Seventeenth Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Estes Park, Colorado, U.S.A. August 4-6, 2003




Call for Papers   |   Paper submission   |   PC login



Call for Papers

Deadline extended to March 30, 2003


The conference provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security. Papers and panel proposals are solicited. Submissions will be refereed by the members of the Working Group and selected based on technical merit and their relevance to the aim of the IFIP Working Group 11.3. The recent change of name of IFIP WG11.3 to "Data and Applications Security" which emphasizes the inter-dependence of Database Security, Application Security and Internet Security, will be reflected also in the conference. The conference is limited to about forty participants so that ample time for discussion and interaction may occur. Preliminary conference proceedings will be distributed to the participants; revised papers and an account of the discussions at the meeting will be published as the next volume in the Research Advances in Database and Information Systems Security series.

Papers may present theory, technique, applications, or practical experience on topics of interest of IFIP WG11.3:

  1. What are good techniques for describing the various factors involved in designing secure data and applications systems, such as:
    • Security and privacy policies or policy requirements
    • Threats to security
    • Costs/benefits of meeting security and privacy requirements (or risks of not meeting them)?
    • Factors associated with developing Web based applications
    What relationships should exist between these descriptions and those already associated with database systems, such as queries, views and schemes?
  2. What are good methodologies for:
    • Obtaining these descriptions
    • Using them in developing secure database systems (including associated applications)
    • Determining with high assurance that the implemented systems are consistent with their descriptions and specifications?
  3. What are the security issues associated with the organization of components (architectures) of database systems, such as networked systems (e.g., WWW), client/server architectures, and layered/modular internal system architectures? How does the integration, interconnection, and interpretation of heterogeneous database systems impact the security of components and the overall system? How do newer technologies and standards such as XML impact these securty issues?
  4. What are the interactions and tradeoffs between functionality, performance and security in various technical features of database systems, such as query processing, data/object model, integrity maintenance, concurrency control/recovery facilities, and inference/deduction capabilities?

Additional topics of interest include but is not limited to: Critical Infrastructure Protection, Cyber Terrorism, Information Warfare, Intrusion Protection, Damage assessment and repair, Database Forensics, PTN security, Electronic Commerce Security.

Instructions for authors

Papers submissions  Authors are invited to submit their contributions electronically through the web by following this link. Submission must be in the form of a .ps (Postscript), or .pdf (Adobe) file. Manuscripts must be in English, typed in double spaced format in 12-point font, and not more than 20 pages. Manuscripts should have a cover page with title, name and addresses (including e-mail address) of authors, an abstract of no more than 300 words and a set of keywords.

Panel proposals  Proposals for panels should be sent electronically to the general chair. Proposals should include a one-page description of the subject matter, the name and address (including e-mail address) of the organizer, and a list of proposed panelists.

Important dates

Submission must be received by: March 21, 2003
Acceptance / rejection notification: May 19, 2003
Final papers in camera-ready form due: June 17, 2003


Program Chairs

Europe, Asia, and Africa
Sabrina De Capitani di Vimercati
Dip. di Tecnologie dell'Informazione
Università degli Studi di Milano
Via Bramante 65
26013 Crema - Italy
Phone: +39 0373 898057
Fax: +39 0373 898010
Email: decapita@dti.unimi.it
North & South America, and Australia
Indrakshi Ray
Department of Computer Science
Colorado State University
601 S Howes Street
Fort Collins, CO 80523, USA
Phone: +1 970 491 7986
Fax: +1 970 491 2466
Email: iray@cs.colostate.edu

General Chair

Indrajit Ray
Department of Computer Science
Colorado State University
601 S Howes Street
Fort Collins, CO 80523, USA
Phone: +1 970 491 7096
Fax: +1 970 491 2466
Email: indrajit@cs.colostate.edu



Program Commitee

Gail-Joon Ahn, University of North Carolina at Charlotte, U.S.A.
Vijay Atluri, Rutgers University, U.S.A.
Elisa Bertino, University of Milano, Italy
Joachim Biskup, University of Dortmund, Germany
Csilla Farkas, University of South Carolina, U.S.A.
Eduardo Fernandez-Medina, University of Castilla-La Mancha, Spain
Ehud Gudes, Ben-Gurion University, Israel
Sushil Jajodia, George Mason Univeristy, U.S.A.
Carl Landwehr, National Science Foundation, U.S.A.
Peng Liu, Pennsylvania State University, U.S.A.
Ravi Mukkamala, Old Dominion University, U.S.A.
LouAnna Notargiacomo, Oracle Corporation, U.S.A.
Marta Oliva, Universitat de Lleida, Spain
Martin Olivier, University of Pretoria, South Africa
Sylvia Osborn, University of Western Ontario, Canada
Pierangela Samarati, University of Milano, Italy
Ravi Sandhu, NSD Security and George Mason University, U.S.A.
Sujeet Shenoi, University of Tulsa, U.S.A.
David Spooner, Rennselaer Polytechnic Institute, U.S.A.
T.C. Ting, University of Connecticut, U.S.A.
Bhavani Thuraisingham, National Science Foundation and MITRE Corp., U.S.A.
Reind P. van de Riet, Vrije Universiteit, The Netherlands
Duminda Wijesekera, George Mason University, U.S.A.


IFIP WG11.3 Chair

Pierangela Samarati
Dip. di Tecnologie dell'Informazione
Università degli Studi di Milano
Via Bramante 65
26013 Crema, Italy
Phone: +39 02 503 30061
Email: samarati@dti.unimi.it


Conference location

The conference will be held at the Stanley Hotel, in Estes Park, Colorado. Estes Park is located at 7,500 feet above sea level about 80 miles northwest of Denver. Cradled by fifty-four 12,000 feet peaks and surrounded by the Rocky Mountain National Park and the Roosevelt National Forest, Estes Park offers spectacular mountain scenery, abundant wildlife habitat and miles of scenic hiking trails and drives.The Stanley Hotel is located on the eastern slope of the Rocky Mountain, about six miles from Rocky Mountain National Park. This stylish and luxurious hotel is noted for its white-pillared neoclassical Georgian architecture and its fine dining.


Home page Conference: http://www.cs.colostate.edu/~ifip03

Home page IFIP WG11.3: http://seclab.dti.unimi.it/~ifip113

Home page IFIP TC11: http://www.ifip.tu-graz.ac.at/TC11