Carlisle is an Associate Professor in the School of Information Technology and Engineering (SITE) at University of Ottawa. Prior to his academic appointment in 2003, he worked for 13 years in industry (Nortel, Entrust) in the design and standardization of a variety of cryptographic and security technologies for the Internet. His research and technical contributions include the CAST family of symmetric encryption algorithms, secure protocols for authentication and management in Public Key Infrastructure (PKI) environments, and a comprehensive architecture and policy language for access control in electronic networks. He is author or co-author of over 30 papers in refereed journals and conference proceedings, along with 15 technical specifications approved by the international standards bodies IETF, ISO, and OASIS. He is also co-author of Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition (Addison-Wesley, 2003).
Dr. Adams' research interests include all areas of applied cryptography and security, with special emphasis on the security-related aspects of computers, networks, and distributed systems. Particular areas of interest include the design and analysis of symmetric encryption algorithms, the design of large-scale infrastructures for authentication and access control, the design of efficient mechanisms to assess and constrain the trust that must be placed in unknown peers in a network, and the creation of effective techniques to preserve and enhance privacy on the Internet.
EuroPKI 2005 Workshop Programme
Wednesday 29 June
6pm - 7pm Registration at Keynes Bar (No.39 on the Campus Map), UKC
7pm Evening reception at Keynes Bar (No.39 on the Campus Map), UKC
Thursday 30 June
8.30am Registration in the box office foyer of Gulbenkian Theatre (ground floor) (No.18 on the Campus Map), UKC
9.00am Conference at Room CGU4, 1st floor of Gulbenkian Theatre (No.18 on the Campus Map)/Cornwallis Building (No.20 on the Campus Map), UKC
9.15am Keynote Speech by Carlisle Adams(Post Script file)
10.30am Coffee Break
11.00 - 12.30 Authorisation.
1. A Multipurpose Delegation Proxy for WWW Credentials
By Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann(PDF)
2. Secure Role Activation and Authorization in the Enterprise Environment
By Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu(PDF)
3. Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an enhanced OCSP Service Provider into GT4
By Jesus Luna, Manel Medina, Oscar Manso(Power Point Presentation)
12.30 - 13.45pm Lunch, Rutherford College (No.28 on the Campus Map)
13.45 - 15.15 Interoperability.
4. A Heterogeneous Network Access Service based on PERMIS and SAML
By Gabriel L´opez, ´Oscar C´anovas, Antonio F. G´omez-Skarmeta, Sassa Otenko, David Chadwick(Power Point Presentation)
5. Interoperation between a conventional PKI and an ID-based infrastructure
By Geraint Price, Chris J. Mitchell (Power Point Presentation)
6. XKMS Working Group Interoperability Status Report
By Guillermo ´Alvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang
15.15 - 15.45 Coffee Break
15.45 Trip to Dover Castle
20.00 - Workshop Banquet
Friday 1 July
9.00 - 10.30 Evaluating a CA
7. An innovative Policy-based Cross Certification methodology for Public Key Infrastructures
By Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak(Power Point Presentation)
8. Modeling Public Key Infrastructure in the Real World
By John Marchesini, Sean Smith(PDF)
9. Classifying Public Key Certificates
By Javier Lopez, Rolf Oppliger, Gˇ§unther Pernul
10.30 - 10.45 Short Break
10.45 - 11.15 ID Based Ring Signatures
10. Identity Based Ring Signature: Why, How and What Next
By Sherman S.M. Chow, Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu(PDF)
11.15 - 11.45 Coffee Break
11.45 - 12.45 Practical Implementations
11. Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
By Wensheng Xu, David Chadwick, Sassa Otenko(Power Point Presentation)
12. CA-in-a-Box
By Mark Franklin, Kevin Mitcham, Sean Smith, Joshua Stabiner, and Omen Wild
12.45 - 14.00 Lunch, Rutherford College (No.28 on the Campus Map)
14.00 - 15.00 New Protocols
13. A Lower-bound of Complexity for RSA-based Password-Authenticated Key Exchange
By SeongHan Shin, Kazukuni Kobara, Hideki Imai(PDF)
14. Recoverable and Untraceable E-cash
By Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong(Power Point Presentation)
15.00 - 15.15 Short Break
15.15 - 16.15 Risks and Attacks
15. A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS
By Younggyo Lee, Injung Kim, Seungjoo Kim, Dongho Won(Power Point Presentation)
16. Installing Fake Root Keys in a PC
By Adil Alsaid, Chris J. Mitchell(Power Point Presentation)
16.15 - 16.45 Coffee Break
16.45 - 17.45 Long term Archiving
17. Provision Of Long-Term Archiving Service For Digitaly Signed Documents Using Archive Interaction Protocol
By Aleksej Jerman Blazic, Peter Sylvester(PDF)
18. Legal Security for Transformations of Signed Documents: Fundamental Concepts
By Andreas U. Schmidt, Zbynˇ¦ek Loebl(Power Point Presentation)
19.00 Dinner
Saturday 2 July
10.00. Optional guided tour of Canterbury Cathedral