Conference Programme:
The Keynote Speech titled PKI: Views from the Dispassionate "I" will be given by Dr Carlisle Adams.

Carlisle is an Associate Professor in the School of Information Technology and Engineering (SITE) at University of Ottawa. Prior to his academic appointment in 2003, he worked for 13 years in industry (Nortel, Entrust) in the design and standardization of a variety of cryptographic and security technologies for the Internet. His research and technical contributions include the CAST family of symmetric encryption algorithms, secure protocols for authentication and management in Public Key Infrastructure (PKI) environments, and a comprehensive architecture and policy language for access control in electronic networks. He is author or co-author of over 30 papers in refereed journals and conference proceedings, along with 15 technical specifications approved by the international standards bodies IETF, ISO, and OASIS. He is also co-author of Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition (Addison-Wesley, 2003).

Dr. Adams' research interests include all areas of applied cryptography and security, with special emphasis on the security-related aspects of computers, networks, and distributed systems. Particular areas of interest include the design and analysis of symmetric encryption algorithms, the design of large-scale infrastructures for authentication and access control, the design of efficient mechanisms to assess and constrain the trust that must be placed in unknown peers in a network, and the creation of effective techniques to preserve and enhance privacy on the Internet.

EuroPKI 2005 Workshop Programme

 

Wednesday 29 June

6pm - 7pm Registration at Keynes Bar (No.39 on the Campus Map), UKC

7pm Evening reception at Keynes Bar (No.39 on the Campus Map), UKC

Thursday 30 June

8.30am Registration in the box office foyer of Gulbenkian Theatre (ground floor) (No.18 on the Campus Map), UKC

9.00am Conference at Room CGU4, 1st floor of Gulbenkian Theatre (No.18 on the Campus Map)/Cornwallis Building (No.20 on the Campus Map), UKC

9.15am Keynote Speech by Carlisle Adams(Post Script file)

10.30am Coffee Break

11.00 - 12.30 Authorisation.

1.        A Multipurpose Delegation Proxy for WWW Credentials

By Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann(PDF)

 

2.        Secure Role Activation and Authorization in the Enterprise Environment

By Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu(PDF)

 

3.        Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an enhanced OCSP Service Provider into GT4

By Jesus Luna, Manel Medina, Oscar Manso(Power Point Presentation)

 

12.30 - 13.45pm Lunch, Rutherford College (No.28 on the Campus Map)

13.45 - 15.15 Interoperability.

4.        A Heterogeneous Network Access Service based on PERMIS and SAML

By Gabriel L´opez, ´Oscar C´anovas, Antonio F. G´omez-Skarmeta, Sassa Otenko, David Chadwick(Power Point Presentation)

 

5.        Interoperation between a conventional PKI and an ID-based infrastructure

By Geraint Price, Chris J. Mitchell (Power Point Presentation)

 

6.        XKMS Working Group Interoperability Status Report

By Guillermo ´Alvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang

 

15.15 - 15.45 Coffee Break

15.45 Trip to Dover Castle

20.00 - Workshop Banquet

Friday 1 July

9.00 - 10.30  Evaluating a CA

7.        An innovative Policy-based Cross Certification methodology for Public Key Infrastructures

By Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak(Power Point Presentation)

 

8.        Modeling Public Key Infrastructure in the Real World

By John Marchesini, Sean Smith(PDF)

 

9.        Classifying Public Key Certificates

By Javier Lopez, Rolf Oppliger, Gˇ§unther Pernul

 

10.30 - 10.45 Short Break

10.45 - 11.15 ID Based Ring Signatures

10.     Identity Based Ring Signature: Why, How and What Next

By Sherman S.M. Chow, Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu(PDF)

 

11.15 - 11.45 Coffee Break

11.45 - 12.45  Practical Implementations

11.    Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server

By Wensheng Xu, David Chadwick, Sassa Otenko(Power Point Presentation)

 

12.    CA-in-a-Box

By Mark Franklin, Kevin Mitcham, Sean Smith, Joshua Stabiner, and Omen Wild

 

12.45 - 14.00 Lunch, Rutherford College (No.28 on the Campus Map)
14.00 - 15.00 New Protocols

13.    A Lower-bound of Complexity for RSA-based Password-Authenticated Key Exchange

By SeongHan Shin, Kazukuni Kobara, Hideki Imai(PDF)

 

14.    Recoverable and Untraceable E-cash

By Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong(Power Point Presentation)

 

15.00 - 15.15 Short Break

15.15 - 16.15 Risks and Attacks

15.    A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS

By Younggyo Lee, Injung Kim, Seungjoo Kim, Dongho Won(Power Point Presentation)

 

16.    Installing Fake Root Keys in a PC

By Adil Alsaid, Chris J. Mitchell(Power Point Presentation)

 

16.15 - 16.45 Coffee Break

16.45 - 17.45 Long term Archiving

17.    Provision Of Long-Term Archiving Service For Digitaly Signed Documents Using Archive Interaction Protocol

By Aleksej Jerman Blazic, Peter Sylvester(PDF)

 

18.    Legal Security for Transformations of Signed Documents: Fundamental Concepts

By Andreas U. Schmidt, Zbynˇ¦ek Loebl(Power Point Presentation)

 

19.00 Dinner

 

Saturday 2 July

10.00. Optional guided tour of Canterbury Cathedral