- From: Yahya Al-Salqan <yahya.abual-salqan@Eng.Sun.COM>
- Date: Fri, 24 Jan 1997 15:11:48 -0800 (PST)
- To: aft@unify.com, cat-ietf@mit.edu, dns-security@tis.com, ipsec@tis.com, etf-otp@bellcore.com
- Cc: etf-pkix@tandem.com, ietf-tls@www10.w3.org, www-security@ns2.Rutgers.EDU
Call For Papers Second International Workshop on Enterprise Security June 18-20, 1997 Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA Co-sponsored by the IEEE Computer Society and the Concurrent Engineering Research Center (CERC) at West Virginia University ============================================================================== Enterprises are increasingly dependent on their information systems to support their business and workflow activities. There is a need for universal electronic connectivity to support interaction and cooperation between multiple organizations. This makes enterprise security and confidentiality more important, but more difficult to achieve, as the multiple organizations may have differences in their security policies and may have to interact via an insecure Internet. These inter-organizational enterprise systems may be very large and so tools and techniques are needed to support the specification, analysis and implementation of security. This workshop will focus on the problems and challenges relating to enterprise security in inter-organizational systems. We aim to bring together principal players from both the internetwork and enterprise security community and will provide plenty of time for discussion. Topics to be addressed include: - Internet/Intranet security - Security infrastructure and protocols - Java Security - Specifying and Analyzing Enterprise Security Policy - Role-Based Access Control - Supporting enterprise security over the Internet - Conflicts and harmonization of inter- and intra-organizational Security - Distributed Database Security - Secure Transactions - Security in Workflow Process - Object-Oriented and CORBA Security - Secure Applications and Environments - Integrating Heterogeneous Security Environments - Managing inter-organizational Enterprise Security - Internet Security protocols - Security Algorithms This workshop will be part of the IEEE Sixth Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET-ICE 96) organized by the Concurrent Engineering Research Center (CERC)/ West Virginia University. Important Dates: ================ Papers Due March 25, 1997 Panel Proposals March 18, 1997 Authors notified of acceptance April 21, 1997 Workshop June 18-20, 1997 Camera Ready June 28, 1997 INFORMATION FOR AUTHORS OF PAPERS TO BE INCLUDED IN THE PROCEEDINGS =================================================================== Mail six copies of an original (not submitted or published elsewhere) paper (double-spaced) of 3000-5000 words to one of the PC co-chairs. Include the title of the paper, the name and affiliation of each author, a 150-word abstract and no more than 8 keywords. The name, position, address, telephone number, and if possible, fax number and e-mail address of the author responsible for correspondence of the paper must be included. An e-mail submission in postscript format will be accepted. INFORMATION FOR PANEL ORGANIZERS ================================ Send six copies of panel proposals to one of the PC co-chairs. Include the title, a 150-word scope statement, proposed session chair and panelists and their affiliations, the organizer's affiliation, address, telephone and fax number, and e-mail address. INFORMATION FOR AUTHORS OF POSITION PAPERS ========================================== Send six copies of position paper of 2-3 pages to one of the PC co-chairs. Include the title of the paper, the name and affiliation of each author, a 150-word abstract and no more than 8 keywords. The name, position, address, telephone number, and if possible, fax number and e-mail address of the author responsible for correspondence of the paper must be included. An accepted position paper will get less presentation time than full paper. Workshop General Chair and Organizer ==================================== Yahya Al-Salqan, Ph.D. Sun Microsystems alsalqan@eng.sun.com Program Committee ================= Program Committee Co-Chairs ========================== Barbara C. Davis Director of Technology The Applied Knowledge Group 231 Market Place, #315 San Ramon, CA 94583-2785 USA Tel. (888) 442-2785 FAX (510) 275-9695 bcdavis@appliedknowledge.com Douglas Moughan National Security Agency, R23 9800 Savage Rd. Ft. Meade, Maryland 20755-6000 USA wdm@tycho.ncsc.mil Workshop Program Committee (Partial List): ========================================== Abdallah Abdallah, Birzeit University, Jerusalem Takasi Arano, NTT Corp, Japan Germano Caronni, ETH-Zurich, Switzerland Taher ElGamal, Netscape Corp., USA Stephen Farrell, Software and Systems Engineering, Ireland Takeo Hamada, Fujitsu, Japan Matthias Hirsch, BSI (Federal Department of Security in the Information Technology-Germany Cynthia L Musselman, Sandia Lab, USA Lisa Pretty, Certicom Corp., Canada Jeffrey Parrett, LLNL, USA Sumitra Reddy, West Virginia University, USA Nahid Shahmehri, Linkoping University, Sweden Morris Sloman, Department of Computing: Imperial College, UK Badie Taha, Al-Quds University, Jerusalem Robert Thomys, BSI (Federal Department of Security in the Information Technology-Germany Tatu Ylonen, SSH Communication Security, Finlad Nick Zhang, EIT, USA Internet Hot-line ================= Information on Enterprise Security Workshop may be obtained through the WWW using the URL http://www.cerc.wvu.edu/SECWK/ For more information on WET-ICE'97, visit the URL: http://www.cerc.wvu.edu/WETICE/WETICE97.html One does not need to have a paper to attend the workshop.
Received on Friday, 24 January 1997 18:12:53 UTC