modeling concepts and techniques will be required to support large-scale, enterprise-wide, distributed systems. The ACM workshop on RBAC brings together researchers, developers, and practitioners to discuss new ideas, developments, applications, requirements, problems, and solutions in the field of RBAC. The workshop invites participation from the database, network, distributed systems, operating system, security and application communities. Attendance is limited to 40 participants to foster a workshop atmosphere. A complete list of topics of interest and instructions for submitting a paper or panel session idea can be found in the call for papers or on the conference web page.

 

SOSP'97 16th ACM Symposium on Operating Systems Principles, St. Malo, France, October 5-8, 1997.
Authors are invited to submit papers to the 16th SOSP describing original research related to the design, implementation, and analysis of operating systems. We seek papers about systems issues on a wide range of platforms and environments, including embedded systems, network (WWW) computers, portable computers, PCs, workstations, high-performance machines, and production environments. Preference will be given to papers of unusual novelty or practicality and papers critiquing prior work or continuing a significant research dialogue. We seek a broad conference of high quality and relevance to current systems issues. A list of topics of interest and information on submitting a paper can be found in the call for papers or on the conference web page.

 

NISS'97 20th National Information Systems Security Conference, Baltimore, MD, USA, October 6-10, 1997. [posted here 5/13/97]
Conference topics include: Research & Development, Policy, Administration & Management, Partnerships, Criteria/Assurance/Standards/Testing, Debates/Views/Case Studies, Electronic Commerce, Internet, Legal/Forensics/Law Enforcement, Knowledge Learning. Also Displays from Government Groups, Book Displays, NIST Products and Services Display, and NSA Products and Services Display. Additional information can be obtained on the conference web page at http://csrc.nist.gov/nissc/ or from Phone:(410)850-0272, Fax:(410)859-4375, EMAIL: NISSCONFERENCE@DOCKMASTER.NCSC.MIL.

 

MOBICOM'97 Third ACM/IEEE International Conference on Mobile Computing and Networking 1997, Budapest, Hungary, September 26-30, 1997.
The wireless communication revolution is bringing fundamental changes to telecommunication and computing. Wide-area cellular systems and wireless LANs promise to make integrated networks a reality and provide fully distributed and ubiquitous mobile computing and communications, thus bringing an end to the tyranny of geography. Furthermore, services for the mobile user are maturing and are poised to change the nature and scope of communication. This conference, the third of an annual series, serves as the premier international forum addressing networks, systems, algorithms, and applications that support the symbiosis of mobile computers and wireless networks. A list of topics can be found in the call for papers and on the conference web page at http://www.monarch.cs.cmu.edu/~mobicom97/.

 

WOBIS'972nd Int'l Workshop on Satellite-based Information Services, Budapest, Hungary, October 1, 1997. (submissions due July 3, 1997). [posted here May 27, 1997]
As its popular predecessor held in conjunction with MobiCom'96, the objective of this workshop is to provide a forum for exploratory research contributions on satellite applications and services. The services are characterized by direct or global broadcast capabilities of LEO, MEO, GEO satellites, low setup costs, high and possibly asymmetric bandwidth, and unconventional network routing. Applications of such services are often real-time, mobile, high bandwidth, and they include telemedicine, public information services, education, entertainment, Internet access, digital battlefield, emergency and disaster response. We invite papers for presentation and discussion at the workshop. Send a postscript copy of the paper by email to the address below. The page limit on all submissions is 5-10 pages, double spaced, 10 pt minimum (approximately 1500-2500 words). Send to: Yongguang Zhang, Hughes Research Labs, RL-96, Malibu, CA 90265, E-mail: ygz@isl.hrl.hac.com Updated conference information and a complete list of topics can be found on the conference web page at: www.wins.hrl.com/conferences/WOSBIS97/.

NSPW'97 New Security Paradigms '97, University of Newcastle upon Tyne, Great Langdale, Cumbria, UK, September 23-26, 1997.
Paradigm shifts disrupt the status quo, destroy outdated ideas, and open the way to new possibilities. This workshop explores deficiencies of current computer security paradigms and examines radical new models which address those deficiencies. Previous years' workshops have identified problematic aspects of traditional security paradigms and explored a variety of possible alternatives. Participants have discussed alternative models for access control, intrusion detection; new definitions of security, privacy, secrecy and trust; biological and economic models of security; multiple policies; and a wide variety of other topics. The 1997 workshop will strike a balance between building on the foundations laid in past years and exploring in new directions. More information can be found in the full call for papers, the conference web page, or send email to newparadigms97@opengroup.org.

 

IC3N97 Sixth International Conference On Computer Communications and Networks, Monte Carlo Hotel, Las Vegas Nevada, USA, September 22-25, 1997. [posted here 5/13/97]
The objective of this conference is to provide an effective forum for original and fundamental advances in Computer Communications and Networks and to foster communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in improving Computer Communications and Networks. For more information about the conference (as opposed to paper submissions) can be obtained from the full call for papers, the conference web page at http://www.cps.msu.edu/~ni/ic3n97, or via email at ic3n@cacs.usl.edu.

 

IDEAS'97 International Database Engineering and Applications Symposium, Montreal,Canada, August 25-27, 1997. [posted here 5/13/97]
The aim of this Symposium is to address the engineering and application aspects of databases. We invite quality papers describing original ideas and new results on applied technological and theoretical aspects of Database Engineering and Applications. In particular we welcome submissions describing work on integrating new technologies in products and applications, on experiences with standard and novel techniques, and on the identification of unsolved issues that pose challenges to and require attention by the research community. We consider this conference to be a unique and important forum to discuss experiences in applying DBMSs to real-life situations among practitioners, and between practitioners and researchers. More information can be found on the conferenece web page at: http://www.cs.concordia.ca/ideas/.

 

DIMACS'97 Workshop on Formal Verification of Security Protocols, DIMACS Center, CoRE Building, Rutgers University, September 3-5, 1997.
As we come to rely more and more upon computer networks to perform vital functions, the need for cryptographic protocols that can enforce a variety of security properties has become more and more important. Since it is notoriously difficult to design cryptographic protocols correctly, this increased reliance on them to provide security has become cause for some concern. This is especially the case since many of the new protocols are extremely complex. In answer to these needs, research has been intensifying in the application of formal methods to cryptographic protocol verification. The goal of this workshop is to facilitate this process by bringing together those were are involved in the design and standardization of cryptographic protocols, and those who are developing and using formal methods techniques for the verification of such protocols. To this end we plan to alternate papers with panels soliciting new paths for research. We are particularly interested in paper and panel proposals addressing new protocols with respect to their formal and informal analysis. Other topics of interest include, but are not limited to
- Progress in belief logics
- Use of theorem provers and model checkers in verifying crypto protocols
- Interaction between protocols and cryptographic modes of operation
- Methods for unifying documentation and formal, verifiable specification
- Methods for incorporating formal methods into crypto protocol design
- Verification of cryptographic API systems
- Formal definition of correctness of a cryptographic protocol
- Arithmetic capability required for proofs of security for number theoretic systems
- Formal definitions of cryptographic protocol requirements
- Design methodologies
- Emerging needs and new uses for cryptographic protocols
- Multiparty protocols, in particular design and verification methods
On-line conference information: registration form, accommodations, travel arrangements, and general conference information.

 

SAFECOMP'97 The 16th International Conference on Computer Safety, Reliability and Security, University of York, UK, September 8-10, 1997. [posted here 5/13/97]
SAFECOMP is an annual event reviewing the state of the art, experiences and new trends in the areas of computer safety, reliability and security. The conference focuses on critical computer applications. It is intended to form a platform for technology transfer between academia, industry and research institutions. More information can be found on the conference web page at http://www.cs.york.ac.uk/safecomp-97.

 

INTRA-FORA'97 First International Conference on INTRANET: Foundation, Research, and Applications,University of Linz, Linz, Austria, September 22-24, 1997.
The Research Institute FAW (Research Institute for Knowledge Processing), the Austrian Computer Society, the Technical University of Vienna (Institute of Software Technology), the Technical University of Prague, the University of Vienna (Department of Applied Informatics and Information) organise the First International INTRAnet Conference on Foundation, Research and Applications (INTRA-FORA). The conference should constitute a forum for in-depth discussions between researchers and practitioners on the emerging field of the INTRANET. The various aspects of the INTRANET (design, programming, communication, security, economical impacts etc.) should be covered at this event. Authors should submit (hard copy via mail or postscript via email) original double-spaced papers no longer than 5000 words to Monika Neubauer, FAW, University of Linz, Linz, Australia. A complete list of topics and details on submitting a paper can be found on the conference web page at http://www.ifs.tuwien.ac.at/intrafora or by email to intra@faw.uni-linz.ac.at.

 

IFIP'97 Eleventh Annual IFIP WG 11.3 Working Conference on Database Security, Lake Tahoe, California, August 11-13, 1997.
The conference provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in database security. Papers and panel proposals are solicited. Submissions will be refereed by the members of the Working Group and selected based on technical merit and their relevance to the aim of the IFIP Working Group 11.3. Information on specific areas of interest, and details on submitting a paper or panel proposal can be found on the conference web page.

 

HASE'97 IEEE* High-Assurance Systems Engineering Workshop (in conjunction with COMPSAC'97), August 11-12, 1997, Washington, DC.
The primary focus of the Workshop is on innovative research results in the area of high-assurance (highly reliable, highly available, safety-critical, real-time, and secure) systems. Complex systems' engineering issues, including hardware design, software engineering (both formal and informal methods), performance evaluation, and system assessment are particular focus of the Workshop. Of special interests are the integrated system design principles that consider multiple aspects of high assurance systems. The purpose of this Workshop is for public dissemination of such research results from academia, industry, and government. Topics of interest include, but are not limited to: Techniques for achieving high dependability; System life-cycle, specification, design, implementation, verification, and validation techniqes of high assurance systems; Evaluation methods and tools, including testing, reliability and availability assessment, performance evaluation, security assessment, etc. for high assurance systems; Application of formal methods on high assurance systems; Evolutionary design approaches for complex high-assurance systems; Software experiences for large high-assurance systems; CASE tools and other domain-specific tools for high-assurance systems; Cost model and assessment metrics for large software projects in the high-assurance domains; System management (scheduling, admission control, etc.) techniques for high assurance systems; Assurance monitoring systems. More information is available in the call for papers or the conference web page.

 

CRYPTO'97 August 17-21, 1997, Santa Barbara, California, USA.
Original papers on all technical aspects of cryptology are solicited for submission to Crypto '97, the Seventeenth Annual IACR Crypto Conference. Crypto '97 is organized by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. For more information, access the IACR web page or the call for papers (CRYPTO'97)

 

ACISP'97 Second Australasian Conference on Information Security and Privacy, Sydney, Australia, July 7-9, 1997.
The Program Committee invites technical papers and panel proposals for topics of technical and general interests. Papers may present theory, techniques, applications and practical experiences on a variety of topics including: network security, security protocols, electronic commerce, distributed system security, database security, security policy, security management, authentication, access control, Cryptology, key management, auditing, security architectures and models, mobile system security, secure operating systems, software and intellectual property protection, smart cards, secure intelligent agents and security evaluation and certification. Papers relating to practical experience and commercial applications in security are particularly welcome. More information is available in the call for papers.

 

FMP'97 Formal Methods Pacific '97, July 9-11, 1997, Victoria University of Wellington, Wellington, New Zealand.
Formal Methods Pacific will provide a forum for discussion of current research on mathematically-based techniques for design and development of computer systems. We are especially interested in papers concerning formal and/or rigorous methods for developing executable programs from abstract specifications, tool support for formal software development, and practical experience with formal methods. We would also welcome papers in related areas, such as software specification and verification, hardware specification and verification, and specification and development of real-time and concurrent systems. More information about FMP'97 can be found at the FMP'97 web page, or contact Lindsay Groves (Convenor FMP'97) at lindsay@comp.vuw.ac.nz.

 

NGITS'97 The Third International Workshop on Next Generation Information Technologies and Systems, Neve Ilan (near Jerusalem), ISRAEL, June 30 - July 3, 1997.
The next generation information systems will be complex, intelligent, and cooperative, and will utilize various multimedia-media technologies. The goal of the NGITS Workshop is to provide an international forum for discussing issues and solutions related to next generation information systems and the technologies that would make them possible. Workshop topics include: Decision Support Systems, Electronic Commerce and Interoperability, Data and knowledge base systems, Data modeling, Information retrieval, human-computer interaction, AI techniques, software engineering and information systems development, management information systems, and advanced applications. Up-to-date information can be found on the conference web page.

 

IWFM'97 1st Irish Workshop on Formal Methods Dublin, Ireland, July 3-4, 1997.
The first Irish Workshop on Formal Methods will be held in University College Dublin on the 3rd and 4th of July, 1997. We seek submissions of papers in the general area of formal methods, theoretical computer science, and mathematics, covering, but not restricted to, the following topics: formal systems, proof systems, mathematical models of computing, semantics, tools, industrial and teaching experiences. The workshop is being organised by the Irish Formal Methods Special Interest Group (IFMSIG). More information can be found on the Workshop Web page.

 

WETICE97 Second International Workshop on Enterprise Security, MIT, Cambridge, Massachusetts, USA, June 18-20, 1997. (submissions are due May 30, 1997??) [posted here May 27, 1997].
This workshop will focus on the problems and challenges relating to enterprise security in inter-organizational systems. We aim to bring together principal players from both the internetwork and enterprise security community and will provide plenty of time for discussion. The agenda will include panels on: Internet Security and IETF, and Building Secure Knowledge Systems; and paper sessions on: Security Infrastructure and Management, Security for the Internet/Web, Secure Collaboration Environments, and Role-Based Access Control. Details on the workshop and submitting a paper can be found on the workshop web page at: www.cerc.wvu.edu/SECWK/index.html.

 

IESS'97 Computer Related Standards and Safety, a workshop of the 3rd International Symposium on Software Engineering Standards, Walnut Creek, California, USA, June 1-6, 1997. [posted here 5/12/97].
Software oriented, system related and industry specific computer related safety standards are proliferating internationally. At the same time, consensus on such development seems to elude the computer science community. There is now a real need to take stock of developments over the last few years and assess the effectiveness of both the standards making process and the standards themselves in order to chart the way ahead. This workshop aims to bring together people interested in participating in an active debate on and formulating a future agenda for: (a) the shape, form, substance and interrelationships of computer related safety standards, (b) the computer related safety standards making process in terms of needs and priorities, and (c) the effectiveness of current computer related safety standards. Preregistration and information enquiries should be sent to: Lorna Kyle, Department of Computer Science, Queen Mary and Westfield College, University of London, London E1 4NS, United Kingdom - Tel: (+44) 171 975 5227, Fax: (+44) 181 980 6533, Email: lorna@dcs.qmw.ac.uk

CSFW10 10th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, 10-12 June, 1997.
This workshop brings together researchers in computer science to examine foundational issues in computer security. We are interested both in papers that describe new results in the theories of computer security and in papers and panels that explore open questions and raise fundamental concerns about existing theories. The paper submission deadline is February 7, 1997. See the web page, or email Program Chair (s.foley@cs.ucc.ie) for full details.

 

EMN'97, Enterprise Networking '97, Montreal, Quebec, June 11-12, 1997.
Topics of interest include:

  • Integration of subsystems of enterprise networks, such as e-mail gateways, LAN switches, bridges and routers, database systems, and security and authentication mechanisms with the internets to provide "end-user" oriented services, such as video-conferencing, multi-media mails, etc.,
  • Enterprise information resource management. Enterprise Networks Management (e.g., configuration, fault, performance, accounting, security, etc.).

Submissions are due to the program chair, Bhumip Khasnabish (bhumip@gte.com) by mail by November 15, 1996.

 

COMPASS'97 12th Annual Conference in COMPuter ASSurance, Gaithersburg, Maryland (at NIST), June 16-20, 1997.
The purpose of COMPASS is to bring together researchers, developers, integrators, and evaluators interested in problems related to specifying, building, and certifying high-assurance systems. What distinguishes COMPASS from similar conferences is its emphasis on bridging the gap between theory and practice. The theme of COMPASS '97, "are we making any progress toward computer assurance?", will focus discussion on whether the approaches that have been developed and reported on during the past 25 years have any hope for solving today's assurance problems. In addition to exposing technical weaknesses in the state-of-the-art and state-of-the- practice, conference goals include: identifying barriers to applying existing assurance technologies in industry, understanding the properties new technologies must have to meet industrial needs, and identifying evidence where advanced technologies are effective in attacking the key problem areas of safety, security, fault-tolerance, and real-time. There will be a tools fair, and the conference will be preceded by one or two days of tutorials. See the conference web page for more information.

 

ENTRSEC Second International Workshop on Enterprise Security, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA, June 18-20, 1997.
Enterprises are increasingly dependent on their information systems to support their business and workflow activities. There is a need for universal electronic connectivity to support interaction and cooperation between multiple organizations. This makes enterprise security and confidentiality more important, but more difficult to achieve, as the multiple organizations may have differences in their security policies and may have to interact via an insecure Internet. These inter-organizational enterprise systems may be very large and so tools and techniques are needed to support the specification, analysis and implementation of security. This workshop will focus on the problems and challenges relating to enterprise security in inter-organizational systems. We aim to bring together principal players from both the internetwork and enterprise security community and will provide plenty of time for discussion. Topics of interest and details on submitting a paper or panel proposal can be found in the full call for papers or on the conference web page.

 

Eurocrypt'9714th Annual Eurocrypt Conference, May 11-15, 1997, Konstanz, Germany [posted here 4/16/97]
EUROCRYPT '97, the 14th Annual EUROCRYPT conference on the theory and applications of cryptologic techniques, is organized by the International Association for Cryptologic Research (IACR). More information can be found on the conference web page at http://www.iacr.org/conferences/ec97/ec97.html, or you can contact General Chairs Roland Nehl or Alfred Buellesbach at eurocrypt97@iacr.org.

 

R&D Opportunities in Federal Information Systems, Hyatt Arlington at Key Bridge (Arlington, VA), May 13-15, 1997.
IPers might be interested in a workshop on R&D Opportunities in Federal Information Systems. It's being sponsored by the National Science and Technology Council, and coordinated by USC's Information Science Institute. The workshop is scheduled for May 13-15, with white papers due March 3,1997. The workshop is "intended to address a concern regarding high level disconnect of the information services (IS) field from the information technologies R&D world, a disconnect which is cultural, educational and technological." More information is available on the workshop web page at http://www.isi.edu/nsf/.

 

SICON'97 IEEE Singapore International Conference on Networks, Kent Ridge, Singapore, April 14-17, 1997.
Network security and privacy is a topic of interest.

 

Asian Computing Science Conference , Singapore, April 22, 1997.
Conf Web page. This year networking and security (algorithms, protocols, formalisms, systems, ...) are among featured topics. The proceedings is expected to be published by Springer-Verlag in the Lectures Notes in Computer Science series.

 

ELECTRONIC COMMERCE FOR CONTENT II, Forum on Technology-Based Intellectual Property Management, Library of Congress, Washington, DC, April 28-29, 1997.
The Interactive Multimedia Association and the U.S. Copyright Office announce the second inter-sector/inter-industry forum on issues in technology-based intellectual property management. The forum builds on the success of the 1996 forum in bringing together different creator, industry, and user perspectives on requirements, standards, and implementation. Progress is being made in many areas, including digital object identifiers, rights management languages, software envelopes, billing systems, and copy protection for DVD systems. As before, the intent of the forum is not to provide a showcase for products but to promote understanding of critical technical issues and related market development problems across industries and along value chains. However, in the interests of increasing the benefits of the forum as a venue for exchange of information and ideas, the IMA is developing a Web-based directory of companies, products, and research projects. Priority will given to new material and reports on significant work in progress. Papers should be received by March 15, 1997, to ensure consideration for the presentation at the forum. Letters of intent to submit are encouraged. There will be an opportunity to revise papers for the proceedings after the forum, and materials not presented at the forum will also be considered for publication. To be listed in the directory of companies and products or to receive updated information on the forum, please contact karms@ima.org. Or visit the IMA Web site at http://www.ima.org.

 

PKS'97 Public Key Solutions 1997 April 28-30, Toronto, Ontario, Canada.
Papers on all aspects of public-key cryptography are solicited for submission to PKS '97. PKS '97 is the third in a series of international conferences dedicated to providing a forum for the promotion of public-key information security solutions for LAN, WAN, wireless environments, and the Internet. The conference is application-oriented, examining existing solutions and identifying emerging trends in public-key algorithms and their implementation, public-key infrastructures, electronic commerce security, smart cards, and Internet security. Information about PKS '95 (Toronto) and PKS '96 (Zurich) can be obtained from the USA Web site http://www.certicom.com/ or the European Web site http://www.r3/ch/, or email Sherry Shannon at sshannon@certicom.com.

 

IEEE S&P'97, Oakland, California, May 4-7, 1997.
The IEEE Symposium on Security and Privacy has, for 16 years, been the premier forum for the presentation of developments in computer security and for bringing together researchers and practitioners in the field. It seeks to build on this tradition of excellence by re-emphasizing work on engineering and applications while maintaining our interest in theoretical advances. See the conference Web page at http://www.itd.nrl.navy.mil/ITD/5540/ieee for additional information.

 

Database Systems For Advanced Applications, Melbourne, Australia, April 1-4, 1997.
DASFAA focuses on research in database theory, development of advanced DBMS technologies, and their advanced applications. Papers on implemented systems, from research prototypes to advanced industry projects are strongly solicited. "Security and integrity" is a topic of interest. Conf Web page

 

4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 2-4, 1997.
Papers pertaining to all aspect of computer security are solicited for submission to the Fourth ACM Conference on Computer and Communications Security. Papers may present theory, technique, applications, and practical experience on a variety of topics including access control, accounting and audit, applied cryptography and cryptographic protocols, authentication and authorization, data/system integrity, electronic commerce, intrusion detection, key management, privacy, protection of software and intellectual property, run-time system security, secure networking, secure operating systems, security architectures and models, security management, security of distributed systems and databases, security protocols, and smart-cards and secure PDAs. Conference Web page;

 

GBN'97 Gigabit Networking Workshop GBN'97, Kobe, Japan, April 5, 1997.
The purpose of this workshop is to provide a forum for presenting and discussing very recent work in gigabit networking and to raise relevant issues to the general networking community in a timely manner. The workshop will consist of a number of short informal presentations and discussion on current research and implementation, hot topics, position statements, and controversial issues relating to high bandwidth networking. The focus is on end-to-end issues including transport and higher layer protocols, host and network interface architecture, operating systems, emerging applications, deployment and management of large networks, economic and regulatory issues, security and privacy, and other societal impacts. Presentations will appear in the online proceedings of the workshop, under URL http://www.ccrc.wustl.edu/pub/ieee-tcgn/conference/gbn97. Registration for the workshop will be handled as part of INFOCOM'97 registration; information is available on the WWW at http://www.ics.uci.edu/~infocom. The call for papers and additional information on the workshop are available on the WWW at http://www.ccrc.wustl.edu/pub/ieee-tcgn.

 

13th Internation Conference on Data Engineering, Birmingham, UK, April 7-11, 1997.
Data Engineering deals with the use of engineering disciplines in the design, development and evaluation of information systems for different computing platforms and architectures. An issue of interest for the conference is the security of network databases. Conference Web page.

 

High Performance Database Management for Large Scale Applications; Birmingham, England, April 7-8, 1997.
Solicits papers that deal with performance issues enabling the support of database management for large scale applications; an example is security and privacy of transactions in electronic commerce. Conf Web page.

 

PTP'97 First International Workshop on Proof Transformation and Presentation, Place: Castle Dagstuhl, Octavieallee, 66687 Wadern, Saarland, Germany, April 8-10, 1997.
Over the past thirty years there has been significant progress in the field of automated theorem proving with respect to the reasoning power of the inference engines: many hard and open mathematical problems could be proven with a machine and the use of formal methods in software engineering and hardware verification is becoming a reality. This informal workshop aims to create an intimate and stimulating setting to bring together researcher from various fields working with or interested in this exciting issue to exchange ideas and results. Topics include (but are not restricted to): Relationship between logic calculi, including complexity measures; Mathematical vernacular; Transformation of proofs from a machine-oriented formalism to a more readable formalism like natural deduction; Abstraction and Restructuring of machine-found proofs; Analysis of user requirements for the interface of ATP systems; Cognitive models of human deduction; and Verbalization of machine-found (formal) proofs in natural language. For more information, see the full call-for-papers, or the conference web page, or contact: ptp-97@cs.uni-sb.de

 

Third International Symposium on Autonomous Decentralized Systems, Berlin, Germany, April 9 - 11, 1997.
Driven by the increasing power, intelligence, reliability, and openness of computer, communication and control technologies, a new generation of distributed systems is emerging, that will be able to support distributed business and control applications with extreme efficiency, reliability and security requirements. Conf Web page

 

5th International Conference on Telecommunication Systems - Modeling and Analysis, Nashville, TN, March 20-23, 1997.
Security and Privacy Issues in Telecommunications is a topic of interest.

 

Dependable Computing for Critical Applications, Partenkirchen, Germany, March 5-7, 1997.
Papers are sought in all areas of dependable computing, including but not limited to models, methods, algorithms, tools and practical experience with specifying, designing, implementing, assessing, validating, operating, and maintaining dependable computing systems. Papers that deal with man-machine interface issues (as they relate to dependability) are specifically encouraged. Of particular but not exclusive interest will be presentations that address combinations of dependability attributes, e.g., safety and security, through studies of either a theoretical or an applied nature.

 

First Asia-Pacific Conference on Knowledge Discovery and Data Mining, February 23-24, 1997, Singapore.
Goal is to bring together researchers and practitioners from basic and applied research and information industries, and to push forward the state-of-art of KDD. The conference technical programme will include paper presentations, posters, invited talks, panels, and tutorials in a two-day event. Security and privacy are topics of interest. Info available from hweeleng@iti.gov.sg; Conf Web page

 

Multimedia Data Security, San Jose, California, February 8-14, 1997.
Part of IS&T/SPIE's 1997 Symposium on Electronic Imaging: Science & Technology. Conf Web page.

 

The Internet Society Symposium on Network and Distributed System Security, San Diego, California, February 10-11, 1997.
The symposium fosters the exchange of technical information that will encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. Symposium proceedings will be published by the IEEE Computer Society Press. Conference Web page.

 

Fast Software Encryption Workshop 1997, Haifa, Israel, January 27-29, 1997
Conf Web page. Interested parties are invited to submit original unpublished papers on the design and analysis of fast encryption algorithms and hash functions. Preproceedings will be available at the meeting. The final proceedings is expected to be published in the Springer-Verlag Lecture Notes in Computer Science. Send submissions to biham@cs.technion.ac.il by October 11, 1996.

 

6th International Conference on Database Theory, Delphi, Greece, January 8-10, 1997.
A topic of interest is fundamentals of security and privacy in databases. Conf Web page.

 

The 1997 IEEE International Performance, Computing, and Communications, Scottsdale/Phoenix, Arizona, U.S.A., February 5-7, 1997
The 1997 IEEE International Performance, Computing, and Communications Conference is sponsored by the IEEE Communications Society, in cooperation with the IEEE Computer Society. This international conference provides a forum for the presentation and exchange of current work in computers, communications, their synergism, and their applications. In addition to participation by the academic community, we particularly wish to encourage the involvement of practitioners in industrial, business, and government settings. Conference Web page.