|
Timetable
Thursday 16th September 2004
8.50-9.00
|
Introduction
|
9.00-10.00
|
Keynote Presentation by Karl-Heinz Brandenburg
(Click to see biography)
Digital Rights Management: Security and/or User Acceptance ?
Secure Envelope technologies for transmitting multimedia data to end customers have now been around since ten years. With all the effort going into modern Digital Rights Management (DRM) systems, some questions are still unanswered:
- - What is "secure enough" for transmitting and storing valuable content ?
- - What is "easy enough" so that we can keep honest people honest ?
- - Where is the best tradeoff between honoring fair use rights and avoiding large spread piracy ?
DRM techniques more and more work from a large puzzle of basic concepts like watermarking, encryption for secure envelopes, authentication of both the absence of tampering with the content and of users, concepts of local usage areas, super distribution and more. From these ingredients, there are a lot of different, mostly incompatible systems in the market and under preparation to enter the market.
The talk will look into some of the alternatives including the requirements work done by the Secure Digital Music Initiative (SDMI), talk about currently available solutions and focuse on some of the work at Fraunhofer (IIS and IDMT) in Erlangen.
|
|
|
Session
1: Privacy/Anonymity
|
“DUO-Onions
and Hydra-Onions - failure and adversary resistant onion protocols” Jan Iwanik, Marek Klonowski and
Miroslaw Kutylowski
|
“Personal Attributes and Privacy” Howard
Chivers
|
|
|
Session
2:
Mobile
Security 1
|
“Local management of
credits and debits in mobile ad hoc networks” Fabio Martinelli,
Marinella Petrocchi, Anna Vaccarelli
|
“How Secure are Current
Mobile Operating Systems?” Heiko Rossnagel, Tobias Murmann
|
“An Overview of Security
Issues and Techniques in Mobile Agents” Mousa Alfalayleh and Ljiljana
Brankovic
|
|
|
Session 3:
Mobile Security 2
|
“An Asymmetric
Cryptography Secure Channel Protocol For Mutli-Application Smart Cards”
Konstantinos Markantonakis, Keith Mayes
|
“Mobile Trust
Negotiation” Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons,
and Charles D. Knutson
|
“Weak Context
Establishment Procedure for Mobility Management and Multi-Homing” Vesa
Torvinen and Jukka Ylitalo
|
Friday 17th September 2004
Session 4:
Security in Microsoft .Net
|
“A Generic Architecture for Web Applications to Support Threat Analysis
of Infrastructural Components” Lieven Desmet, Bart Jacobs, Frank
Piessens, and Wouter Joosen
|
“Threat
Modelling for Web Services Based Web Applications” Lieven Desmet, Bart
Jacobs, Frank Piessens, and Wouter Joosen
|
“Thread
Modelling For ASP.NET” Rudiger Grimm and Henrik Eichstadt
|
“Threat
Modelling for SQL Servers” E.Bertino, D.Bruschi, S.Franzoni,
I.Nai-Fovino, and S.Valtolina
|
“Thread
Modelling for Active Directory” David
Chadwick
|
“Thread
Modelling for Security Tokens in Web Applications” Danny De Cock, Karel
Wouters, Dries Schellekens, Dave Singelee, and Bart Preneel
|
|
|
Session 5: Cryptography
|
“Analysis of the DVB
Common Scrambling Algorithm” Ralf-Philipp Weinmann, Kai Wirt
|
“An Extension of Typed
MSR for Specifying Esoteric Protocols and their Dolev-Yao Intruder” Theodoros
Balopoulos, Stephanos Gritzalis
|
|
|
Session 6: Multimedia Security
|
“Robust Visual Hashing
Using JPEG2000” Roland Norcen and Andreas Uhl
|
“A System For End-To-End
Authentication Of Adaptive Multimedia Content” Takashi Suzuki, Zulfikar
Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain
|
|
|
Session
7: Application Level Security
|
“Using SAML To Link The
Globus Toolkit To The PERMIS Authorisation Infrastructure” D.Chadwick,
O.Otenko, V. Welch
|
“Secure Role Based Messaging”.
D.W.Chadwick, G.Zhao, G.Lunt
|
“Five non-technical
pillars of Network Information Security Management” E. Kritzinger and
S.H von Solms
|
Saturday 18th September 2004
There will be a
choice of scenic walks with a packed lunch. The plans will depend on
suitable weather conditions as the weather in the Lake District is very
changeable.
The easy walk will
be around Lakes Grasmere and Rydal Water. These are some of the most
tranquil places in the Lake District and (particularly Rydal Water)
provided much of the inspiration for the poetry of William Wordsworth.
The walk will require good stout walking shoes, but is not particularly
challenging physically. Waterproof clothing is a must (Kagoul or
similar), and a small backpack will be needed for extra clothes, food
and drink.
The more strenuous
walk will be up Helvellyn (950m.). One of the larger peaks in the lake
district, this walk is quite demanding and can present a challenge in
places, where scrambling over rocks will be required. One reaching the
top in clear weather, the views are magnificent and well worth the
climb. It is advisable to wear walking boots or shoes that provide
ankle support. Waterproof clothing is essential, as is additional
clothing. The best strategy is to carry about three layers of thin
clothing (e.g. T-shirt, thin jumper, and fleecy jacket) that can be put
on or removed as required, in addition to a kagoul or similar
waterproof layer. Loose comfortable trousers are advisable, such as
corduroy, or Rohan type trousers, and should be made from synthetic fibres.
Denim should not be worn as this can be quite restrictive and can
absorb water and produce a strong refrigeration effect in the wind.
(Pictures to be added shortly.)
|