[fw-wiz] Computer Security Mexico 2003

From: Seguridad en Computo - UNAM (seguridad@seguridad.unam.mx)
Date: 01/16/03


From: Seguridad en Computo - UNAM <seguridad@seguridad.unam.mx>
To: seguridad@seguridad.unam.mx
Date: Thu Jan 16 08:43:01 2003


-----BEGIN PGP SIGNED MESSAGE-----

   ---------------------------------------------------------------------
                        Computer Security Mexico 2003
                              Call for papers

                       Antiguo Colegio de San Ildefonso
                          March 6th-March 7th, 2003

                            Old Downtown,Mexico City
   -------------------------------------------------------------------------

 Since 1994, Mexico has participated of this celebration through the
 Computer Security Department (DSC-UNAM, www.seguridad.unam.mx) and
 UNAM-CERT (www.unam-cert.unam.mx).

 The goal of Computer Security 2003 Mexico (www.seguridad2003.unam.mx)
 is to create awareness among the computer user community about security
 strategies and mechanisms used to protect information systems.Since 1994,
 Mexico has been organizing this great event through the Computer Security
 Department (DSC-UNAM, www.seguridad.unam.mx) and UNAM-CERT
 (www.unam-cert.unam.mx).

 Computer Security 2003 will be an event for all the people who are
 involved in the use, design and administration of computer systems.

 The community is invited to participate in Computer Security 2003
 through the presentation of theoretical, technical, and applied works
 as well as those that present practical experiences in the following
 topics (but not limited to them):

    * Electronic commerce
         o Certification
         o Digital cash
         o New protocols
         o Secure transactions
         o New technologies
    * New firewall technologies
         o Hybrids FW
         o New generations of FW
    * World Wide Web security
         o Secure Sockets Layer (SSL)
         o Secure schemes
    * Legislation about Computer Security
         o Advances in legislation 1999-2000
         o Regulation of domain names
         o Copyright and industrial property
    * Network security
         o New network technology applied to security (ATM, Fast Ethernet)
         o Router security
    * Cluster security
    * Software development security
    * Distributed systems security
    * Database security
    * Security of agents and multi-platform languages
    * Incident response Teams
    * Computer security incident handling, prevention and coordination
    * Administrative and legal issues on incident handling
    * Software protection and intellectual property
    * New tools for incident handling
    * Intrusion detection
    * Computer attacks
    * Privacy and cryptography protocols
    * Security policies
    * Computer viruses
    * DDOS

              --------------------------------------------------

                            Who should attend ?

    * System administrators who are interested in Computer Security.

    * People working in the field of Computer Security who do handle Computer
      Security incidents.

    * Anybody who is interested in Computer Security and wants to meet
      another interested people. This event will help him or her improve
      security programs, plans, and tools by listening to the speakers and by
      sharing and interacting with the attendees.

    * People who want to establish incident response teams.

    * Anybody who has a particular interest in network security, monitoring
      tools, intrusion detection and firewalls.

    * Managers of enterprises who are interested in secure transactions via
      the Internet and that need to improve the security of their systems.

              --------------------------------------------------

                            Why should you assist?

  Because it is the opportunity to find out about what is being developed in
  the computer security field and it is also a chance to share your own
  experience and interests with people of the field.

  You can learn about how to manage and respond to computer security incidents
  without exposing your resources.

       Important Dates
       ---------------

         Paper submissions: February 7th, 2003.
         Acceptance notifications: February 14th, 2003.
         Final papers: February 24th, 2003
         Event: March 1, 2003 - March 7, 2003.
          Conferences: March 6th and March 7th

       Workshop Format
       ---------------

      On March 6 and 7, there will be technical conferences
   and business sessions only.

     All contributions should follow the next guidelines:

        1. Conference papers: Written papers may be as long as desired,
            but presentations must be limited to 30 minutes.

              --------------------------------------------------

                          Instructions for authors

  We will receive proposals for presentations, that
  follow these guidelines:

     * The documents should be submitted by the date indicated above.

     * The contents of the documents should be of high-quality and must be
       original.

     * They should include an abstract with the description of the content and
       style of the presentation.

     * The papers will be evaluated using the actual proposal, which must
       contain:

          o title
          o format (workshop, tutorial or conference)
          o extended abstract (more than one but less than two pages)
          o requirements for the presentation (computing equipment,
          o datashow projector, slide projector, etc.)
          o author information
               + name
               + address and affiliation
               + brief resume
               + fax and telephone number
               + e-mail address

       Accepted formats
       ----------------

  Authors whose papers are accepted must submit the complete version to be
  included into the proceedings of the event.

  Submissions will be accepted in the following formats:

     * TeX/LaTeX
     * PostScript
     * Word for Windows
     * ASCII
     * HTML

  Please contact the committee (congreso@seguridad.unam.mx ) if you need
  to use a different format.

  Note: For images and graphics use GIF, PCX, BMP, JPEG and JPG formats.

       Submissions

  Presentations can be sent using the following means:

          * e-mail:

                 congreso@seguridad.unam.mx

          * Post mail to the following address:

                 Departamento de Seguridad en Cómputo
                 Dirección General de Cómputo Académico
                 Circuito Exterior, Ciudad Universitaria 04510
                 México, D.F. México

              --------------------------------------------------

                               Program Committee

  The papers will be evaluated and selected by a scientific committee.

  The committee will be integrated by investigators and profesionistas
  recognized in the field of the computer security worldwide.

               --------------------------------------------------

                              Further Information:

          * Web: http://www.seguridad2003.unam.mx

        * e-mail: congreso@seguridad.unam.mx

        * Address:

                Departamento de Seguridad en Cómputo/UNAM-CERT
                Dirección General de Cómputo Académico
                Circuito Exterior, Ciudad Universitaria 04510
                México, D.F. México
                Phone : (52) 56 22 81 69 and (52) 56 85 22 29
                Fax : (52) 56 22 80 43
                http://www.seguridad.unam.mx
                 http://www.unam-cert.unam.mx

 Juan Carlos Guel
 ---
 Departamento Seguridad en Computo
 UNAM-CERT
 DGSCA, UNAM E-mail:seguridad@seguridad.unam.mx
 Circuito Exterior, C. U. Tel.: 5622-81-69 Fax: 5622-80-43
 Del. Coyoacan WWW: http://www.seguridad.unam.mx
 04510 Mexico D. F. WWW: http://www.unam-cert.unam.mx

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: cp850

iQEVAwUBPiUJNHAvLUtwgRsVAQFmzQf+M3C9uC0w2BuNFr3SAtpx+GtUMUlQbf+L
mGAa3AzorE2YcZx/Oarvz+/I20Oib5yNvSsRB4pJwGm3qP3a8juw8+s73sntDkZY
Hhbjn85J2jWu/XMNG8fiv3llLK5nt08kZ+d3LFwdWLMg7GkeTLSLyPzuuZn6vDGB
iHueQ0Ii89tUnTEzGebLlbiWdtm7RfUnYQN4QXlveQbCu4v5zhbGCrfIwSRDEz8Q
LNnO9l9q+AyJnP/+4UUFXZrj09cR3eCKNI0iDCYplHxdFLDFrz5q3R+vMEJFDn16
S+5dJlATVRCMI538998iR8PWMkK/UiPJq9LxfUyVbd1Jf3ouiXaciA==
=RQx7
-----END PGP SIGNATURE-----



Relevant Pages