DIMACS Trust management workshop, Sept 30 - Oct 2.

------- Forwarded Message Received: from amontillado.research.att.com (amontillado.research.att.com [135.205.42.32]) by nsa.research.att.com (8.7.3/8.7.3) with ESMTP id LAA24206 for <mab-local@nsa.research.att.com>; Tue, 17 Sep 1996 11:52:51 -0400 (EDT) Received: from research.research.att.com (research.research.att.com [135.205.32.20]) by amontillado.research.att.com (8.7.5/8.7) with SMTP id LAA14378 for <mab@issr.research.att.com>; Tue, 17 Sep 1996 11:52:30 -0400 (EDT) Received: from ns.research.att.com by research; Tue Sep 17 11:48:17 EDT 1996 Received: from henson.rutgers.edu by ns; Tue Sep 17 11:06:01 EDT 1996 Received: (from bquigley@localhost) by henson.rutgers.edu (8.6.12+bestmx+oldruq+newsunq+grosshack/8.6.12) id LAA26298; Tue, 17 Sep 1996 11:02:41 -0400 Date: Tue, 17 Sep 1996 11:02:41 -0400 From: Barbara Quigley <bquigley@dimacs.rutgers.edu> Message-Id: <199609171502.LAA26298@henson.rutgers.edu> To: dimacs-members@dimacs.rutgers.edu, local-list@dimacs.rutgers.edu, dimacs-dimacs@dimacs.rutgers.edu, dimacs-current-postdocs-industry@dimacs.rutgers.edu, dimacs-current-postdocs-univ@dimacs.rutgers.edu, dimacs-current-visitors@dimacs.rutgers.edu, rutgers-list@dimacs.rutgers.edu, theorynt@vm1.nodak.edu, finite-model-theory@informatik.rwth-aachen.de Subject: DIMACS Workshop on Trust Management in Networks, Rutgers University, September 30 - October 2, 1996 DIMACS Workshop on Trust Management in Networks September 30 - October 2, 1996 DIMACS, Rutgers University - ---------------------------------------------------------------------------- Organizers: Ernie Brickell brickell@btec.com Joan Feigenbaum jf@research.att.com David Maher dpm@allegra.att.com Theme: The use of public-key cryptography on a mass-market scale requires sophisticated mechanisms for managing trust. For example, any application that receives a signed request for action is forced to answer the central question ``Is the key used to sign this request authorized to take this action?'' In certain applications, this question reduces to ``Does this key belong to this person?'' In others, the authorization question is considerably more complicated, and resolving it requires techniques for formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. This workshop covers all aspects of the trust management problem. Relevant topics include but are not limited to: * General approaches to trust management * Languages, systems, and tools * Certificates and public-key infrastructure * Formal models and analysis * Trust management in specific application domains; including but not limited to: o Banking o E-mail o Internet commerce o Licensing o Medical information systems o Mobile programs and ``code signing'' o Revocation of cryptographic keys For more information: Information about local arrangements, travel, lodging and registration can be found at http://dimacs.rutgers.edu/Workshops/Management. Those without WWW access can contact Pat Pravato at 908-445-5929 or pravato@dimacs.rutgers.edu. This workshop is part of DIMACS Special Year on Networks. Information about the Special Year on Networks can be found at DIMACS WWW site: http://dimacs.rutgers.edu or by contacting the center. __________________ Program: Monday, September 30, 1996 8:15 Continental breakfast 9:00 Welcome to DIMACS Fred Roberts, DIMACS Director 9:15 What is "Trust Management," and what are the Workshop Goals? Joan Feigenbaum, AT&T Laboratories 9:45 Let a Thousand (Ten Thousand?) CAs Reign Stephen Kent, BBN Corporation 10:45 Break 11:00 The PolicyMaker Approach to Trust Management Matt Blaze, AT&T Laboratories (Joint work with J. Feigenbaum and J. Lacy) 12:00 Lunch 1:15 SDSI: A Simple Distributed Security Infrastructure Butler Lampson, Microsoft (Joint work with R. Rivest) 2:15 SPKI Certificates Carl Ellison, Cybercash 3:15 Break 3:45 Panel Discussion Moderator: David Maher, AT&T Laboratories Panelists: Blaze, Ellison, Kent, and Lampson 5:30 Wine and cheese Tuesday, October 1, 1996 8:15 Continental Breakfast 9:00 Using PICS Labels for Trust Management Rohit Khare, World Wide Web Consortium 9:30 Managing Trust in an Information-Labeling System Martin Strauss, Iowa State University (Joint work with M. Blaze, J. Feigenbaum, and P. Resnick) 10:00 Trust Management in Web Browsers, Present and Future Ed Felten, Princeton University (Joint work with D. Dean and D. Wallach) 10:30 Break 10:45 IBM Cryptolopes, SuperDistribution, and Digital Rights Management Marc A. Kaplan, IBM Watson Research Center 11:15 Requirements and Approaches for Electronic Licenses David Maher, AT&T Laboratories 11:45 PathServer Michael Reiter, AT&T Laboratories (Joint work with S. Stubblebine) 12:15 Lunch 1:30 Inferno Security David Presotto, Bell Labs -- Lucent Technologies 2:00 Transparent Internet E-mail Security Raph Levien, University of Calfornia at Berkeley (Joint work with L. McCarthy and M. Blaze) 2:30 Secure Digital Names Stuart Haber, Bellcore (Joint work with S. Stornetta) 3:00 Break 3:30 Untrusted Third Parties: Key Management for the Prudent Mark Lomas, Cambridge University (Joint work with B. Crispo) 4:00 Distributed Trust Management using Databases Trevor Jim, University of Pennsylvania (Joint work with C. Gunter) 4:30 Distributed Commerce Transactions: Structuring Multi-Party Exchanges into Pair-wise Exchanges Steven Ketchpel, Stanford University (Joint work with H. Garcia-Molina) Wednesday, October 2, 1996 8:15 Continental Breakfast 9:00 Policy-Controlled Cryptographic Key Release David McGrew, Trusted Information Systems, Inc. (Joint work with D. Branstad) 9:45 An X.509v3-based Public-Key Infrastructure for the Federal Government William Burr, Nat'l. Inst. of Standards and Technology 10:15 Break 10:30 The ICE-TEL Public-Key Infrastructure and Trust Model David Chadwick, Salford University 11:00 A Distributed Trust Model Alfarez Abdul-Rahman, University College, London (Joint work with S. Hailes) 11:30 On Multiple Statements from Trust Sources Raphael Yahalom, Hebrew University and MIT 12:00 Lunch 1:00 Off-line Delegation in a Distributed File Repository Arne Helme, University of Twente (Joint work with T. Stabell-Kul) 1:30 Operational Tradeoffs of Aggregating Attributes in Digital Certificates Ian Simpson, Carnegie Mellon University 2:00 Trust Management for Mobile Agents Vipin Swarup, Mitre (Joint work with W. Farmer and J. Guttman) 2:30 Break 3:00 Trust Management in ERLink Samuel Schaen, Mitre 3:30 Linking Trust with Network Reliability Y. Desmedt, University of Wisconsin at Milwaukee (Joint work with M. Burmester) 4:00 Trust Management Under Law-Governed Interaction Naftaly Minsky, Rutgers University (Joint work with V. Ungureanu) 4:30 Tools for Security Policy Definition and Implementation Polar Humenn, Blackwatch Technology, Inc. ------- End of Forwarded Message
participants (1)
-
Matt Blaze