Final CfP First International Conference on Security in Pervasive
Computing (SPC2003)
Dieter Hutter
hutter@dfki.de
Wed, 29 Jan 2003 12:43:05 +0100
--------------------------------------------
We are sorry if you receive multiple copies!
--------------------------------------------
Call for Participation
----------------------
First International Conference on
Security in Pervasive Computing (SPC-2003)
March 12 - 14, 2003
in Boppard, Germany
http://www.dfki.de/SPC2003 (online registration)
The ongoing compression of computing facilities into small and
mobile devices like handhelds, portables or even wearable computers
will enhance an ubiquitous information processing. The basic para-
digm of such a pervasive computing is the combination of strongly
decentralized and distributed computing with the help of diversified
devices allowing for spontaneous connectivity via the internet.
Computers will become invisible to the users awareness and exchange
of information between devices will effectively defy users control.
Assuming a broad usage of more powerful tools and more effective
ways to use them the quality of every day life will be strongly
influenced by the dependability of the new technology. Information
stored, processed, and transmitted be the various devices is one of
the most critical resources. Threats exploiting vulnerabilities of
new kinds of user interfaces, displays, operating systems, networks,
and wireless communications will cause new risks of loosing
confidentiality, integrity, and availability. Can these risks be
reduced by countermeasures to an acceptable level or do we have to
redefine political and social demands as it is expressed by the
Gartner Group from a privacy perspective:
By 2010, driven by the improving capabilities of data analysis ...
privacy will become a meaningless concept in Western societies.
Topics of Interest:
-------------------
The objective of this conference is to develop new security concepts
for complex application scenarios based on systems like handhelds,
phones, smartcards, and smart labels hand in hand with the emerg-
ing technology of ubiquitous and pervasive computing. Particular
subjects are methods and technology concerning the identification
of risks, the definition of security policies, and the development
of security measures that are related to the specific aspects of
ubiquitous and pervasive computing like mobility, communication,
and secure hardware/software platforms.
Conference Schedule:
--------------------
In consideration of the novel character of the conference theme it
is planned to have three kinds of events:
- invited talks that give an introduction into security related
aspects of pervasive computing:
Friedemann Mattern (ETH Zurich):
The Age of Pervasive Computing - Everything Smart, Everything Connected?
Hideyuki Nakashima (Cyber Assist Research Center, Japan)
Cyber Assist Project and Its Security Requirements
Frank Stajano (Cambridge University)
Security in Pervasive Computing
Markus Luidolt (Philips Semiconductors, Austria)
The World of Smart Labels - applications and security aspects
Paul Karger (IBM Watson Research, USA)
tbd.
- sessions for the presentation of the technical papers:
Time Constraint Delegation for P2P Data Decryption,
Tie Yan Li
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing,
Kemal Bicakci and Nazife Baykal
Visual Crypto Displays enabling Secure Communications,
P. Tuyls, T. Kevenaar, G.J. Schrijen, A.A.M. Staring, M. van Dijk
Smart Devices and Software Agents: the Basics of Good Behaviour,
Howard Chivers, John Clark, and Susan Stepney
Enforcing Security Policies via Types,
Daniele Gorla and Rosario Pugliese
Trust Context Spaces: An Infrastructure for Pervasive Security,
Philip Robinson, Michael Beigl
Authentication in Pervasive Computing,
Irfan Zakiuddin, Sadie Creese, Bill Roscoe, Michael Goldsmith
Dependability Issues of Pervasive Computing in a Healthcare Environment,
Juergen Bohn, Felix Gaertner, Harald Vogt
End-to-end trust in pervasive computing starts with recognition,
Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Chen Yong
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,
Daniel W. Engels, Ronald L. Rivest, Sanjay E. Sarma and Stephen A. Weis
Embedding Distance Bounding Protocols within Intuitive Interactions
Laurent Bussard, Yves Roudier
Protecting Access to People Location Information
Urs Hengartner, Peter Steenkiste
Enlisting Hardware Architecture to Thwart Malicious Code Injection
Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
Hakan Kvarnstrom, Hans Hedbom and Erland Jonsson.
Implementing a Formally Verifiable Security~Protocol in Java Card,
Engelbert Hubbers, Martijn Oostdijk, Erik Poll
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
Marco Gruteser
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
Axel Schairer
Optimized Smart Card RISC Architecture for Multiple-Precision Modular Arithmetic
Johann Großschaedl, Guy-Armand Kamendje
- working groups that focus on particular problems areas.
The results of the working groups will be presented and discussed
in panel sessions. The final results will be published together with
the technical papers in the Lecture Notes Series on Computer Science
(LNCS).
Location:
---------
It will be held at an old former monastery in Boppard, Germany.
Boppard is a nice small town located in the rhine valley about one hour
away from Frankfurt airport.
Organisation:
-------------
The conference will be organised jointly by
- German Information Security Agency (BSI)
- German Research Center for Artificial Intelligence (DFKI)
- Institute for Telematics, University of Freiburg.
Program Committee
-----------------
Michael Beigl (University of Karlsruhe)
Joshua Guttman (MITRE)
Dieter Hutter (DFKI) (co-organiser)
Paul Karger (IBM Watson Research)
Friedemann Mattern (ETH Zurich)
Catherine Meadows (Naval Research Lab)
Guenter Mueller (University of Freiburg) (co-organiser)
Joachim Posegga (SAP)
Kai Rannenberg (University of Frankfurt)
Kurt Rothermel (University of Stuttgart)
Ryoichi Sasaki (Tokyo Denki University)
Frank Stajano (University of Cambridge)
Werner Stephan (DFKI) (co-organiser)
Moriyasu Takashi (Hitachi Ltd)
Seiji Tomita (NTT Information Platform Laboratories)
Markus Ullmann (BSI) (co-organiser)