ietf-smime
[Top] [All Lists]

ACM CCCS'98: Preliminary Program and Call for Participation

1998-07-16 11:09:03


                             
                             
                             Preliminary Program

                          Fifth ACM Conference on
                    Computer and Communications Security

                          San Francisco, California
                             November 2-5, 1998
                           Sponsored by ACM SIGSAC


        For more information visit http://www.research.att.com/~reiter/ccs5


        Launched in 1993, ACM CCCS is the ACM's flagship security conference. 
        CCCS covers a wide range of topics in computer/information security
        and offers a technical as well as a tutorial program. Presentation
        topics are diverse, addressing state-of-the-art results of both 
        practical and theoretical nature (and everything in between).

 
================================= DAY 0 =================================== 
 
 Monday, November 2, 1998: Tutorials

                    Core Topics                  Emerging Topics

  9:00-12:30 Cryptography: Theory and   Programming Languages and Security
             Applications               Martin Abadi (DEC Systems Research
             Dan Boneh (Stanford        Center, USA) and George Necula
             University, USA)           (Carnegie Mellon University, USA)

 12:30-13:30 Lunch

 13:30-17:00 To Be Determined           Authentication Protocol Verification
                                        and Analysis Jon Millen 
                                        (SRI International, USA)


================================= DAY 1 =================================== 

 Tuesday, November 3, 1998: Technical sessions

 9:00-10:00 Keynote address
            Risks and challenges in computer-communication infrastructures
            Peter G. Neumann (SRI International, USA)

 10:00-10:30                    Break

 10:30-12:00            Group key management

            Communication complexity of group key distribution
            Klaus Becker (R^3 Security Engineering, Switzerland) and Uta
            Wille (IBM Zurich Research Laboratory, Switzerland)

            Key management for encrypted broadcast
            Avishai Wool (Bell Labs, USA)

            Authenticated group key agreement and related protocols
            Giuseppe Ateniese (USC Information Sciences Institute, USA),
            Michael Steiner (IBM Zurich Research Laboratory, Switzerland),
            and Gene Tsudik (USC Information Sciences Institute, USA)

 12:00-13:30                    Lunch

 13:30-15:30                    Anonymity

            The design, implementation and operation of an email pseudonym 
server
            David Mazie`res and M. Frans Kaashoek (Massachusetts Institute
            of Technology, USA)

            Panel: Anonymity on the Internet
            Moderator: Paul Syverson (Naval Research Lab, USA)

 15:30-16:00                    Break

 16:00-17:00            Mobile code security
            
            History-based access-control for mobile code
            Guy Edjlali, Anurag Acharya, and Vipin Chaudhary (University of
            California, Santa Barbara, USA)

            A specification of Java loading and bytecode verification
            Allen Goldberg (Kestrel Institute, USA)


================================= DAY 2 =================================== 


 Wednesday, November 4, 1998: Technical sessions

 9:00-10:30                     Cryptography

            A new public key cryptosystem based on higher residues
            David Naccache (Gemplus, France) and Jacques Stern (Ecole
            Normale Superieure, France)

            An efficient non-interactive statistical zero-knowledge proof
            system for quasi-safe prime products
            Rosario Gennaro (IBM T.J. Watson Research Center, USA), Daniele
            Micciancio (Massachusetts Institute of Technology, USA), and
            Tal Rabin (IBM T.J. Watson Research Center, USA)

            Communication-efficient anonymous group identification
            Alfredo De Santis (Universita' di Salerno, Italy) and Giovanni
            Di Crescenzo (University of California, San Diego, USA)

 10:30-11:00                    Break

 11:00-12:00                    Invited talk

            The development of public key cryptography
            Martin Hellman


 12:00-13:30                    Lunch

 13:30-15:00                    Systems

            A security architecture for computational grids
            Ian Foster (Argonne National Laboratory, USA), Carl Kesselman,
            Gene Tsudik (USC Information Sciences Institute, USA), and
            Steven Tuecke (Argonne National Laboratory, USA)

            Design of a high-performance ATM firewall
            Jun Xu and Mukesh Singhal (Ohio State University, USA)

            A practical secure physical random bit generator
            Markus Jakobsson, Elisabeth Shriver, Bruce Hillyer (Bell Labs,
            USA) and Ari Juels (RSA Labs, USA)

 15:00-15:30                    Break

 15:30-16:30                    Invited talk

            Trust in cyberspace? A research roadmap
            Fred Schneider (Cornell University, USA)


================================= DAY 3 =================================== 
 
 
 Thursday, November 5, 1998: Technical sessions

 9:00-10:30             Protocol design and analysis

            A probabilistic poly-time framework for protocol analysis
            Pat Lincoln (SRI International, USA), John Mitchell, Mark
            Mitchell (Stanford University, USA), and Andre Scedrov
            (University of Pennsylvania, USA)

            On using public-key cryptography in password protocols
            Shai Halevi (IBM T.J. Watson Research Center, USA) and Hugo
            Krawczyk (Technion, Israel)

            Cryptanalysis of Microsoft's point-to-point tunneling protocol
            Bruce Schneier (Counterpane Systems, USA)

 10:30-11:00                    Break

 11:00-12:00                    System monitoring

            How to prove where you are
            Eran Gabber and Avishai Wool (Bell Labs, USA)

            Temporal sequence learning and data reduction for anomaly detection
            Terran Lane and Carla E. Brodley (Purdue University, USA)


================== Worst paper award and author lampooning =================== 



 Steering committee chair: Ravi Sandhu, George Mason University
 General chair:            Li Gong, JavaSoft

 Program chair:            Mike Reiter
                           AT&T Labs, Room A269, 180 Park Avenue
                           Florham Park, NJ 07932-0971 USA
                           phone: +973-360-8349

 Awards chair:             Jacques Stern, ENS/DMI
 Publication chair:        Stuart Stubblebine, AT&T Labs
 Publicity chair:          Gene Tsudik, USC ISI

 
 Program committee:

 Martin Abadi, DEC SRC              David Naccache, Gemplus
 Bill Cheswick, Lucent/Bell Labs    Hilarie Orman, DARPA/ITO
 Carl Ellison, Cybercash            Avi Rubin, AT&T Labs--Research
 Ed Felten, Princeton University    Pierangela Samarati, Universita di Milano
 Paul Karger, IBM T.J. Watson       Gene Tsudik, USC ISI
 Steve Kent, BBN Corporation        Paul Van Oorschot, Entrust Technologies
 Ueli Maurer, ETH Zurich            Bennet Yee, UCSD
 Cathy Meadows, Naval Res. Lab      Moti Yung, CertCo

For more information, visit http://www.research.att.com/~reiter/ccs5


<Prev in Thread] Current Thread [Next in Thread>