[Many appologies if you receive duplicates of this message]
=======================================
C A L L for P A R T I C I P A T I O N
=======================================
*** PERFORMANCE 2005 ***
The 24th IFIP WG7.3 International Symposium on
Computer Performance Modeling, Measurement and Evaluation
Juan-les-Pins, France
October 3-7, 2005
http://www-sop.inria.fr/maestro/performance2005/
The IFIP WG7.3 International Symposium on Computer Performance Modeling,
Measurement and Evaluation (PERFORMANCE 2005) will be held in
Juan-les-Pins, France on October 5-7, 2005. The tutorials will be held
on October 3 and 4, 2005.
The list of accepted papers and tutorials and the conference
registration form can be found on the conference website.
Registrations are now *open*. Early conference registration: by
September 3, 2005.
Student travel grant:
A number of student travel grants will be available. Details on how to
apply can be found on the conference website.
Conference hotel:
Rooms have been reserved at a negotiated rate at
Hotel Ambassador
50-52, chemin des Sables
B.P. 49 - 06160 Juan-Les-Pins Cedex
FRANCE
Tel: +33 (0)4 92 93 74 10 - Fax: +33 (0)4 93 67 79 85
e-mail: manager(a)hotel-ambassadeur.com
URL: http://www.hotel-ambassadeur.com/
A list of nearby hotels has been posted on the conference website.
------------------------------------------------------------------------
General Chair:
Philippe Nain (INRIA, France)
Program Committee Co-Chairs:
Cheng-Shang Chang (National Tsing Hua U., Taiwan)
Daniel A. Menascé (George Mason U., USA)
Tutorial Co-Chairs:
Eitan Altman (INRIA, France)
Zhen Liu (IBM T. J. Watson Reseach Center, USA)
Proceedings Chair:
Rudesindo Nunez Queija (CWI & U. Eindhoven, Netherlands)
Posters Chair:
Thomas Bonald (France Telecom R&D, France)
Local arrangements:
Ephie Deriche (INRIA, France)
Dany Sergeant (INRIA, France)
Finance Chair:
Dany Sergeant (INRIA, France)
Publicity Chair:
Sara Alouf (INRIA, France)
Corporate Sponsors:
IBM T.J. Watson Research Center
France Telecom R&D
Texas Instruments
Institutional Sponsors:
IFIP WG7.3
Computer Performance Foundation
INRIA
Conseil Régional de la Région Provence-Alpes-Côte-d'Azur
Conseil Général des Alpes-Maritimes
------------------------------------------------------------------------
--------------------------------------------
ACM Student Research Competition
--------------------------------------------
For the first time, the annual SIGMOBILE MOBICOM conference is hosting the
ACM Student Research Competition (SRC). Students submitting to the MOBICOM
2005 Poster Program can opt to have their posters considered also by the
SRC committee. Selected competitors will receive up $500USD for their
conference travel, depending on need and eligibility. Competitors should
be prepared to attend the poster session and, if selected for further
competition, give a short talk about their research projects. Winners will
be announced at the conference.
To participate:
The Student Research Competition is open to graduate and undergraduate
students whose submissions are accepted by the SRC committee. To be
considered, complete a submission to the Student Poster Programm by June
20, 2005, and indicate that you would like to participate in the SRC.
Current ACM student membership and student status as of the submission
deadline are required for the lead student.
Contact:
Haiyun Luo, University of Illinois, (haiyun(a)cs.uiuc.edu)
Dirk Westhoff, NEC Research Europe, (dirk.westhoff(a)netlab.nec.de)
Dear colleague,
we are happy to announce the availability of the AVISPA Tool v1.0 for
the Automatic Validation of Internet Security-sensitive Protocols and
Applications. It is downloadable by following the link below:
http://www.avispa-project.org/download.html
For more information about the AVISPA Project, you may look at
http://www.avispa-project.org.
The announcement of this release of the tool is enclosed below.
The AVISPA Team
--------------------------------------------------------------------
XXX X X XXXXX XXXXX XXXXXX XXX
X X X X X X X X X X X
X X X X X X X X X X
X X X X X X X X X X
XXXXXXX X X X XXXXX XXXXXX XXXXXXX
X X X X X X X X X
X X X X X X X X X
X X X X X X X X X
X X X XXXXX XXXXX X X X
V E R S I O N 1 . 0
(June 14, 2005)
We are happy to announce the availability of the AVISPA Tool v1.0, a
push-button tool for the Automatic Validation of Internet
Security-sensitive Protocols and Applications. The AVISPA Tool v1.0
is available at
http://www.avispa-project.org
===========================
Overview of the AVISPA Tool
===========================
The AVISPA Tool is a push-button tool for the automated validation of
Internet security-sensitive protocols and applications. It provides a
modular and expressive formal language (called HLPSL) for specifying
protocols and their security properties, and integrates different
back-ends that implement a variety of state-of-the-art automatic
analysis techniques ranging from protocol falsification (by finding an
attack on the input protocol) to abstraction-based verification
methods for both finite and infinite numbers of sessions.
The HLPSL is an expressive, modular, role-based, formal language that
allows for the specification of control flow patterns,
data-structures, alternative intruder models, complex security
properties, as well as different cryptographic primitives and their
algebraic properties. These features make HLPSL well suited for
specifying modern, industrial-scale protocols. Moreover, the HLPSL
enjoys both a declarative semantics based on a fragment of the
Temporal Logic of Actions and an operational semantics based on a
translation into the rewrite-based formalism Intermediate Format IF.
The AVISPA Tool automatically translates HLPSL specifications into
equivalent IF specifications which are in turn fed to the back-ends.
Currently the following back-ends are integrated in the AVISPA Tool:
* The On-the-fly Model-Checker (OFMC) performs protocol falsification
and bounded verification by exploring the transition system
described by an IF specification in a demand-driven way. OFMC
implements a number of correct and complete symbolic techniques. It
supports the specification of algebraic properties of cryptographic
operators, and typed and untyped protocol models.
* The Constraint-Logic-based Attack Searcher (CL-AtSe) applies
constraint solving with some powerful simplification heuristics and
redundancy elimination techniques. CL-AtSe is built in a modular
way and is open to extensions for handling algebraic properties of
cryptographic operators. It supports type-flaw detection and handles
associativity of message concatenation.
* The SAT-based Model-Checker (SATMC) builds a propositional formula
encoding a bounded unrolling of the transition relation specified by
the IF, the initial state and the set of states representing a
violation of the security properties. The propositional formula is
then fed to a state-of-the-art SAT solver and any model found is
translated back into an attack.
* The TA4SP (Tree Automata based on Automatic Approximations for the
Analysis of Security Protocols) back-end approximates the intruder
knowledge by using regular tree languages and rewriting. For
secrecy properties, TA4SP can show whether a protocol is flawed (by
under-approximation) or whether it is safe for any number of
sessions (by over-approximation).
In order to demonstrate the effectiveness of the AVISPA Tool on a
large collection of practically relevant, industrial protocols, we
have selected a substantial set of security problems associated with
protocols that have recently been or are currently being standardized
by organizations like the Internet Engineering Task Force IETF. We
have then formalized in HLPSL a large subset of these protocols, and
the result of this specification effort is the AVISPA Library
(publicly available at the AVISPA web-page), which at present
comprises 112 security problems derived from 33 protocols.
Further details on the AVISPA Tool v1.0 and on the AVISPA project can
be found in the paper:
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna,
J. Cuellar, P. Hankes Drielsma, P.C. Heam, O. Kouchnarenko,
J. Mantovani, S. Moedersheim, D. von Oheimb, M. Rusinowitch,
J. Santiago, M. Turuani, L. Vigano`, L. Vigneron. "The AVISPA Tool
for the Automated Validation of Internet Security Protocols and
Applications." In Proc. CAV'05, LNCS. Springer Verlag, 2005,
Available at the URL http://www.avispa-project.org/avispa-cav05.ps
========
PARTNERS
========
The following research groups have contribute to the development of
the AVISPA Tool v1.0:
* Artificial Intelligence Laboratory,
Dipartimento di Informatica, Sistemistica e Telematica (DIST),
University of Genova, Italy
* Laboratoire Lorrain de Recherche en Informatique et ses Applications
(LORIA UMR 7503) with partners INRIA, CNRS, Universite' Henri Poincare' (UHP)
Université Nancy 2 AND
Laboratoire d'Informatique de l'Universite' de Franche-Comte',
France
* Eidgenoessische Technische Hochschule Zuerich (ETHZ),
Information Security Group, Department of Computer Science,
Zuerich, Switzerland
* Siemens Aktiengesellschaft, Munich, Germany
================
GETTING IN TOUCH
================
The home page of the AVISPA project is <http://www.avispa-project.org>.
A mailing list <avispa-users(a)avispa-project.org> for general
questions, bugs and bug fixes, possible extensions, and user requests
on the AVISPA Tool is available. To register please send an empty
message to
<avispa-users-join(a)avispa-project.org>
New releases and other important events for AVISPA will be also
announced on this list.
--
The AVISPA Team
http://www.avispa-project.org
--------------------------------------------------------------------
Please distribute as widely as you can! See for more details the attached
document.
Thank you for your help!
Best regards
Dominique
CALL FOR PAPERS AND TUTORIALS
Net-Con2005
Network Control and Engineering for QoS, Security and Mobility
IFIP TC6 Conference, sponsored by WG6.2 (Network and Internetwork
Architectures), WG6.6 (Management of Networks and Distributed Systems),
WG6.7 (Smart Networks) and WG6.8 (Mobile and Wireless Comm)
France Télécom - Lannion, France - November 14 18, 2005
CALL FOR PAPERS
INFORMATION SCIENCES
Special Issue:AMBIENT INTELLIGENCE
Ambient Intelligence (AmI) is an innovative paradigm of invisible adaptive network technologies that integrates concepts ranging from ubiquitous computing to autonomous and intelligent systems. AmI supports the vision that technology will become invisible, embedded in our natural surroundings, present whenever we need it, attuned to all our senses, adaptive to users and context and autonomously acting. High quality information and content must be available to any user, anywhere, at any time, and on any device.
In an ambient intelligent environment ,people are surrounded with networks of embedded intelligent devices that deliver ubiquitous information, communication, services, and entertainment. Furthermore, the devices adapt themselves to users, and even anticipate their needs. Ambient intelligent environments present themselves quite differently compared to contemporary handheld or stationary electronic boxes and devices. Electronics will be integrated into clothing, furniture, cars, houses, offices, and public places, introducing the problem of developing new user interface concepts that allow natural interaction with these environments. A promising approach is the one in which users interact with their digital environments in the same way as they interact with each other.
In the context of this theme,original contributions are solicited in all relevant areas, including but not limited to
·
Mobile and Wireless Networking in Ambient Intelligence Environment
·
Robotics platforms for AmI
·
Information fusion
·
Real-time Knowledge Management for AmI
·
Speech Recognition
·
Sensor Networking
·
Machine Vision algorithms for scene interpretation and HCI
·
Computational Intelligence and Machine Learning algorithms
·
Design and deployment of innovative infrastructures
·
Mobile Learning in AmI environment
·
Peer-to-Peer and Grid-Based Services for Mobile Users
·
Networking in Miniature Wearable Computers and Embedded Systems Software
·
Arts and Entertainment in AmI environment
Prospective authors should prepare their manuscript in accordance with the requirements of the Information Sciences presented in detail in the Information for Authors.Authors should submit an electronic version(PDF) format to vasilako(a)ath.forthnet.gr adhering to the following schedule:
Manuscript Submissions Nov 1, 2005
Acceptance Notification Febr 1,2006
Final Manuscript Due May 1,2006
Publication 3rd Quarter 2006
Guest Editor: Dr.Athanasios Vasilakos, University of Thessaly,Greece.
PERFORMANCE 2005
IFIP WG 7.3 International Symposium on
Computer Performance, Modeling, Measurements and Evaluation
Oct. 3-7, Juan-les-Pins, France
http://www-sop.inria.fr/maestro/performance2005/
CALL FOR POSTERS
The PERFORMANCE 2005 conference solicits posters on recent or ongoing
research in the areas of:
* Performance-oriented design and evaluation of: communication
networks, mobile and wireless systems, Internet servers and E-commerce
systems, Web services, Web architectures, peer-to-peer systems, grid
computing, computer architectures, database systems, operating systems,
software systems, distributed systems, multimedia systems, file and I/O
systems, memory systems, real-time systems, and fault-tolerant systems.
* Techniques and algorithms: analytic modeling, performance
optimization, queueing analysis, stochastic scheduling, model
verification and validation, power analysis, hybrid models, experimental
design, system or network measurement and monitoring, workload
characterization, simulation, and statistical analysis.
The poster session is intended to present and discuss innovative
research work in an informal setting. The submission by students is
especially encouraged.
SUBMISSION GUIDELINES
A poster submission consists of an extended abstract of up to 2 pages
(double column, 9-point or larger fonts) including the names and
affiliations of the authors. Poster submissions must be sent by email to
posters.perf2005(at)sophia.inria.fr as Postscript or Adobe PDF files.
Posters will be selected by the Poster Committee. The extended abstracts
of accepted posters will be published in a special issue of the
Performance Evaluation Review. Any question must be directed to the
Poster Committee Chair at posters.perf2005(at)sophia.inria.fr
IMPORTANT DATES
Submission due: July 7, 2005
Notification to authors: July 22, 2005
Camera ready extended abstract due: August 19, 2005
POSTER COMMITTEE
Thomas Bonald, France Telecom (chair)
Sem Borst, Bell Labs and CWI
Alain Jean-Marie, U. Montpellier and INRIA
(other members to be announced)
--
Sara Alouf
Publicity Chair of Performance 2005
Dear all,
today I have distributed the minutes of meeting 2005/1 in Toronto
(they have been prepared by Jan Slavik).
Something strange must have happened:
Whereas some of you have already confirmed and have even
indicated some necessary modifications
others haven't apparently received the attachments.
Could you please indicates whether you got
- my email message
- the minutes as attachment
- the new IFIP publication policy as attachment?
Best regards
Otto
=====================================================================
Call for Paper for the 1st International Workshop on
QUALITY of PROTECTION - QoP 2005
Security Measurements and Metrics
http://dit.unitn.it/~qop/
Milano, Italy, Thu. 15 September 2005.
Affiliated with 10th European Symposium on Research in Computer
Security (ESORICS 2005) in Milano (12-14 Sep).
http://esorics05.dti.unimi.it
and the 11th IEEE International Software Metrics Symposium (METRICS
2005) in Como (19-22 Sep)
http://www.swmetrics.org/metrics2005
=======================================================================
WORKSHOP OVERVIEW
Information Security in Industry has matured in the last few decades.
Standards such as ISO17799, the Common Criteria, a number of
industrial certification and risk analysis methodologies have raised
the bar on what is considered a good security solution from a business
perspective.
Yet, if we compare Information Security with Networking or Empirical
Software Engineering we find a major difference. Networking research
has introduced concepts such as Quality of Service and Service Level
Agreements. Conferences and Journals are frequently devoted to
performance evaluation, QoS and SLAs. Empirical Software Engineering
has made similar advances. Notions such as software metrics and
measurements are well established. Processes to measure the quality and
reliability of software exist and are appreciated in industry.
Security looks different. Even a fairly sophisticated standard such as
ISO17799 has an intrinsically qualitative nature. Notions such as
Security Metrics, Quality of Protection (QoP) or Protection Level
Agreement (PLA) have surfaced in the literature but still have a
qualitative flavour. The "QoP field" in WS-Security is just a data
field to specify a cryptographic algorithm. Indeed, neither ISO17799
nor ISO15408 (the Common Criteria) addresses QoP sufficiently.
ISO17799 is a management standard, not directly concerned with the
actual quality of protection achieved; ISO15408 is instead a product
assessment standard and yet does not answer the question of how a user
of a product assessed by it can achieve a high QoP within his/her
operational environment. Both standards cover just one aspect of an
effective QoP and even the combination of both would not address the
aspect sufficiently. "Best practice" standards, such as the baseline
protection standard published by many government agencies, also belong
to the category of standards that are useful, but not sufficient, for
achieving a good QoP.
Security is different also in another respect. A very large proportion
of recorded security incidents has a non-IT cause. Hence, while the
networking and software communities may concentrate on technical
features (networks and software), security requires a much wider notion
of "system", including users, work processes, organisational structures
in addition to the IT infrastructure.
The QoP Workshop intends to discuss how security research can progress
towards a notion of Quality of Protection in Security comparable to the
notion of Quality of Service in Networking, Software Reliability, or
Software Measurements and Metrics in Empirical Software Engineering.
SUBMISSION TOPICS:
Original submissions are solicited from industry and academic experts
to presents their work, plans and views related to Quality of
Protection. The topics of interest include but are not limited to:
* Industrial Experience
* Security Risk Analysis
* Security Quality Assurance
* Measurement-based decision making and risk management
* Empirical assessment of security architectures and solutions
* Mining data from attacks and vulnerabilities repositories
* Security metrics
* Measurement theory and formal theories of security metrics
* Security measurement and monitoring,
* Experimental verification and validation of models,
* Simulation and statistical analysis, stochastic modeling
* Reliability analysis
INVITED SPEAKERS
- Stefano De Panfilis - Engineering SpA (IT)
- TBA
IMPORTANT DATES:
- Fri 10 June (deadline is extended till Thu 23 June) - Paper submissions
- Fri 8 July - Notification of acceptance
- Mon 12 Sep - Wed 14 Sep ESORICS
- Thu 15 Sep - QoP Workshop
- Mon 19 Sep - Thu 22 Sep IEEE METRICS in Como
PAPER SUBMISSION:
Original RESEARCH PAPERS are solicited in any of the above mentioned
topics. Research papers should be limited to 12 pages in the standard
Springer Verlag format, describing significant research results based
on sound theory or experimental assessment.
We also solicit INDUSTRY EXPERIENCE REPORTS, limited to 6 pages, about
the use of security measurements and metrics in industrial
environments. Industry papers should have at least one author from
industry or government, and will be considered for their industrial
relevance.
PUBLICATION:
Authors of accepted papers will be expected to give full presentations
at the workshop. Revised versions of the papers presented at the
workshop will be published by Kluwer/Springer in the Applied Security
Series.
PROGRAMME COMMITTEE
Alessandro Acquisti - Carnegie Mellon University (USA)
Matt Bishop - U. California Davis (USA)
Imrich Chlamtac - CreateNet (IT)
Yves Deswarte - LAAS-CNRS (FR)
Paolo Donzelli - University of Maryland (USA)
Gerhard Eschelbeck - QUALYS (USA)
Dieter Gollmann - TU Hamburg-Harburg (DE) --- Co-chair
Erland Jonsson - Chalmers University of Technology (SW)
Svein Johan Knapskog - The Norwegian University of Science and
Technology (NOR)
Helmut Kurth - ATSEC (DE)
Bev Littlewood - City University, London (UK)
Fabio Massacci - Univ. di Trento (IT) --- Co-Chair
Flemming Nielson - Technical University of Denmark (DE)
Mario Piattini - Polytechnical University of Madrid (SP)
Ketil Stшlen - SINTEF (NO) & Univ. of Oslo (NO)
Lorenzo Strigini - City University, London (UK)
Edgar Weippl - Vienna University of Technology (AU)
Jeannette Wing - Carnegie Mellon University (USA)
Marvin Zelkowitz - University of Maryland (USA)
Call for Papers
The 4th International Conference on Optical Communications and Networks
ICOCN2005
http://www.ICOCN2005.org
December 14 - 16, 2005
Conference Location Inter-Continental Hotel
Bangkok, Thailand
Paper Submission Deadline: September 10, 2005
Dear all,
please find enclosed the minutes of TC6 meeting 2005-1.
There is a reference in the minutes on the new TC6 publication policy
which is also attached (and which is to be considered as part of the
minutes).
I would like to thank Jan Slavik for the great job when preparing the
meeting minutes.
Best regards
Otto