WET ICE '99 -- IEEE Fourth International Workshop on
          Enterprise Security
          June 16-18, 1999, Stanford University, California, USA

Sponsors: IEEE Computer Society and CERC at West Virginia University
Host: Center for Design Research, Stanford University

Call for Papers
Fourth International Workshop on Enterprise Security

This document is also available in PostScript and PDF formats


Enterprise Security Workshop

General Information

Full Workshop Call For Papers

Registration

Electronic submission

Agenda

Program Committee


General Information

WET ICE '99 Home Page

IEEE Format for Proceedings

IEEE Copyright Policies

Previous WET ICE Workshops


Participating Organizations


IEEE


IEEE Computer Society


CERC, West Virginia University


Center for Design Research, Stanford University

Enterprises are becoming increasingly dependent on their information systems to support their business and workflow activities. There is a need for universal electronic connectivity to support interaction and cooperation between multiple organizations. This makes enterprise security and confidentiality more important but at the same time more difficult to achieve, as the multiple organizations may have differences in their security policies and may have to interact via an insecure Internet.

These inter-organizational enterprise systems may be very large. Efficient tools, techniques and methodologies are therefore needed to support the specification, analysis and implementation of security.

This workshop will focus on the problems and challenges relating to enterprise security in inter-organizational systems. We aim to bring together principal players from both the internetwork and the enterprise security community and will provide plenty of time for discussion.

Topics to be discussed include

Internet security
  • Security protocols for the Internet
  • The work and efforts of IETF security groups
  • Global key infrastructures
Distribution
  • Distributed database security
  • Secure transactions
  • Inter- and intra- organizational security
  • Security of collaborative applications
Secure infrastructures
  • Secure applications and environments
  • Object-oriented and CORBA Security
  • Secure enterprise infrastructures
  • Security algorithms
  • Public key infrastructures
Secure infrastructures
  • Role-based access control
  • Enterprise security policies
  • Security in workflow processes

Submissions

Authors should submit six copies of an original paper (not submitted or published elsewhere) to the General Chair or one of the Program Co-Chairs. WWW submissions are also accepted. Instructions and forms are available [here].

Submissions should include the title of the paper, the name and affiliation of each author, a 150-word abstract, and no more than 8 keywords. Submissions should not exceed 3000 words in length. The name, position, address, telephone number, and if possible, fax number and e-mail address of the author responsible for correspondence must be included.

A representative selection of accepted papers will published in the work shop post-proceedings. Papers accepted for publication in the proceedings are limited to six pages (about 2000-2500 words) in IEEE format (two columns, single spaced, 10pt Times). Authors are strongly encouraged to adhere to this format also when submitting papers. Detailed information on the IEEE format (together with some templates) is available at http://www.computer.org/cspress/instruct.htm.

Panel proposals

Send six copies of panel proposals to the Program Chair. Include a title, a 150-word scope statement, proposed session chair and panelists and their affiliations, the organizer's affiliation, address, telephone and fax number, and e-mail address.

General Chair

Yahya Al-Salqan
Sun Microsystems
901 San Antonio Rd
Palo Alto, CA 94303
USA
E-mail: alsalqan@eng.sun.com

Program Co-Chairs

Nahid Shahmehri
Dept. of Computer Science
Linköping University
S-581 83 Linköping
SWEDEN
E-mail: nahsh@ida.liu.se

Mourad Debbabi
Computer Science Department
Laval University
Ste-Foy, Quebec, G1k 7P5
CANADA
E-mail: debabi@ift.ulaval.ca

Workshop Program Committee

Dominique Bolignano, Trusted Logic, France
Germano Caronni, ETH-Zentrum, Switzerland
Michael Geva, Java Security Group, USA
Jean Goubault, Gie Dyade, France
Dima Hamad, Birzeit University, West Bank
Douglas Maughan, National Security Agency, USA
Steve Lloyd, Entrust, Canada
Gary McGraw, Reliable Software Technologies Inc., USA
Aravindan Ranganathan, Sun Microsystems, USA
Sumitra Reddy, CERC, West Virginia University, USA
Vipin Samar, Oracle, USA
Bill Soley, Sun Microsystems, USA
Robert Thomys, BSI, Germany
Mark Vandenwauver, K.U. Leuven, Belgium
Wu Wen, Science University of Tokyo, Japan.
Tatu Ylönen, SSH Communications Security, Finland
Nick Zhang, XETI, USA
Qun Zhong, HP Extend Enterprise Lab, USA

Important Dates

Full papers due to workshop organizers April 12, 1999
Notification of decisions to paper authors April 26, 1999
Advance Registration May 26, 1999
Workshop June 16-18, 1999
Final papers due for proceedings June 30, 1999

Inquiries

Please send all inquiries regarding this workshop to the General Chair, Yahya Al-Salqan,
alsalqan@eng.sun.com.

For inquiries regarding WET ICE in general, contact wetice@cerc.wvu.edu or call (U.S.) +1-304-293-7226.


Page hosted by IDA  Dept. of Computer and Information Science, Linköpings universitet, Sweden

Last modified 24-Mar-99 11:17