____________________________________________________________________ Before a larger group can see the virtue of an idea, a smaller group must first understand it. "Stranger Suns" George Zebrowski The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ [EMAIL PROTECTED] www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- ---------- Forwarded message ---------- Date: Sun, 4 Feb 2001 10:03:45 -0500 From: "R. A. Hettinga" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Fw: CfP - Workshop on Security of Mobile Multiagent Systems (SEMAS-2001) --- begin forwarded text From: "Frank Sudia" <[EMAIL PROTECTED]> To: "Digital Commerce Soc" <[EMAIL PROTECTED]> Subject: Fw: CfP - Workshop on Security of Mobile Multiagent Systems (SEMAS-2001) Date: Fri, 2 Feb 2001 20:04:09 -0800 Sender: [EMAIL PROTECTED] Reply-To: "Frank Sudia" <[EMAIL PROTECTED]> [Other branches of computer science discovering security.] ----- Original Message ----- From: "Dieter Hutter" <[EMAIL PROTECTED]> To: <undisclosed-recipients:;> Sent: Thursday, February 01, 2001 11:30 PM Subject: CfP - Workshop on Security of Mobile Multiagent Systems (SEMAS-2001) This message was sent to several mailing lists. We apologise if you receive multiple copies of it. CALL FOR PAPERS First International Workshop on SECURITY OF MOBILE MULTIAGENT SYSTEMS (SEMAS-2001) To be held at the Fifth International Conference on Autonomous Agents (Agents 2001) Montreal, Canada May 29th 2001 http://www.dfki.de/~kuf/semas/ The far reaching influence of the Internet has resulted in an increased interest in agent technologies, which are poised to play a key role in the implementation of successful Internet and WWW-based applications in the future. While there is still considerable hype concerning agent technologies, there is also an increasing awareness of the problems involved. In particular, that these applications will not be successful unless security issues can be adequately handled. Although there is a large body of work on cryptographic techniques that provide basic building-blocks to solve specific security problems, relatively little work has been done in investigating security in the multiagent system context. The introduction of mobile software agents significantly increases the risks involved in Internet and WWW-based applications. For example, if we allow agents to enter our hosts or private networks, we must offer the agents a platform so that they can execute correctly but at the same time ensure that they will not have deleterious effects on our hosts or any other agents / processes in our network. If we send out mobile agents, we should also be able to provide guarantees about specific aspects of their behaviour, i.e., we are not only interested in whether the agents carry-out their intended task correctly. They must defend themselves against attacks initiated by other agents, and survive in potentially malicious environments. Agent technology can also be used to support network security. For example in the context of intrusion detection, intelligent guardian agents may be used to implement active protection strategies on a firewall or intelligent monitoring agents can be used to analyse the behaviour of agents migrating through a network. Part of the inspiration for such multi-agent systems comes from primitive animal behaviour, such as that of guardian ants protecting their hill or from biological immune systems. Topics of Interest - ------------------ We welcome the submission of papers from the full spectrum of issues associated with security in mobile multiagent systems, both in the public Internet and in private networks. We particularly encourage the discussion of the following topics: - - security policies for agent environments - - security mechanisms that can be implemented by using (mobile) multiple agents - - reasoning about security in an agent architecture - - security for agents (against other agents, malicious hosts, and software failures) - - security for agent hosts (against agent attacks and agent deficiency) - - security through agents (for any form of malfunctioning in the network) - - application of security mechanism in a (mobile) multiagent context - - integration of traditional security mechanisms to the agent realm - - design methodologies for secure (mobile) multiagent systems The workshop aims at bringing together people from the two relevant research fields, information security and agent-oriented programming. Consequently we would like to encourage discussion papers, conceptual papers, system papers, and application papers. It is planned to publish the workshop papers with a scientific publisher after the workshop. Submission Details - ------------------ To participate in the workshop you should submit an original research paper of up to 5000 words (approximately 8 pages maximum) or a position paper (up to 2000 words, approximately 3 pages) to the workshop chair, to arrive no later than 19 March 2001. It is planned to structure the workshops into invited talks, technical presentations and panel discussions. The technical presentations will be selected from the research papers. Formatting instructions can be found at http://www.acm.org/sigs/pubs/proceed/template.html and should be strictly followed. The first page should include the full name and contact details of at least one author (email and full postal address). Electronic submissions are mandatory. Acceptable formats are PDF and PostScript. Important Dates: - ---------------- Submissions due Monday 19th March 2001 Notifications sent Friday 30th March 2001 Camera ready version due Monday 16th April 2001 Workshop Tuesday 29th May 2001 Organisation: - ------------- Klaus Fischer and Dieter Hutter, DFKI Saarbr=FCcken, Germany Program Committee: - ------------------ Sahin Albayrak, TU Berlin, Germany David Basin, University of Freiburg, Germany Ciaran Bryce, University of Geneve, Switzerland Hans-J=FCrgen B=FCrckert, DFKI GmbH Saarbr=FCcken, Germany G=FCnter Karjoth, IBM Research Z=FCrich, Switzerland Luc Moreau, University of Southampton, UK Volker Roth, Frauenhofer IGD, Germany Helmut Schwigon, BSI Bonn, Germany Vipin Swarup, The MITRE Corp, USA Christian Tschudin, Uppsala University, Sweden Jan Vitek, Purdue University, USA Contact Person: - --------------- Dr. Klaus Fischer DFKI GmbH Stuhlsatzenhausweg 3 D-66123 Saarbr=FCcken Germany Tel/Fax +49 681 302-3917/-2235 Email: [EMAIL PROTECTED] URL: http://www.dfki.de/~kuf/ __________________________________________________________________________ To be removed from this list, send a message with "unsubscribe info-hol" as its sole content to [EMAIL PROTECTED] For more information see http://lal.cs.byu.edu/lal/hol-documentation.html For help on using this list (especially unsubscribing), send a message to "[EMAIL PROTECTED]" with one line of text: "help". --- end forwarded text -- ----------------- R. A. Hettinga <mailto: [EMAIL PROTECTED]> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'