Information Security News mailing list archives

Computer Security Mexico 2003


From: InfoSec News <isn () c4i org>
Date: Wed, 15 Jan 2003 06:12:05 -0600 (CST)

Forwarded from: Seguridad en Computo - UNAM <seguridad () seguridad unam mx>

-----BEGIN PGP SIGNED MESSAGE-----

   ---------------------------------------------------------------------
                       Computer Security Mexico 2003
                             Call for papers

                       Antiguo Colegio de San Ildefonso
                          March 6th-March 7th, 2003

                          Old Downtown,Mexico City
   -------------------------------------------------------------------------

 Since 1994, Mexico has participated of this celebration through the
 Computer Security Department (DSC-UNAM, www.seguridad.unam.mx) and
 UNAM-CERT (www.unam-cert.unam.mx).

 The goal  of Computer Security 2003 Mexico (www.seguridad2003.unam.mx)
 is to create awareness among the computer user community about security
 strategies and mechanisms used to protect information systems.Since 1994,
 Mexico has been organizing this great event through the Computer Security
 Department (DSC-UNAM, www.seguridad.unam.mx) and  UNAM-CERT
 (www.unam-cert.unam.mx).

 Computer Security 2003  will be an event for all the people who are
 involved in the  use, design and administration of computer systems.

 The community  is invited to  participate in Computer  Security 2003
 through the  presentation of theoretical,  technical, and  applied works
 as  well as those that  present practical  experiences in the following
 topics (but not limited to them):

    * Electronic commerce
         o Certification
         o Digital cash
         o New protocols
         o Secure transactions
         o New technologies
    * New firewall technologies
         o Hybrids FW
         o New generations of FW
    * World Wide Web security
         o Secure Sockets Layer (SSL)
         o Secure schemes
    * Legislation about Computer Security
         o Advances in legislation 1999-2000
         o Regulation of domain names
         o Copyright and industrial property
    * Network security
         o New network technology applied to security (ATM, Fast Ethernet)
         o Router security
    * Cluster security
    * Software development security
    * Distributed systems security
    * Database security
    * Security of agents and multi-platform languages
    * Incident response Teams
    * Computer security incident handling, prevention and coordination
    * Administrative and legal issues on incident handling
    * Software protection and intellectual property
    * New tools for incident handling
    * Intrusion detection
    * Computer attacks
    * Privacy and cryptography protocols
    * Security policies
    * Computer viruses
    * DDOS

              --------------------------------------------------

                            Who should attend ?

    * System administrators who are interested in Computer Security.

    * People working in the field of Computer Security who do handle Computer
      Security incidents.

    *  Anybody  who is  interested  in  Computer Security  and wants  to  meet
      another  interested people.  This event  will help  him or  her improve
      security programs, plans, and tools by listening to the speakers and by
      sharing and interacting with the attendees.

    * People who want to establish incident response teams.

    * Anybody  who has a particular  interest in network security, monitoring
      tools, intrusion detection and firewalls.

    * Managers  of enterprises who are  interested in secure transactions via
      the Internet and that need to improve the security of their systems.

              --------------------------------------------------

                            Why should you assist?

  Because it  is the opportunity to find out about  what is being developed in
  the  computer security  field  and it  is also  a chance  to share  your own
  experience and interests with people of the field.

  You can learn about how to manage and respond to computer security incidents
  without exposing your resources.

       Important Dates
       ---------------

        Paper submissions: February 7th, 2003.
        Acceptance notifications: February 14th, 2003.
        Final papers: February 24th, 2003
        Event: March 1, 2003 - March 7, 2003.
        Conferences: March 6th and March 7th

       Workshop Format
       ---------------

      On March 6 and 7, there will be technical conferences
   and business sessions only.

     All contributions should follow the next guidelines:

        1. Conference papers: Written papers may be as long as desired,
            but presentations must be limited to 30 minutes.

              --------------------------------------------------

                          Instructions for authors

  We will  receive proposals  for presentations, that
  follow these guidelines:

     * The documents should be submitted by the date indicated above.

     * The  contents of  the documents should  be of high-quality  and must be
       original.

     * They should include an abstract with the description of the content and
       style of the presentation.

     * The papers  will be  evaluated using  the actual  proposal, which  must
       contain:

          o title
          o format (workshop, tutorial or conference)
          o extended abstract (more than one but less than two pages)
          o requirements for the presentation (computing equipment,
          o datashow projector, slide projector, etc.)
          o author information
               + name
               + address and affiliation
               + brief resume
               + fax and telephone number
               + e-mail address


       Accepted formats
       ----------------

  Authors whose  papers are  accepted must submit  the complete version  to be
  included into the proceedings of the event.

  Submissions will be accepted in the following formats:

     * TeX/LaTeX
     * PostScript
     * Word for Windows
     * ASCII
     * HTML

  Please contact the committee  (congreso () seguridad unam mx ) if you need
  to use a different format.

  Note: For images and graphics use GIF, PCX, BMP, JPEG and JPG formats.

       Submissions

  Presentations can be sent using the following means:

          * e-mail:

                 congreso () seguridad unam mx

          * Post mail to the following address:

                 Departamento de Seguridad en Cómputo
                 Dirección General de Cómputo Académico
                 Circuito   Exterior,  Ciudad   Universitaria  04510
                 México, D.F. México

              --------------------------------------------------

                               Program Committee

  The papers will be evaluated and selected by a scientific committee.

  The  committee  will  be  integrated  by  investigators  and  profesionistas
  recognized in the field of the computer security worldwide.

               --------------------------------------------------

                              Further Information:

        * Web:    http://www.seguridad2003.unam.mx

        * e-mail: congreso () seguridad unam mx

        * Address:

                Departamento de Seguridad en Cómputo/UNAM-CERT
                Dirección General de Cómputo Académico
                Circuito   Exterior,  Ciudad   Universitaria  04510
                México, D.F. México
                Phone  : (52)  56 22  81 69  and (52)  56 85  22 29
                Fax : (52) 56 22 80 43
               http://www.seguridad.unam.mx
               http://www.unam-cert.unam.mx


 Juan Carlos Guel
 ---
 Departamento Seguridad en Computo
 UNAM-CERT
 DGSCA, UNAM                    E-mail:seguridad () seguridad unam mx
 Circuito Exterior, C. U.       Tel.: 5622-81-69  Fax: 5622-80-43
 Del. Coyoacan                  WWW: http://www.seguridad.unam.mx
 04510 Mexico D. F.             WWW: http://www.unam-cert.unam.mx

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: cp850

iQEVAwUBPiUJNHAvLUtwgRsVAQFmzQf+M3C9uC0w2BuNFr3SAtpx+GtUMUlQbf+L
mGAa3AzorE2YcZx/Oarvz+/I20Oib5yNvSsRB4pJwGm3qP3a8juw8+s73sntDkZY
Hhbjn85J2jWu/XMNG8fiv3llLK5nt08kZ+d3LFwdWLMg7GkeTLSLyPzuuZn6vDGB
iHueQ0Ii89tUnTEzGebLlbiWdtm7RfUnYQN4QXlveQbCu4v5zhbGCrfIwSRDEz8Q
LNnO9l9q+AyJnP/+4UUFXZrj09cR3eCKNI0iDCYplHxdFLDFrz5q3R+vMEJFDn16
S+5dJlATVRCMI538998iR8PWMkK/UiPJq9LxfUyVbd1Jf3ouiXaciA==
=RQx7
-----END PGP SIGNATURE-----



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: