Call for Participation - 2nd International Conference on Pervasive Computing
================================================== Second International Conference on Security in Pervasive Computing (SPC-2005) April 6 - 8, 2005 in Boppard, Germany http://www.spc-conf.org =================================================== The ongoing compression of computing facilities into small and mobile devices like handhelds, portables or even wearable computers will enhance an ubiquitous information processing. The basic para- digm of such a pervasive computing is the combination of strongly decentralized and distributed computing with the help of diversified devices allowing for spontaneous connectivity via the internet. Computers will become invisible to the users awareness and exchange of information between devices will effectively defy users control. The objective of this conference is to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, and smart labels hand in hand with the emerg- ing technology of ubiquitous and pervasive computing. Particular subjects are methods and technology concerning the identification of risks, the definition of security policies, and the development of security measures that are related to the specific aspects of ubiquitous and pervasive computing like mobility, communication, and secure hardware/software platforms. Organisation: ----------------- The conference is organised jointly by the German Information Security Agency (BSI) and the German Research Center for Artificial Intelligence (DFKI) The conference will take place in an old former monastery in Boppard, Germany. Boppard is a nice small town located in the rhine valley about one hour away from Frankfurt airport. The conference fee of 400 Euro (full time students 300 Euro) covers the accomodation (single rooms) for 3 nights (April 6-8, 2005), all meals and refreshments, conference dinner and Springer LNCS conference proceedings. Registration is available at http://www.spc-conf.org Program Committee ----------------- N. Asokan, Nokia Research Michael Beigl University of Karlsruhe, Germany Sonja Buchegger, EPFL-IC-LCA, Switzerland Dieter Hutter, DFKI Saarbruecken, Germany Ari Juels, RSA Lab, USA Paul Karger, IBM Watson Research, USA Dennis Kuegler, BSI, Bonn, Germany Catherine Meadows, Naval Research Lab, USA Takashi Moriyasu, Hitachi Ltd, Japan Guenter Mueller, University of Freiburg, Germany Panos Papadimitratos, Cornell University, USA Joachim Posegga, University of Hamburg, Germany Yves Roudier, Institut Eurecom, France Andrei Serjantov, The Free Haven Project, United Kingdom Frank Stajano, Cambridge University, United Kingdom Werner Stephan, DFKI Saarbruecken, Germany Seiji Tomita, NTT Information Platform Laboratories, Japan Markus Ullmann, BSI, Bonn, Germany Program Co-Chairs ----------------- Dieter Hutter, DFKI Saarbruecken, Germany Markus Ullmann, BSI, Bonn, Germany Programme: ---------- Invited talks: -------------- Pervasive Computing - A Case for the Precautionary Principle? Lorenz Hilty, Swiss Federal Laboratories for Materials Testing and Research (EMPA) Security Issues for Mobile ad hoc Networks, Panagiotis Papadimitratos, Virginia Tech Security Concept of the EU-Passport, Dennis Kuegler, BSI Electronic Product Code, Frederic Thiesse, University of St. Gallen Security Issues of Mobile Devices, Claudia Eckert, Technical University of Darmstadt and FhG Technical papers ---------------- TENeT: A Framework for Distributed Smartcards. Masayuki Terada et al. P2P digital value fair trading system using smart cards. Masayuki Hanadate et al. Devices are People Too: Using Process Patterns to Elicit Security Requirements in Novel Domains: a ubiquitous healthcare example. Yang Liu, John A. Clark, and Susan Stepney Secure identity management for pseudo-anonymous service access. Michael Hitchens, Judy Kay, Bob Kummerfeld, and Ajay Brar Security issues in pervasive personalised assistance enhancing communication, Bertin Klein, Sandra Zilles, and Tristran Miller Safeguards in a World of Ambient Intelligence: Outline of a research agenda on the European Level. Michael Friedewald Challenge-Response based RFID Authentication Protocol for Distributed Database Environment. Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks,. Stefaan Seys and Bart Preneel Ephemeral Pairing on Anonymous Networks. Jaap-Henk Hoepman Exploiting Empirical Engagement in Authentication Protocol. Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, and Irfan Zakiuddin. Supporting Dynamically Changing Authorizations in Pervasive Communication Systems, Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, and Roy H. Campbell. Look who's talking ? Authenticating Service Access Points, Adolf Hohl, Lutz Lowis, and Alf Zugenmaier Privacy for Profitable Location Based Services, Lothar Fritsch, Markulf Kohlweiss, Tobias Koelsch, and Dogan Kesdogan On the Anonymity of Periodic Location Samples, Marco Gruteser and Baik Hoh A Theorem Proving Approach to Analysis of Secure Information Flow, Adam Darvas, Reiner Haehnle, and Dave Sands An Efficient Access Control Model for Mobile Ad-hoc Communities, Sye Loong Keoh and Emil Lupu TrustAC: Trust-Based Access Control for Pervasive Devices, Florina Almenarez, Andres Maren, Celeste Campo, and Carlos Garcea R.
participants (1)
-
Dieter Hutter