Calls for Papers

IEEE Computer Society's Technical Committee on Security and Privacy


Past Conferences and Journal Special Issues

Last Modified:01/13/05

Note: Please contact by email if you have any questions..



Past Conferences and Other Announcements - 1998


ACSAC'98 Fourteenth Annual Computer Security Applications Conference, "Applying Practical Security Solutions", Scottsdale, Arizona, USA, December 7-11, 1998. (Submissions due: May 29, 1998). [posted here: March 3, 1998]
The conference solicits papers, panels, vendor presentations, and tutorials that address practical approaches to solving security problems in federal, state, local governments, departments of defense, and commercial environments. Selected papers will be those that present examples of in-place or attempted solutions to real problems; lessons learned; original research analyses, and approaches to securing our information infrastructure. A complete list of topics, and instructions for submitting a paper or a proposal for a tutorial or vendor display can be found on the conference web page at


SETA'98 Conference on Sequences and their Applications, National University of Singapore, December 14-17 1998. (submissions due: August 10, 1998) [posted here: 2/23/98]
Sequences have important applications in ranging systems, spread spectrum communication systems, multi-terminal system identification, code division multiple access communications systems, global positioning systems, software testing, circuit sting, computer simulation, and stream ciphers. There is also an interaction between sequences and error-correcting codes. The purpose of this series of international conferences is to bring together experts from different areas, and to bridge advances in different areas. A complete list of topics and submission instructions can be found on the conference web page at


ICS'98 1998 International Computer Symposium, National Cheng Kung University, Tainan, TAIWAN, R.O.C, December 17-19, 1998. (submissions due: July 15, 1998) [posted here: 6/16/98]
ICS'98 consists of eight separate workshops, each focusing on a specific area. Workshop duration will be from one day up to 3 days, depending on the number of selected papers. Of particular interest to this list is the workshop on cryptology and information security. Topics include: Cipher System Design and Theory, User and Message Authentication, Key Distribution and Management, Secret Sharing, Digital Signatures, Zero-Knowledge Protocols, Secure Broadcasting and Electronic Conferencing, Network Security, Database Security, Distributed System Security, Open System Security, Secure Electronic Voting, One-way Functions, Applications of and Information Security Technology. Information Center: E-mail: Additional Information on ICS'98 is available on the conference WWW homepage at


HASE'98 3rd IEEE* High-Assurance Systems Engineering Symposium Washington, DC, USA, November 13-14, 1998. [posted here: 7/6/98]
The primary focus of the Symposium is on innovative research results in the area of high-assurance (highly reliable, highly available, safety-critical, real-time, and secure) systems. Complex systems' engineering issues, including hardware design, software engineering (both formal and informal methods), performance evaluation, and system assessment are particular focus of the Symposium. Of special interests are the integrated system design principles that consider multiple aspects of high assurance systems. The purpose of this Symposium is for public dissemination of such research results from academia, industry, and government. More information can be obtained from the conference web page at


AT'98 Workshop on Agent Technologies, University of Maryland Baltimore County, November 17-18, 1998. (Submissions due: October 23, 1998) [posted here 10/8/98].
The goal of the workshop is to provide a forum where researchers and developers can meet to exchange ideas and report on leading-edge developments in the area of agent technologies. If you wish to participate, please provide a short abstract describing research or ideas which you would be willing to present. Submit abstracts to no later than October 23, 1998. Please see the web page at for more details.


IIIS'98 Second Annual IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems. Warrenton, Virginia, USA, November 19-20, 1998. (submissions due: April 1, 1998). [posted here: 12/22/97]
Second Annual IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems. Papers solicited describing original ideas and results on foundations and applications related to the subject of integrity and internal control in information systems. Six copies of papers up to 5000 words due before 1 April to Prof. Sushil Jajodia, See web page for details.


25th Annual Computer Security Conference and Exhibition, Conference: November 2-4, 1998 Exhibition: November 1-3, 1998, Chicago Hilton Towers, Chicago, IL. [posted here 10/31/98]
The 25th Annual Computer Security Conference and Exhibition is sponsored by the Computer Security Institute and provides timely and informative security technology briefings through technical tracks and vendor exhibits. For more information see the conference web page at


Third Nordic Workshop on Secure IT Systems, Trondheim, Norway, November 5-6, 1998. Organized by Norwegian University of Science and Technology (NTNU). [posted here 10/31/98]
The theme of the workshop is applied security, i.e., all kinds of security issues for all kinds of information technology systems. We are in particular looking for contributions that deal with the interface between research and applications, rather than a specific technical area. Thus, papers that present research that can easily be applied to existing industrial problems or papers based on industrial applications, are especially welcome, without ruling out papers that present ongoing academic research into information security. More information can be found on the conference web page at


CCS-5 Preliminary call for papers for the Fifth Conference on Computer and Communications Security, San Francisco, California, USA, November 3-5, 1998 (Tutorials on November 2, 1998). (submissions due: April 3, 1998). [posted here: 10/1/97]
Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Fifth ACM Conference on Computer and Communications Security. Papers may present theory, technique, applications, or practical experience; a complete list of topics of interest can be found in the call for papers. Instructions for authors: Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with a proceedings. Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using 11-point font and reasonable margins on letter-size paper), and at most 20 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Submission instructions for papers, as well as for panel proposals and tutorial proposals, will be posted at and circulated in the final call for papers.


MOBILCOM'98 The Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, Texas, USA, October 25-30, 1998. [posted here 10/8/98]
The wireless communication revolution is bringing fundamental change to telecommunication and computing. Wide-area cellular systems and wireless LANs promise to make integrated networks a reality and provide fully distributed and ubiquitous mobile computing and communications, thus bringing an end to the tyranny of geography. Furthermore, services for the mobile user are maturing and are poised to change the nature and scope of communication. This conference, the fourth of an annual series, serves as the premier international forum addressing networks, systems, algorithms, and applications that support the symbiosis of mobile computers and wireless networks. See the conference web page at for more information.


ISW'98 Information Survivability Workshop 1998 ("Protecting Critical Infrastructures and Critical Applications"), Wyndham Safari Resort, Orlando, Florida USA, October 28-30, 1998. (submissions due: July 15, 1998) [posted here: 6/8/98]
The second Information Survivability Workshop (ISW'98) will focus on the domain-specific survivability requirements and characteristics of up to four different critical infrastructure and critical application areas (e.g., banking, transportation, electric power, and telecommunications). The primary goal of the workshop is to foster cooperation and collaboration between domain experts and the survivability research community to improve the survivability of critical, real-world systems. Another important goal is to continue to identify and highlight new survivability research ideas that can contribute to the protection of critical infrastructures and critical applications. Attendance at the workshop will be limited to 50 participants, and will be by invitation only, based on the submission of a short position paper (of up to 4 pages in length, single-spaced, 12 pt.). Additional information will be posted periodically in the workshop home


WSLSDS'98 Workshop on Security in Large-Scale Distributed Systems, Purdue University, West Lafayette, Indiana, USA, October 20-23, 1998. (submissions due: April 10, 1998) [posted here: 2/23/98]
This workshop is intended to promote discussion of new and promising approaches to the definition, management, enforcement, and recovery of security-relevant properties in wide-scale distributed systems. We invite contributions in all areas of information security, including especially: policy definition in heterogeneous networks, software engineering for security and reliability, change management in large-scale systems, auditing and audit reduction in the large, insider misuse definition and detection in large networks, intrusion detection in the large, incident response and recovery in the large, authentication and access control in large-scale systems, protection of quality of service, software forensics and investigation, defining and tolerating acceptable loss, mobile agents and active content issues, topological segmentation and firewall clustering, perimeter definition and defense, the role of standards, the role of COTS (commercial off-the shelf) systems. The program committee solicits abstracts of up to 5 pages for presentations on the above and related topics, and panel proposals detailing topics of discussion and 3-6 suggested panel members. 10 paper copies of proposals are due by April 10 to the program chair: Professor Eugene Spafford/ COAST Laboratory/ Department of Computer Sciences/ Purdue University/ W. Lafayette, IN 47907-1398/ Alternatively, PDF format abstracts can be emailed to the program chair no later than April 8. More details may be found online at


RBAC'98 Third ACM Workshop on Role-based Access Control, George Mason University, Arlington, VA, USA, October 22-23, 1998. [posted here: 7/6/98]
The essence of Role-Based Access Control (RBAC) is that permissions are assigned to roles rather than to individual users. Users acquire these permissions by virtue of being authorized to act in these roles. The driving motivation for RBAC is to simplify security policy administration while facilitating the definition of flexible, customized policies. The ACM workshop on RBAC brings together researchers, developers, and practitioners to discuss the application of RBAC to both traditional and emerging systems and the development of new modeling paradigms for future applications. The workshop invites participation from the database, network, distributed systems, operating system, security and application communities. Attendance is limited to 40 participants to foster a workshop atmosphere. For further information about the workshop, contact Srinivas Ganta at or consult our web site at


ASIACRYPT'98 Fourth conference of theory and applications of cryptologic techniques, Beijing, People's Republic of China, October 18-22, 1998. [posted here 7/6/98]
It is sponsored by the State Key Laboratory of Information Security (SKLOIS) and Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptologic Research (IACR). Original papers are solicited on all technical aspects of cryptology. Please send a cover letter and 16 copies of the submission to Prof. Dingyi Pei, one of the Program Co-chairs, at SKLOIS, Graduate School of USTC, #19A Yu Quan Road, Beijing 100039, P.R.China no later than May 9, 1998 (or postmarked by May 1, 1998, and sent via airmail or courier). Further information can be found on the conference web page at at


IRW-FMP'98 International Refinement Workshop and Formal Methods Pacific 1998, The Australian National University, September 29-October 2, 1998. (submissions due: April 3, 1998). [posted here: 2/16/98]
IRW/FMP'98 will provide a forum for discussion of current research on mathematically-based techniques for the design and development of computer systems. The program committee welcomes submissions relating to all aspects of mathematically-based techniques for the design and development of computer systems. A complete list of topics can be found on the workshop web page, along with guidelines for submission.


FMLDO7 Foundations of Models and Languages for Data and Objects, Seventh International Workshop on Foundations of Models and Languages for Data and Objects, Ostfriesland, Germany, October 5-9, 1998. (submissions due: Abstract by March 27, 1998). [posted here: 2/5/98]
This international workshop will be the seventh in a series focusing on foundations of models and languages for data and objects. In order to stimulate extensive discussions, the time for the presentation of a long (short) paper is 60 (30) minutes followed by about 30 (15) minutes of discussion. Furthermore, another participant will be asked in advance to prepare a response to the work presented. Due to the special character of the workshop, every participant is expected to stay for the complete duration of the workshop. Typical, but not exclusive topics of interest are: distributed and federated databases, object oriented databases, deductive databases, temporal aspects, logics and semantics, database and information systems design, integrity and security, query languages and optimization, databases in world-wide nets, and database dynamics. Authors are cordially invited to submit four copies of their contribution (extended abstract) preferably in electronic form (uuencoded gzipped PostScript) by March 27, 1998 to: Klaus-Dieter Schewe / Institut f"ur Informatik / Technische Universit"at Clausthal / Erzstr. 1 / 38678 Clausthal-Zellerfeld / Germany. Email: Papers should not exceed 10 pages (single-spaced, 12pt, US letter or A4 paper) for long presentations, and 5 pages for short presentations and for working group proposals.


COMSAC'98 Twenty-second Annual International Computer Software and Applications Conference, Vienna, Austria, August 17-21. (submissions due: January 15, 1998) [posted here: 12/22/97]
Topics of interest include all aspects of software security and safety. Six copies of original papers (3000-5000 words) due to program co-chairs (by area, see web page) by January 15, 1998. Further information on web page or:,,


NBIS'98 International Workshop on Network-Based Information Systems Vienna, August 24-28, 1998. (Submissions due: February 20, 1998) [posted here 2/5/98]
The main objective of this workshop is to bring together researchers from both network systems and information systems with the aim of encouraging the exchange of ideas and experience between these two communities. It will represent an international forum to give an overview of the most recent trending. Topics of interest include but are not limited to: Communication Networks, Internet Applications, Web-based database systems, Distributed Cooperating Information Systems, Groupware, Distributed and Parallel Algorithms, Multimedia Computing Systems, Mobile Computing Systems, Distributed Object-Oriented Systems, Interoperable Systems, Electronic Commerce, and Security and Privacy. All submitted papers MUST be formatted according to the author guidelines provided by IEEE Computer Society Press and MUST NOT be longer than FIVE pages. The author guidelines can be found at Complete instructions for paper submission are detailed on the conference web page. For any further questions or inquiries please contact: Professor Makoto Takizawa/ Dept. of Computers and Systems Engineering/ Tokyo Denki University/Ishizaka, Hatoyama, Saitama 350-0311, Japan/ Tel. +81-492-96-2911 ext.2507 Fax. +81-492-96-6185 (or 0501)/ URL


VLDB'98 24th International Conference on Very Large Data Bases, New York, NY, August 24-27, 1998. (Submissions due: February 16 & 23, 1998) [posted here 12/22/97]
Topics of interest include authorization and security. Submissions in various categories due by February 23, 1998, with abstracts of original research papers due 16 February to Jennifer Widom,, or Oded Shmueli, Details available on web page.


ECOMM, International Workshop on Business Process Reengineering and Supporting Technologies for Electronic Commerce, Vienna, August 24-28, 1998. (submissions due: March 15, 1998). [posted here: 3/2/98] The purpose of this workshop is to bring together researchers and practitioners who are working in technology areas of business process reengineering and electronic commerce in order to discuss recent research findings and address complementary research and development issues. Of particular interest are papers describing reengineering of existing business processes to address the rapid growth of the internet market and cross the chasm between organizational structures and e-commerce. Papers describing technologies and systems to support such reengineering efforts are also solicited. A complete list of topics and detailed instructions for submitting a paper are given on the conference web page at>.


MDDS'98 International workshop on Mobility in databases and Distributed Systems, Vienna, Austria, August 24-28, 1998. (submissions due: March 10, 1998). [posted here: 2/9/98] The objective of this workshop is to bring together researchers and practitioners with mobile communications background, database research interests, advanced applications and distributed computing systems research and development skills to discuss all aspects of emerging mobile computing paradigm. A complete list of topics of interest can be found on the conference web page. Papers should be in English and must not exceed 6000 words. The cover page should include the name and affiliation of the author(s), contact address/es, e-mail, fax and telephone. Authors are invited to send either 5 copies of their paper by courrier mail or an electronic submission (PostScript, Adobe Acrobat PDF, Microsoft Word) to Arkady Zaslavsky / DEXA'98 MDDS Workshop / Monash University / School of Computer Science and Software Engineering / 900 Dandenong Road, Caulfield East / VIC 3145 Australia / (e-mail): / (phone): +61-3-9903-2479 / (fax): +61-3-9903-1071. Authors of accepted papers will be expected to present their work at the work shop. All attendees must register for the DEXA'98 conference. Details about the DEXA'98 conference can be found at xa98.


DEXA-SIDIA'98 International Workshop on Security and Integrity of Data Intensive Applications, Vienna, Austria, August 26-28, 1998. (Submissions due March 15, 1998) [posted here 12/22/97]
Submissions (short papers up to 2500 words or full papers up to 5000 words) due March 15, 1998. Electronic submission preferred; contact and see web page for full details


USENIX'983rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31 - September 3, 1998. (extended abstracts due: March 6, 1998) [posted here: 2/5/98] The Workshop on Electronic Commerce will begin with tutorials which offer in-depth instruction in essential technologies. The one day of tutorials will be followed by three days of refereed papers and panel presentations examining topics in electronic commerce as well as the invited sessions exploring Public Key Infrastructures. A list of areas of interest for tutorials, papers, and panel sessions, along with instructions for submission, are given on the conference web page. Questions about topics should be addressed to the program chair via electronic mail to Technical paper submissions and proposals for panels must be received by March 6, 1998. Work-In-Progress reports must be received by March 20, 1998.


IFIP/SEC'98 International Information Security Conference, Vienna and Budapest, Austria and Hungary, August 31-September 4, 1998. (submissions due: January 16, 1998) [posted here 7/7/97]
SEC '98 covers a wide range of security related topics. It comprises both emphasis in technical as well as commercial aspects of information security. The conference is held within the framework of the IFIP World Computer Congress. Contact: Prof. Dr. Reinhard Posch; IAIK Klosterwiesgasse 32/I A-8010 Graz, AUSTRIA Tel: +43 316 8735510 Fax: +43 316 873520. e-mail:


CIA'98 2nd International Workshop, Cooperative Information Agents- Learning, Mobility and Electronic Commerce for Information Discovery in the Internet, Cite de Sciences - La Vilette, Paris, France, July 3-8, 1998. (Submissions due: February 6, 1998) [posted here: 12/22/97].
The research and application area of cooperative information agents is of rapidly increasing importance. The development of cooperative information agents requires expertise from several different research areas, especially AI, DAI, Databases, and CSCW. The interdisciplinary CIA workshop series covers the whole thematic range of cooperative information agents. The CIA-98 workshop will build on the success of CIA-97 ('DAI meets Databases') and mainly focus on the themes 'learning', 'mobility' and 'electronic commerce' in the context of cooperativer information discovery. A complete list of topics and detailed instructions on paper submission is given on the conference web page, or you may contact: Matthias Klusch/Technical University of Chemnitz/Computer Science Department/Strasse der Nationen 62/Phone: +49-371-531-1511, Fax: +49-371-531-1530/EMail:


ACISP'98 Third Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 13-15, 1998. (Submissions due: February 20, 1998) [posted here 12/22/97]
Papers solicited pertaining to all aspects of information security and privacy are solicited. Papers may present theory, techniques, applications and practical experiences on any relevant topic. Electronic submissions (preferred) or seven copies of hard copy anonymized submissions due February 20, 1998, to or A/Prof Ed Dawson, Queensland University of Technology. Details available on web page.


IFIP WG11.3 Twelfth Annual IFIP WG 11.3 Working Conference on Database Security, Porto Carras Complex, Chalkidiki, Greece, July 15-17, 1998. (submissions due: March 10, 1998). [posted here: 7/7/97]
The conference provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in database security. Papers and panel proposals are solicited. The conference is limited to about forty participants so that ample time for discussion and interaction may occur. Preliminary conference proceedings will be distributed to participants; revised papers and an account of the discussions at the meeting will be published by IFIP as the next volume in the ``Database Security: Status and Prospects'' series. Authors are invited to submit five copies of their papers to the program chair. Manuscripts must be in English, typed in double spaced format in 12 point font, and not more than 5000 words. Each copy should have a cover page with name, title, and address (including e-mail address) of authors, and an abstract of no more than 200 words. Electronic or fax submissions will not be accepted. Proposals for panels should include a one-page description of the subject matter and should be submitted electronically. Program chair: Professor Sushil Jajodia, Mail Stop 4A4, George Mason University, Fairfax, VA 22030-4444, USA. Tel: 703-993-1653, Fax: 703-993-1638, email: More information about the conference and about IFIP WG 11.3 can be found at URL:


WFMSP'98 Workshop on Formal Methods and Security Protocols, Indianapolis, Indiana, (following LICS'98) June 25, 1998. (Submissions due March 13) [posted here 12/22/97]
Correspondence and submissions to and Details available on web page.


ISCC'98The Third IEEE Symposium on Computers and Communications, Athens, Greece, June 30-July 2, 1998. [posted here 11/9/97]
The fast growing convergence between communications and computer technologies is having an increasingly profound impact on information and networking systems. This third annual event will provide a technical forum for experts from industry and academia to exchange ideas and present results of ongoing research in the areas listed on the conference web page at


Euro-PDS'98 The Second European Conference on Parallel and Distributed Systems, Vienna, Austria, July 1-3, 1998. [posted here 2/16/98].
The purpose of the Second European Conference on Parallel and Distributed Systems is to bring together developers and researchers from universities, industry and government to advance the field of parallel and distributed computing. A complete list of topics is given on the conference web page. Of particular interest to readers of this listing is the area of "Interoperability and Security."


SICON'98 6th IEEE Singapore International Conference on Networks, Singapore, July 1-4, 1998. [posted here 7/7/97]
The National University of Singapore and Computer Chapter (IEEE Singapore Section) are pleased to announce the 6th IEEE Singapore International Conference On Networks (SICON'98) in Singapore. The conference will start with two days of tutorials, and will continue with two days of technical presentations. As with the previous conferences, SICON'98 will provide a forum to bring together International and regional researchers, who are actively involved in research in computer networks and communications area. A complete list of topics of interest is given in the call for papers and on the conference web page at

SIGMOD'98ACM SIGMOD/PODS '98 Joint Conference, Seattle, Washington, USA, June 1-4, 1998 (submissions due: abstract by October 27, 1997; full paper by November 3, 1997) [posted here 9/29/97]
The 1998 ACM-SIGMOD Conference will bring together researchers, practitioners, developers and users to explore new concepts, tools, and techniques for database management systems. The conference will provide a forum for the dissemination of original research contributions as well as contributions related to practical system design, implementation, and evaluation. A complete list of topics of interest can be found on the conference web page at All submissions (including technical papers, panels, demos, tutorials and industrial submissions) must be received by November 3, 1997. Submissions should be sent to the program chair: Laura M. Haas, IBM Almaden Research Center K55/B1, 650 Harry Road, San Jose, CA 95120-6099 USA. e-mail: phone: 408-927-1722 fax: 408-927-3215. For research papers, submit six copies of an original manuscript to the program chair. It should be less than 25 pages, double-spaced, in no smaller than 10 point font (and with normal margins). The address, telephone number, FAX number, and electronic address of the contact author should be given on the title page of the submission. In addition, you must submit to the program chair by electronic mail a PLAIN ASCII file (no postscript, no LaTex) containing the title of the paper, the authors, and an abstract of 250 words or less by October 27, 1997. There are additional guidelines for submitting tutorial proposals. Please see the call-for-papers.

EUROCRYPT'9816th Annual IACR Eurocrypt Conference, Helsinki, Finland, May 31-June 4, 1998. (submissions due November 11, 1997) [posted here 2/9/98]
General Information: Original papers on all technical aspects of cryptology are solicited for submission to Eurocrypt '98, the 16th Annual IACR Eurocrypt Conference. Eurocrypt '98 is organized by the International Association for Cryptologic Research (IACR) and in cooperation with the Helsinki University of Technology. For more information, access Instructions for authors: A submission must contain a cover letter, one title page and 20 copies of the paper (double-sided copies preferred). The paper should be at most 12 pages excluding the bibliography and clearly marked appendices, and at most 15 pages in total. Submissions must be received by the program chair at the address given below no later than November 11, 1997 (or postmarked by November 3, 1997, and sent via airmail or courier). Detailed directions regarding the cover letter and the apper are given on the conference web page. For additional information, please contact: Arto Karila, General Chair Eurocrypt '98 / Helsinki University of Technology / Telecommunications Software and Multimedia Lab / P.O.Box 1100 / FIN-02015 HUT, Finland / Phone: +358-9-451-2173 / Fax: +358-9-451-3293 / E-mail:


PODS'98ACM SIGMOD/PODS '98 Joint Conference, Seattle, Washington, USA, June 1-4, 1998 [posted here 9/29/97]
The Symposium on Principles of Data Base Design will focus on new developments in the fundamental aspects of databases. Original research papers on the theory, design, specification, or implementation of databases are solicited. Papers emphasizing new topics or foundations of emerging areas are especially welcomed. A complete list of topics of interest can be found on the conference web page at Submissions of extended abstracts can be sent, in twelve copies, to one of the following two addresses, to be received before the deadline of 17 November 1997: Jan Paredaens, University of Antwerp (UIA), Universiteitsplein 1, B-2610 Antwerp, Belgium (email:; or Dan Suciu, AT&T Labs-Research, 180 Park Avenue room B294, Florham Park, NJ 07932-0971 (email: No electronic submissions will be accepted. The address, telephone number, FAX number, and e-mail address of the contact author should be given on the title page of the submission. A limit of 10 pages is placed on submissions. Font size should be at least 10 points. The abstract must provide sufficient detail to allow the program committee to assess its merits and should include appropriate references to and comparisons with the literature.


CAiSE*'98 10th Conference on Advanced Information Systems Engineering, Pisa, Italy, June 8-12, 1998. [posted here: 2/16/98].
CAiSE*98 is the 10th in the series of CAiSE Conferences which provide a forum for presentation and exchange of research results and practical experiences within the field of Information Systems Engineering. A special theme of the CAiSE*98 Conference is "Information Systems Engineering in Public Administrations". The scientific programme consists of paper presentations, workshops, tutorials, and interactive panel sessions. A complete list of topics and up-to-the-minute information is given on the conference web page at Questions regarding the Program of the Conference can be sent to: Questions regarding the Organisation of the Conference can be sent to:


CSFW11 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, 9-11 June, 1998. (Submissions due: February 6, 1998) [posted here: 10/22/97].
This workshop brings together researchers in computer science to examine foundational issues in computer security. We are interested both in papers that describe new results in the theories of computer security and in papers and panels that explore open questions and raise fundamental concerns about existing theories. The paper submission deadline is February 6, 1998. See the web page, or email Program Chair ( for full details.


WETICE'98 IEEE Seventh International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Stanford University, California, USA, June 17-19, 1998. (Submissions due: January 30, 1998) [posted here 12/22/97]
Topics include mobile agents, mobile objects, mobile computing, security and mobility, locating mobile entities, and communicating with mobile entities (see the web page for details). Papers submitted for the workshop should not be more than 15 pages in length. Submission should be mailed to the workshop chair, or made available for downloading over the Web.


IEEE-S&P'981998 IEEE Symposium on Security and Privacy, Oakland, California USA, May 3-6, 1998. (submissions due: November 24, 1997) [posted here 9/29/97]
The Symposium on Security and Privacy has, for 18 years, been the premier forum for the presentation of developments in computer security and for bringing together researchers and practitioners in the field. Last year, we began to re-emphasize work on engineering and applications while maintaining our interest in theoretical advances. The continued effort to broaden the scope of the conference (along with the topics of interest) are described in the call for papers. Papers should be submitted by mail or the various express carriers. Papers will NOT be accepted by fax. Papers should include an abstract, must not exceed 7500 words, and must report original work that has not been published previously and is not under consideration for publication elsewhere. The names and affiliations of authors should appear on a separate cover page only, as "blind" refereeing is used. If authors remove bibliographic citations for "blind" refereeing, those citations should also be included on the separate cover page only, so that the program co-chairs can verify the citations, without compromising the "blind" refereeing by the program committee members. Panel proposals should include a title, an abstract which describes the topic(s) to be discussed, the names of all proposed participants and assurances that the participants agree to serve on the panel, a proposed length and format for the panel and any other information that the panel proposer thinks would support their proposal. Paper or panel proposals should be sent to: Paul A. Karger, Program Co-Chair, IBM Corporation, Thomas J. Watson Research Center, 30 Saw Mill River Road, Hawthorne, NY 10532, USA. Please mark the envelope "IEEE Security and Privacy Symposium." We would also like to have an electronic, ascii text version of the abstract sent seperately to The electronic version of the abstract should include the title and the abstract as it appears in the paper. Authors who submit an abstract for a 5-minute talk should include a title, all authors names and their affiliations, where appropriate, and text. The whole should fit easily on one 8.5" by 11" page. Abstracts for 5-minute talks should be sent to Paul A. Karger at the above U.S. Postal address to be received no later than Friday, April 10, 1998 at 6:00 P.M (EST). Please mark the envelope "IEEE Security and Privacy Symposium - 5 minute Abstracts" If you have questions about the submission procedures, please contact Paul Karger by electronic mail at or by telephone at +1 (914) 784-7294. The call-for-papers is at


DOCS'98 Second Workshop on Distributed Object Computing Security, Baltimore, Maryland, USA. May 5-7, 1998, (submissions due: January 9, 1998) [posted here 12/22/97]
Topics of interest include DOC security standards, product design issues, security integration issues, and security operational issues. One page position statement to be submitted by 9 January 1998 to Further information from web page or co-chairs Richard Soley, OMG,, or David Chizmadia, NSA,


WebDB'98 International Workshop on the Web and Databases, Valencia, Spain, March 27-28 1998 (in conjunction with EDBT '98, (submissions due: January 12, 1998) [posted here 12/22/97]
Topics of interest include security and integrity issues. Submit extending abstract, 6pp (3000 words) or less, by January 12 in Postscript or HTML by e-mail to


ETAPS'98 European Joint Conferences on Theory and Practice of Software, Lisbon, Portugal, March 30-April 3, 1998. [posted here 7/7/97]
The European Joint Conferences on Theory and Practice of Software (ETAPS) is a new annual meeting covering a wide range of topics in Software Science which will take place in Europe each spring in the slot currently occupied by CAAP/ESOP/CC and TAPSOFT. ETAPS is a loose and open confederation of existing and new conferences and other events which aims to become the primary European forum for academic and industrial researchers working on topics relating to Software Science. The call for papers is now open for the five main conferences of ETAPS'98. See the ETAPS web page for more details about the scope and submission instructions of each individual conference. Prospective authors who have no access to WWW should use the e-mail address given for each conference to obtain further information.

  • Foundations of Software Science and Computation Structures (FoSSaCS): E-mail address:
  • Fundamental Approaches to Software Engineering (FASE): E-mail address:
  • European Symposium On Programming (ESOP): E-mail address:
  • International Conference on Compiler Construction (CC): E-mail address:
  • Tools and Algorithms for the Construction and Analysis of Systems (TACAS): E-mail address:


AGENTS-EMCSR'98 From agent theory to agent implementation: A Symposium at the 14th European Meeting on Cybernetics and Systems Research (EMCSR'98) Vienna, Austria, April 14-17, 1998. (submissions due: November 8, 1987) [posted here 2/9/98]
The main objective of this symposium is to foster the exchange of ideas and experience among researchers working on theoretical and practical issues of agent technology, covering both the micro and macro aspects of agent design. Topics of intrest include: Agent languages and architectures, Applications, Communication, Conceptual and theoretical foundations, Development and engineering methodologies, Learning and adaptability, Safety, security, and responsibility issues, Single vs. multi-agent systems, Social issues in agent societies, Testbeds and evaluations, and User interface issues. For details of how to prepare the draft final paper, see the guidelines for the main EMCSR conference published on the EMCSR web server. Draft final papers should not exceed 10 single-spaces A4 pages, final papers must not exceed 6 pages (10 point, two column). For any further information on this symposium please contact the local co-chair: Paolo Petta / Austrian Research Inst. for Artificial Intelligence / Schottengasse 3 / A-1010 Vienna Austria, Europe / email: / Fax: +43 1 5336112-77.


IH Workshop Workshop on Information Hiding, Portland, Oregon, USA. April 15-17, 1998. (submissions due: December 31, 1997) [posted here 10/1/97]
Many researchers are interested in hiding information or in stopping other people doing this. Current research themes include copyright marking of digital objects, covert channels in computer systems, subliminal channels in cryptographic protocols, low-probability-of-intercept communications, broadcast encryption schemes, and various kinds of anonymity services ranging from steganography through location security to digital elections. These closely linked areas of study were brought together in 1996 by a workshop on information hiding held at the Isaac Newton Institute in Cambridge. This second international workshop on information hiding will be held in Portland, Oregon from the 15th to the 17th April 1998. Interested parties are invited to submit papers on research and practice which are related to these areas of interest. Submissions can be made electronically (latex or postscript; preferred format is latex using llncs.sty) or in paper form; in the latter case, send eight copies suitable for blind refereeing (the authors' names should be on a separate cover sheet and there should be no obvious references). Papers should not exceed fifteen pages in length. Submit papers to: David Aucsmith, Intel Architecture Labs, 5200 N. E. Elam Young Parkway, Hillsboro, OR 97124-6497, USA. (email:


WWCA'98Second International Conference on World Wdie Computing and its Applications, Tsukuba Daiichi Hotel, Tsukuba, Japan, March 3-4, 1997. [posted here 11/9/97]
Conference information can be found on the web page at


EUROMED-NET'98 Special Track on Electronic Commerce on the Internet, Nicosia, Cyprus, March 4-7, 1998. [posted here 2/9/98]
Topics to be covered by the track are listed below, split into two categories, namely horizontal and vertical areas. The horizontal areas to be addressed are: Dataweb Technology; Database systems and multimedia systems in support of electronic commerce; Workflow technology in support of electronic commerce; Transaction management and electronic commerce; Intelligent agents and electronic commerce; Security and electronic commerce; Electronic payment systems; Standards in middleware and data exchange; Methodologies for multimedia e-commerce systems; Mobile computing platforms, access and standards; Distributed Systems and Applications and Support Infrastructure; Middleware platforms and languages (CORBA, Java, etc.); Coordination Models and Frameworks for seamless integration of various components. The vertical areas to be addressed include but are not limited to: Tourism; Healthcare; Transport; Textiles; Maritime Industry; Chemicals; Distance Learning; Legal aspects of electronic commerce. See the conference web page for details.


SNDSS'98The Internet Society Symposium on Network and Distributed System Security, Catamaran Resort, San Diego, California, March 11-13, 1998. [posted here 7/7/97]
The symposium will foster information exchange between hardware and software developers of network and distributed system security services. The intended audience is those who are interested in the practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than theory. Encouraging and enabling the Internet community to apply, deploy, and advance the state of available security technology is the major focus of symposium. A complete list of topics of interest is given in the call for papers. The program committee invites technical papers and panel proposals, for topics of technical and general interest. Technical papers should be 10-20 pages in length. Panel proposals should be two pages and should describe the topic, identify the panel chair, explain the format of the panel, and list three to four potential panelists. Each submission must contain a separate title page with the type of submission (paper or panel), the title or topic, the names of the author(s), organizational affiliation(s), telephone and FAX numbers, postal addresses, Internet electronic mail addresses, and must list a single point of contact if more than one author. The names of authors, affiliations, and other identifying information should appear only on the separate title page. Submissions must be received by August 1, 1997, and should be made via electronic mail in either PostScript or ASCII format. All submissions and program related correspondence (only) should be directed to the program chair: Matt Bishop, Department of Computer Science, University of California at Davis, Davis CA 95616-8562, Email: Phone: +1 (916) 752-8060, FAX: +1 (916) 752-4767. Dates, final call for papers, advance program, and registration information will be available at the URL:


ICDE'98 The 14th International Conference on Data Engineering, Orlando, Florida, USA, February 23-27, 1998.
Data Engineering deals with the use of engineering techniques and methodologies in the design, development and assessment of information systems for different computing platforms and application environments. The 14th International Conference on Data Engineering will continue in its tradition of being a premier forum for presentation of research results and advanced data-intensive applications and discussion of issues on data and knowledge engineering. The mission of the conference is to share research solutions to problems of today's information society and to identify new issues and directions for future research and development work. The complete list of topics, instructions for submitting papers or panel proposals can be found in the call for papers or the conference web page.


PKC'98 1998 International Workshop on Practice and Theory in Public Key Cryptography, Pacific Convention Center, Yokohama, Japan, February 5-6, 1998. [posted here 9/29/97]
The main purpose of PKC'98 is to bring together both practitioners and theoreticians who are working on public key encryption, digital signature, one-way hashing and their applications to share their experience and research outcomes. A complete list of topics of interest can be found at All correspondences, including inquiries and submissions (details are on the conference web page) will be made through e-mail. The official e-mail address for PKC'98 is


7th USENIX Security Symposium, San Antonio, Texas; January 26-29, 1998.
The goal of this symposium is to bring together researchers, practitioners, system programmers, and others interested in the latest advances in security and applications of cryptography. This will be a four day symposium with two days of tutorials, followed by two days of refereed paper presentations, invited talks, works-in-progress presentations, and panel discussions. Tutorials for both technical staff and managers will provide immediately useful, practical information on topics such as local and network security precautions, what cryptography can and cannot do, security mechanisms and policies, firewalls and monitoring systems. If you are interested in proposing a tutorial, contact the tutorial coordinator, Dan Klein: phone (412)421-2332 email . In addition to the keynote presentation, the technical program includes refereed papers, invited talks, a work in progress session, and panel sessions. There will be Birds-of-a-Feather sessions the last two evenings. You are invited to make suggestions to the program committee via email to . See the conference web page for details on topics and instructions for submission of work. The deadline for submission of papers is September 9, 1997.


ADC'98 9th Australasian Database Conference, University of Western Australia, Perth, Western Australia, February 2-3, 1998. [posted here May 13, 1997]
The Australasian Database Conference series is an annual forum for exploring research, development and novel applications of database systems, particularly research into novel and emerging areas of database systems and technology. Authors should submit either: four (4) copies of a paper to the address below or one (1) copy of a postscript version to Submitted papers should be original, no longer than 5,000 words, and both the submission and the camera ready copy must in A4 two column format, no more than 10 pages in length, have 25mm margins, single spaced, and in 10 point font). Papers must include the author's name, address, e-mail address, a 200 word abstract, and 3 to 6 keywords identifying the subject area. Papers may be submitted to: John Roddick / ADC'98 / School of Computer and Information Science / University of South Australia / The Levels, South Australia 5095 / Australia / Telephone: +61 8 8302 3463 / Facsimile: +61 8 8302 3381 / Email:


OBJ-CSA OMG-DARPA Workshop on Compositional Software Architectures, Marriott Hotel, Monterey, California, USA, January 6-8, 1998. [posted here 12/22/97].
The workshop will focus on the interactions between componentware software architectures, and web and distributed object architectures. Componentware did not exactly set the world on fire five years ago. Now we have new languages, maturing visions of compositional architectures (CORBA, WWW, ActiveX, ....), the web as a distributed system with a low-entry barrier, and emerging middleware service architectures. Do we have the critical mass to jump start the component-based software cottage industry? Even if the technology enablers are there, what is needed to establish an effective componentware market? What are the remaining barriers? The workshop is intended to bring together a mix of leading industry, government, and university software architects, componentware framework developers, researchers, standards develpers, vendors, and customers.


ENCXCS'97 Engineering Complex Computer Systems Minitrack, part of the Emerging Technologies Track of the 31st Annual, Hawaii International Conference on Systems Sciences (HICSS), Big Island of Hawaii, HI, January 6-9, 1998. [posted here 5/12/97]
The purpose of HICSS is to provide a forum for the interchange of ideas, research results, development activities, and applications among academicians and practitioners in computer-based systems sciences. The conference consists of tutorials, advanced seminars, presentations of accepted papers, open forum, tasks forces, and plenary and distinguished guest lectures. There is a high degree of interaction and discussion among the conference participants because the conference is conducted in a workshop-like setting. More information about the Minitrack can be obtained from the web page at or via email from Track Chair Ralph H. Sprague, Jr., For more information, visit the HICSS Web site at:


WECS'98 Workshop on Education in Computer Security, Asilomar Conference Center, Pacific Grove, CA, January 19-21, 1988. (submissions due: December 15, 1997). [posted here 11/9/97]
The Workshop on Education in Computer Security is intended to bring together those interested in developing and enhancing instruction in computer security within undergraduate and graduate computer science programs. The Workshop's objectives are to provide a forum for discussion of ideas and techniques in computer security education. The theme for the 1998 workshop will be the use of laboratory activities to enhance educational objectives. It is expected that the outcome of the workshop will be a set of laboratory exercises that can be used by the participants and others to enhance the teaching of security objectives. The meeting will also feature a half-day tutorial on Penetration Testing by Daniel Faigin, of the Aerospace Corporation. Penetration Testing is a holistic flaw assessment approach that is applied to expose weaknesses in an implemented system. This form of system stress testing is likely to be appealing to students and provides a rigorous framework from which instructors may fashion laboratory and course material. All participants must: (a) Submit a laboratory exercise, (b) Make conference center reservations, and (c) Complete the workshop registration form. Educators from undergraduate and graduate programs wishing to participate in the workshop are requested to submit a laboratory exercise or project description used to provide instruction on a topic in Computer or Network Security. Exercises should be submitted on or before 15 December 1997. All exercises will be organized in a collection which will be prepared for distribution to participants at the meeting. Submissions should be sent to: Prof. Cynthia E. Irvine, Computer Science Department, Code CS/Ic , Naval Postgraduate School, Monterey, CA 93943-5118, USA Voice: +1 408 656 2461 Fax: +1 408 656 2814 Hard copy and e-mail submissions are acceptable. Complete submission instructions and local arrangements can be found on the conference web page at


ICOIN-12 The 12th International Conference on Information Networking, Koganei, Tokyo, Japan, January 21-23, 1998. [posted here 10/1/97]
The International Conference on Information Networking (ICOIN) is to provide an international forum for scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects of communication networks and distributed computing systems. This is the fourth conference with the new name of ICOIN, which succeeds the Joint Workshop on Computer Communications (JWCC) starting from 1985. A complete list of topics of interest can be found in the call for papers. Further Information: or please contact: Prof. Makoto Takizawa, Dept. of Computers and Systems Engineering, Tokyo Denki University, Ishizaka, Hatoyama, Saitama 350 03, Japan, Tel. +81 492 96 2911 ext. 2507, Fax. +81 492 96 6185.