[Pl-seminar] Second NJITES Cybersecurity Symposium, April 28 2003
Dominic Duggan
dduggan at cs.stevens-tech.edu
Fri Apr 18 09:31:44 EDT 2003
Second NJITES Symposium on
Cybersecurity and Trustworthy Software
Monday, April 28, 2003
Stevens Institute of Technology
Hoboken, New Jersey, USA
*Early registration deadline: Wednesday April 23*
Symposium web site: http://www.njites.org/Symposium/
E-mail inquiries: njites-symposium at cs.stevens-tech.edu
Register for future announcements:
http://guinness.cs.stevens-tech.edu/mailman/listinfo/njites-announce
This symposium brings together researchers and practitioners, in
government, academia and industry, to discuss problems and possible
solutions in cyber security, both for e-commerce and for homeland
security. A particular emphasis of the symposium is to bring together
those interested in communications security and in end-to-end
security.
8:30-9:15 Registration and breakfast
9:15 Opening remarks
9:30-10:30 Keynote talk: Computer Security.
Ed Felten, Princeton University.
10:30-11:00 Coffee break.
11:00-11:30 Cryptology and non-computer security.
Matt Blaze, AT&T Labs-Research.
11:30-12:00 Privacy-protecting statistics computation:
theory and practice.
Rebecca Wright, Stevens Institute of Technology.
12:00-12:30 Flexible Regulation of Distributed Coalitions.
Naftaly Minsky, Rutgers University.
12:30-2:00 Lunch.
2:00-3:00 Keynote talk: Toward fixing the "compliance defects"
of public key cryptography.
Michael Reiter, Carnegie Mellon University.
3:00-3:30 Coffee break.
3:30-4:00 Dependent session types for safety
in distributed communications.
Adriana Compagnoni, Stevens Institute of Technology.
4:00-4:30 Improving security with distributed cryptography.
Tal Rabin, IBM Hawthorne Research.
4:30-5:00 Type-Based Distributed Access Control.
Tom Chothia, Stevens Institute of Technology.
5:00 Concluding remarks.
More information about the pl-seminar
mailing list