OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

xacml message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Subject: Reminder: ACM CCS8 -- call for participation


REMINDER: ACM CCS8 -- Early registration rate ends October 1, 2001
(Apologies if you receive this msg more than once)

More information and registration form at
http://seclab.crema.unimi.it/~ccs8

===========================================================
8TH ACM COMPUTER AND COMMUNICATION SECURITY CONFERENCE (CCS)
November 5-8, 2001, Philadelphia, PA (USA)
http://seclab.crema.unimi.it/~ccs8

Sponsored by ACM SIGSAC
==========================================================

TUTORIALS ON NOV. 5  -- WORKSHOPS ON NOV. 5 and NOV. 8



PRELIMINARY CONFERENCE PROGRAM
-----------------------------------------------------------

TUESDAY	NOV. 6

8:30 - 8:45 OPENING REMARKS BY CHAIRS
Mike Reiter (Bell Labs, Lucent Technologies, USA)
Pierangela Samarati (Universita` di Milano, Italy)


8:45 - 10:00 INVITED TALK
Brian Snow
(Technical Director, Information Assurance Directorate,
National Security Agency, USA)


10:00 - 10:30  COFFEE BREAK


10:30 - 12:30 PASSWORD MANAGEMENT AND DIGITAL SIGNATURES

Error Tolerant Password Recovery
  Niklas Frykholm, Ari Juels
  (RSA Laboratories, USA)

Delegation of Cryptographic Servers for Capture-Resilient Devices
  Philip MacKenzie, Michael K. Reiter
  (Bell Labs, Lucent Technologies, USA)

Twin Signatures: An Alternative to the Hash-and-Sign Paradigm
  David Naccache, David Pointcheval, Jacques Stern
  (Ecole Normale Superieure,  France)

BiBa: A New Signature Scheme for Broadcast Authentication
  Adrian Perrig (UC Berkeley, USA)


12:30 - 14:00 LUNCH


14:00 - 15:30 ACCESS CONTROL

Policy Algebras for Access Control - The Propositional Case
  Duminda Wijesekera, Sushil Jajodia
  (George Mason University, USA)

A Chinese Wall Security Model for Decentralized Workflow Systems
  Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni
  (Rutgers University, USA)

Design and Implementation of a Flexible RBAC-Service in an
Object-Oriented Scripting Language
  Gustaf Neumann, Mark Strembeck
  (Vienna University of Economics and BA, Austria)


15:30 - 16:00  COFFEE BREAK


16:00 - 17:30 MOBILE CODE AND DISTRIBUTED SYSTEMS

An Efficient Security Verification Method for Programs with
Stack Inspection
  Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki
  (Nara Institute of Science and Technology, Japan)

The Performance of Public Key-Enabled Kerberos Authentication
in Mobile Computing Applications
  Alan Harbitter,  Daniel A. Menasce`
  (PEC Solutions Inc., USA - George Mason University, USA)

A New Approach to DNS Security (DNSSEC)
  Giuseppe Ateniese,  Stefan Mangard
  (The Johns Hopkins University, USA)


19:00  RECEPTION

-----------------------------------------------------------------

WEDNESDAY NOV. 7

8:30 - 10:00 PROTOCOLS

Events in Security Protocols
  Federico Crazzolara, Glynn Winskel
  (University of Cambridge, England)

On the Relationship between Strand Spaces and Multi-Agent Systems
  Joseph Y. Halpern, Riccardo Pucella
  (Cornell University, USA)

Verifiable, Secret Shuffles of ElGamal Encrypted Data for
Secure Multi-Authority Elections
  C. Andrew Neff (VoteHere Inc.,  USA)


10:00 - 10:30 COFFEE BREAK


10:30 - 12:30 SECURE DATA PUBLISHING AND CERTIFICATE MANAGEMENT

Tangler - A Censorship Resistant Publishing System Based On Document
Entanglements
  Marc Waldman, David Mazieres
  (New York University, USA)

Flexible Authentication of XML documents
  Prem Devanbu, Michael Gertz, April Kwong, Chip Martel,
  Glen Nuckolls,  Stuart G. Stubblebine
  (UC Davis, USA and Stubblebine Consulting, USA)

Interoperable Strategies in Automated Trust Negotiation
  Ting Yu, Marianne Winslett, Kent Seamons
  (University of Illinois at Urbana-Champaign, USA,
  and Brigham Young Univerity, USA)

Distributed Credential Chain Discovery in Trust Management
  Ninghui Li, William H. Winsborough, John C. Mitchell
  (Stanford University, USA,  and NAI Labs, USA)


12:30 - 14:00 LUNCH


14:00 - 15:30 PROTOCOL ANALYSIS

Bounded-Process Cryptographic Protocol Analysis
  Jonathan Millen, Vitaly Shmatikov
  (SRI International, USA)

On the Abuse-Freeness of the Garay-Jakobsson-MacKenzie
Two-Party Protocol
  Rohit Chadha, Max Kanovich, Andre Scedrov
  (University of Pennsylvania, USA)

The Faithfulness of Abstract Encryption
  Joshua D. Guttman, F. Javier Thayer Fabrega, Lenore D. Zuck
  (MITRE, USA - New York University, USA)


15:30 - 16:00 COFFEE BREAK


16:00 - 17:30 PANEL - THE DIGITAL MILLENIUM COPYRIGHT ACT: AN INFORMAL DEBATE
Allan Adler
(Vice President, Legal and Governmental Affairs American Association of Publishers)
Fred von Lohmann
(Senior Intellectual Property Attorney, Electronic Frontier Foundation)


-------------------------------------------------------------

THURSDAY NOV. 8

8:30 - 10:00 CRYPTOSYSTEMS

OCB: An Authenticated-Encryption Mode for Emerging Cryptographic
Standards
  Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
  (UC Davis, USA - UC San Diego, USA - University of Nevada, USA)

Paillier's Cryptosystem Revisited
  Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham,
  Phong Q. Nguyen
  (Universita` di Catania, Italy -  IBM Research Yorktown
  Heights, USA - Ecole Normale Superieure, France)

Securely Combining Public-Key Cryptosystems
  Stuart Haber, Benny Pinkas
  (InterTrust STAR Lab, USA)


10:00 - 10:30 COFFEE BREAK


10:30 - 12:30 GROUP KEY MANAGEMENT AND SIGNATURES

A Practical Forward Secure Group Signature Scheme
  Dawn Song (UC Berkeley, USA)

Formalizing GDOI Group Key Management Requirements in NPATRL
  Catherine Meadows, Paul Syverson, Iliano Cervesato
  (Naval Research Laboratory, USA)

Accountable-Subgroup Multisignatures
  Silvio Micali, Kazuo Ohta, Leonid Reyzin
  (MIT, USA -  University of Electoro-Communications, Japan)

Provably Authenticated Group Diffie-Hellman Key Exchange
  Emmanuel Bresson, Olivier Chevassut, David Pointcheval,
  Jean-Jacques Quisquater
  (Ecole Normale Superieure, France -  Lawrence Berkeley National
  Laboratory, USA - Microelectronic laboratory, Belgium)


12:30 CLOSING

============================================================
============================================================

TUTORIALS AND WORKSHOPS

MONDAY NOV. 5

TUTORIAL 1: TOPICS IN INTRUSION DETECTION: CORRELATION AND
NETWORK-BASED APPROACHES
(Vern Paxson and Stuart Staniford)

TUTORIAL 2: SECURITY AND SOFTWARE ENGINEERING
(Stuart Stubblebine and Prem Devanbu)

WORKSHOP: SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
(http://www.star-lab.com/sander/spdrm)


----------------------------------------------------------

THURSDAY NOV. 8 (13:30 - 18:30)

WORKSHOP: DATA MINING FOR SECURITY APPLICATIONS
(http://seclab.crema.unimi.it/~ccs8/mining-program.html)

==========================================================



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Powered by eList eXpress LLC