Final CfP First International Conference on Security in Pervasive Computing (SPC2003)

Dieter Hutter hutter@dfki.de
Wed, 29 Jan 2003 12:43:05 +0100


         --------------------------------------------
         We are sorry if you receive multiple copies!
         --------------------------------------------


                  Call for Participation
                  ----------------------


            First International Conference on 
       
         Security in Pervasive Computing (SPC-2003)

               March 12 - 14, 2003 
                in Boppard, Germany

            http://www.dfki.de/SPC2003 (online registration)


The ongoing compression of computing facilities into small and 
mobile devices like handhelds, portables or even wearable computers 
will enhance an ubiquitous information processing. The basic para-
digm of such a pervasive computing is the combination of strongly 
decentralized and distributed computing with the help of diversified 
devices allowing for spontaneous connectivity via the internet. 
Computers will become invisible to the users awareness and exchange 
of information between devices will effectively defy users control.

Assuming a  broad usage of  more powerful tools and more effective 
ways to use them the quality of every day life will be strongly 
influenced by the dependability of the new technology. Information 
stored, processed, and transmitted be the various devices is one of 
the most critical resources. Threats exploiting vulnerabilities of 
new kinds of user interfaces, displays, operating systems, networks,
and wireless communications will cause new risks of loosing 
confidentiality, integrity, and availability. Can these risks be 
reduced by countermeasures to an acceptable level or do we have to 
redefine political and social demands  as it is expressed by the 
Gartner Group from a privacy perspective:

  By 2010, driven by the improving capabilities of data analysis ... 
  privacy will become a meaningless concept in Western societies.


Topics of Interest:
-------------------

The objective of this conference is to develop new security concepts 
for complex application scenarios based on systems like handhelds, 
phones,  smartcards, and smart labels hand in hand with the emerg-
ing technology  of ubiquitous and pervasive computing. Particular 
subjects are methods  and technology concerning the identification
of risks, the definition of  security policies, and the development 
of security measures that are related to the specific aspects of 
ubiquitous and pervasive computing like mobility, communication, 
and secure hardware/software platforms.


Conference Schedule:
--------------------

In consideration of the novel character of the conference theme it 
is planned to have three kinds of events:

- invited talks that give an introduction into security related 
  aspects of pervasive computing:

  Friedemann Mattern (ETH Zurich): 
       The Age of Pervasive Computing - Everything Smart, Everything Connected?  
  Hideyuki Nakashima (Cyber Assist Research Center, Japan)
       Cyber Assist Project and Its Security Requirements   
  Frank Stajano (Cambridge University) 
       Security in Pervasive Computing  
  Markus Luidolt (Philips Semiconductors, Austria)
       The World of Smart Labels - applications and security aspects
  Paul Karger (IBM Watson Research, USA) 
       tbd.

- sessions for the presentation of the technical papers:

  Time Constraint Delegation for P2P Data Decryption,
      Tie Yan Li
  SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing, 
      Kemal Bicakci and Nazife Baykal  
  Visual Crypto Displays enabling Secure Communications,  
      P. Tuyls, T. Kevenaar, G.J. Schrijen, A.A.M. Staring, M. van Dijk
  Smart Devices and Software Agents: the Basics of Good Behaviour,  
      Howard Chivers, John Clark, and Susan Stepney
  Enforcing Security Policies via Types,  
      Daniele Gorla and Rosario Pugliese
  Trust Context Spaces: An Infrastructure for Pervasive Security,  
      Philip Robinson, Michael Beigl
  Authentication in Pervasive Computing,
      Irfan Zakiuddin, Sadie Creese, Bill Roscoe, Michael Goldsmith
  Dependability Issues of Pervasive Computing in a Healthcare Environment,
      Juergen Bohn, Felix Gaertner, Harald Vogt
  End-to-end trust in pervasive computing starts with recognition,
      Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Chen Yong
  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,
      Daniel W. Engels, Ronald L. Rivest, Sanjay E. Sarma and Stephen A. Weis
  Embedding Distance Bounding Protocols within Intuitive Interactions  
      Laurent Bussard, Yves Roudier
  Protecting Access to People Location Information
      Urs Hengartner, Peter Steenkiste
  Enlisting Hardware Architecture to Thwart Malicious Code Injection
      Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi
  Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
      Hakan Kvarnstrom, Hans Hedbom and Erland Jonsson.
  Implementing a Formally Verifiable Security~Protocol in Java Card,
      Engelbert Hubbers, Martijn Oostdijk, Erik Poll
  A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
      Marco Gruteser
  Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
      Axel Schairer
  Optimized Smart Card RISC Architecture for Multiple-Precision Modular Arithmetic 
      Johann Großschaedl, Guy-Armand Kamendje

- working groups that focus on particular problems areas.

The results of the working groups will be presented and discussed 
in panel sessions. The final results will be published together with 
the technical papers in the Lecture Notes Series on Computer Science
(LNCS).


Location:
---------

It will be held at an old former monastery in Boppard, Germany. 
Boppard is a nice small town located in the rhine valley about one hour 
away from Frankfurt airport.


Organisation:
-------------

The conference will be organised jointly by 

- German Information Security Agency  (BSI) 
- German Research Center for Artificial Intelligence  (DFKI) 
- Institute for Telematics, University of Freiburg.


Program Committee		
----------------- 

Michael Beigl (University of Karlsruhe)
Joshua Guttman (MITRE)
Dieter Hutter (DFKI) (co-organiser)
Paul Karger (IBM Watson Research)
Friedemann Mattern (ETH Zurich)
Catherine Meadows (Naval Research Lab)
Guenter Mueller (University of Freiburg) (co-organiser)
Joachim Posegga (SAP)
Kai Rannenberg (University of Frankfurt)
Kurt Rothermel (University of Stuttgart)
Ryoichi Sasaki (Tokyo Denki University)
Frank Stajano (University of Cambridge)
Werner Stephan (DFKI) (co-organiser)
Moriyasu Takashi (Hitachi Ltd)
Seiji Tomita (NTT Information Platform Laboratories)
Markus Ullmann (BSI) (co-organiser)