We apologize in advance if you receive multiple copies of this CFP.
----------------------------------------------------------------------
SANPA 2004
Second International Workshop on
Sensor and Actor Network Protocols and Applications
August 22, 2004 Boston, Massachusetts, USA
in Conjunction with Mobiquitous 2004
http://www.sanpa.org
CALL FOR PARTICIPATION
----------------------------------------------------------------------
SCOPE:
Wireless Sensor and Actor Networks (WSANs) are fast emerging as a new
sensing paradigm based on the collaborative effort of large number of
sensors deployed close to or inside the phenomenon to be observed, and
have the potential of providing diverse services to numerous
applications. The realization of WSANs require intensive technical
research efforts especially in power aware scalable wireless ad hoc
communications protocols due to their unusual application requirements
and unique constraints such as the following:
- WSANs are generally composed of large number of sensor nodes that
have limited computational and storage capacity.
- In many applications, sensor nodes can be randomly scattered in
unreachable regions.
- The sensed phenomenon must be acted on by the actor nodes in field
in a timely and accurate manner.
- The lifetime of a sensor network is generally limited to the battery
lifetime of sensor nodes.
SANPA 2004 is intended to provide a forum for researchers to present
their contributions as technical papers related to communication
protocols for WSANs, data management, access, aggregation and fusion
techniques, and sensor network applications. SANPA 2004 will continue
and build upon the success of SNPA 2003 (held in conjunction with ICC
2003).
IMPORTANT INFORMATION:
- Workshop location: http://www.sanpa.org/
- Program: http://www.sanpa.org/program.htm
- Registration: http://www.mobiquitous.org/rform.html
- E-mail: sanpa(a)ece.gatech.edu
APOLOGIES FOR MULTIPLE COPIES
The submission deadline has been postponed to September 10 (firm)
^^^^^^^^^^^^^^^^^^^
***************************************************
******** FINAL CALL FOR PAPERS ********
***************************************************
* *
* QoS-IP 2005 *
* The Third International Workshop on *
* QoS in Multiservice IP Networks *
* *
* Catania, Italy -- February 2-4, 2005 *
* *
* http://www.tlc-networks.polito.it/QoS-IP2005/ *
* *
***************************************************
Technical Co-Sponsorship of the IEEE Communications Society pending
Deadlines:
September 10th, 2004 Electronic Paper Submission
November 1st, 2004 Acceptance Notification
November 15th, 2004 Final Version Due
Topics:
- Architectures for the provision of QoS guarantees
in IP networks
- End-to-end QoS in IP networks
- Adaptive and customizable QoS provision
- Network planning and optimization for QoS
- Traffic models for QoS network design
- Analytical and simulation models for QoS estimation
- Fluid models for QoS estimation in large IP networks
- Experimental results on QoS
- QoS in wireless/mobile IP networks
- QoS in photonic IP networks
- QoS for special environments (Peer-to-peer, infomobility,
broadcasting, ...)
- Mapping and Interworking between Local QoS and
end-to-end QoS mechanisms
Information:
http://www.tlc-networks.polito.it/QoS-IP2005/
Keynote speakers:
Francois Baccelli, Ecole Normale Superieure, Paris, France
Rene Cruz, University of California, San Diego, USA
Henning Schulzrinne, Columbia University, New York, USA
Organizing Committee:
General Chair
Marco Ajmone Marsan, Politecnico di Torino, Italy
Program Committee Co-chairs
Giuseppe Bianchi, University of Rome Tor Vergata, Italy
Marco Listanti, University of Rome La Sapienza, Italy
Michela Meo, Politecnico di Torino, Italy
Local Arrangements Chair
Giovanni Schembra, University of Catania, Italy
Finance Chair
Alfio Lombardo, University of Catania, Italy
Publications Chair
Raffaele Bolla, University of Genova, Italy
Information System Chair
Maurizio M. Munafo', Politecnico di Torino, Italy
Dear Gus,
I hope to avoid a discussion at GA level. My proposed steps were and still
are:
- discussion on the only open issue during our tc chair dinner;
- discussion with the Finance Committee;
- hopefully agreement of all of us;
- formal minuting of this in TA;
- inform EB and GA about the agreed upon procedure (this can happen after
the GA meeting);
- ask EB to take care of administrative process to replace Standing Order
Supplement 8.
However, the "old" proposal has been included in the treasurer´s report
which has been put on the website (with the nice statement that this
procedure had been agreed upon between the treasurer and Leon Strous). I
have requested Dipak to remove this procedure from his report and wait for
the result of the steps I mentioned above. I have not had his reaction on
this last request (which was only sent this morning).
kind regards,
Leon
Original Message:
-----------------
From: gjo(a)daimlerchrysler.com
Date: Tue, 10 Aug 2004 08:41:59 -0400
To: il2v(a)weyl.math.virginia.edu, jberleur(a)info.fundp.ac.be, strous(a)iae.nl,
ito(a)ito.ecei.tohoku.ac.jp, jan.wibe(a)plu.ntnu.no, franz(a)uni-paderborn.de,
jkarat(a)watson.ibm.com, meersman(a)vub.ac.be, jdr(a)inbekon.com,
max.bramer(a)bcs.org.uk, basie(a)rkw.rau.ac.za,
ifip-tc6(a)informatik.rwth-aachen.de
Subject: Fw: tc fund procedure
Dear Chairmen:
This will be debated at the GA, if you have any advise for me please let
me know !!
Gustav
ITN/PD
Visit the CAx R&T website at: http://roadmap/d2710
----- Forwarded by Gus J Olling/ITM/DCC/DCX on 08/10/2004 08:40 AM -----
L.A.M.Strous(a)DNB.NL
08/10/2004 01:45 AM
To
basie(a)rau.ac.za, franz(a)uni-paderborn.de, gjo(a)daimlerchrysler.com,
il2v(a)weyl.math.virginia.edu, ito(a)ito.ecei.tohoku.ac.jp,
jan.wibe(a)plu.ntnu.no, jberleur(a)info.fundp.ac.be, jdr(a)inbekon.com,
jkarat(a)us.ibm.com, max.bramer(a)port.ac.uk, meersman(a)vub.ac.be,
nakatsu(a)atr.co.jp, rgj(a)dcs.bbk.ac.uk, spaniol(a)informatik.rwth-aachen.de,
strous(a)iae.nl
cc
Subject
tc fund procedure
Dear friends,
another issue to be finalized. The proposed TC fund procedure is
unanimously agreed upon with the exception of one issue, namely the
expenses for tc-chairs en working group chairs related to attending
business meetings. I would like to have a short final discussion on this
during our dinner. Please find attached a document that contains the
original proposal and (at the end) a proposal for a small revision. Steps
to be taken:
- final discussion during tc chair dinner
- (try to reach) agreement with Finance Committee
- formal decision in TA meeting
- inform EB and GA and request them to change the standing order
supplement
8 accordingly.
You will not be surprised to learn that our treasurer is strongly opposing
this revision and also some former TC-chairs feel that this is not a good
procedure because of the danger that this will get out of hand and will
use
too much of our financial resources. I have received no comments yet from
the other members of the Finance Committee whom I also asked for their
views.
kind regards,
Leon
(See attached file: TC funds procedure.doc)
"Externe E-mail wordt niet gebruikt voor het aangaan van verplichtingen"
"Any E-mail messages are given in good faith but shall not be binding nor
shall they be construed as constituting any obligation"
--------------------------------------------------------------------
mail2web - Check your email from the web at
http://mail2web.com/ .
Dear Chairmen:
This will be debated at the GA, if you have any advise for me please let
me know !!
Gustav
ITN/PD
Visit the CAx R&T website at: http://roadmap/d2710
----- Forwarded by Gus J Olling/ITM/DCC/DCX on 08/10/2004 08:40 AM -----
L.A.M.Strous(a)DNB.NL
08/10/2004 01:45 AM
To
basie(a)rau.ac.za, franz(a)uni-paderborn.de, gjo(a)daimlerchrysler.com,
il2v(a)weyl.math.virginia.edu, ito(a)ito.ecei.tohoku.ac.jp,
jan.wibe(a)plu.ntnu.no, jberleur(a)info.fundp.ac.be, jdr(a)inbekon.com,
jkarat(a)us.ibm.com, max.bramer(a)port.ac.uk, meersman(a)vub.ac.be,
nakatsu(a)atr.co.jp, rgj(a)dcs.bbk.ac.uk, spaniol(a)informatik.rwth-aachen.de,
strous(a)iae.nl
cc
Subject
tc fund procedure
Dear friends,
another issue to be finalized. The proposed TC fund procedure is
unanimously agreed upon with the exception of one issue, namely the
expenses for tc-chairs en working group chairs related to attending
business meetings. I would like to have a short final discussion on this
during our dinner. Please find attached a document that contains the
original proposal and (at the end) a proposal for a small revision. Steps
to be taken:
- final discussion during tc chair dinner
- (try to reach) agreement with Finance Committee
- formal decision in TA meeting
- inform EB and GA and request them to change the standing order
supplement
8 accordingly.
You will not be surprised to learn that our treasurer is strongly opposing
this revision and also some former TC-chairs feel that this is not a good
procedure because of the danger that this will get out of hand and will
use
too much of our financial resources. I have received no comments yet from
the other members of the Finance Committee whom I also asked for their
views.
kind regards,
Leon
(See attached file: TC funds procedure.doc)
"Externe E-mail wordt niet gebruikt voor het aangaan van verplichtingen"
"Any E-mail messages are given in good faith but shall not be binding nor
shall they be construed as constituting any obligation"
Some of you have remarked small mistakes. Here it is the correct version.
Best regards
Ramon
--
=========================================================================
Ramon Puigjaner
Universitat de les Illes Balears
Departament de Ciencies Matematiques i Informatica
07122 PALMA (Spain)
Phone: +34-971173288 Fax: +34-971173003
e-mail: putxi(a)uib.es
=========================================================================
Student Travel Grants:
ICNP 2004 is expecting to be able to provide up to
ten student travel grants. To be eligible, students must be enrolled in
a University in the United States, and travel must be from the United
States to the conference site. Applicants must submit a one page
summary that includes: a) a summary of the educational background; b) a
summary of research interests and research accomplishments; c)
motivation for attending the conference. Applications must be sent to
Tom LaPorta (tlp(a)cse.psu.edu), and include ICNP Travel Application in
the subject line. The deadline for submissions is August 31. Applicants
will be notified by September 2.
For further information about ICNP and conference program see
http://www.icnp2004.de.vu
Tom Laporta
--
________________________________________________________________________
Hartmut König Tel: +49 355 69 22 36
koenig(a)informatik.tu-cottbus.de Fax: +49 355 69 21 27
BTU Cottbus
LS Rechnernetze und Kommunikationssysteme
PF 10 13 44, D-03013 Cottbus, Germany
http://www-rnks.informatik.tu-cottbus.de
________________________________________________________________________
[Apologies for multiple copies of this announcement]
CALL FOR PARTICIPATION
RAID 2004
"Intrusion Detection and Society"
Seventh International Symposium on
Recent Advances in Intrusion Detection
Sponsored by SAP, France Telecom, and Région PACA
Institut Eurecom, Sophia-Antipolis, French Riviera, France
September 15-17, 2004
http://raid04.eurecom.fr
RAID 2004 will be collocated with ESORICS 2004
The RAID symposium brings together leading researchers and practitioners from
academia, government, and industry to discuss intrusion detection technologies
and issues from research and commercial perspectives.
This year's program features a single technical track with 14 full papers and
2 practical experience reports selected from almost 120 submissions. It also
includes invited speakers, a poster session as well as an abstracts' session.
The abstracts' session offers attendees the opportunity to present preliminary
research results or summaries of work published elsewhere. Poster presentations
of similar research results are also possible on Wednesday evening. Abstract
submissions from people not presenting posters are also welcome. Submissions
to either poster or abstract session should be sent to <dacier(a)eurecom.fr>.
For details see http://raid04.eurecom.fr/ .
TECHNICAL PROGRAM
-----------------
Wednesday, September 15th
=========================
09.00 Registration opens
12.30 Lunch
14.00 - 14.15 Welcome
14.15 - 15.15 Invited Talk: Lessons in Intrusion Detection
Bruce Schneier, Counterpane Internet Security, CA, USA
15.15 - 15.45 Coffee break
15.45 - 16.45 Modelling process behaviour - Chair: Alfonso Valdes,
(SRI International, USA)
Automatic Extraction of Accurate Application-Specific
Sandboxing Policy,
Lap-chung Lam and Tzi-cker Chiueh,
Rether Networks Inc., Centereach N.Y., USA
Context Sensitive Anomaly Monitoring of Process Control
Flow to Detect Mimicry Attacks and Impossible Paths,
Haizhi Xu, Wenliang Du, and Steve J. Chapin,
Systems Assurance Institute, Syracuse University, USA
16.45 - 17.00 Break
17.00 - 18.00 Abstract session
18.00 - Poster session
Thursday, September 16th
========================
09.00 - 10.30 Detecting Worms and Viruses - Chair: John McHugh
(CMU/SEI CERT, USA)
HoneyStat: Local Worm Detection Using Honeypots,
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian
Grizzard, John Levine, and Henry Owen,
Georgia Institute of Technology, USA
Fast Detection of Scanning Worm Infections,
Jaeyeon Jung (1), Stuart E. Schechter (2),
and Arthur W. Berger (1),
(1) MIT CSAIL, USA
(2) Harvard DEAS, USA.
Detecting Unknown Massive Mailing Viruses Using
Proactive Methods
Ruiqi Hu and Aloysius K. Mok,
Dept of Computer Sciences, University of Texas at Austin, USA
10.30 - 11.00 Coffee break
11.00 - 12.30 Attack and Alert Analysis - Chair: Diego Zamboni
(IBM Research, Switzerland)
Using Adaptive Alert Classification to Reduce False Positives
in Intrusion Detection,
Tadeusz Pietraszek,
IBM Zürich Research Laboratory, Switzerland.
Attack Analysis and Detection for Ad Hoc Routing Protocols
Yi-an Huang, Wenke Lee,
College of Computing, Georgia Institute of Technology, USA.
On the Design and Use of Internet Sinks for Network Abuse
Monitoring
Vinod Yegneswaran (1), Paul Barford (1), Dave Plonka (2),
(1) Dept of Computer Science, University of Wisconsin,
Madison, USA,
(2) Dept of Information Technology, University of Wisconsin,
Madison, USA
12.30 - 14.00 Lunch
14.00 - 15.00 Invited Talk: Fighting Fraud in Telecom Environments
Håkan Kvarnström
TeliaSonera AB, Sweden
15.00 - 15.30 Coffee break
15.30 - 16.30 Practical Experience - Chair: George Mohay
(Queensland University of Technology, Australia)
Monitoring IDS Background Noise Using EWMA Control
Charts and Alert Information
Jouni Viinikka and Herve Debar,
France Telecom R&D, Caen, France
Experience with a Commercial Deception System,
Brian Hernacki, Jeremy Bennett, Thomas Lofgren,
Symantec Corporation, Redwood City, USA
16.30 - 17.30 Poster session
Friday, September 17th
======================
09.00 - 10.30 Anomaly Detection - Chair: Christopher Kruegel,
(Technical University of Vienna, Austria)
Anomalous Payload-based Network Intrusion Detection
Ke Wang Salvatore J. Stolfo,
Computer Science Dept, Columbia University, USA
Anomaly Detection Using Layered Networks Based on Eigen
Co-occurrence Matrix
Mizuki Oka (1), Yoshihiro Oyama (2,3), Hirotake Abe (1), and
Kazuhiko Kato (1,3),
(1) University of Tsukuba, Japan,
(2) University of Tokyo, Japan,
(3) Japan Science and Technology Cooperation, Japan
Seurat: A Pointillist Approach to Anomaly Detection
Yinglian Xie (1), Hyang-Ah Kim (1), David R. O'Hallaron (1,2)
Michael K. Reiter (1,2), and Hui Zhang (1,2),
(1) Dept of Computer Science, Carnegie-Mellon University, USA
(2) Dept of Electrical and Computer Engineering,
Carnegie-Mellon University, USA
10.30 - 11.00 Coffee Break
11.00 - 12.30 Formal Analysis for Intrusion Detection - Chair: Wenke Lee
(Georgia Tech, USA)
Detection of Interactive Stepping Stones with Maximum
Delay Bound: Algorithms and Confidence Bounds
Avrim Blum, Dawn Song, Shobha Venkataraman
Carnegie Mellon University, USA.
Formal Reasoning about Intrusion Detection Systems
Tao Song (1), Calvin Ko (2), Jim Alves-Foss (3),
Cui Zhang (4), and Karl Levitt (1),
(1) Computer Security Laboratory, University of California,
Davis, USA,
(2) NAI LAbs, Network Associates Inc., Santa Clara, CA, USA,
(3) Center for Secure and Dependable Systems, University
of Idaho, USA
(4) Computer Science Dept, California State University,
Sacramento, USA.
RheoStat : Real-time Risk Management
Ashish Gehani and Gershon Kedem,
Dept of Computer Science, Duke University, USA
12.30 - 12.45 Concluding remarks
12.45 - 14.00 Lunch
ORGANIZING COMMITTEE
--------------------
General Chair: Refik Molva <refik.molva(a)eurecom.fr>
Program Chairs: Erland Jonsson <erland.jonsson(a)ce.chalmers.se>
Alfonso Valdes <valdes(a)sdl.sri.com>
Publication Chair: Magnus Almgren <almgren(a)ce.chalmers.se>
Publicity Chair: Yves Roudier <Yves.Roudier(a)eurecom.fr>
Sponsor Chair: Marc Dacier <marc.dacier(a)eurecom.fr>
PROGRAM COMMITTEE
-----------------
Tatsuya Baba (NTT Data, Japan)
Lee Badger (DARPA, USA)
Sungdeok Cha (KAIST, Korea)
Steven Cheung (SRI International, USA)
Herve Debar (France Telecom R&D, France)
Simone Fischer-Hubner (Karlstad University, Sweden)
Steven Furnell (University of Plymouth, UK)
Dogan Kesdogan (RWTH Aachen, Germany)
Chris Kruegel (Technical University of Vienna, Austria)
Hakan Kvarnstrom (TeliaSonera R&D, Sweden)
Wenke Lee (Georgia Tech, USA)
Douglas Maughan (DHS HSARPA, USA)
Roy Maxion (Carnegie Mellon University, USA)
John McHugh (CMU/SEI CERT, USA)
Ludovic Me (Supelec, France)
George Mohay (Queensland University of Technology, Australia)
Vern Paxson (ICSI and LBNL, USA)
Giovanni Vigna (UCSB, USA)
Andreas Wespi (IBM Research, Switzerland)
Felix Wu (UC Davis, USA)
Diego Zamboni (IBM Research, Switzerland)
STEERING COMMITTEE
------------------
Chair: Marc Dacier (Eurecom, France)
Herve Debar (France Telecom R&D, France)
Deborah Frincke (University of Idaho, USA)
Huang Ming-Yuh (The Boeing Company, USA)
Wenke Lee (Georgia Institute of Technology, USA)
Ludovic Me (Supelec, France)
S. Felix Wu (UC Davis, USA)
Andreas Wespi (IBM Research, Switzerland)
Giovanni Vigna (UCSB, USA)
VENUE / TRAVEL
--------------
RAID 2004 will be held on the French Riviera coast, about 20 km West of Nice
and 15 km Northeast of Cannes. The conference will take place at Institut
Eurecom / CICA, in the Sophia Antipolis science park, which can easily be
reached thanks to the nearby Nice international airport. For more
information, refer to: http://raid04.eurecom.fr/visitor_information.html
IMPORTANT DATES
---------------
Deadline for abstract/poster submission : August 30, 2004
(contact: Marc Dacier <Marc.Dacier(a)eurecom.fr>)
RAID conference dates : September 15-17, 2004
[Apologies for multiple copies of this announcement]
CALL FOR PARTICIPATION
ESORICS 2004
9th European Symposium on Research in Computer Security
Sponsored by SAP, @sec, and Région PACA
Institut Eurecom, Sophia Antipolis, French Riviera, France
September 13-15, 2004
http://esorics04.eurecom.fr
ESORICS 2004 will be collocated with RAID 2004
Since 1990, ESORICS has been confirmed as the European research event in
computer security, attracting audience from both the academic and industrial
communities. The symposium has established itself as one of the premiere,
international gatherings on Information Assurance. This year's three days
program will feature a single technical track with 27 full papers selected
from almost 170 submissions.
PRELIMINARY PROGRAM
-------------------
Monday, September 13th
======================
09:15 - 09:30 opening remarks
09:30 - 10:30 invited talk
10:30 - 11:00 coffee break
11:00 - 12:30 Access control
--------------
Incorporating Dynamic Constraints in the Flexible Authorization Framework
Shiping Chen, Duminda Wijesekera, Sushil Jajodia
Access-Condition-Table-driven Access Control for XML Database
Naizhen Qi, Michiharu Kudo
An Algebra for Composing Enterprise Privacy Policies
Michael Backes, Markus Duermuth, Rainer Steinwandt
12:30 - 14:00 lunch
14:00 - 15:30 Cryptographic protocols
-----------------------
Deriving, attacking and defending the GDOI protocol
Catherine Meadows, Dusko Pavlovic
Better Privacy for Trusted Computing Platforms
Jan Camenisch
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees
Protocol
Michael Backes
15:30 - 16:00 coffee break
16:00 - 17:30 Anonymity and information hiding
--------------------------------
A Formalization of Anonymity and Onion Routing
Sjouke Mauw, Jan Verschuren, Erik de Vink
Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
Rainer Böhme, Andreas Westfeld
Comparison between two practical mix designs
Claudia Diaz, Len Sassaman, Evelyne Dewitte
Tuesday, September 14th
=======================
09:00 - 10:30 Distributed data protection
---------------------------
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Einar Mykletun, Maithili Narasimha, Gene Tsudik
Towards a theory of data entanglement
James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
Portable and Flexible Document Access Control Mechanisms
Mikhail Atallah, Marina Bykova
10:30 - 11:00 coffee break
11:00 - 12:30 Information flow and security properties
----------------------------------------
Possibilistic Information Flow Control in the Presence of Encrypted
Communication
Dieter Hutter, Axel Schairer
Information flow control revisited: Noninfluence = Noninterference +
Nonleakage
David von Oheimb
Security Property Based Administrative Controls
Jon A. Solworth, Robert H. Sloan
12:30 - 14:00 lunch
14:00 - 15:30 Authentication and trust management
-----------------------------------
A Vector Model of Trust for Developing Trustworthy Systems
Indrajit Ray, Sudip Chakraborty
Parameterized Authentication
Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor
Networks
Bulent Yener, Seyit A. Camtepe
15:30 - 16:00 coffee break
16:00 - 17:30 Cryptography
------------
IPv6 Opportunistic Encryption
Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
On the role of key schedules in attacks on iterated ciphers
Lars R. Knudsen, John E. Mathiassen
A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
Bodo Moller
Wednesday, September 15th
=========================
09:00 - 10:30 Operating systems and architecture
----------------------------------
A Host Intrusion Prevention System for Windows Operating Systems
Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini
Re-establishing Trust in Compromised Systems: Recovering from Rootkits
that Trojan the System Call Table
Julian Grizzard, John Levine, Henry Owen
ARCHERR: Runtime Environment Driven Program Safety
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya
10:30 - 11:00 coffee break
11:00 - 12:30 Intrusion detection
-------------------
Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
John McHugh
Redundancy and diversity in security
Bev Littlewood, Lorenzo Strigini
Discover Novel Attack Strategies from INFOSEC Alerts
Xinzhou Qin, Wenke Lee
ORGANIZING COMMITTEE
--------------------
General Chair
Refik Molva
Institut Eurecom
email: Refik.Molva(a)eurecom.fr
Program Chairs
Peter Ryan Pierangela Samarati
University of Newcastle upon Tyne University of Milan
email: Peter.Ryan(a)newcastle.ac.uk email: samarati(a)dti.unimi.it
Publication Chair Publicity Chair
Dieter Gollmann Yves Roudier
TU Hamburg-Harburg Institut Eurecom
email: diego(a)tuhh.de email: roudier(a)eurecom.fr
Sponsoring Chair
Marc Dacier
Institut Eurecom
email: dacier(a)eurecom.fr
PROGRAM COMMITTEE
-----------------
Vijay Atluri, Rutgers University, USA
Giampaolo Bella, Università di Catania, Italy
Joachim Biskup, Universitaet Dortmund, Germany
Jan Camenisch, IBM Research, Switzerland
Germano Caronni, Sun Microsystems Laboratories, USA
David Chadwick, University of Salford, UK
Ernesto Damiani, University of Milan, Italy
Sabrina De Capitani di Vimercati, University of Milan, Italy
Yves Deswarte, LAAS-CNRS, France
Alberto Escudero-Pascual, Royal Institute of Technology, Sweden
Csilla Farkas, University of South Carolina, USA
Simon Foley, University College Cork, Ireland
Dieter Gollmann, TU Hamburg-Harburg, Germany
Joshua D. Guttman, MITRE, USA
Sushil Jajodia, George Mason University, USA
Sokratis K. Katsikas, University of the Aegean, Greece
Maciej Koutny, University of Newcastle upon Tyne, UK
Peng Liu, Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Roy Maxion, Carnegie Mellon University, USA
Patrick McDaniel, AT&T Labs-Research, USA
John McHugh, CERT/CC, USA
Catherine A. Meadows, Naval Research Lab, USA
Refik Molva, Institut Eurécom, France
Peng Ning, NC State University, USA
LouAnna Notargiacomo, The MITRE Corporation, USA
Eiji Okamoto, University of Tsukuba, Japan
Stefano Paraboschi, University of Bergamo, Italy
Andreas Pfitzmann, TU Dresden, Germany
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Jean-Jacques Quisquater, Microelectronic laboratory, Belgium
Steve Schneider, University of London, UK
Christoph Schuba, Sun Microsystems, Inc., USA
Michael Steiner, IBM T.J. Watson Research Laboratory, USA
Paul Syverson, Naval Research Laboratory, USA
Kymie M.C. Tan, Carnegie Mellon University, USA
Dan Thomsen, Tresys Technology, USA
Moti Yung, Columbia University, USA
VENUE / TRAVEL
--------------
ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice
and 15 km Northeast of Cannes. The conference will take place at Institut
Eurecom / CICA, in the Sophia Antipolis science park, which can easily be
reached thanks to the nearby Nice international airport. For more
information, refer to: http://esorics04.eurecom.fr/visitor_information.html
IMPORTANT DATES
---------------
ESORICS conference dates: September 13-15, 2004
Dear friends,
Attached you will find the programme of Net-Con 2004 to be held in Palma
next November 2-5.
In the web page of the conference (http://netcon04.uib.es) you will find
the registration and the hotel booking forms.
If you can distribute this announcement in your countries, I will thank
you very much.
Best regards
Ramon
=========================================================================
Ramon Puigjaner
Universitat de les Illes Balears
Departament de Ciencies Matematiques i Informatica
07122 PALMA (Spain)
Phone: +34-971173288 Fax: +34-971173003
e-mail: putxi(a)uib.es
=========================================================================
Call for Papers
"Managing New Networked Worlds"
Authors are invited to submit complete unpublished papers, which are not
under review in any other conference or journal, as well as proposals
for tutorials, panel discussions, poster demonstrations, application
sessions or birds-of-a-feather sessions. Detailed submission
instructions are available on the symposium Web site,
http://www.ieee-im.org/.
Topics of interest include the following with a more detailed list
included on the WWW site.
* Management paradigms, models, and algorithms
*Management functions and operational challenges
*Management standards, platforms and technologies
*Management of new networked worlds
Technical Paper and Application Session Deadline: 23 August, 2004
Poster, Tutorial and Panel Deadline: 30 September, 2004
This symposium will be co-located with Telemanagement World.
http://www.tmforum.org/