Call for Papers
Sixteenth Annual IFIP WG 11.3 Working Conference on Data and Application Security
King's College, University of Cambridge, UK July 29-31, 2002



dummy
dummy

The conference provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security. Papers and panel proposals are solicited. Submissions will be refereed by the members of the Working Group and selected based on technical merit and their relevance to the aim of the IFIP Working Group 11.3. The recent change of name of IFIP WG11.3 to "Data and Applications Security" which emphasizes the inter-dependence of Database Security, Application Security and Internet Security, will be reflected also in the conference. The conference is limited to about forty participants so that ample time for discussion and interaction may occur. Preliminary conference proceedings will be distributed to participants; revised papers and an account of the discussions at the meeting will be published as the next volume in the Research Advances in Database and Information Systems Security series.


Papers may present theory, technique, applications, or practical experience on topics of interest of IFIP WG11.3:
  1. What are good techniques for describing the various factors involved in designing secure data and applications systems, such as:
    • Security and privacy policies or policy requirements
    • Threats to security
    • Costs/benefits of meeting security and privacy requirements (or risks of not meeting them)?
    • Factors associated with developing Web based applications
    What relationships should exist between these descriptions and those already associated with database systems, such as queries, views and schemes?
  2. What are good methodologies for:
    • Obtaining these descriptions
    • Using them in developing secure database systems (including associated applications)
    • Determining with high assurance that the implemented systems are consistent with their descriptions and specifications?
  3. What are the security issues associated with the organization of components (architectures) of database systems, such as networked systems (e.g., WWW), client/server architectures, and layered/modular internal system architectures? How does the integration, interconnection, and interpretation of heterogeneous database systems impact the security of components and the overall system? How do newer technologies and standards such as XML impact these securty issues?
  4. What are the interactions and tradeoffs between functionality, performance and security in various technical features of database systems, such as query processing, data/object model, integrity maintenance, concurrency control/recovery facilities, and inference/deduction capabilities?
Additional topics of interest include: Critical Infrastructure Protection, Cyber Terrorism, Information Warfare, Intrusion Protection, Damage assessment and repair, PTN security.

Instructions for authors
Papers submissions  Authors are invited to submit their contributions electronically to either program chair. Submission must be in the form of a .ps (Postscript), .pdf (Adobe) or .rtf (Microsoft) file. Manuscripts must be in English, typed in double spaced format in 12-point font, and not more than 20 pages. Manuscripts should have a cover page with title, name and addresses (including e-mail address) of authors, and an abstract of no more than 200 words.

Panel proposals  Proposals for panels should be sent electronically to the general chair. Proposals should include a one-page description of the subject matter, the name and address (including e-mail address) of the organizer, and a list of proposed panelists.

Important dates
Submission must be received by: March 22, 2002
Acceptance / rejection notification: May 20, 2002
Final papers in camera-ready form due: June 18, 2002


Program Chairs
Europe, Asia, and Africa
Ehud Gudes
Department of Computer Science
Ben-Gurion University, ISRAEL
Tel: +972-8-6461626
Fax: +972-8-6472909
Email:ehud@cs.bgu.ac.il
North and South America
Sujeet Shenoi
Computer Science Department
University of Tulsa, USA
Tel: +1-918-6313269
Fax: +1-918-6313077
Email:sujeet@utulsa.edu

General Chair
Ken Moody
Computer Laboratory
University of Cambridge

JJ Thomson Avenue
Cambridge CB3 0FD.
Tel: ++44-1223-334625
Email: km@cl.cam.ac.uk

IFIP WG11.3 Chair
Pierangela Samarati
Information Technology Dept.
University of Milan, ITALY
Tel: +39-0373-898237
Email: samarati@dsi.unimi.it

Conference location King's College, a constituent college of Cambridge University, England. is one of the oldest Cambridge colleges, having been founded in 1441 by Henry VI. Situated next to the river Cam in the very heart of the historic city of Cambridge, King's College as an international conference centre provides a unique blend of traditional surroundings and modern facilities, and is only one hour by train from London.

The conference location can be explored at http://www.kings.cam.ac.uk/

Home page IFIP WG11.3: http://seclab.dti.unimi.it/~ifip113

Home page IFIP TC11: http://www.ifip.tu-graz.ac.at/TC11


dummy
dummy