(DBWORLD) IFIP WG 11.3 Working Conference on Database Security

David Spooner (spoonerd@cs.rpi.edu)
Mon, 6 Jan 1997 22:28:23 -0600 (CST)

CALL FOR PAPERS

Eleventh Annual IFIP WG 11.3 Working Conference
on Database Security

Lake Tahoe, California
August 11-13, 1997

The conference provides a forum for presenting original unpublished
research results, practical experiences, and innovative ideas in
database security. Papers and panel proposals are solicited. Submissions
will be refereed by the members of the Working Group and selected based
on technical merit and their relevance to the aim of the IFIP Working
Group 11.3.

The conference is limited to about forty participants so that ample
time for discussion and interaction may occur. Preliminary conference
proceedings will be distributed to participants; revised papers and an
account of the discussions at the meeting will be published as the next
volume in the "Database Security: Status and Prospects" series.

Instructions for Paper Authors
------------------------------

Authors are invited to submit five copies of their contributions to
one of the program co-chairs. Manuscripts must be in English, typed in
double spaced format in 12 point font, and not more than 5000 words. Each
copy should have a cover page with title, name and addresses (including
e-mail address) of authors, and an abstract of no more than 200 words.
Electronic or fax submissions will not be accepted.

Panel Proposals
---------------

Proposals for panels should be sent to one of the program co-chairs.
Proposals should include a one-page description of the subject matter,
the name and address (including e-mail address) of the organizer, and a
list of proposed panelists. Electronic submissions are preferred.

Program Co-Chairs:

T. Y. Lin Xiaolei Qian
Dept. Math and Computer Sci Computer Science Laboratory
San Jose State University SRI International
129 S. 10th St, 333 Ravenswood Ave,
San Jose, CA 95192 Menlo Park, CA 94025
Tel: 408-924-5121 Tel: 415-859-2358
Fax: 408-924-5080 Fax: 415-859-2844
E-mail:tylin@cs.sjsu.edu E-mail:qian@csl.sri.com

Important Dates
---------------

Submissions must be received by: March 10, 1997
Notification of acceptance/rejection: May 20, 1997
Final papers in camera-ready form due: July 1, 1997

Conference Organizers
---------------------

General Chair:
Teresa F. Lunt
DARPA/ITO

Program Co-Chairs:
T. Y. Lin Xiaolei Qian
SJSU, UC-Berkeley SRI International

IFIP WG 11.3 Chair:
David L. Spooner
Rensselaer Poly. Inst.

More information about the conference and about IFIP WG 11.3 can be found
at URL: http://www.cs.rpi.edu/ifip/

Summary of IFIP WG 11.3 Issues
------------------------------

1. What are good techniques for describing the various factors involved
in designing secure database systems, such as:

Security and privacy policies or policy requirements

Threats to security

Costs/benefits of meeting security and privacy requirements (or risks
of not meeting them)?

What relationships should exist between these descriptions and those
already associated with database systems, such as queries, views and
schemes?

2. What are good methodologies for:

Obtaining these descriptions

Using them in developing secure database systems (including associated
applications)

Determining with high assurance that the implemented systems are
consistent with their descriptions and specifications?

3. What are the security issues associated with the organization of
components (architectures) of database systems, such as networked systems
(e.g., WWW), client/server architectures, and layered/modular internal
system architectures? How does the integration, interconnection, and
interpretation of heterogeneous database systems impact the security of
components and the overall system?

4. What are the interactions and tradeoffs between functionality, performance
and security in various technical features of database systems, such as
query processing, data/object model, integrity maintenance, concurrency
control/recovery facilities, and inference/deduction capabilities?

5. What information can be maintained or generated by a database system
to assist in maintaining security or privacy, and what are good techniques
for using such information, either at run-time or in subsequent analysis,
to detect and discourage security violations?

-------------------------------------------------------------------------------
The dbworld alias reaches many people, and should only be used for
messages of general interest to the database community.

Requests to get on or off dbworld should go to listproc@cs.wisc.edu.

to subscribe send
subscribe dbworld Your Full Name

to unsubscribe send
unsubscribe dbworld

to change your address
send an unsubscribe request from the old address
send a subscribe request from the new address

to find out more options send
help
------------------------------------------------------------------------FOOTER-