Information Security News mailing list archives

2001 IEEE Symposium on Security and Privacy


From: InfoSec News <isn () C4I ORG>
Date: Mon, 26 Feb 2001 18:28:46 -0600

http://www.ieee-security.org/TC/sp2001.html

May 13-16, 2001

The Claremont Resort
Oakland, California, USA

sponsored by IEEE Computer Society Technical Committee on Security and
Privacy in cooperation with The International Association for
Cryptologic Research (IACR)

Sunday, 13 May 2001 4:00- 7:00
Registration and Reception

Monday, 14 May 2001 - Wednesday, 16 May 2001: Conference Proper
The conference program has not yet been finalized. Below is a list of
accepted paper, in no particular order.

List of Accepted Papers

Evaluation of Intrusion Detectors: A Decision Theory Approach
John Gaffney, Jacob Ulvila

Performance of Public Key-Enabled Kerberos Authentication in Large
Networks
Alan Harbitter, Daniel A. Menasce

Cryptographic Security for Mobile Code
Joy Algesheimer, Christian Cachin, Jan Camenisch, Gnter Karjoth

Intrusion Detection via Static Analysis
David Wagner, Drew Dean

On Confidentiality and Algorithms
Johan Agat

A Model for Asynchronous Reactive Systems and its Application to
Secure Message Transmission
Birgit Pfitzmann, Michael Waidner

Protection of Keys against Modification Attack
Wai-wa FUNG, Mordecai Golin, Jim Gray

Cryptographic Key Generation from Voice
Authors: Fabian Monrose, Michael Reiter, Qi Li, Susanne Wetzel

Information-Theoretic Measures for Anomaly Detection
Wenke Lee, Dong Xiang

Preserving Information Flow Properties under Refinement
Heiko Mantel

A Trend Analysis of Exploitations
Hilary Browne, William Arbaugh, John McHugh, William Fithen

Understanding Trust Management Systems
Stephen Weeks

Data Mining Methods for Detection of New Malicious Executables
Matthew Schultz, Eleazar Eskin, Erez Zadok, Sal Stolfo

SD3: A trust management system with certified evaluation
Trevor Jim

A Fast Automaton-Based Method for Detecting Anomalous Program
Behaviors
R Sekar, Mugdha Bendre, Pradeep Bollineni

Formal Treatment of Certificate Revocation Under Communal Access
Control
Xuhui Ao, Naftaly Minsky, Victoria Ungureanu

Networked Cryptographic Devices Resilient to Capture
Philip MacKenzie, Michael Reiter

Graph-Based Authentication of Digital Streams
Sara Miner, Jessica Staddon

ELK, a New Protocol for Efficient Large-Group Key Distribution
Adrian Perrig, Dawn Song, J. D. Tygar


----------------------------------------------------------------------

5-Minute Talks

A continuing feature of the symposium will be a session of 5-minute
talks, where attendees can present preliminary research results or
summaries of works published elsewhere. Printed abstracts of these
talks will be distributed at the symposium. Abstracts for 5-minute
talks should fit on one 8.5"x11" or A4 page, including the title and
all author names and affiliations. Send an email with a MIME
attachment containing your abstract in PDF or portable postscript
format to needham () microsoft com. This email should state that your
abstract is for the session of 5-minute presentations at the 2001 IEEE
Symposium on Security and Privacy, and should include the presenter's
name, email and postal addresses, and phone and fax numbers. Please
use a subject field containing the string "Oakland01".

5-minute abstracts due:  March 12, 2001
Acceptance notification:  April 2, 2001

ISN is hosted by SecurityFocus.com
---
To unsubscribe email LISTSERV () SecurityFocus com with a message body of
"SIGNOFF ISN".


Current thread: