We apologize if you receive multiple copies of this CFP.
10th IEEE/IFIP
Network Operations and Management Symposium (NOMS 2006)
http://www.noms2006.org
Call for Papers
?Management of Integrated
End-to-end Communications and Services"
The 10th IEEE/IFIP Network Operations and Management
Symposium (NOMS 2006) will be held 3-7 April 2006 in
the Vancouver Convention and Exhibition Center, Vancouver,
Canada. Held in even-numbered years since 1988, NOMS 2006
will follow the 18 year tradition of NOMS and IM as the
primary forum for technical exchange of the research,
standards, development, systems integration, service
provider, and user communities. NOMS 2006 will present
up-to-date approaches and technical solutions for
integrated systems and services including communication
networks, host systems, enterprise applications, service
oriented architectures, and delivery of management services.
The conference provides a peer-reviewed program of technical
sessions, application sessions, tutorials, posters,
application sessions, and panels as well as vendor exhibits.
Integrated systems and services require considerations for
today?s multi-service and multi-domain environment of
heterogeneous technologies, service offerings, management
strategies, and business models. NOMS 2006 focuses on
integrated management that encompasses provisioning,
operation, and maintenance. This broad scope also calls
for an integrated approach to dependability, resilience,
quality-of-service, mobility management, and services
billing. In particular, these considerations include the
combination of wireless and wired networks and the
integration of all-IP communication systems.
NOMS 2006 will offer five types of sessions:
technical, application, poster, panel, and BoF. Technical
sessions present high-quality papers on the latest
research results in the network operations and management
area. Application sessions present papers focusing on the
experience of IT and telecommunications industries, such
as service providers, OSS vendors, and equipment
manufacturers. The scope here includes customer
requirements, management system implementations, and
business practices. Poster sessions provide an insight
into work-in-progress. Panel sessions focus on business
implications, market trends, and emerging applications
with panelists who are technology and business leaders.
Authors are invited to submit complete unpublished papers
that are not under review in any other conference or
journal in the following, or related topic areas:
Management Paradigms, Models and Architectures
* Self-managing networks (self-healing, self-optimizing,
self-protecting and self-configuring)
* Integrated control and management
* Distributed and scalable management
* Policy and role based management
* Programmable, active, and adaptive mgmt
* Resilience and survivability
* "Plug-n-Play" component-based management
* Customer controlled and managed networks
* Proactive and reactive management
Operation and Management Functions
* Security management
* Mobility management
* End-to-end measurements
* Network and systems monitoring
* Alarm correlation and filtering
* Customer care and workforce management
* Process engineering for operators' service and
network management
* Performance and fault management
* Configuration and accounting management
* Integration and testing of commercial off-the-shelf
products
* Content hosting and delivery
* Path Protection and Restoration
* Internet service pricing, Bandwidth trading
, Service
Engineering and Operational Challenges
* Next generation operation support systems
* Service design and quality assurance
* Resource inventory, planning, and allocation
* Service discovery and service negotiation
* SLAs and business process management
* Quality-of-Service management
* Service portability/mobility (VHE)
* Transaction-oriented services and supply chain
management
* "Soft" networks (Soft-switch, Parlay, 3GPP OSA, JAIN)
and service switching
* Dynamic service requirements analysis
* Charging and accounting of integrated systems
and services
Theories, Models, and Enabling Management Technologies
* Theory (control, optimization, economic, games, chaos,
graph) for management
* Grid, middleware and peer-to-peer technologies
* Information models and Internet technologies
(Web, XML, DEN, CIM)
* AI techniques (knowledge-based, intelligent agents,
machine learning, neural networks,)
* Data warehousing, ontology, mining and statistical
methods in management
* User interfaces and virtual reality in management
*
Management of Emerging Networks and Services
* Converged networks and services
* Peer-to-peer and community networks
* Grids, grid services, and grid applications
* Ad hoc and self-configurable networks
* Multi-sensor and self-organizing networks
* Overlay networks, virtual topologies and VPN services
* Wireless broadband networks (2G, 2.5G, 3G, and beyond)
* High speed access, Wireless Local (WLANs) and Personal
Area Networks (PANs)
* Optical networks (metropolitan, all optical, WDM,
DWDM, optical IP)
* Video and broadband cable networks
* VoIP, VoD, FTTX networks, services, and protocols
(IPv4, IPv6, H.323, SIP, RTP, RTCP, RTSP, MGCP, and QoS)
* Storage Area Networks (SAN) and ASPs server farms
* Web services and content delivery networks
* Smart homes and networked haptics
* Satellite and interplanetary networks
* e-World (e-health, e-commerce, e-business, and e-government)
Important Dates:
* Deadline for Technical Session Papers: 1 August 2005
* Deadline for Application Session Papers: 15 September 2005
* Deadline for Tutorials, Panels and Posters: 15 September 2005
* Notification of Acceptance: 12 November 2005
* Final Camera Ready Papers Due: 1 February 2006
For more information on NOMS 2006, please contact one of the
two Program Co-chairs:
Joseph L. Hellerstein <hellers(a)us.ibm.com>, IBM, U.S.A.
Burkhard Stiller <stiller(a)tik.ee.ethz.ch>,
University of Zürich and ETH Zürich, Switzerland
Poster Sessions
---------------
In addition to regular papers presented in technical sessions,
NOMS 2006 also offers poster sessions for more informal
interactions and presenting work in progress. Short papers
(4 pages long) can be submitted for consideration as poster
presentations. Posters will be selected from these short papers
and regular papers. You can submit your work selecting "Poster
session" in the NOMS 2006 submission system (JEMS) at
https://submissoes.sbc.org.br/noms2006. Further questions
related to posters must be addressed to the poster co-chairs:
Lisandro Zambenedetti Granville <granville(a)inf.ufrgs.br>,
Federal University of Rio Grande do Sul
Nikos Anerousis <nikos(a)us.ibm.com>, IBM, USA
Kyung-Hyu Lee <khyulee(a)etri.re.kr>, ETRI, Korea
Application Sessions
--------------------
The NOMS2006 Application Session submissions aim to encourage
discussions concerning experience, lessons-learned, business
cases, implementation examples, new applications, innovative
enterprises, and organizational impacts, in any of the detailed
topics found at http://www.noms2006.org.
Papers for the Application Sessions should be written in English.
The paper format should have a visual in the upper half of a
page and the explanatory text in the lower half (annotated
visuals). Paper submissions should consist of no more than
15 annotated visuals in PDF only. Detailed author instructions
are available on the author information page on the conference
web site. Further questions related to the application session
should be addressed to the sessions co-chairs:
Joseph Betser <Joseph.Betser(a)aero.org>, Aerospace, USA
Prosper Chemouil <prosper.chemouil(a)francetelecom.com>,
France Telecom, France
Yoshiaki Kiriha <y-kiriha(a)ay.jp.nec.com>, NEC, Japan
NOMS 2006 Workshops
-------------------
Workshops on specialized topics will be held on the days before
and after the NOMS technical program. Contributions to these
workshops will be solicited and reviewed separately from those
for NOMS. A proposal to organize a half-day or full-day workshop
should contain the following information
* A draft of the CFP (includes Title, description,
topics and dates)
* Why is the topic area important?
* Likely contributors and target audience
* Organizing committee
* Plan for workshop advertising and publicity
* Biography of the main organizer (100-200 words)
Deadline for submission is September 15, 2005.
For a point of reference, see the workshops held in conjunction
with IM 2005 at http://www.ieee-im.org/workshops.html. Workshop
proposals should be sent to one of the tutorial co-chairs:
Ehab Al-Shaer <ehab(a)cs.depaul.edu>, De Paul University, USA
Rolf Stadler <stadler(a)imit.kth.se>, KTH, Sweden
Call for Tutorials
------------------
NOMS 2006 will feature state-of-the-art tutorials from top experts in
their fields on the days before (April 3, 2006) and after (April 7,
2006) the technical program.
Topics cover every level from introductory skills to highly advanced and
address highly important and relevant subject areas of Systems, Network
and Service Management.
To provide the best possible tutorial offerings, NOMS 2006 solicits
proposals and ideas for half-day (3.5 hours) and full-day (7 hours)
tutorials.
Proposals will be evaluated by the NOMS 2006 Technical Program
Committee. Tutorial presenters will receive a honorarium.
If you are interested in presenting a tutorial at this conference or
have an idea for a tutorial you would like to see offered please contact
the Tutorial Chair:
Alexander Keller <alexk(a)us.ibm.com>
Deadline for submitting Tutorial Proposals: 15 September 2005
A proposal to present a tutorial should contain the following information:
* Tutorial Title
* Full Name(s) and Affiliation(s) of the Instructor(s)
* Outline and Extended Abstract (500-1000 words) detailing the
importance of the subject and its relevance and benefits to NOMS
2006 attendees
* Potential attendee profile
* Biography of the Instructor (100-200 words)
If the tutorial or its earlier version has been given before, please
indicate the events, dates and contents.
*******************************************************************
Call for Participation
11th International Conference on Mobile Computing and Networking
August 28 - September 2, 2005
Cologne, Germany
http://www.sigmobile.org/mobicom/2005/
*******************************************************************
ACM MobiCom is a highly-selective international conference on mobile
computing and networking. It serves as the premier forum for presenting and
discussing research results on networks, systems, algorithms, and
applications supporting the symbiosis of mobile computing and wireless
networking. Each year, the conference attracts about 500 researchers,
practitioners, students, and executives. MobiCom 2005 will be held in
beautiful Cologne, Germany.
Technical Program. The program consists of a single track with 23
papers. The authors present cutting-edge results on various topics, such
as new architectures, content-based and geometric routing, self-management,
cross-layer optimization. The papers cover ad hoc networks, mesh networks,
wireless sensor networks, WLANs, and cellular networks. A list of accepted
papers can be found at http://www.sigmobile.org/mobicom/2005/program.html.
Tutorials. Four tutorials will be offered: (a) Wireless sensor and actuator
networks, (b) 802.11 WLAN MAC and smart antennas: issues and directions,
(c) Security in sensor and ad hoc networks: perspectives and status, (d)
Wide area wireless networks: 3G and beyond.
Cologne is very popular, especially in August due to World Youth Day 2005
taking place there. Because Pope Benedict XVI organizes this event, he will
be in town just the week before MobiCom. Thus, we ask you to make your
hotel and flight reservations as early as possible. For more travel info
please visit http://www.sigmobile.org/mobicom/2005/travel.html.
Registration is available at http://www.regmaster.com/mobicom2005.html.
There is a discounted rate until August 5, 2005.
--
Welcome to the netw2006-lists mailing list!
Please save this message for future reference. Thank you.
If you ever want to remove yourself from this mailing list,
you can send mail to <Majordomo(a)dei.uc.pt> with the following
command in the body of your email message:
unsubscribe netw2006-lists
or from another account, besides ifip-tc6(a)informatik.rwth-aachen.de:
unsubscribe netw2006-lists ifip-tc6(a)informatik.rwth-aachen.de
If you ever need to get in contact with the owner of the list,
(if you have trouble unsubscribing, or have questions about the
list itself) send email to <owner-netw2006-lists(a)dei.uc.pt> .
This is the general rule for most mailing lists when you need
to contact a human.
Here's the general information for the list you've subscribed to,
in case you don't already have it:
-----------------------------------------------------------------------------
netw2006-lists mailing list.
Please contact netw2006-lists(a)dei.uc.pt for any information regarding this
mailing list.
Please report any problems using this mailing list to helpdesk(a)dei.uc.pt.
-----------------------------------------------------------------------------
Dear all,
please find the new TC6 calendar as attachment.
It would be good if you check the entries (in particular if you
are a WG chairperson) and if you would communicate missing
entries and modifications to me. This is probably necessary
since in the hectics of the Toronto meeting not everything was
perfectly remembered by me.
Some other things (which are relatively serious):
1. In some cases our preplanning is far from being perfect.
We don't know too much even about 2006.
For example: Even the location of FORTE 2006 has not been decided!
Some years ago we have had a six-year plan which now becomes
more and more a 6-month plan.
2. Many organisors behave really crazy:
- they change the publisher with respect to the announcement in
the call for papers without notifying the authors about that,
i.e. they don't karmouch (= care much) about the event
- others sign an event request form where Kluwer is mentioned
as publisher, but thereafter they "decide" to make a printing
somewhere in Singapore (even if the conference is in Colmar, France)
just for so-called cost reasons even if they ask 350 EURO as
registration fee - much of which is for gala dinners;
they don't contact PC members for reviewing, they don't inform them
about the outcome; they do not invite for a PC meeting;
they accept many dozens of papers (with probably questionable
overall quality); they ask for best paper awards without any
justification;
.......
Thus I really urge our WG chairpersons (predominantly) but also all other
delegates to take somewhat better care of our events.
We risk to get a very negative reputation!
The overall strategy of TC6 must be discussed in Wroclaw (at Meeting 2005/2)
at the very latest. Some changes are really unavoidable.
Best regards
Otto
[Apologies if you receive multiple copies of this CFP,
but please forward to anyone you believe may be interested -- thanks!]
CALL FOR PAPERS
==================================================================
First IEEE International Workshop on
Heterogeneous Wireless Networks: Resource Management and QoS
(HWN-RMQ06)
http://www.ieee-ccnc.org/2006/conf_program/hwn-rmq_workshop/index.htm
In conjunction with
IEEE Consumer Communications and Networking Conference (CCNC06)
Las Vegas, Nevada, USA, 7-10 January 2006
==================================================================
Scope
The fourth generation (4G) of wireless communications is expected to
integrate a potentially large number of different heterogeneous wireless
technologies in what could be considered a huge step forward towards
universal wireless access and omnipresent computing through seamless
mobility. Even though 4G standard is currently not defined, there are many
current outlooks that delineate the vision of the new wireless technologies.
Based on the emergent trends of mobile communication, 4G will have larger
bandwidth, higher data rates, smoother and quicker handoff and will focus on
guaranteeing faultless service and seamless handoff across a multitude of
wireless networks. The key concept is integrating the 4G capabilities with
all of the existing mobile technologies. Special maneuvers will be necessary
amongst different access systems in terms of horizontal (intra-system) and
vertical (inter-system) handoff as well as seamless mobility, Quality of
Service (QoS), dependability and security.
In this workshop, we solicit high quality papers from leading researchers
that present state-of-the-art research in heterogeneous wireless networks
dealing with resource management techniques and QoS provisioning.
Topics of Interest
Topics of interest include, but are not limited to:
- Interworking with 2.5G, 3G, and other wireless networks
- QoS provisioning for heterogeneous wireless networks
- End-to-End QoS Architectures
- Location, Mobility and Handoff Management
- Seamless vertical handoff techniques between different wireless networks
- Network selection criteria
- Resource management/allocation
- Bandwidth adaptation
- Power control and management
- Load, admission, and flow control
- Architecture design alternatives for heterogeneous wireless networks
- Performance analysis and experimentation of heterogeneous wireless
networks
- Pricing and billing issues
- Security techniques and methods for heterogeneous wireless networks
- Heterogeneous wireless networks applications and measurements
- Simulation study of heterogeneous wireless networks
- Scalability of heterogeneous wireless networks
- Implementation and testbed experiments
- Standardization activities for heterogeneous wireless networks
- Heterogeneous multi-hop wireless networks
Important Dates
- Paper submission: 15 August 2005
- Notification of acceptance: 15 September 2005
- Final Paper submission: 14 October 2005
Paper Submissions
Submitted papers must represent original material that is not currently
under review in any other conference or journal, and has not been previously
published. Paper length should not exceed five-page technical paper
manuscript. Please see author information page for submission guidelines at
CCNC06 website (http://www.ieee-ccnc.org). Papers should be submitted in a
.pdf format through EDAS at http://edas.info/Paper.cgi?c=4602. Submissions
should include a cover page with authors' names, affiliations, fax and
telephone numbers and e-mail addresses. All accepted papers will be
published in the conference proceedings. At least one author of accepted
papers is required to register at the full registration rate.
Workshop Co-Chairs:
- Name Nidal Nasser Mieso Denko
- E-mail nasser(a)cis.uoguelph.ca denko(a)cis.uoguelph.ca
- URL http://www.cis.uoguelph.ca/~nasserhttp://www.cis.uoguelph.ca/~denko
- Affiliation University of Guelph, Guelph, Canada
Publicity Chair:
Youssef Iraqi
University of Waterloo, Canada
iraqi(a)bbcr.uwaterloo.ca
http://bcr2.uwaterloo.ca/~iraqi/
Technical Program Committee (In progress)
- Khalid Al-Begain University of Glamorgan UK
- Hakim Badis University of Paris-Sud XI France
- Tarek Bejaoui University of Paris-Sud XI France
- Jiannong Cao Hong Kong Polytechnic University Hong Kong
- Soumaya Cherkaoui University of Sherbrooke Canada
- Yuh-Shyan Chen National Chung Cheng University Taiwan
- Javier Gozalvez University Miguel Hernandez Spain
- Christian Hartmann Technische Universitat Munchen Germany
- Youssef Iraqi University of Waterloo Canada
- Anup Kumar University of Louisville USA
- Wei Li The University of Toledo USA
- Jelena Misic University of Manitoba Canada
- Mohamed Ould-Khaoua University of Glasgow UK
- Burkhard Stiller University of Zurich and ETH Zurich Switzerland
- Abd-Elhamid M. Taha Queen's University Canada
- Ljiljana Trajkovic Simon Fraser University Canada
- Duc A. Tran University of Dayton USA
- Shahrokh Valaee University of Toronto Canada
- Quanhong Wang Queen's University Canada
- Kui Wu University of Victoria Canada
- Jingyuan Zhang The University of Alabama USA
- Weihua Zhuang University of Waterloo Canada
We sincerely apologize if you receive this CFP more than once.
-----------------------------------------------------------------------
CALL FOR PAPERS
1st International Symposium on Wireless Pervasive Computing 2006
16 - 18 January 2006, Phuket, Thailand
http://www.iswpc.org/2006
Technically Sponsored by IEEE Communications Society
Hosted by Suranaree University of Technology, Thailand
Wireless pervasive computing is a rapidly growing area increasingly
attracting attention due to its potential impact on the quality of
lifestyles of individuals. This symposium aims to provide a platform for
researchers in the area of wireless pervasive computing to showcase their
results, launch new ideas, as well as to interact with colleagues from this
area.
Topics of interest include, but not limited to :-
-Wireless pervasive computing systems design
-Wireless commuication systems for pervasive computing
-Wireless access techniques
-Wireless network architecture
-Localization and tracking techniques
-Ad hoc networks
-Wireless sensor networks
-Signal processing for wireless networks
-Coding and modulation techniques
-Cooperative coding and processing
-Wearable devices
-WLANs and WPANs
-Middleware
-RF systems
-Multimedia systems
-Speech and video processing
-Resource management
-Wireless security
-Healthcare applications
-Security applications
Acceptance will be based on an extended abstract of about 1500 words (two
pages in the standard IEEE conference format). The
extended abstract should include details required for the reviewers to
assess the contribution of your work. A short summary of
approximately 150 words is also required. Extended abstracts must be
submitted electronically by August 1, 2005, via EDAS
(http://edas.info). All papers will be peer reviewed. Proceedings of the
conference will be available on IEEE Xplore after the event.
IMPORTANT DATES
Last date for submitting of papers, proposals for tutorials and panel
sessions: August 1, 2005
Notification of Acceptance: September 15, 2005
Last date for submission of camera-ready versions of accepted papers:
November 15, 2005
PDF version of this CFP is available at http://www.iswpc.org/2006/cfp.pdf
RAID 2005 Call for Participation
The world's premier intrustion detection technology forum.
Seattle, Washington, USA
September 7-9, 2005
Register now: http://www.conjungi.com/cgi-bin/registration.cgi
Full Call for Participation: http://www.cs.fsu.edu/~yasinsac/RAID2005.pdf
Includes RAID 2005 Preliminary Program
Symposium Web Page: http://www.conjungi.com/RAID/
RAID Organizing Committee calls for the participation of global IT security
professional/researcher for broad-range global technology exchange and
international information assurance technology excellence.
While the full paper submission is closed, RAID-2005 is still accepting
Poster Session submissions until August 15th. If accepted, the author will
have a 5 minutes presentation time slot with a poster display/discussion
forum afterward.
RAID covers all topics related to Intrusion Detection Systems and
Technologies including their design, use and maintenance, integration,
correlation and self-protection, etc. For RAID 2005, RAID has expanded to
the broader field of intrusion defense. Of particular interest are intrusion
tolerant systems and systems for which detection triggers an adaptive
response.
First International Conference on Scalable Information Systems
(INFOSCALE)
30 May - 1 Jun 2006, Hong Kong
http://www.infoscale.org/
PRELIMINARY CALL FOR PAPERS
As the data volumes continue to increase and the ways of information
dispersion across the globe continue to diversify, new scalable methods
and structures are needed for efficiently processing those distributed
and autonomous data. Grid computing, P2P technology, distributed
information retrieval technology, and networking technology all must be
merged to address the scalability concern. This forum focuses on this
key merged domain and looks for new integrated solutions for this
diversifying world of information.
Conference Scope:
Parallel Information Retrieval
Scalable Distributed Information Retrieval
Scalable Grid Information Systems
P2P Systems
Scalable Mobile/Sensor DB Systems
Index Compression Methods
Architectures for Scalability
Networking for Scalable Information Systems
Scalable Information System Applications
(medicine, biology, military, etc.)
Evaluation Metrics for Scalability
VLDB
Data Mining
Information Security
Important Deadlines (tentative):
Paper submission: 1 Oct 2005
Notification: 31 Dec 2005
Final version: 15 Feb 2006
Publications: Original and previously unpublished technical papers
are solicited for presentation at the conference and publication in
the proceedings. The proceedings will be published by IEEE Press and
available online through IEEE Xplore. Selected papers will be
published in journal special issues.
General Chair
Xiaohua Jia, City University of Hong Kong
PC Chairs
Abdur Chowdhury, AOL
Francis Lau, The University of Hong Kong
Frank Zhigang Wang, Cambridge-Cranfield High Performance
Computing Facilities
Steering Committee Chairs
Imrich Chlamtac, CreateNet Research Consortium, Chair
Ophir Frieder, Illinois Institute of Technology, Co-chair
Publicity Chairs
Jinli Cao, La Trobe University
Local Arrangement Chair
Victor Lee, City University of Hong Kong
Program Committee
Khalid Al-Begain, University of Glamorgan, Wales
David Al-Dabass, University of Nottingham Trent, UK
Mohand Boughanem, University Paul Sabatier, France
Andrei Broder, IBM T. J. Watson Research Center, USA
Wentong Cai, Nanyang Technological University, Singapore
Jamie Callan, Carnegie Mellon University, USA
David Carmel, IBM Research, Israel
Jose Manuel Garcia Carrasco, University of Murcia, Spain
Scott Cost, University of Maryland Baltimore County, USA
Fabio Crestani, University of Strathclyde, UK
Arjen de Vries, Centrum voor Wiskunde en Informatica,
Netherlands
David Doermann, University of Maryland, USA
Tarek El-Ghazawi, George Washington University, USA
Dan Feng, Huazhong University of Science and Technology, P. R.
China
Galal Hassan Galal-Edeen, Cairo University, Egypt
Lee Giles, Pennsylvania State University, USA
Nazli Goharian, Illinois Institute of Technology, USA
Siegmar Gross, University of Applied Sciences, Germany
David Grossman, Illinois Institute of Technology, USA
David Hawking, Commonwealth Scientific and Industrial Research
Organisation, Australia
Andreas Henrich, University of Bamberg, Germany
Otthein Herzog, University of Bremen, Germany
Djoerd Hiemstra, University of Twente, Netherlands
Jimmy Huang, York University, Canada
George Ioannidis, University of Bremen, Germany
Narayana Jayaram, London Metropolitan University, UK
Guojun Jin, Lawrence Berkeley Laboratory, USA
Joemon Jose, University of Glasgow, UK
Paul Kantor, Rutgers University, USA
Stefan Kirn, University of Hohenheim, Germany
Aleksander Kolcz, AOL, USA
Peter Komisarczuk, University of Wellington, New Zealand
Axel Korthaus, University of Mannheim, Germany
Donald Kraft, Louisiana State University, USA
Mounia Lalmas, Queen Mary University of London, UK
Minglu Li, Shanghai Jiaotong University, P. R. China
Tao Li, University of Rochester, USA
Andrew MacFarlane, City University London, UK
James Mayfield, Johns Hopkins University, USA
Massimo Melucci, University of Padova, Italy
Lingkui Meng, Wuhan University, P. R. China
Charles Nicholas, University of Maryland, USA
Greg Pass, AOL, USA
Yale Patt, University of Texas, USA
Thomas Roelleke, Queen Mary University London, UK
Heiner Stuckenschmidt, Vrije Universiteit Amsterdam, Netherlands
Xian-He Sun, Illinois Institute of Technology, USA
Ulrich Thiel, Fraunhofer Integrated Publication and information
Systems Institute, Germany
Ingo Timm, University of Bremen, Germany
Anastasios Tombros, Queen Mary University London, UK
Pavel Tvrdik, Czech Technical University, Czech Republic
Herman Vandermulen, AOL, USA
Zhichen Xu, Yahoo, USA
Wai Gen Yee, Illinois Institute of Technology, USA
Jim Yip, University of Huddersfield, UK
Clement Yu, University of Illinois at Chicago, USA
Zhu Zhang, University of Michigan, USA
[Apologies if you receive multiple copies of this message]
CALL FOR PARTICIPATION
ESORICS 2005
10TH EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY
Milan, Italy - September 12-14, 2005
http://esorics05.dti.unimi.it/
AIMS AND SCOPE
Organized in a series of European countries, ESORICS is confirmed as
the European research event in computer security. The symposium
started in 1990 and has been held on alternate years in different
European countries and attracts an international audience from both
the academic and industrial communities. From 2002 it has been held
yearly. The Symposium has established itself as one of the premiere,
international gatherings on information assurance.
PRELIMINARY PROGRAM
Monday September 12, 2005
-------------------------
09:15 - 09:30 Welcome and Opening
09:30 - 10:30 Invited talk -- Barbara Simons
10:30 - 11:00 Coffee break
11:00 - 12:30 Session 1: Access control
XML Access Control with Policy Matching Tree
N. Qi, M. Kudo
Semantic Access Control Model: A Formal Specification
M. I. Yague, M. Gallardo, A. Mana
A Generic XACML Based Declarative Authorization Scheme for Java
R. Gupta, M. Bhide
12:30 - 14:00 Lunch
14:00 - 15:30 Session 2: Advanced Authorization Specifications
Specification and Validation of Authorisation Constraints Using UML
and OCL
K. Sohr, G. Ahn
Unified Index for Mobile Object Data and Authorizations
V. Atluri, Q. Guo
On Obligations
M. Hilty, D. Basin, A. Pretschner
15:30 - 16:00 Coffe break
16:00 - 17:30 Session 3: Cryptographic Schemes
A Practical, Voter-Verifiable Election Scheme
D. Chaum, P.Y.A. Ryan, S.Schneider
Machine-Checked Security Proofs of Cryptographic Signature Schemes
S. Tarento
Sanitizable Signatures
G. Ateniese, D. Chou, B. de Medeiros, G. Tsudik
Tuesday September 13, 2005
--------------------------
09:00 - 10:30 Session 4: Cryptographic Protocols
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
M. Backes, B. Pfitzmann
Secure Implementation of Cryptographic Protocols: A Case Study Of
Mutual Distrust
A. Askarov, A. Sabelfeld
Augmented oblivious Polynomial Evaluation Protocol and Its
Applications
H. Zhu
10:30 - 11:00 Coffee break
11:00 - 12:30 Session 5: Intrusion detection
Using Attack Trees to Identify Malicious Attacks from Authorized
Insiders
I. Ray, N. Poolsapassit
An Efficient and Unified Approach to Correlating, Hypothesizing,
and Predicting Network Intrusion Alerts
L. Wang, A. Liu, S. Jajodia
Towards a Theory of Intrusion Detection
G. Di Crescenzo, A. Ghosh, R. Talpade
12:30 - 14:00 Lunch
14:00 - 15:30 Session 6: Network security
On Scalability and Modularisation in the Modelling of Network
Security Systems
J. de Albuquerque, H. Krumm, P. de Geus
Sybil resistant DHT routing
G. Danezis, R. Anderson
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent
Distributed Denial-of-Service Attacks
F.C. Freiling, T. Holz, G. Wicherski
15:30 - 16:00 Coffee break
16:00 - 17:30 Session 7: Information Flow and Formal Security Properties
Quantifying Probabilistic Information Flow in Computational
Reactive Systems
M. Backes
Enforcing Non-safety Security Policies with Program Monitors
J. Ligatti, L. Bauer, D. Walker
Soundness of Formal Encryption in the Presence of Key-Cycles
P. Adao, G. Bana, J. Herzog, A. Scedrov
Wednesday September 14, 2005
----------------------------
09:00 - 10:30 Session 8: Privacy and Data Protection
Privacy Preserving Clustering
S. Jha, L. Kruger, P. McDaniel
Abstractions Preserving Parameter Confidentiality
S. Gurgenas, P. Ochsenschlaeger, C. Rudolpah
Minimal Disclosure in Hierarchical Hippocratic Databases with
Delegation
F. Massacci, J. Mylopoulos, N. Zannone
10:30 - 11:00 Coffee break
11:00 - 12:30 Session 9: Security for protocols and devices
Security Notions for Disk Encryption
K. Gjosteen
Local View Attack on Anonymous Communication
M. Gogolewski, M. Klonowski, M. Kutylowski
Browser Model for Security Analysis of Browser-Based Protocols
T. Gross, B. Pfitzmann, A. Sadeghi
REGISTRATION
Online registration is available on the conference web page:
http://esorics05.dti.unimi.it/registration.php
ADDITIONAL INFORMATION
On the web pages (http://esorics05.dti.unimi.it), you will find
information about the program, the conference hotel and venue, and
some travel and tourist information. We look forward to seeing you in
Milan at ESORICS 2005.
(My apologies if you receive multiple copies of this message)
Dear Colleagues,
Please find the call for participation for ISWCS 2005, 5 - 7 September 2005, Siena, Italy below.
On behalf of the organizing committee, we look forward to receiving you at ISWCS 2005.
Many thanks
Best regards,
Boon
General Co-chair
*************** CALL FOR PARTICIPATION **********************
ISWCS 2005
2nd International Symposium on Wireless Communication Systems
http://www.iswcs.org/iswcs2005
5 - 7 September 2005, Siena, Italy
*************** CALL FOR PARTICIPATION **********************
The Technical Program includes 100 full papers and 33 poster papers. Out of 252 submissions, the Technical Program Committee worked very diligently and professionally in the selection of the final papers, with at least three reviews for each submitted contribution. The Program is structured in three parallel tracks and 5 sessions per track, with a total of 15 sessions. The three tracks represent key areas in wireless communications, namely: wireless network layer; radio channel modulation and coding, and; wireless network applications. The session topics (and the paper contributions) are very indicative of current research interests in the wireless field. Please find more information with regards to the technical program at the following URL: http://www.iswcs.org/iswcs2005/plan_technical_sessions_ISWCS_2005.pdf
Posters represent work in progress and have been given a very visible role (and an important slot) in the program. In fact, the poster presentations will follow immediately the Plenary Session on the morning of Sept 7. We expect active discussion around posters and interaction with authors. The panel will precede the social dinner on Sept 6 it will be addressing the very timely and, in many aspects still controversial topic, entitled "Towards a wireless and ubiquitous information society". The panelists comprise of researchers from IBM, Harris Corporation, Alcatel, KDDI R&D Lab, among others.
We have been very lucky to secure two well known and esteemed researchers in the wireless community Dr Victor Bahl, Microsoft Research and Prof Dharma P. Agrawal, University of Cincinnati - as keynote and plenary speakers respectively. Dr Bahl talk Bridging the Information Divide: Challenges & Opportunities will touch a very critical problem created by the Internet today and will describe how wireless technologies will enable ubiquitous connectivity and services connecting rural villages in remote areas using a programmable mobile platform. Prof Agrawal talk, entitled Why use Aggregate Logical Sensor Units for large Sensor Networks?, will address a critical area of sensor networks tight energy constraints. Dr Agrawal will show that such constraints can be relaxed by aggregating off the shelf sensors into logical units that support the desired functions.