Enterprise Security Workshop CFP

			      Call For Papers 

 		  Second International Workshop on Enterprise Security

			      June 18-20, 1997
		    Massachusetts Institute of Technology (MIT),
			Cambridge, Massachusetts, USA
		
		Co-sponsored by the IEEE Computer Society and the
		Concurrent Engineering Research Center (CERC) at 
			   West Virginia University
           
                          
==============================================================================
Enterprises are increasingly dependent on their information systems to
support their business and workflow activities.  
There is a need for universal electronic connectivity to support 
interaction and cooperation between multiple  organizations.  
This makes enterprise security and confidentiality more important, 
but more difficult to achieve, as the multiple organizations may 
have differences in their security policies and may have to interact 
via an insecure Internet.  These inter-organizational enterprise systems 
may be very large and so tools and techniques are needed
to support the specification, analysis and implementation of security.

This workshop will focus on the problems and challenges relating to
enterprise security in inter-organizational systems. We aim to bring
together principal players from both the internetwork and enterprise
security community and will provide plenty of time for discussion.   Topics
to be addressed include:

	- Internet/Intranet security
        - Security infrastructure and protocols
	- Java Security
	- Specifying and Analyzing Enterprise Security Policy
        - Role-Based Access Control
        - Supporting enterprise security over the Internet
        - Conflicts and harmonization of inter- and intra-organizational
             Security
        - Distributed Database Security
        - Secure Transactions
        - Security in Workflow Process
        - Object-Oriented and CORBA Security
        - Secure Applications and Environments
        - Integrating Heterogeneous Security Environments
        - Managing inter-organizational Enterprise Security
	- Internet Security protocols
	- Security Algorithms

This workshop will be part of the IEEE Sixth Workshops on Enabling
Technologies: Infrastructure for Collaborative Enterprises (WET-ICE
96) organized by the Concurrent Engineering Research Center (CERC)/
West Virginia University.

Important Dates:
================
Papers Due			March 25, 1997
Panel Proposals			March 18, 1997
Authors notified of acceptance  April 21, 1997
Workshop			June 18-20, 1997
Camera Ready			June 28, 1997

INFORMATION FOR AUTHORS OF PAPERS TO BE INCLUDED IN THE PROCEEDINGS 
===================================================================
Mail six copies of an original (not submitted or published elsewhere)
paper (double-spaced) of 3000-5000 words to one of the PC co-chairs. 
Include the title of the paper, the name and affiliation of each author, a
150-word abstract and no more than 8 keywords. The name, position,
address, telephone number, and if possible, fax number and e-mail
address of the author responsible for correspondence of the paper must
be included.


An e-mail submission in postscript format will be accepted.

INFORMATION FOR PANEL ORGANIZERS 
================================
Send six copies of panel proposals to one of the PC co-chairs. 
Include the title, a 150-word scope statement, proposed session chair and
panelists and their affiliations, the organizer's affiliation,
address, telephone and fax number, and e-mail address.

INFORMATION FOR AUTHORS OF POSITION PAPERS
==========================================
Send six copies of position paper of 2-3 pages to one of the PC
co-chairs. Include the title of the paper, the name and affiliation of
each author, a 150-word abstract and no more than 8 keywords. The
name, position, address, telephone number, and if possible, fax number
and e-mail address of the author responsible for correspondence of the
paper must be included. An accepted position paper will get less
presentation time than full paper.  

Workshop General Chair and Organizer
====================================
	Yahya Al-Salqan, Ph.D.
	Sun Microsystems
	
	alsalqan@eng.sun.com

Program Committee
=================

Program Committee Co-Chairs
==========================
	Barbara C. Davis
	Director of Technology
	The Applied Knowledge Group
	231 Market Place, #315
	San Ramon, CA  94583-2785
	USA

	Tel. (888) 442-2785
	FAX  (510) 275-9695
	bcdavis@appliedknowledge.com

	Douglas Moughan
	National Security Agency, R23
	9800 Savage Rd.
	Ft. Meade, Maryland 20755-6000
	USA

	wdm@tycho.ncsc.mil



Workshop Program Committee (Partial List):
==========================================
Abdallah Abdallah, Birzeit University, Jerusalem
Takasi Arano, NTT Corp, Japan
Germano Caronni, ETH-Zurich, Switzerland
Taher ElGamal, Netscape Corp., USA
Stephen Farrell, Software and Systems Engineering, Ireland
Takeo Hamada, Fujitsu, Japan
Matthias Hirsch, BSI (Federal Department of Security in the Information
	Technology-Germany
Cynthia L Musselman, Sandia Lab, USA
Lisa Pretty, Certicom Corp., Canada
Jeffrey Parrett, LLNL, USA
Sumitra Reddy, West Virginia University, USA
Nahid Shahmehri, Linkoping University, Sweden
Morris Sloman, Department of Computing: Imperial College, UK
Badie Taha, Al-Quds University, Jerusalem
Robert Thomys, BSI (Federal Department of Security in the Information
	Technology-Germany
Tatu Ylonen, SSH Communication Security, Finlad
Nick Zhang, EIT, USA



Internet Hot-line
================= 

Information on Enterprise Security Workshop may be obtained through
the WWW using the URL http://www.cerc.wvu.edu/SECWK/ 

For more information on WET-ICE'97, visit the URL: 
http://www.cerc.wvu.edu/WETICE/WETICE97.html

One does not need to have a paper to attend the workshop.  

Received on Friday, 24 January 1997 18:12:53 UTC