IFIP home page
Eighth IFIP TC-6 TC-11
Conference on Communications
and Multimedia Security
Truetrust Limited home page

Home
Program Committee
Important Dates
Call For Papers
Instructions for Authors
Conference Program
Conference Venue
Registration
Accommodation
News
Contacts
Organising Committee

Timetable

Thursday 16th September 2004

8.50-9.00

Introduction

9.00-10.00

Keynote Presentation by Karl-Heinz Brandenburg
(Click to see biography)

Digital Rights Management: Security and/or User Acceptance ?

Secure Envelope technologies for transmitting multimedia data to end customers have now been around since ten years. With all the effort going into modern Digital Rights Management (DRM) systems, some questions are still unanswered:

  • - What is "secure enough" for transmitting and storing valuable content ?
  • - What is "easy enough" so that we can keep honest people honest ?
  • - Where is the best tradeoff between honoring fair use rights and avoiding large spread piracy ?

DRM techniques more and more work from a large puzzle of basic concepts like watermarking, encryption for secure envelopes, authentication of both the absence of tampering with the content and of users, concepts of local usage areas, super distribution and more. From these ingredients, there are a lot of different, mostly incompatible systems in the market and under preparation to enter the market.

The talk will look into some of the alternatives including the requirements work done by the Secure Digital Music Initiative (SDMI), talk about currently available solutions and focuse on some of the work at Fraunhofer (IIS and IDMT) in Erlangen.

 

 

Session 1: Privacy/Anonymity

“DUO-Onions and Hydra-Onions - failure and adversary resistant onion protocols” Jan Iwanik, Marek Klonowski and Miroslaw Kutylowski

Personal Attributes and Privacy” Howard Chivers

 

 

Session 2:

Mobile Security 1

“Local management of credits and debits in mobile ad hoc networks” Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli

“How Secure are Current Mobile Operating Systems?” Heiko Rossnagel, Tobias Murmann

“An Overview of Security Issues and Techniques in Mobile Agents” Mousa Alfalayleh and Ljiljana Brankovic

 

 

Session 3:

Mobile Security 2

“An Asymmetric Cryptography Secure Channel Protocol For Mutli-Application Smart Cards” Konstantinos Markantonakis, Keith Mayes

“Mobile Trust Negotiation” Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons, and Charles D. Knutson

“Weak Context Establishment Procedure for Mobility Management and Multi-Homing” Vesa Torvinen and Jukka Ylitalo

Friday 17th September 2004

Session 4:

Security in Microsoft .Net

A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components” Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen

“Threat Modelling for Web Services Based Web Applications” Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen

“Thread Modelling For ASP.NET” Rudiger Grimm and Henrik Eichstadt

“Threat Modelling for SQL Servers” E.Bertino, D.Bruschi, S.Franzoni, I.Nai-Fovino, and S.Valtolina

“Thread Modelling for Active Directory”  David Chadwick

“Thread Modelling for Security Tokens in Web Applications” Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelee, and Bart Preneel

 

 

Session 5: Cryptography

“Analysis of the DVB Common Scrambling Algorithm” Ralf-Philipp Weinmann, Kai Wirt

“An Extension of Typed MSR for Specifying Esoteric Protocols and their Dolev-Yao Intruder” Theodoros Balopoulos, Stephanos Gritzalis

 

 

Session 6: Multimedia Security

“Robust Visual Hashing Using JPEG2000” Roland Norcen and Andreas Uhl

“A System For End-To-End Authentication Of Adaptive Multimedia Content” Takashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain

 

 

Session 7: Application Level Security

“Using SAML To Link The Globus Toolkit To The PERMIS Authorisation Infrastructure” D.Chadwick, O.Otenko, V. Welch

 “Secure Role Based Messaging”. D.W.Chadwick, G.Zhao, G.Lunt

“Five non-technical pillars of Network Information Security Management” E. Kritzinger and S.H von Solms

Saturday 18th September 2004

There will be a choice of scenic walks with a packed lunch. The plans will depend on suitable weather conditions as the weather in the Lake District is very changeable.

The easy walk will be around Lakes Grasmere and Rydal Water. These are some of the most tranquil places in the Lake District and (particularly Rydal Water) provided much of the inspiration for the poetry of William Wordsworth. The walk will require good stout walking shoes, but is not particularly challenging physically. Waterproof clothing is a must (Kagoul or similar), and a small backpack will be needed for extra clothes, food and drink.

The more strenuous walk will be up Helvellyn (950m.). One of the larger peaks in the lake district, this walk is quite demanding and can present a challenge in places, where scrambling over rocks will be required. One reaching the top in clear weather, the views are magnificent and well worth the climb. It is advisable to wear walking boots or shoes that provide ankle support. Waterproof clothing is essential, as is additional clothing. The best strategy is to carry about three layers of thin clothing (e.g. T-shirt, thin jumper, and fleecy jacket) that can be put on or removed as required, in addition to a kagoul or similar waterproof layer. Loose comfortable trousers are advisable, such as corduroy, or Rohan type trousers, and should be made from synthetic fibres. Denim should not be worn as this can be quite restrictive and can absorb water and produce a strong refrigeration effect in the wind.

(Pictures to be added shortly.)


Info-CMS2004@salford.ac.uk