Invitation
Committees
Programme
Sponsors
Exhibition
Key Dates
Social events
Technical visits
Conference venue
Travel
Advance Programme
Call for Contributions

> Congress / Advance Programme / Conferences / SEC

SEC2004: 19th IFIP International Information Security Conference

 

> Information Security Conference
> Embedded Workshop Information Security Management (ISM)
> Embedded Workshop Information Security Education (ISE)
> Embedded Workshop Privacy and Anonymity in Networked and Distributed Systems (I-NetSec'04)

 

TC11 - Security and Protection in Information Processing Systems

Room for SEC: Saint Exupéry

Room for embedded Workshops: Spot

Conference Chair: Yves Deswarte (LAAS-CNRS, France)

Programme Committee co-Chairs: Frédéric Cuppens (ENST Bretagne, France) and Sushil Jajodia (George Mason U., USA)

Embedded within Sec 2004, three dedicated workshops will present new achievements in Information Security Education ( ISE , the WG11.8 Workshop), in Information Security Management ( ISM , the 10th IFIP WG 11.1 Working Conference), and in Privacy and Anonymity in Networked and Distributed Systems ( I-NetSec'04 , the 3rd IFIP 11.4 Working Conference ).

 

Monday 23 August 2004

13h30 - 15h: Risk Management

Chair: Sushil Jajodia (George Mason U., USA)

An Abstract Reduction Model for Computer Security Risk - Mohamed Hamdi, Noureddine Boudriga (U. Carthage, Tunisia)

Remediation Graphs for Security Patch Management - Vipin Swarup, (The MITRE Corporation, USA)

Security Modelling for Risk Analysis - Lam For Kwok (City U. of Hong-Kong, Hong-Kong), Dennis Longley (Queensland U. Technology, Australia)

13h30-15h: Malicious Code Analysis

Chair: Frédéric Cuppens (ENST-bretagne, France)

Contrasting Malicious Java Applets by Modifying the Java Virtual Machine - Vincenzo Ciaschini (INFN-CNAF, Italy), Roberto Gorrieri (U. Bologna, Italy)

Analyzing Network Management Effects with SPIN and cTLA - Gerrit Rothmaier (Materna GmbH, Germany), Andre Pohl, Heiko Krum (U. Dortmund, Germany)

Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics - Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk and Ravi K. Iyer (UIUC, USA)

 

15h30-17h: Panel

Meeting the Global Challenges of Security Incident Response

Chair: Vijay M. Masurkar (Sun Microsystems, Inc., U.S.A.)

Participants:

Simone Fischer-Hübner, Karlstad U., Sweden
Morton Swimmer, IBM Zurich Research Laboratory, Switzerland
Kai Rannenberg, Goethe U. Frankfurt, Germany
Albin Zuccato, Karlstad U., Sweden
Gunnar Wenngren, Swedish Defence Research Agency, Sweden

 

17h-17h30: Kristian Beckman Award

Chair: Louise Yngström (U. of Stockholm DSV, Sweden)

Secure Sensors for Smart Censors? Moore's Law for Fahrenheit 1984? - Jean-Jacques Quisquater (UCL, Belgium), recipient of the Kristian Beckman Award

 

Tuesday 24 August 2004

10h30-12h: Information Flow

Chair: William List (Wm. List & Co, UK)

Security in Globally Distributed Industrial Information Systems - Petri Saloma, Ronja Addams-Moring, Teemupekka M. Virtanen (Helsinki U. Technology, Finland)

A Case for Information Ownership in ERP systems - S.H. von Solms, Manfred P. Hertenberger (Rand Afrikaans U., South Africa),

Interactive Access Control for Web Services - Hristo Koshutanski, Fabio Massacci (U. Trento, Italy)

13h30- 15h: Security and Control of IT in Society: Identity Management

Chair: Teemupekka M. Virtanen (Helsinki U. Technology, Finland)

Identity-based Key Infrastructures (IKIs) - Yvo Desmedt, Mike Burmester (Florida State U., USA)

ModInt: Compact Modular Arithmetic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System - Hiroaki Kikuchi, Junji Nakazato (Tokai U., Japan)

Dependable Security by Twisted Secret Sharing - Semir Daskapan (Delft U. Technology, Netherlands)

15h30 - 17h30: Intrusion Detection

Chair: Hervé Debar (France-Telecom R&D, France)

A Language Driven IDS for Event and Alert Correlation - Eric Totel, Bernard Vivinis, Ludovic Mé (SupÉlec, France)

Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks - Avishai Wool, Danny Nebenzahl (Tel Aviv U., Israel)

Eigenconnections to Intrusion Detection - Yacine Bouzida, Sylvain Gombault (ENST Bretagne, France)

Visualising Intrusions: Watching the Webserver - Stefan Axelsson (Chalmers U., Sweden)

 

Wednesday 25 August 2004

10h30-12h: Security Architecture

Chair: Sushil Jajodia (George Mason U., USA)

MASKS: Managing Anonymity while Sharing Knowledge to Servers - Robert Pinto, Lucila Ishitani, Virgílio Almeida, Wagner Meira Júnior, Fabiano A. Fonseca, Fernando D. Castro (U. Federal Minas Gerais, Brazil)

Security and Differentiated Hotspot Services Through Policy-based Management Architecture - Idir Fodil, Vincent Jardin (6WIND, France)

Key Management for Secure Multicast in Hybrid Satellite Networks - Ayan Roy Chowdhury, John S. Baras (U. Maryland, USA)

13h30 - 15h: Security Protocols

Chair: Dr. Indrajit Ray (Colorado State U., USA)

Supporting End-to-End Security across Proxies with Multiple-Channel SSL - Yong Song, Victor Leung, Konstantin Beznosov (U. British Columbia, Canada)

A Content-Protection Scheme for Multi-Layered Reselling Structures - Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei (National Taiwan U., Taiwan)

An Asymmetric Cryptography Secure Channel Protocol for Smart Cards - Konstantinos Markantonakis, Konstantinos Rantos (Royal Holloway, UK)

15h30 - 17h: Security Protocols and Home Security

Chair: Kai Rannenberg (Goethe U.Frankfurt, Germany)

IPsec Clustering - Antti Nuopponen (Emic Networks, Finland), Sami Vaarala (Stinghorn, Finland), Teemupekka Virtanen (Helsinki U. Technology, Finland)

Improving Secure Device Insertion in Home Ad-hoc Networks - Olivier Heen, Jean-Pierre Andreaux (Thomson R&D France, France)

Spam Filter Analysis - Flavio D.Garcia, Jaap-Henk Hoepman (U. Nijmegen, The Netherlands), Jeroen van Nieuwenhuizen (U. Twente, The Netherlands)

Thursday 26 August 2004

10h30 - 12h: Database management  

Chair: Frédéric Cuppens (ENST-Bretagne, France)

Collective Signature for Efficient Authentication of XML Documents - Indrajit Ray, Eunjong Kim (Colorado State U., USA)  

Updating Encrypted XML Documents on Untrusted Macines - Prakash D. Reddy, Robert N. Mayo, Eamonn O'Brien-Strain, Jim Rowson, Yuhong Xiong (Hewlett Packard Labs, USA)  

Efficient Simultaneous Contract Signing - Martin Stanek (Comenius U., Slovakia), Lubica Liskova (Slovak U.Technology, Slovakia)

13h30 - 15h: Access Control and Data Protection

Chair: Yves Deswarte (LAAS-CNRS, France)

DHCP Authentication using Certificates - Jacques Demerjian, Ahmed Serhrouchni (ENST, France)

ecursive Sandboxes: Extending Systrace to Empower Applications - Aleksey Kurchuk, Angelos D. Keromytis (Columbia U., USA)

Fast Digital Certificate Revocation - Vipul Goyal, (Banaras Hindu U., India)

15h30 - 17h: Authentication  

Chair: Éric Totel (SupÉlec, France)

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies - Paul S. Dowland, Steven M. Furnell (U. Plymouth, UK)

Trusted Computing, Trusted Third Parties, and Verified Communications - Martín Abadi (U. California at Santa Cruz, USA)

Maille Authentication - A Novel Protocol for Distributed Authentication - Andrew A. Fritz, (U. Houston, USA)

17h - 17h30: Closing: Best Student Paper Award and Presentation of Sec 2005

*****

Embedded Workshop Information Security Management (ISM)

Tuesday 24 August 2004

Room: spot

Programme Committee Chair; Matt Warren (Deakin U., Australia)

10h30 - 12h: Corporate ISM  

Corporate Information Security Education: Is Outcomes Based Education the Solution? - Joahn Van Niekerk, Rossouw Von Solms (Port Elizabeth Technikon, South Africa)

Towards Corporate Information Security Obedience - Kerry-Lynn Thomson, Rossouw von Solms (Port Elizabeth Technikon, South Africa)

13h30 - 15h: ISM - Risk Analysis Methods and Frameworks  

CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection - Tyrone Busutiil , Matthew Warren (Deakin U., Australia)

Framework for role-based monitoring of Insider Misuse - Aung Htike Phyo, Steven M. Furnell, Francisco Portilla (U. Plymouth, UK)

15h30 - 17h30: ISM & Technology  

Update/Patch Management Systems: a protocol taxonomy with security implications - Andrew Colarik, Clark Thomborson, and Lech Janczewski (U. Auckland, New Zealand)

Investigating a smart Technology - Kevin O'Sullivan, Karen Neville, Ciara Heavin (U. College Cork, Ireland)

Discussion on what are the future issues of Information Security.

Panel: to-be-announced

*****

Embedded Workshop Information Security Education (ISE)

Wednesday 25 August 2004

Room: Spot

Program Committee Chair: Helen Armstrong (Curtin U., Australia)

10h30-12h: Welcome

Aims of workshop, Helen Armstrong (Curtin U., Australia)

Doctoral Programmes - Breadth and Depth
Chair: Helen Armstrong (Curtin U., Australia)

Laboratory Support for Information Security Education - Natalia Miloslavskaia, Alexander Tolstoi, Dmitriy Ushakov (Moscow Engineering Physics Institute, Russia)

An holistic approach to an international doctoral program in information security - Louise Yngström, (U. Stockholm DSV, Sweden)

A new paradigm for information security education at doctoral level - Nimal Jayaratna (Curtin Business School, Australia)

13h30-15h: Doctoral Programmes - from East to West

Chair: Louise Yngström, (U. of Stockholm DSV, Sweden)

Highly qualified information security personnel training in Russia - Victor Gorbatov, Anatoly Maluk, Natalia Miloslavskaya, Alexander Tolstoy (Moscow Engineering Physics Institute, Russia)

Doctor of Philosophy: IT Security - Jill Slay (U. South Australia, Australia)

Doctoral Programme on Information and Communication Systems Security at the U. the Aegean - Socratis Katsikas, (U. the Aegean, Greece)

An international security perspective - Gerald Quirchmayr (U. Vienna, Austria)

15h30-16h30: Doctoral Programme - Strategy and Cooperation

Chair: Gerald Quirchmayr (U. of Vienna, Austria)

Academic content and structure required by the military for an international doctoral program - Ronald Dodge (US Military Academy West Point, USA)  

Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach - Cynthia Irvine & Timothy Levin (Naval Postgraduate School, Monterey, USA)  

16h30-17h30: Building an International Doctorate Programme  

General content standards and core body of knowledge requirements - Corey Schou (Idaho State U., USA)  

Panel : Minimum requirements for international doctorate

Moderators: Helen Armstrong (Curtin U., Australia) and Gerald Quirchmayr (U. Vienna, Austria)

*****

Embedded Workshop
Privacy and Anonymity in Networked and Distributed Systems
(I-NetSec'04)

Thursday 26 August 2004

10h30 - 12h: Privacy Enhancing Technologies

A Security Model for Anonymous Credential Systems - Andreas Pashalidis, Chris J. Mitchell (Royal Holloway, UK)

Private Information Storage with Logarithmic-Space Secure Hardware - Alexander Iliev, Sean Smith (Dartmouth College, USA)

Taxonomy of Mixes and Dummy Traffic - Claudia Diaz, Bart Preneel (K.U.Leuven, Belgium)

13h30 - 15h: Design for Privacy and Identity Management

Identity Management for Self-Portrayal - Toby Baier, Christian P. Kunze (U. Hamburg, Germany)

Privacy Preserving Online Reputation Systems - Marco Voss (Darmstadt U. of Technology, Germany)

A Risk Driven Approach to Designing Privacy Enhanced Secure Applications - Els Van Herreweghen (IBM Research, Zurich, Switzerland)

15h30 - 17h: Privacy Threats and Trusted Computing

Privacy-Invasive Software in File-Sharing Tools - Andreas Jacobsson, Martin Boldt, Bengt Carlsson (Blekinge Institute of Technology, Sweden)

Infusing Privacy Norms in DRM -Incentives and Perspectives from Law - Alex Cameron (U. Ottawa, Canada)

Panel: Trusted Computing and Privacy

Moderator: Bart De Decker (K. U. Leuven, Belgium)

Participants: Yves Deswarte (LAAS-CNRS, France), Dirk Kuhlmann (HP Labs, UK), Kai Rannenberg (Goethe U. Frankfurt, Germany), Els Van Herreweghen (IBM Research, Zurich, Switzerland)

 

 

 

 

The Final Programme is online!

We are very proud to present an extremely attractive programme that offers more than six hundred presentations.
This very rich programme offers a large variety of opportunities. Attendees will be able to compose their own menu, by mixing on-the-edge research and state-of-the-practice results in their own field of expertise, together with surveys and prospective views in other domains of interest.
The overall schedule of sessions and the social events have been designed to facilitate fruitful interactions between attendees.

Join us during a week and share l'esprit de Toulouse !

         Jean Claude Laprie

> Final Programme
    Download the pdf version
> Registration fee information
    Download the Registration     fees
> Partnership file
   Download the pdf version

 

> Posters presenting WCC 2004
   will be sent on request .
   We rely on you to ensure a    large publicity to WCC 2004.