ICCC'97 International Conference for Computer Communications,
Cannes, France, November 19-21, 1997.
The conference aims is to provide an integrated perspective and a
timely spectrum of computer and communications technologies in the
context of present and future applications. Topics include: New
technologies, applications, and services; Trends and strategies; and
Policy and governmental issues. A complete list of topics can be
found in the
call for papers and the
conference web page.
IFIP-IICIS International Federation for Information Processing,
First Working Conference on Integrity and Internal Control in
Information Systems, Zurich, Switzerland December 4-5, 1997.
IFIP TC-11 Working Group 11.5 has been charged with exploring the
area of the integrity objective within IT security and the
relationship between integrity in information systems and the
overall internal control systems that are established in
organisations to support the corporate governance codes. A complete
list of conference topics and updated information can be found on
the conference web page at
http://www.ifip.tu-graz.ac.at/TC11/CONF/CFPINS.html.
ACSAC'97Thirteenth Annual Computer Security Applications,
December 8-12, 1997, San Diego, CA. [posted here 4/16/97]
This internationally recognized conference provides a forum for the
world's experts in information system security to exchange ideas
about solving critical problems relating to confidentiality and
privacy, availability, and integrity. We are looking for papers,
panels and tutorials that address: Emerging security standards for
electronic commerce, New directions in cryptography and key
management, Network management and smart card applications, New
technologies for protecting electronic cache, Audit and audit
reduction, New paradigms for protecting electronic intellectual
capital, Securing very high-speed telecommunications, Defensive
information warfare, Software safety and program correctness, and
Security in health care and law enforcement. Information about
papers, panel sessions, tutorial proposals, vendor displays, and
student papers can be found on the conference web page at
http://www.isse.gmu.edu/~acsac, or from the Program Chair at
ACSAC_program_chair@smiley.mitre.org.
ISCOM'97 1997 International Symposium on Communications,
National Tsing Hua University, Hsinchu, Taiwan, December 17-19,1997.
[posted here May 27, 1997]
The 1997 International Symposium on Communications (ISCOM-97) is the
4th biennial symposium organized by the academic, research and
industrial societies in communications in Taiwan and will be held at
National Tsing Hua University, Hsinchu, Taiwan, from Wednesday
December 17, 1997 to Friday December 19, 1997. An exhibition will be
organized for local industrial companies and development/research
institutes. Detailed information on accommodations, travel
arrangements, excursions and the technical program will be included
in subsequent mailings or can be reached via WWW at
http://www.ee.nthu.edu.tw/~iscom97/. Please see the conference
web page for the call-for-papers for a complete list of topics and
detailed instructions on submitting an abstract.
EDOC'97 The 1st International Enterprise Distributed Object
Computing Workshop, Marriott Resort, Gold Coast, Australia, October
24-26, 1997. [posted here 5/13/97]
This first International Enterprise Distributed Object Computing
Workshop will bring together experts from different backgrounds
working on various aspects of Enterprise Distributed Object
Computing. A further aim of the event is to promote this important
topic within the Asia-Pacific Region. A list of topics can be found
on the conference web page at:
http://www.dstc.edu.au/events/edoc97/. Please email your
enquiries to: edoc-info@dstc.edu.au Further details for the EDOC'97
event and this Call For Papers can be found on the conference web
page.
ICNP'97Fifth IEEE International Conference on Network Protocols,
October 28-31, 1997, Swissotel, Atlanta, GA. [posted here 4/16/97]
ICNP deals with the entire development cycle of communication
network protocols, from design and specification, to verification,
testing, performance analysis, implementation, and performance
tuning. Protocol functions of interest include (but are not limited
to) the following: network access, switching, routing, flow and
congestion control, multimedia transport, network security and
management, interoperability, and internetworking. See the
Conference's web page at
http://www.cc.gatech.edu/conferences/icnp97 for information.
WebNet'97 World Conference of the WWW, Internet, and Intranet,
Toronto, Canada, October 31-November 5, 1997.
The second World Conference of the WWW, Internet, and Intranet is an
international conference, organized by the Association for the
Advancement of Computing in Education (AACE) in cooperation
WWW/Internet businesses & industry. This annual conference serves as
a multi-disciplinary forum for the exchange of information on the
development, applications, and research on all topics related to the
Web. This encompasses the use, applications and societal and legal
aspects of the Internet in its broadest sense. A list of topics of
interest and information on submitting a paper can be found in the
call for papers or on the
conference web page.
RBAC'97 Second ACM Workshop on Role-Based Access Control, George
Mason University, November 6-7, 1997.
The central idea of Role-Based Access Control (RBAC) is that users
acquire and use permissions based on their current job functions,
assignments and activities in an organization. The driving
motivation for RBAC is to simplify security policy administration
while facilitating the definition of flexible, customized policies.
RBAC has been successfully applied since the mainframe era. Modern
information systems will continue to use classical RBAC models, but
the development of new modeling concepts and techniques will be
required to support large-scale, enterprise-wide, distributed
systems. The ACM workshop on RBAC brings together researchers,
developers, and practitioners to discuss new ideas, developments,
applications, requirements, problems, and solutions in the field of
RBAC. The workshop invites participation from the database, network,
distributed systems, operating system, security and application
communities. Attendance is limited to 40 participants to foster a
workshop atmosphere. A complete list of topics of interest and
instructions for submitting a paper or panel session idea can be
found in the
call for papers or on the
conference web page.
SOSP'97 16th ACM Symposium on Operating Systems Principles, St.
Malo, France, October 5-8, 1997.
Authors are invited to submit papers to the 16th SOSP describing
original research related to the design, implementation, and
analysis of operating systems. We seek papers about systems issues
on a wide range of platforms and environments, including embedded
systems, network (WWW) computers, portable computers, PCs,
workstations, high-performance machines, and production
environments. Preference will be given to papers of unusual novelty
or practicality and papers critiquing prior work or continuing a
significant research dialogue. We seek a broad conference of high
quality and relevance to current systems issues. A list of topics of
interest and information on submitting a paper can be found in the
call for papers or on the
conference
web page.
NISS'97 20th National Information Systems Security Conference,
Baltimore, MD, USA, October 6-10, 1997. [posted here 5/13/97]
Conference topics include: Research & Development, Policy,
Administration & Management, Partnerships,
Criteria/Assurance/Standards/Testing, Debates/Views/Case Studies,
Electronic Commerce, Internet, Legal/Forensics/Law Enforcement,
Knowledge Learning. Also Displays from Government Groups, Book
Displays, NIST Products and Services Display, and NSA Products and
Services Display. Additional information can be obtained on the
conference web page at
http://csrc.nist.gov/nissc/ or from Phone:(410)850-0272,
Fax:(410)859-4375, EMAIL: NISSCONFERENCE@DOCKMASTER.NCSC.MIL.
MOBICOM'97 Third ACM/IEEE International Conference on Mobile
Computing and Networking 1997, Budapest, Hungary, September 26-30,
1997.
The wireless communication revolution is bringing fundamental
changes to telecommunication and computing. Wide-area cellular
systems and wireless LANs promise to make integrated networks a
reality and provide fully distributed and ubiquitous mobile
computing and communications, thus bringing an end to the tyranny of
geography. Furthermore, services for the mobile user are maturing
and are poised to change the nature and scope of communication. This
conference, the third of an annual series, serves as the premier
international forum addressing networks, systems, algorithms, and
applications that support the symbiosis of mobile computers and
wireless networks. A list of topics can be found in the
call for papers and on the conference web page at
http://www.monarch.cs.cmu.edu/~mobicom97/.
WOBIS'972nd Int'l Workshop on Satellite-based Information
Services, Budapest, Hungary, October 1, 1997. (submissions due July
3, 1997). [posted here May 27, 1997]
As its popular predecessor held in conjunction with MobiCom'96, the
objective of this workshop is to provide a forum for exploratory
research contributions on satellite applications and services. The
services are characterized by direct or global broadcast
capabilities of LEO, MEO, GEO satellites, low setup costs, high and
possibly asymmetric bandwidth, and unconventional network routing.
Applications of such services are often real-time, mobile, high
bandwidth, and they include telemedicine, public information
services, education, entertainment, Internet access, digital
battlefield, emergency and disaster response. We invite papers for
presentation and discussion at the workshop. Send a postscript copy
of the paper by email to the address below. The page limit on all
submissions is 5-10 pages, double spaced, 10 pt minimum
(approximately 1500-2500 words). Send to: Yongguang Zhang, Hughes
Research Labs, RL-96, Malibu, CA 90265, E-mail: ygz@isl.hrl.hac.com
Updated conference information and a complete list of topics can be
found on the conference web page at:
www.wins.hrl.com/conferences/WOSBIS97/.
NSPW'97 New Security Paradigms '97, University of Newcastle upon
Tyne, Great Langdale, Cumbria, UK, September 23-26, 1997.
Paradigm shifts disrupt the status quo, destroy outdated ideas, and
open the way to new possibilities. This workshop explores
deficiencies of current computer security paradigms and examines
radical new models which address those deficiencies. Previous years'
workshops have identified problematic aspects of traditional
security paradigms and explored a variety of possible alternatives.
Participants have discussed alternative models for access control,
intrusion detection; new definitions of security, privacy, secrecy
and trust; biological and economic models of security; multiple
policies; and a wide variety of other topics. The 1997 workshop will
strike a balance between building on the foundations laid in past
years and exploring in new directions. More information can be found
in the full
call for papers, the
conference web page,
or send email to newparadigms97@opengroup.org.
IC3N97 Sixth International Conference On Computer Communications
and Networks, Monte Carlo Hotel, Las Vegas Nevada, USA, September
22-25, 1997. [posted here 5/13/97]
The objective of this conference is to provide an effective forum
for original and fundamental advances in Computer Communications and
Networks and to foster communication among researchers and
practitioners working in a wide variety of scientific areas with a
common interest in improving Computer Communications and Networks.
For more information about the conference (as opposed to paper
submissions) can be obtained from the full
call for papers, the conference web page at
http://www.cps.msu.edu/~ni/ic3n97, or via email at ic3n@cacs.usl.edu.
IDEAS'97 International Database Engineering and Applications
Symposium, Montreal,Canada, August 25-27, 1997. [posted here
5/13/97]
The aim of this Symposium is to address the engineering and
application aspects of databases. We invite quality papers
describing original ideas and new results on applied technological
and theoretical aspects of Database Engineering and Applications. In
particular we welcome submissions describing work on integrating new
technologies in products and applications, on experiences with
standard and novel techniques, and on the identification of unsolved
issues that pose challenges to and require attention by the research
community. We consider this conference to be a unique and important
forum to discuss experiences in applying DBMSs to real-life
situations among practitioners, and between practitioners and
researchers. More information can be found on the conferenece web
page at:
http://www.cs.concordia.ca/ideas/.
DIMACS'97 Workshop on Formal Verification of Security Protocols,
DIMACS Center, CoRE Building, Rutgers University, September 3-5,
1997.
As we come to rely more and more upon computer networks to perform
vital functions, the need for cryptographic protocols that can
enforce a variety of security properties has become more and more
important. Since it is notoriously difficult to design cryptographic
protocols correctly, this increased reliance on them to provide
security has become cause for some concern. This is especially the
case since many of the new protocols are extremely complex. In
answer to these needs, research has been intensifying in the
application of formal methods to cryptographic protocol
verification. The goal of this workshop is to facilitate this
process by bringing together those were are involved in the design
and standardization of cryptographic protocols, and those who are
developing and using formal methods techniques for the verification
of such protocols. To this end we plan to alternate papers with
panels soliciting new paths for research. We are particularly
interested in paper and panel proposals addressing new protocols
with respect to their formal and informal analysis. Other topics of
interest include, but are not limited to
- Progress in belief logics
- Use of theorem provers and model checkers in verifying crypto
protocols
- Interaction between protocols and cryptographic modes of operation
- Methods for unifying documentation and formal, verifiable
specification
- Methods for incorporating formal methods into crypto protocol
design
- Verification of cryptographic API systems
- Formal definition of correctness of a cryptographic protocol
- Arithmetic capability required for proofs of security for number
theoretic systems
- Formal definitions of cryptographic protocol requirements
- Design methodologies
- Emerging needs and new uses for cryptographic protocols
- Multiparty protocols, in particular design and verification
methods
On-line conference information:
registration form,
accommodations,
travel arrangements, and general
conference information.
SAFECOMP'97 The 16th International Conference on Computer
Safety, Reliability and Security, University of York, UK, September
8-10, 1997. [posted here 5/13/97]
SAFECOMP is an annual event reviewing the state of the art,
experiences and new trends in the areas of computer safety,
reliability and security. The conference focuses on critical
computer applications. It is intended to form a platform for
technology transfer between academia, industry and research
institutions. More information can be found on the conference web
page at
http://www.cs.york.ac.uk/safecomp-97.
INTRA-FORA'97 First International Conference on INTRANET:
Foundation, Research, and Applications,University of Linz, Linz,
Austria, September 22-24, 1997.
The Research Institute FAW (Research Institute for Knowledge
Processing), the Austrian Computer Society, the Technical University
of Vienna (Institute of Software Technology), the Technical
University of Prague, the University of Vienna (Department of
Applied Informatics and Information) organise the First
International INTRAnet Conference on Foundation, Research and
Applications (INTRA-FORA). The conference should constitute a forum
for in-depth discussions between researchers and practitioners on
the emerging field of the INTRANET. The various aspects of the
INTRANET (design, programming, communication, security, economical
impacts etc.) should be covered at this event. Authors should submit
(hard copy via mail or postscript via email) original double-spaced
papers no longer than 5000 words to Monika Neubauer, FAW, University
of Linz, Linz, Australia. A complete list of topics and details on
submitting a paper can be found on the conference web page at
http://www.ifs.tuwien.ac.at/intrafora or by email to intra@faw.uni-linz.ac.at.
IFIP'97 Eleventh Annual
IFIP WG 11.3 Working Conference on Database Security, Lake
Tahoe, California, August 11-13, 1997.
The conference provides a forum for presenting original unpublished
research results, practical experiences, and innovative ideas in
database security. Papers and panel proposals are solicited.
Submissions will be refereed by the members of the Working Group and
selected based on technical merit and their relevance to the aim of
the IFIP Working Group 11.3. Information on specific areas of
interest, and details on submitting a paper or panel proposal can be
found on the
conference web page.
HASE'97 IEEE* High-Assurance Systems Engineering Workshop (in
conjunction with COMPSAC'97), August 11-12, 1997, Washington, DC.
The primary focus of the Workshop is on innovative research results
in the area of high-assurance (highly reliable, highly available,
safety-critical, real-time, and secure) systems. Complex systems'
engineering issues, including hardware design, software engineering
(both formal and informal methods), performance evaluation, and
system assessment are particular focus of the Workshop. Of special
interests are the integrated system design principles that consider
multiple aspects of high assurance systems. The purpose of this
Workshop is for public dissemination of such research results from
academia, industry, and government. Topics of interest include, but
are not limited to: Techniques for achieving high dependability;
System life-cycle, specification, design, implementation,
verification, and validation techniqes of high assurance systems;
Evaluation methods and tools, including testing, reliability and
availability assessment, performance evaluation, security
assessment, etc. for high assurance systems; Application of formal
methods on high assurance systems; Evolutionary design approaches
for complex high-assurance systems; Software experiences for large
high-assurance systems; CASE tools and other domain-specific tools
for high-assurance systems; Cost model and assessment metrics for
large software projects in the high-assurance domains; System
management (scheduling, admission control, etc.) techniques for high
assurance systems; Assurance monitoring systems. More information is
available in the
call for papers or the
conference web
page.
CRYPTO'97 August 17-21, 1997, Santa Barbara, California, USA.
Original papers on all technical aspects of cryptology are solicited
for submission to Crypto '97, the Seventeenth Annual IACR Crypto
Conference. Crypto '97 is organized by the International Association
for Cryptologic Research (IACR), in cooperation with the IEEE
Computer Society Technical Committee on Security and Privacy, and
the Computer Science Department of the University of California,
Santa Barbara. For more information, access the
IACR web page or the call for
papers
(CRYPTO'97)
ACISP'97 Second Australasian Conference on Information Security
and Privacy, Sydney, Australia, July 7-9, 1997.
The Program Committee invites technical papers and panel proposals
for topics of technical and general interests. Papers may present
theory, techniques, applications and practical experiences on a
variety of topics including: network security, security protocols,
electronic commerce, distributed system security, database security,
security policy, security management, authentication, access
control, Cryptology, key management, auditing, security
architectures and models, mobile system security, secure operating
systems, software and intellectual property protection, smart cards,
secure intelligent agents and security evaluation and certification.
Papers relating to practical experience and commercial applications
in security are particularly welcome. More information is available
in the
call for papers.
FMP'97 Formal Methods Pacific '97, July 9-11, 1997, Victoria
University of Wellington, Wellington, New Zealand.
Formal Methods Pacific will provide a forum for discussion of
current research on mathematically-based techniques for design and
development of computer systems. We are especially interested in
papers concerning formal and/or rigorous methods for developing
executable programs from abstract specifications, tool support for
formal software development, and practical experience with formal
methods. We would also welcome papers in related areas, such as
software specification and verification, hardware specification and
verification, and specification and development of real-time and
concurrent systems. More information about FMP'97 can be found at
the FMP'97 web page,
or contact Lindsay Groves (Convenor FMP'97) at lindsay@comp.vuw.ac.nz.
NGITS'97 The Third International Workshop on Next Generation
Information Technologies and Systems, Neve Ilan (near Jerusalem),
ISRAEL, June 30 - July 3, 1997.
The next generation information systems will be complex,
intelligent, and cooperative, and will utilize various
multimedia-media technologies. The goal of the NGITS Workshop is to
provide an international forum for discussing issues and solutions
related to next generation information systems and the technologies
that would make them possible. Workshop topics include: Decision
Support Systems, Electronic Commerce and Interoperability, Data and
knowledge base systems, Data modeling, Information retrieval,
human-computer interaction, AI techniques, software engineering and
information systems development, management information systems, and
advanced applications. Up-to-date information can be found on the
conference web page.
IWFM'97 1st Irish Workshop on Formal Methods Dublin, Ireland,
July 3-4, 1997.
The first Irish Workshop on Formal Methods will be held in
University College Dublin on the 3rd and 4th of July, 1997. We seek
submissions of papers in the general area of formal methods,
theoretical computer science, and mathematics, covering, but not
restricted to, the following topics: formal systems, proof systems,
mathematical models of computing, semantics, tools, industrial and
teaching experiences. The workshop is being organised by the Irish
Formal Methods Special Interest Group (IFMSIG). More information can
be found on the
Workshop
Web page.
WETICE97 Second International Workshop on Enterprise Security,
MIT, Cambridge, Massachusetts, USA, June 18-20, 1997. (submissions
are due May 30, 1997??) [posted here May 27, 1997].
This workshop will focus on the problems and challenges relating to
enterprise security in inter-organizational systems. We aim to bring
together principal players from both the internetwork and enterprise
security community and will provide plenty of time for discussion.
The agenda will include panels on: Internet Security and IETF, and
Building Secure Knowledge Systems; and paper sessions on: Security
Infrastructure and Management, Security for the Internet/Web, Secure
Collaboration Environments, and Role-Based Access Control. Details
on the workshop and submitting a paper can be found on the workshop
web page at:
www.cerc.wvu.edu/SECWK/index.html.
IESS'97 Computer Related Standards and Safety, a workshop of the
3rd International Symposium on Software Engineering Standards,
Walnut Creek, California, USA, June 1-6, 1997. [posted here
5/12/97].
Software oriented, system related and industry specific computer
related safety standards are proliferating internationally. At the
same time, consensus on such development seems to elude the computer
science community. There is now a real need to take stock of
developments over the last few years and assess the effectiveness of
both the standards making process and the standards themselves in
order to chart the way ahead. This workshop aims to bring together
people interested in participating in an active debate on and
formulating a future agenda for: (a) the shape, form, substance and
interrelationships of computer related safety standards, (b) the
computer related safety standards making process in terms of needs
and priorities, and (c) the effectiveness of current computer
related safety standards. Preregistration and information enquiries
should be sent to: Lorna Kyle, Department of Computer Science, Queen
Mary and Westfield College, University of London, London E1 4NS,
United Kingdom - Tel: (+44) 171 975 5227, Fax: (+44) 181 980 6533,
Email: lorna@dcs.qmw.ac.uk
CSFW10
10th IEEE Computer Security Foundations Workshop, Rockport,
Massachusetts, USA, 10-12 June, 1997.
This workshop brings together researchers in computer science to
examine foundational issues in computer security. We are interested
both in papers that describe new results in the theories of computer
security and in papers and panels that explore open questions and
raise fundamental concerns about existing theories. The paper
submission deadline is February 7, 1997. See
the web page,
or email Program Chair (s.foley@cs.ucc.ie) for full details.
EMN'97, Enterprise Networking '97, Montreal, Quebec, June 11-12,
1997.
Topics of interest include:
- Integration of subsystems of enterprise networks, such as
e-mail gateways, LAN switches, bridges and routers, database
systems, and security and authentication mechanisms with the
internets to provide "end-user" oriented services, such as
video-conferencing, multi-media mails, etc.,
- Enterprise information resource management. Enterprise
Networks Management (e.g., configuration, fault, performance,
accounting, security, etc.).
Submissions are due to the program chair, Bhumip Khasnabish (bhumip@gte.com)
by
mail by November 15, 1996.
COMPASS'97
12th Annual Conference in COMPuter ASSurance, Gaithersburg, Maryland
(at NIST), June 16-20, 1997.
The purpose of COMPASS is to bring together researchers, developers,
integrators, and evaluators interested in problems related to
specifying, building, and certifying high-assurance systems. What
distinguishes COMPASS from similar conferences is its emphasis on
bridging the gap between theory and practice. The theme of COMPASS
'97, "are we making any progress toward computer assurance?", will
focus discussion on whether the approaches that have been developed
and reported on during the past 25 years have any hope for solving
today's assurance problems. In addition to exposing technical
weaknesses in the state-of-the-art and state-of-the- practice,
conference goals include: identifying barriers to applying existing
assurance technologies in industry, understanding the properties new
technologies must have to meet industrial needs, and identifying
evidence where advanced technologies are effective in attacking the
key problem areas of safety, security, fault-tolerance, and
real-time. There will be a tools fair, and the conference will be
preceded by one or two days of tutorials. See the
conference web page
for more information.
ENTRSEC Second International Workshop on Enterprise Security,
Massachusetts Institute of Technology (MIT), Cambridge,
Massachusetts, USA, June 18-20, 1997.
Enterprises are increasingly dependent on their information systems
to support their business and workflow activities. There is a need
for universal electronic connectivity to support interaction and
cooperation between multiple organizations. This makes enterprise
security and confidentiality more important, but more difficult to
achieve, as the multiple organizations may have differences in their
security policies and may have to interact via an insecure Internet.
These inter-organizational enterprise systems may be very large and
so tools and techniques are needed to support the specification,
analysis and implementation of security. This workshop will focus on
the problems and challenges relating to enterprise security in
inter-organizational systems. We aim to bring together principal
players from both the internetwork and enterprise security community
and will provide plenty of time for discussion. Topics of interest
and details on submitting a paper or panel proposal can be found in
the full
call for papers or on the
conference web page.
Eurocrypt'9714th Annual Eurocrypt Conference, May 11-15, 1997,
Konstanz, Germany [posted here 4/16/97]
EUROCRYPT '97, the 14th Annual EUROCRYPT conference on the theory
and applications of cryptologic techniques, is organized by the
International Association for
Cryptologic Research (IACR). More information can be found on
the conference web page at
http://www.iacr.org/conferences/ec97/ec97.html, or you can
contact General Chairs Roland Nehl or Alfred Buellesbach at
eurocrypt97@iacr.org.
R&D Opportunities in Federal Information Systems, Hyatt
Arlington at Key Bridge (Arlington, VA), May 13-15, 1997.
IPers might be interested in a workshop on R&D Opportunities in
Federal Information Systems. It's being sponsored by the National
Science and Technology Council, and coordinated by USC's Information
Science Institute. The workshop is scheduled for May 13-15, with
white papers due March 3,1997. The workshop is "intended to address
a concern regarding high level disconnect of the information
services (IS) field from the information technologies R&D world, a
disconnect which is cultural, educational and technological." More
information is available on the workshop web page at
http://www.isi.edu/nsf/.
SICON'97 IEEE Singapore International Conference on Networks,
Kent Ridge, Singapore, April 14-17, 1997.
Network security and privacy is a topic of interest.
Asian Computing Science Conference , Singapore, April 22, 1997.
Conf Web page. This
year networking and security (algorithms, protocols, formalisms,
systems, ...) are among featured topics. The proceedings is expected
to be published by Springer-Verlag in the Lectures Notes in Computer
Science series.
ELECTRONIC COMMERCE FOR CONTENT II, Forum on Technology-Based
Intellectual Property Management, Library of Congress, Washington,
DC, April 28-29, 1997.
The Interactive Multimedia Association and the U.S. Copyright Office
announce the second inter-sector/inter-industry forum on issues in
technology-based intellectual property management. The forum builds
on the success of the 1996 forum in bringing together different
creator, industry, and user perspectives on requirements, standards,
and implementation. Progress is being made in many areas, including
digital object identifiers, rights management languages, software
envelopes, billing systems, and copy protection for DVD systems. As
before, the intent of the forum is not to provide a showcase for
products but to promote understanding of critical technical issues
and related market development problems across industries and along
value chains. However, in the interests of increasing the benefits
of the forum as a venue for exchange of information and ideas, the
IMA is developing a Web-based directory of companies, products, and
research projects. Priority will given to new material and reports
on significant work in progress. Papers should be received by March
15, 1997, to ensure consideration for the presentation at the forum.
Letters of intent to submit are encouraged. There will be an
opportunity to revise papers for the proceedings after the forum,
and materials not presented at the forum will also be considered for
publication. To be listed in the directory of companies and products
or to receive updated information on the forum, please contact karms@ima.org.
Or visit the IMA Web site at
http://www.ima.org.
PKS'97 Public Key Solutions 1997 April 28-30, Toronto, Ontario,
Canada.
Papers on all aspects of public-key cryptography are solicited for
submission to PKS '97. PKS '97 is the third in a series of
international conferences dedicated to providing a forum for the
promotion of public-key information security solutions for LAN, WAN,
wireless environments, and the Internet. The conference is
application-oriented, examining existing solutions and identifying
emerging trends in public-key algorithms and their implementation,
public-key infrastructures, electronic commerce security, smart
cards, and Internet security. Information about PKS '95 (Toronto)
and PKS '96 (Zurich) can be obtained from the USA Web site
http://www.certicom.com/ or
the European Web site http://www.r3/ch/,
or email Sherry Shannon at sshannon@certicom.com.
IEEE S&P'97, Oakland, California, May 4-7, 1997.
The IEEE Symposium on Security and Privacy has, for 16 years, been
the premier forum for the presentation of developments in computer
security and for bringing together researchers and practitioners in
the field. It seeks to build on this tradition of excellence by
re-emphasizing work on engineering and applications while
maintaining our interest in theoretical advances. See the conference
Web page at
http://www.itd.nrl.navy.mil/ITD/5540/ieee for additional
information.
Database Systems For Advanced Applications, Melbourne,
Australia, April 1-4, 1997.
DASFAA focuses on research in database theory, development of
advanced DBMS technologies, and their advanced applications. Papers
on implemented systems, from research prototypes to advanced
industry projects are strongly solicited. "Security and integrity"
is a topic of interest.
Conf Web page
4th ACM Conference on Computer and Communications Security,
Zurich, Switzerland, April 2-4, 1997.
Papers pertaining to all aspect of computer security are solicited
for submission to the Fourth ACM Conference on Computer and
Communications Security. Papers may present theory, technique,
applications, and practical experience on a variety of topics
including access control, accounting and audit, applied cryptography
and cryptographic protocols, authentication and authorization,
data/system integrity, electronic commerce, intrusion detection, key
management, privacy, protection of software and intellectual
property, run-time system security, secure networking, secure
operating systems, security architectures and models, security
management, security of distributed systems and databases, security
protocols, and smart-cards and secure PDAs.
Conference Web
page;
GBN'97 Gigabit Networking Workshop GBN'97, Kobe, Japan, April 5,
1997.
The purpose of this workshop is to provide a forum for presenting
and discussing very recent work in gigabit networking and to raise
relevant issues to the general networking community in a timely
manner. The workshop will consist of a number of short informal
presentations and discussion on current research and implementation,
hot topics, position statements, and controversial issues relating
to high bandwidth networking. The focus is on end-to-end issues
including transport and higher layer protocols, host and network
interface architecture, operating systems, emerging applications,
deployment and management of large networks, economic and regulatory
issues, security and privacy, and other societal impacts.
Presentations will appear in the online proceedings of the workshop,
under URL
http://www.ccrc.wustl.edu/pub/ieee-tcgn/conference/gbn97.
Registration for the workshop will be handled as part of INFOCOM'97
registration; information is available on the WWW at
http://www.ics.uci.edu/~infocom. The call for papers and
additional information on the workshop are available on the WWW at
http://www.ccrc.wustl.edu/pub/ieee-tcgn.
13th Internation Conference on Data Engineering, Birmingham, UK,
April 7-11, 1997.
Data Engineering deals with the use of engineering disciplines in
the design, development and evaluation of information systems for
different computing platforms and architectures. An issue of
interest for the conference is the security of network databases.
Conference Web page.
High Performance Database Management for Large Scale Applications;
Birmingham, England, April 7-8, 1997.
Solicits papers that deal with performance issues enabling the
support of database management for large scale applications; an
example is security and privacy of transactions in electronic
commerce.
Conf
Web page.
PTP'97 First International Workshop on Proof Transformation and
Presentation, Place: Castle Dagstuhl, Octavieallee, 66687 Wadern,
Saarland, Germany, April 8-10, 1997.
Over the past thirty years there has been significant progress in
the field of automated theorem proving with respect to the reasoning
power of the inference engines: many hard and open mathematical
problems could be proven with a machine and the use of formal
methods in software engineering and hardware verification is
becoming a reality. This informal workshop aims to create an
intimate and stimulating setting to bring together researcher from
various fields working with or interested in this exciting issue to
exchange ideas and results. Topics include (but are not restricted
to): Relationship between logic calculi, including complexity
measures; Mathematical vernacular; Transformation of proofs from a
machine-oriented formalism to a more readable formalism like natural
deduction; Abstraction and Restructuring of machine-found proofs;
Analysis of user requirements for the interface of ATP systems;
Cognitive models of human deduction; and Verbalization of
machine-found (formal) proofs in natural language. For more
information, see the full
call-for-papers, or the
conference web page,
or contact: ptp-97@cs.uni-sb.de
Third International Symposium on Autonomous Decentralized Systems,
Berlin, Germany, April 9 - 11, 1997.
Driven by the increasing power, intelligence, reliability, and
openness of computer, communication and control technologies, a new
generation of distributed systems is emerging, that will be able to
support distributed business and control applications with extreme
efficiency, reliability and security requirements.
Conf Web page
5th International Conference on Telecommunication Systems - Modeling
and Analysis, Nashville, TN, March 20-23, 1997.
Security and Privacy Issues in Telecommunications is a topic of
interest.
Dependable Computing for Critical Applications, Partenkirchen,
Germany, March 5-7, 1997.
Papers are sought in all areas of dependable computing, including
but not limited to models, methods, algorithms, tools and practical
experience with specifying, designing, implementing, assessing,
validating, operating, and maintaining dependable computing systems.
Papers that deal with man-machine interface issues (as they relate
to dependability) are specifically encouraged. Of particular but not
exclusive interest will be presentations that address combinations
of dependability attributes, e.g., safety and security, through
studies of either a theoretical or an applied nature.
First Asia-Pacific Conference on Knowledge Discovery and Data Mining,
February 23-24, 1997, Singapore.
Goal is to bring together researchers and practitioners from basic
and applied research and information industries, and to push forward
the state-of-art of KDD. The conference technical programme will
include paper presentations, posters, invited talks, panels, and
tutorials in a two-day event. Security and privacy are topics of
interest. Info available from hweeleng@iti.gov.sg;
Conf Web
page
Multimedia Data Security, San Jose, California, February 8-14,
1997.
Part of IS&T/SPIE's 1997 Symposium on Electronic Imaging: Science &
Technology.
Conf
Web page.
The Internet Society Symposium on Network and Distributed System
Security, San Diego, California, February 10-11, 1997.
The symposium fosters the exchange of technical information that
will encourage and enable the Internet community to apply, deploy,
and advance the state of available security technology. Symposium
proceedings will be published by the IEEE Computer Society Press.
Conference Web page.
Fast Software Encryption Workshop 1997, Haifa, Israel, January
27-29, 1997
Conf Web page.
Interested parties are invited to submit original unpublished papers
on the design and analysis of fast encryption algorithms and hash
functions. Preproceedings will be available at the meeting. The
final proceedings is expected to be published in the Springer-Verlag
Lecture Notes in Computer Science. Send submissions to biham@cs.technion.ac.il
by October 11, 1996.
6th International Conference on Database Theory, Delphi, Greece,
January 8-10, 1997.
A topic of interest is fundamentals of security and privacy in
databases.
Conf
Web page.
The 1997 IEEE International Performance, Computing, and
Communications, Scottsdale/Phoenix, Arizona, U.S.A., February 5-7,
1997
The 1997 IEEE International Performance, Computing, and
Communications Conference is sponsored by the
IEEE
Communications Society, in cooperation with the
IEEE Computer Society. This
international conference provides a forum for the presentation and
exchange of current work in computers, communications, their
synergism, and their applications. In addition to participation by
the academic community, we particularly wish to encourage the
involvement of practitioners in industrial, business, and government
settings.
Conference Web page.