NetSec
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
November 2004
- 2 participants
- 2 discussions
#####################################
# #
# PRIMA 2005 #
# EINREICHUNGSZEITRAUM VERLÄNGERT #
# #
# ABSTRACTS: 17. Dezember 2004 #
# BEITRÄGE: 7. Januar 2005 #
# #
#####################################
Privacy Respecting Incident Management
PRIMA 2005
Workshop der GI-fachgruppen SIDAR und PET
6. April 2005
Regensburg, Deutschland
http://www.gi-fg-sidar.de/prima2005
mailto:prima2005{at}gi-fg-sidar.de
Die GI Fachgruppen SIDAR (Reaktive Sicherheit) und PET
(Datenschutzfördernde Technik) laden zur Einreichung von Beiträgen ein
über die Wechselbeziehungen von
-Datenschutz und
-Aspekten der reaktiven Sicherheit wie z.B.
-Intrusion Detection,
-Incident Management und
-Forensik.
Detaillierte Informationen finden Sie unten im Call for Papers und auf
der Web-Seite: http://www.gi-fg-sidar.de/prima2005
----------------------------------------------------------------------
F I N A L C A L L F O R P A P E R S
----------------------------------------------------------------------
Privacy Respecting Incident Management
PRIMA 2005
6. April 2005
Regensburg, Deutschland
Satelliten-Workshop der Fachgruppen SIDAR und PET
im Rahmen der 2. Jahrestagung des
Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.
http://www.gi-fg-sidar.de/prima2005
mailto:prima2005{at}gi-fg-sidar.de
----------------------------------------------------------------------
Der Workshop greift reaktive Themen der IT-Sicherheit wie Intrusion
Detection, Incident Management und Forensik auf und untersucht, ob
diese Technologien mit den technischen und rechtlichen Zielstellungen
des modernisierten Datenschutzes vereinbar sind, ohne dabei andere
juristische oder organisatorische Anforderungen beispielsweise aus dem
Bereich des betrieblichen Mitbestimmungsrechts oder der
Strafverfolgung unangemessen zu beschneiden. Im interdisziplinären
Diskurs sollen die verschiedenen Perspektiven beleuchtet und sowohl
der Stand der Technik als auch neue Entwicklungen kommentiert sowie
die Implikationen für zukünftige Konzepte und Implementierungen
aufgezeigt werden.
Nach einem Überblick aus technischer und juristischer Sicht steht die
gemeinsame Entwicklung von rechtlich zulässigen und gleichermaßen
praxistauglichen Lösungen im Mittelpunkt. Damit verbundene, neue
Forschungsfragen sollen herausgearbeitet werden.
Das Programmkomitee lädt ein zur Einreichung von Beiträgen, die unter
anderem (aber nicht ausschließlich) folgende Gesichtspunkte behandeln:
1) Überblick über
- den Stand der Technik und die
- Initiativen zur Standardisierung und Zertifizierung
im Bereich von Technologien und Maßnahmen wie
- Entdeckung von Schutzzielverletzungen (Intrusion Detection),
- Entdeckung von Agenten mit Schadensfunktion (Malware),
- Ermittlung von Verwundbarkeiten (Vulnerability Assessment),
- Vorfallsmeldungen/Sicherheitswarnungen durch Hersteller/CERTS,
- Sicherung und Analyse von Datenspuren (Honeypots, Forensics) oder
- Datenbestandssicherung (Backup).
Diese Beiträge sollen insbesondere erläutern, welche
personenbezogenen Daten anfallen und wie sie verarbeitet werden.
2) Überblick über die juristischen Grundlagen im nationalen oder
internationalen Kontext im Hinblick auf die Erhebung und
Verarbeitung personenbezogener Daten insbesondere im Bereich
- des Datenschutzes,
- der betrieblichen Mitbestimmung,
- der Strafverfolgung und
- der inneren Sicherheit.
3) Möglichkeiten und Implikationen einer datenschutzfreundlichen
Gestaltung der unter 1) aufgeführten Technologien, indem Maßnahmen
für ein größtmögliches Maß an Datensparsamkeit durch z.B.
- vollständige Vermeidung
oder frühestmögliche
- Anonymisierung,
- Pseudonymisierung,
- Aggregation oder
- (ggf. automatisierter) Löschung
von personenbezogenen Daten realisiert werden oder durch
eine nutzerfreundliche Gestaltung.
4) Organisatorische und juristische Implikationen bei der
datenschutzgerechten Nutzung bzw. Durchführung der unter 1)
genannten Technologien bzw. Maßnahmen, z.B.
- Rechte und Pflichten von Dienstanbietern und Administratoren
(u.a. Haftungsfragen, Vertragsgestaltung),
- Umgang mit Anfragen ermittelnder Behörden,
- gerichtliche Verwertbarkeit von Datenspuren,
- Präzedenzurteile.
FORMALIA
--------
Jeder Beitrag wird von mindestens drei Gutachtern bewertet.
Angenommene Beiträge werden auf dem Workshop präsentiert und
diskutiert. Es ist vorgesehen, die Beiträge nach Einarbeitung der
Ergebnisse des Workshops in einem Themenheft der Zeitschrift
"DuD - Datenschutz und Datensicherheit" zu veröffentlichen.
Beiträge können in deutscher oder in englischer Sprache verfasst
werden und sollen 4-14 Seiten umfassen.
Instruktionen zur Einreichung von Beiträgen:
http://www.gi-fg-sidar.de/prima2005/
TERMINE
-------
17. Dezember 2004: Einreichung der Abstracts
07. Januar 2005: Einreichung der Beiträge
07. Februar 2005: Benachrichtigung der Autoren über die Annahme
06. April 2005: Workshop
29. April 2005: Abgabe der endgültigen Beiträge
TAGUNGSLEITUNG
--------------
Ulrich Flegel, Universität Dortmund,
Fachbereich Informatik, LS6 - Informationssysteme und Sicherheit,
D-44221 Dortmund
Tel.: +49-231-755-4775, ulrich.flegel{at}udo.edu
Marit Hansen, Unabhängiges Landeszentrum für Datenschutz
Schleswig-Holstein,
Holstenstraße 98, D-24103 Kiel
Tel.: +49-431-988-1214, marit.hansen{at}datenschutzzentrum.de
Michael Meier, Brandenburgische Technische Universität Cottbus,
Institut für Informatik, Lehrstuhl Rechnernetze,
Postfach 10 13 44, D-03013 Cottbus
Tel.: +49-355-69-2028, mm{at}informatik.tu-cottbus.de
LOKALE ORGANISATION
-------------------
Hannes Federrath, Thomas Nowey, Klaus Plößl,
Universität Regensburg, Institut für Wirtschaftsinformatik,
93040 Regensburg
Tel.: +49-941-943-2870, Fax: -2888
PROGRAMMKOMITEE
---------------
Johann Bizer (ULD Schleswig-Holstein)
Roland Büschkes (T-Mobile)
Alexander Dix (LfD Brandenburg)
Dieter Ermer (LfD Bayern)
Walter Ernestus (BfD)
Hannes Federrath (Uni Regensburg)
Christoph Fischer (BFK edv-consulting GmbH)
Simone Fischer-Hübner (Uni Karlstad, Schweden)
Ulrich Flegel (Uni Dortmund)
Sandra Frings (Fraunhofer IAO)
Jens Gruhl (Staatsanwaltschaft Konstanz)
Marit Hansen (ULD Schleswig-Holstein)
Jürgen Hauber (LKA Baden-Württemberg)
Hanns-Wilhelm Heibey (LfD Berlin)
Klaus Julisch (IBM Research Zürich)
Stefan Kelm (Secorvo Security Consulting GmbH)
Dogan Kesdogan (RWTH Aachen)
Klaus-Peter Kossakowski (Presecure Consulting GmbH)
Christopher Krügel (UCSB, Kalifornien)
Norbert Luttenberger (Universität Kiel)
Dietmar Mauersberger (LKA Bayern)
Michael Meier (BTU Cottbus)
Ralf Moll (Kriminalpolizei Heilbronn)
Jens Nedon (ConSecur GmbH)
Hartmut Pohl (FH Bonn-Rhein-Sieg)
Kai Rannenberg (Uni Frankfurt a.M.)
Peer Reymann (Uni Hamburg / ITQS GmbH)
Dirk Schadt (Computer Associates)
Uwe Schläger (Datenschutz Nord GmbH)
Wolfgang Schreiber (BKA)
Gabriel Schulz (LfD Mecklenburg-Vorpommern)
Martin Seeger (NetUSE AG)
VERANSTALTER
------------
Die Fachgruppen SIDAR und PET der
Gesellschaft für Informatik e.V. (GI)
Wissenschaftszentrum, Ahrstraße 45; D-53175 Bonn
Tel.: +49-228-302-145; Fax: +49-228-302-167
http://www.gi-ev.de
--
Ulrich Flegel | Voice: +49 231 755-4775 (secretary: -2641)
Computer Science Dpt. | Fax : +49 231 755-2405
Chair VI, ISSI | Email: ulrich.flegel(a)udo.edu
University of Dortmund | WWW: http://ls6-www.cs.uni-dortmund.de/~flegel/
D-44221 Dortmund | office: Universität Dortmund, Campus Süd, GB V/R431
Germany | August-Schmidt-Strasse 12, D-44227 Dortmund
1
0
----------------------------------------------------------------------------
---
CALL FOR PAPERS
DIMVA 2005
Second GI SIG SIDAR Conference on
Detection of Intrusions & Malware, and Vulnerability Assessment
In Cooperation with the IEEE Task Force on Information Assurance
Vienna, Austria
July 7 - 8, 2005
http://www.dimva.org/dimva2005
mailto:info@dimva.org
----------------------------------------------------------------------------
---
The special interest group Security - Intrusion Detection and Response
(SIDAR)
of the German Informatics Society (GI) organizes DIMVA as an annual
conference
that brings together experts from throughout Europe to discuss the state of
the
art in the areas of intrusion detection, detection of malware, and
assessment
of vulnerabilities. DIMVA emphasizes the collaboration and exchange of ideas
between industry, academia, law enforcement and government, and invites four
types of submissions:
- Full papers of up to 6000 words, presenting novel and mature research
results.
Full papers will be reviewed, and papers accepted for presentation at the
conference will be included in the proceedings, which are planned to
appear in
Springers Lecture Notes in Computer Science (LNCS) series.
- Industry papers of up to 2000 words, describing best practices, case
studies,
lessons learned, or latest product developments. Industry papers will be
reviewed and, if accepted for presentation at the conference, will be
published
at the DIMVA 2005 Web site.
- Panel proposals for the discussion of hot topics in the areas of intrusion
detection, malware, or vulnerability assessment. Panel proposals should
include a short rationale for the panel, a description of the proposed
panel
format, and names of panelists.
- Proposals of two-to-three-hour tutorials on topics of current or emerging
interest. Tutorial proposals must not exceed three pages. They must
clearly
identify the intended audience, include a brief biography of the speaker,
and
contain enough material to provide a sense of their scope and depth.
Tutorial
material will be published on the DIMVA 2005 Web site.
The scope of DIMVA is broad and includes, but is not restricted to the
following
areas:
Intrusion detection:
- Novel intrusion detection and correlation techniques such as alert fusion
or
honey pots
- Intrusion detection in special environments such as control systems or
mobile
networks
- Assessment, testing, and benchmarking of intrusion detection systems
- Automated response systems and intrusion prevention systems
- Incident management and response, response team cooperation, and legal
issues
Malware:
- Detection and prevention of viruses, worms, Trojan horses, and other forms
of
malware
- Malware trends and statistics
- Techniques used to increase the harmfulness of malware
- Detailed analysis and discussion of the latest malware as well as computer
and network forensics in general
Vulnerability assessment:
- New reverse engineering techniques
- Circumvention of security mechanisms such as bypassing of buffer overflow
protection
- Risk evaluation and weighing, ROI on vulnerability assessments and
management
- Software development, testing, and verification methodologies for
IT-security
DIMVA specifically encourages interdisciplinary papers that combine elements
from
all three main areas, as well as papers from other communities such as
machine
learning, law, crime detection & investigation, or economics that present
these
communities perspectives on and contributions to the above IT security
issues.
ORGANIZING COMMITTEE:
---------------------
General Chair: Christopher Kruegel (Technical University Vienna, Austria,
chris(a)cs.ucsb.edu)
Academic Chair: Klaus Julisch (IBM Research, Switzerland,
dimva-chair(a)zurich.ibm.com)
Industry Chair: Marc Heuse (n.runs, Germany, marc.heuse(a)nruns.com)
Sponsor Chair: Werner Metterhausen (VZM GmbH, Germany, wme(a)vzm.de)
PROGRAM COMMITTEE:
------------------
Dominique Alessandri, IBM, Switzerland
Thomas Biege, SUSE LINUX AG, Germany
Roland Büschkes, T-Mobile, Germany
Marc Dacier, Institut Eurécom, France
Herve Debar, France Telecom R&D, France
Luca Deri, ntop.org, Italy
Sven Dietrich, CMU, USA
Toralv Dirro, McAfee, Germany
Ulrich Flegel, University of Dortmund, Germany
Steven Furnell, University of Plymouth, UK
Detlef Günther, CERT-VW, Germany
Dirk Häger, BSI, Germany
Bernhard Hämmerli, HTA Luzern, Switzerland
Oliver Heinz, arago AG, Germany
Peter Herrmann, University of Dortmund, Germany
Marc Heuse, n.runs, Germany
Erland Jonsson, Chalmers University of Technology, Sweden
Engin Kirda, Technical University Vienna, Austria
Hartmut König, Technical University of Cottbus, Germany
Klaus-Peter Kossakowski, Presecure, Germany
Hannes Lubich, Computer Associates, Switzerland
Michael Meier, Technical University of Cottbus, Germany
Martin Naedele, ABB Corporate Research, Switzerland
Marc Rennhard, ETH Zurich, Switzerland
Dirk Schadt, Computer Associates, Germany
Robin Sommer, TU München, Germany
Axel Tanner, IBM Research, Switzerland
Stephen Wolthusen, Fraunhofer-IGD, Germany
IMPORTANT DATES:
----------------
- January 21, 2005: Deadline for submission of full and industry papers.
- March 4, 2005 : Deadline for submission of panel and tutorial proposals.
- March 21, 2005 : Notification of acceptance or rejection.
- April 8, 2005 : Final paper camera ready copy due.
- July 7 - 8, 2005: DIMVA conference.
PAPER SUBMISSIONS AND CONFERENCE REGISTRATION:
----------------------------------------------
Submitted full papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a conference
with
proceedings. Full papers must include an abstract, a list of keywords, and a
list of all authors and their affiliations. Committee members are not
required
to read appendices; thus, papers should be intelligible without them.
Submissions must be in English, and in either postscript or PDF format.
Authors
of accepted papers must guarantee that their papers will be presented at the
conference. Plan to give presentations, panels, and tutorials in English.
Authors are invited to submit their papers electronically. Details on the
electronic submission procedure as well as detailed registration information
(including fees, suggested hotels, and travel directions) will be provided
by
end of December 2004 at the conference Web site at
http://www.dimva.org/dimva2005.
SPONSORSHIP OPPORTUNITIES:
--------------------------
We solicit interested organizations to serve as sponsors for DIMVA 2005;
please
contact the Sponsor Chair, Mr. Werner Metterhausen, for information
regarding
corporate sponsorship (mailto: wme(a)vzm.de)
STEERING COMMITTEE:
-------------------
Chairs: Ulrich Flegel (University of Dortmund, Germany),
Michael Meier (Technical University of Cottbus, Germany)
Roland Büschkes (T-Mobile, Germany),
Marc Heuse (n.runs, Germany)
1
0