Sponsors: IEEE Computer Society and CERC at West
Virginia University
Host: Center for Design Research, Stanford University
General Information
|
Enterprises are becoming increasingly dependent on their information
systems to support their business and workflow activities. There is a
need for universal electronic connectivity to support interaction and
cooperation between multiple organizations. This makes enterprise
security and confidentiality more important but at the same time more
difficult to achieve, as the multiple organizations may have
differences in their security policies and may have to interact via an
insecure Internet. These inter-organizational enterprise systems may be very large. Efficient tools, techniques and methodologies are therefore needed to support the specification, analysis and implementation of security. This workshop will focus on the problems and challenges relating to enterprise security in inter-organizational systems. We aim to bring together principal players from both the internetwork and the enterprise security community and will provide plenty of time for discussion. Topics to be discussed include | ||||||||||
Internet security
|
Secure infrastructures
| ||||||||||
SubmissionsAuthors should submit six copies of an original paper (not submitted or published elsewhere) to the General Chair or one of the Program Co-Chairs. WWW submissions are also accepted. Instructions and forms are available [here].Submissions should include the title of the paper, the name and affiliation of each author, a 150-word abstract, and no more than 8 keywords. Submissions should not exceed 3000 words in length. The name, position, address, telephone number, and if possible, fax number and e-mail address of the author responsible for correspondence must be included. A representative selection of accepted papers will published in the work shop post-proceedings. Papers accepted for publication in the proceedings are limited to six pages (about 2000-2500 words) in IEEE format (two columns, single spaced, 10pt Times). Authors are strongly encouraged to adhere to this format also when submitting papers. Detailed information on the IEEE format (together with some templates) is available at http://www.computer.org/cspress/instruct.htm. Panel proposalsSend six copies of panel proposals to the Program Chair. Include a title, a 150-word scope statement, proposed session chair and panelists and their affiliations, the organizer's affiliation, address, telephone and fax number, and e-mail address.General ChairYahya Al-SalqanSun Microsystems 901 San Antonio Rd Palo Alto, CA 94303 USA E-mail: alsalqan@eng.sun.com | |||||||||||
Program Co-ChairsNahid ShahmehriDept. of Computer Science Linköping University S-581 83 Linköping SWEDEN E-mail: nahsh@ida.liu.se
|
Mourad Debbabi Computer Science Department Laval University Ste-Foy, Quebec, G1k 7P5 CANADA E-mail: debabi@ift.ulaval.ca | ||||||||||
Workshop Program CommitteeDominique Bolignano, Trusted Logic, FranceGermano Caronni, ETH-Zentrum, Switzerland Michael Geva, Java Security Group, USA Jean Goubault, Gie Dyade, France Dima Hamad, Birzeit University, West Bank Douglas Maughan, National Security Agency, USA Steve Lloyd, Entrust, Canada Gary McGraw, Reliable Software Technologies Inc., USA Aravindan Ranganathan, Sun Microsystems, USA Sumitra Reddy, CERC, West Virginia University, USA Vipin Samar, Oracle, USA Bill Soley, Sun Microsystems, USA Robert Thomys, BSI, Germany Mark Vandenwauver, K.U. Leuven, Belgium Wu Wen, Science University of Tokyo, Japan. Tatu Ylönen, SSH Communications Security, Finland Nick Zhang, XETI, USA Qun Zhong, HP Extend Enterprise Lab, USA Important Dates
InquiriesPlease send all inquiries regarding this workshop to the General Chair, Yahya Al-Salqan, alsalqan@eng.sun.com.For inquiries regarding WET ICE in general, contact wetice@cerc.wvu.edu or call (U.S.) +1-304-293-7226. |
Last modified 24-Mar-99 11:17