PerSec'04

First IEEE International Workshop on Pervasive Computing and Communication Security

www.list.gmu.edu/persec

(held in conjunction with PerCom 2004 http://www.percom.org/)

March 14, 2004


  1. Call for Papers
  2. Workshop Scope
  3. Registration and Hotel
  4. Advance Program

Scope:

Research in pervasive computing and communications continues to gain momentum. However, research in the provision of security and privacy in these environments is still in its infancy. PerSec will provide an international  forum to encourage and present original research ideas and results that address all aspects of security and privacy for pervasive computing.


Registration and Hotel:

Registration is open now at the PerCom homepage.
Author registration deadline ------- 5:00 PM PST Jan. 12th 2004
Early Registration Deadline ------- Feb. 15th 2004
Reserve Hotel


Advance Program:

Session 1: Research Challenges (9:00am - 10:00am)
  • Welcome
  • Trustworthy Pervasive Computing: The Hard Security Problems
    Kumar Ranganathan, Intel Corporation
Coffee Break: 10:00am-10:15am
Session 2: Privacy (10:15am-11:15am)
  • Mix Zones: User Privacy in Location-aware Services
    Alastair Beresford and Frank Stajano, University of Cambridge
  • Untraceable Secret Credentials: Trust Establishment with Privacy
    Laurent Bussard, Yves Roudier, and Refik Molva, Institut Eur´ecom, Corporate Communications
Coffee Break: 11:15am-11:30am
Session 3: RFID (11:30am-12:30pm)
  • Hash-based Enhancement of Location Privacy
    for Radio-Frequency Identification Devices using Varying Identifiers

    Dirk Henrici and Paul Müller, University of Kaiserslautern, Germany
  • "Yoking-Proofs" for RFID Tags
    Ari Juels, RSA Laboratories

Lunch: 12:30pm-1:30pm

Session 4: Context Aware Security (1:30pm-2:30pm)
  • Context-Based Security Policies: A New Modeling Tool
    Patrick Brézillon, Université Paris 6, France, and Ghita Kouadri Mostéfaoui,  University of Fribourg, Switzerland
  • Context-Based Secure Resource Access in Pervasive Computing Environments
    Anand Tripathi, Tanvir Ahmed, Devdatta Kulkarni, Richa Kumar, and Komal Kashiramka, University of Minnesota, USA
Coffee Break: 2:30pm-2:45pm
Session 4(continued): Context Aware Security (2:45pm-3:45pm)
  • Towards Context-aware Security: An Authorization Architecture for Intranet Environments
    Chris Wullems, Mark Looi and Andrew Clark, Queensland University of Technology, Australia
  • Pervasive Authentication Domains for Automatic Pervasive Device Authorization
    Reiner Sailer and James R. Giles, IBM T. J. Watson Research Center

 

Coffee Break: 3:45pm-4:15pm
Session 5: Panel Discussion (4:15pm-5:30pm)
  • Topic: Do we need new security paradigms for pervasive systems?
  • Panel chair: Ravi Sandhu, Geroge Mason University and NSD Security
  • Panelists:
    Ari Juels, RSA Laboratories
    Kumar Ranganathan, Intel Corporation
    Roshan Thomas, McAfee Research, Network Associates
    Anand Tripathi, University of Minnesota