[p2p-hackers] ESORICS 2004 - Last Call for Participation

Yves.Roudier at eurecom.fr Yves.Roudier at eurecom.fr
Fri Sep 3 17:30:04 UTC 2004


         [Apologies for multiple copies of this announcement]

                        CALL FOR PARTICIPATION

                             ESORICS 2004
        9th European Symposium on Research in Computer Security

               Sponsored by SAP, @sec, and Région PACA

      Institut Eurecom, Sophia Antipolis, French Riviera, France
                        September 13-15, 2004 
                     http://esorics04.eurecom.fr  
             ESORICS 2004 will be collocated with RAID 2004


Since 1990, ESORICS has been confirmed as the European research event in
computer security, attracting audience from both the academic and industrial
communities. The symposium has established itself as one of the premiere,
international gatherings on Information Assurance. This year's three days
program will feature a single technical track with 27 full papers selected
from almost 170 submissions.


                          TECHNICAL PROGRAM
                          -----------------

Monday, September 13th
======================

09:15 - 09:30   opening remarks

09:30 - 10:30   invited talk: Enterprise Privacy Management 
                Michael Waidner - IBM Zurich Research Laboratory, Switzerland  


10:30 - 11:00   coffee break

11:00 - 12:30   Access control
                --------------

  Incorporating Dynamic Constraints in the Flexible Authorization Framework
  Shiping Chen, Duminda Wijesekera, Sushil Jajodia
	
  Access-Condition-Table-driven Access Control for XML Database
  Naizhen Qi, Michiharu Kudo

  An Algebra for Composing Enterprise Privacy Policies
  Michael Backes, Markus Duermuth, Rainer Steinwandt
	
12:30 - 14:00   lunch
	
14:00 - 15:30   Cryptographic protocols
                -----------------------

  Deriving, attacking and defending the GDOI protocol
  Catherine Meadows, Dusko Pavlovic

  Better Privacy for Trusted Computing Platforms
  Jan Camenisch

  A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees
  Protocol
  Michael Backes
	
15:30 - 16:00   coffee break
	
16:00 - 17:30   Anonymity and information hiding
                --------------------------------

  A Formalization of Anonymity and Onion Routing
  Sjouke Mauw, Jan Verschuren, Erik de Vink

  Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
  Rainer Böhme, Andreas Westfeld

  Comparison between two practical mix designs
  Claudia Diaz, Len Sassaman, Evelyne Dewitte


Tuesday, September 14th
=======================

09:00 - 10:30    Distributed data protection
                 ---------------------------

  Signature Bouquets: Immutability for Aggregated/Condensed Signatures
  Einar Mykletun, Maithili Narasimha, Gene Tsudik

  Towards a theory of data entanglement
  James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong

  Portable and Flexible Document Access Control Mechanisms
  Mikhail Atallah, Marina Bykova
	
10:30 - 11:00   coffee break
	
11:00 - 12:30   Information flow and security properties
                ----------------------------------------

  Possibilistic Information Flow Control in the Presence of Encrypted
  Communication
  Dieter Hutter, Axel Schairer

  Information flow control revisited: Noninfluence = Noninterference +
  Nonleakage
  David von Oheimb

  Security Property Based Administrative Controls
  Jon A. Solworth, Robert H. Sloan
	
12:30 - 14:00   lunch
	
14:00 - 15:30   Authentication and trust management
                -----------------------------------

  A Vector Model of Trust for Developing Trustworthy Systems
  Indrajit Ray, Sudip Chakraborty

  Parameterized Authentication
  Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran

  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor
  Networks
  Bulent Yener, Seyit A. Camtepe
	
15:30 - 16:00   coffee break
	
16:00 - 17:30   Cryptography
                ------------

  IPv6 Opportunistic Encryption
  Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann

  On the role of key schedules in attacks on iterated ciphers
  Lars R. Knudsen, John E. Mathiassen

  A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
  Bodo Möller


Wednesday, September 15th
=========================

09:00 - 10:30   Operating systems and architecture
                ----------------------------------

  A Host Intrusion Prevention System for Windows Operating Systems
  Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini

  Re-establishing Trust in Compromised Systems: Recovering from Rootkits
  that Trojan the System Call Table
  Julian Grizzard, John Levine, Henry Owen

  ARCHERR: Runtime Environment Driven Program Safety
  Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya
	
10:30 - 11:00   coffee break
	
11:00 - 12:30   Intrusion detection
                -------------------

  Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
  John McHugh

  Redundancy and diversity in security
  Bev Littlewood, Lorenzo Strigini

  Discover Novel Attack Strategies from INFOSEC Alerts
  Xinzhou Qin, Wenke Lee


                           ORGANIZING COMMITTEE
                           --------------------

General Chair
 Refik Molva
 Institut Eurecom
 email: Refik.Molva at eurecom.fr 

Program Chairs 
 Peter Ryan                              Pierangela Samarati 
 University of Newcastle upon Tyne       University of Milan 
 email: Peter.Ryan at newcastle.ac.uk       email: samarati at dti.unimi.it 
    
Publication Chair                       Publicity Chair 
 Dieter Gollmann                         Yves Roudier 
 TU Hamburg-Harburg                      Institut Eurecom 
 email: diego at tuhh.de                    email: roudier at eurecom.fr 
    
Sponsoring Chair                        
 Marc Dacier
 Institut Eurecom
 email: dacier at eurecom.fr


                              PROGRAM COMMITTEE
                              -----------------

 Vijay Atluri, Rutgers University, USA 
 Giampaolo Bella, Università di Catania, Italy 
 Joachim Biskup, Universitaet Dortmund, Germany 
 Jan Camenisch, IBM Research, Switzerland 
 Germano Caronni, Sun Microsystems Laboratories, USA 
 David Chadwick, University of Salford, UK 
 Ernesto Damiani, University of Milan, Italy 
 Sabrina De Capitani di Vimercati, University of Milan, Italy 
 Yves Deswarte, LAAS-CNRS, France 
 Alberto Escudero-Pascual, Royal Institute of Technology, Sweden 
 Csilla Farkas, University of South Carolina, USA 
 Simon Foley, University College Cork, Ireland 
 Dieter Gollmann, TU Hamburg-Harburg, Germany 
 Joshua D. Guttman, MITRE, USA 
 Sushil Jajodia, George Mason University, USA 
 Sokratis K. Katsikas, University of the Aegean, Greece 
 Maciej Koutny, University of Newcastle upon Tyne, UK 
 Peng Liu, Pennsylvania State University, USA 
 Javier Lopez, University of Malaga, Spain 
 Roy Maxion, Carnegie Mellon University, USA 
 Patrick McDaniel, AT&T Labs-Research, USA 
 John McHugh, CERT/CC, USA 
 Catherine A. Meadows, Naval Research Lab, USA 
 Refik Molva, Institut Eurécom, France 
 Peng Ning, NC State University, USA 
 LouAnna Notargiacomo, The MITRE Corporation, USA 
 Eiji Okamoto, University of Tsukuba, Japan 
 Stefano Paraboschi, University of Bergamo, Italy 
 Andreas Pfitzmann, TU Dresden, Germany 
 Bart Preneel, Katholieke Universiteit Leuven, Belgium 
 Jean-Jacques Quisquater, Microelectronic laboratory, Belgium 
 Steve Schneider, University of London, UK 
 Christoph Schuba, Sun Microsystems, Inc., USA 
 Michael Steiner, IBM T.J. Watson Research Laboratory, USA 
 Paul Syverson, Naval Research Laboratory, USA 
 Kymie M.C. Tan, Carnegie Mellon University, USA 
 Dan Thomsen, Tresys Technology, USA 
 Moti Yung, Columbia University, USA 



                              VENUE / TRAVEL
                              --------------

ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice
and 15 km Northeast of Cannes. The conference will take place at Institut
Eurecom / CICA, in the Sophia Antipolis science park, which can easily be
reached thanks to the nearby Nice international airport. For more
information, refer to: http://esorics04.eurecom.fr/visitor_information.html




More information about the P2p-hackers mailing list