Date sent:      	Mon, 24 Jul 2000 03:30:27 -0500
Send reply to:  	Area de Seguridad en Computo 
From:           	Area de Seguridad en Computo 
Subject:        	Re: [ISN] Computer Security 2000 Mexico
-----BEGIN PGP SIGNED MESSAGE-----

> .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---'
>
>             C o m p u t e r    S e c u r i t y   2000   M e x i c o
>
>                      November 26th - December 1st, 2000
>
>                    Palacio de Miner'ia, M'exico City, M'exico.
>
> .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---'
>
>                      C A L L   F O R   P A P E R S
>
> The goal of "Computer Security 2000" and "International Computer
> Security Day" is to create awareness in the computer user community
> about security strategies and mechanisms used to protect information.
>
> "Computer Security 2000" (http://www.seguridad2000.unam.mx)will be a
> meeting for all the people who is involved in the use of Computer
> equipment. DISC 2000 (http://www.disc2000.unam.mx)is an annual
> world-wide celebration convoked by ACM(Association For Computing
> Machinery).
>
> Since 1994, Mexico has participated in this celebration through the
> Computer Security Area (ASC, http://www.asc.unam.mx). This year DISC2000
> will take place alongside the event "Computer Security 2000" on November
> 30th.
>
> The community is invited to participate in the "Computer Security
> 2000" event through the presentation of theoretical, technical, and
> applied works and those who presents practical experience in the
> following topics (but not limited to them):
>
>      >> Electronic commerce
>           Certification
>           Digital cash
>           New protocols
>           Secure transactions
>           New Technologies
>      >> New firewall technologies
>           Hybrids FW
>           New generations of FW
>      >> World Wide Web security
>           Secure Sockets Layer (SSL)
>           Secure Schemes
>      >> Legislation about Computer Security
>           Advances in legislation 1999-2000
>           Regulation of domain names
>           Copyright and Industrial property
>      >> Network security
>           New network technology applied to Security (ATM, Fast
>           Ethernet) Routers security
>      >> Clusters security
>      >> Security for software developers
>      >> Security in distributed systems and data bases
>      >> Security in agents and multi-platform languages
>      >> Incident response teams
>      >> Computer security incident handling, prevention and coordination
>      >> Administrative and legal issues in the incident handling
>      >> Software protection and intellectual property New tools for
>      >> incident handling Attacks and intrusion detection Computer
>      >> attacks Privacy and cryptography protocols Security policies
>      >> Computer viruses DDOS attacks
>
>                               Important Dates
>                               ................
>
> Paper submissions: September 22th
> Acceptance notification: October 7th
> Final papers due: October 28th
> Event Dates: November 26th to December 1st
>
>                               Workshop Format
>                               ................
>
> There will be tutorial-style presentations and workshop-style
> presentations during November 26,27 and 28. And November 29 and December
> 1 will consist of Technical conferences, as well as business sessions.
>
> The Birds of Feather Sessions(BOF'S) will be held on November 26,27 and
> 28. Contributions should follow the following guidelines:
>
> 1.-Tutorials and workshops:
>      Half or full day tutorial proposals will be considered.
>
> 2. Conference papers: Written papers may be as long as desired, but
> presentations must be limited to 30 minutes.
>
> 3. Panel Sessions: These informal sessions should either follow a more
> "hands-on" approach or provide for a high degree of audience
> participation.
>
> They should be tailored to address specific issues and should be from 60
> to 90 minutes in duration. Panel Sessions on a particular topic are also
> aceptable.
>
>                           Program Committee
>                       .....................
>
> The committe will be composed by:
>
>            >> Dr. Eugene Spafford
>               Director of CERIAS, Purdue University, EU
>
>            >> Wietse Venema
>               IBM T.J. Watson Research Center
>
>            >> Dr. Eugene Schultz
>               Global Integrity, EU
>
>            >> Linda McCarthy
>               Net-Defense, EU
>
>            >> M. en C. Diego Zamboni
>               CERIAS, Purdue University
>
>            >> Juan Carlos Guel Lopez
>               Computer Security Area DGSCA-UNAM, Mexico
>
>
>                            Further Information
>                           .....................
>
>
>      E-mail:comite@AT@seguridad.unam.mx
>      http://www.seguridad2000.unam.mx
>      http://www.disc2000.unam.mx
>      http://www.asc.unam.mx
>
>                                 Address
>                                .........
>
>      Area de Seguridad en Computo
>      Direccion General de Computo Academico
>      Circuito Exterior, Ciudad Universitaria 04510
>      Mexico, D.F. Mexico
>      Phone : (52) 56 22 81 69 and (52) 56 85 22 29
>      Fax : (52) 56 22 80 43
>
>
> ---
> Juan Carlos Guel Lopez
> Area de Seguridad en C'omputo   E-mail: asc@AT@asc.unam.mx
> DGSCA, UNAM                     Tel.: 5622-81-69  Fax: 5622-80-43
> Circuito Exterior, C. U.        WWW: http://www.asc.unam.mx/
> 04510 Mexico D. F.              PGP: finger asc@asc.unam.mx

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1i

iQEVAwUBOXv+rz6HeEeO/+C1AQHABwf/fl33f8klDIGTduPZWWTtD2hPH++G/z8u
BujCZ0R/hM9HbX8I4Dthye0RvUP+7RFIyT+6Pk7zXRuSlBL0WJlzq7xQtCxqfhCN
w/H2GUCO1KbfdoG/4paycCLqVpKclV4iJ/En2/Lw3yinEzQnleCYzbioimcoAhGS
arBdGWCBuaDbXsTmO7/rSUg043MpEXsDmDGLF3GRU4J7s9BhX3SeuZcKe1+PHHhj
UrQ80jzwsh+5WQdqDQMVVpALkhwOVsOA1v5g0Acq41iU+h2DoF1rJBsy2M5VZajc
DQAVCbV0pRBvGzV89VbNyBZPHirv4hCJ8ky4MeCkKnFsLKxScGR+gg==
=8OXa
-----END PGP SIGNATURE-----

 search: