Fw: CfP - Workshop on Security of Mobile Multiagent Systems
Frank Sudia
fsudia at home.com
Tue Dec 10 11:45:29 PST 2019
(SEMAS-2001)
Date: Fri, 2 Feb 2001 20:04:09 -0800
Sender: bounce-dcsb at reservoir.com
Reply-To: "Frank Sudia" <fsudia at home.com>
[Other branches of computer science discovering security.]
----- Original Message -----
From: "Dieter Hutter" <hutter at dfki.de>
To: <undisclosed-recipients:;>
Sent: Thursday, February 01, 2001 11:30 PM
Subject: CfP - Workshop on Security of Mobile Multiagent Systems
(SEMAS-2001)
This message was sent to several mailing lists.
We apologise if you receive multiple copies of it.
CALL FOR PAPERS
First International Workshop on
SECURITY OF MOBILE MULTIAGENT SYSTEMS (SEMAS-2001)
To be held at the
Fifth International Conference on Autonomous Agents (Agents 2001)
Montreal, Canada
May 29th 2001
http://www.dfki.de/~kuf/semas/
The far reaching influence of the Internet has resulted in an
increased interest in agent technologies, which are poised to play a
key role in the implementation of successful Internet and WWW-based
applications in the future. While there is still considerable hype
concerning agent technologies, there is also an increasing awareness
of the problems involved. In particular, that these applications will
not be successful unless security issues can be adequately
handled. Although there is a large body of work on cryptographic
techniques that provide basic building-blocks to solve specific
security problems, relatively little work has been done in
investigating security in the multiagent system context. The
introduction of mobile software agents significantly increases the
risks involved in Internet and WWW-based applications. For example,
if we allow agents to enter our hosts or private networks, we must
offer the agents a platform so that they can execute correctly but at
the same time ensure that they will not have deleterious effects on
our hosts or any other agents / processes in our network. If we send
out mobile agents, we should also be able to provide guarantees about
specific aspects of their behaviour, i.e., we are not only interested
in whether the agents carry-out their intended task correctly. They
must defend themselves against attacks initiated by other agents, and
survive in potentially malicious environments.
Agent technology can also be used to support network security. For
example in the context of intrusion detection, intelligent guardian
agents may be used to implement active protection strategies on a
firewall or intelligent monitoring agents can be used to analyse the
behaviour of agents migrating through a network. Part of the
inspiration for such multi-agent systems comes from primitive animal
behaviour, such as that of guardian ants protecting their hill or from
biological immune systems.
Topics of Interest
- ------------------
We welcome the submission of papers from the full spectrum of issues
associated with security in mobile multiagent systems, both in the
public Internet and in private networks. We particularly encourage
the discussion of the following topics:
- - security policies for agent environments
- - security mechanisms that can be implemented by using
(mobile) multiple agents
- - reasoning about security in an agent architecture
- - security for agents (against other agents, malicious hosts, and
software failures)
- - security for agent hosts (against agent attacks and agent
deficiency)
- - security through agents (for any form of malfunctioning in the
network)
- - application of security mechanism in a (mobile) multiagent context
- - integration of traditional security mechanisms to the agent realm
- - design methodologies for secure (mobile) multiagent systems
The workshop aims at bringing together people from the two relevant
research fields, information security and agent-oriented programming.
Consequently we would like to encourage discussion papers, conceptual
papers, system papers, and application papers. It is planned to
publish the workshop papers with a scientific publisher after the
workshop.
Submission Details
- ------------------
To participate in the workshop you should submit an original research
paper of up to 5000 words (approximately 8 pages maximum) or a
position paper (up to 2000 words, approximately 3 pages) to the
workshop chair, to arrive no later than 19 March 2001. It is planned
to structure the workshops into invited talks, technical presentations
and panel discussions. The technical presentations will be selected
from the research papers. Formatting instructions can be found at
http://www.acm.org/sigs/pubs/proceed/template.html and should be
strictly followed. The first page should include the full name and
contact details of at least one author (email and full postal
address). Electronic submissions are mandatory. Acceptable formats
are PDF and PostScript.
Important Dates:
- ----------------
Submissions due Monday 19th March 2001
Notifications sent Friday 30th March 2001
Camera ready version due Monday 16th April 2001
Workshop Tuesday 29th May 2001
Organisation:
- -------------
Klaus Fischer and Dieter Hutter, DFKI Saarbr=FCcken, Germany
Program Committee:
- ------------------
Sahin Albayrak, TU Berlin, Germany
David Basin, University of Freiburg, Germany
Ciaran Bryce, University of Geneve, Switzerland
Hans-J=FCrgen B=FCrckert, DFKI GmbH Saarbr=FCcken, Germany
G=FCnter Karjoth, IBM Research Z=FCrich, Switzerland
Luc Moreau, University of Southampton, UK
Volker Roth, Frauenhofer IGD, Germany
Helmut Schwigon, BSI Bonn, Germany
Vipin Swarup, The MITRE Corp, USA
Christian Tschudin, Uppsala University, Sweden
Jan Vitek, Purdue University, USA
Contact Person:
- ---------------
Dr. Klaus Fischer
DFKI GmbH
Stuhlsatzenhausweg 3
D-66123 Saarbr=FCcken
Germany
Tel/Fax +49 681 302-3917/-2235
Email: Klaus.Fischer at dfki.de
URL: http://www.dfki.de/~kuf/
__________________________________________________________________________
To be removed from this list, send a message with "unsubscribe info-hol"
as its sole content to majordomo at lal.cs.byu.edu
For more information see http://lal.cs.byu.edu/lal/hol-documentation.html
For help on using this list (especially unsubscribing), send a message to
"dcsb-request at reservoir.com" with one line of text: "help".
--- end forwarded text
--
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
More information about the cypherpunks-legacy
mailing list