TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Dagstuhl Seminar 9214

System Security

( Mar 30 – Apr 03, 1992 )

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/9214

Organizers
  • G.J. Simmons
  • T. Beth
  • W. Diffie



Impacts
  • Special issue on Dagstuhl seminar system security, March 29 - April 3, 1992 - Beth, Thomas; Strack, Hermann - Amsterdam : IOS Pr. 1993 - (Journal of computer security : 2. 1993, 11,S. 1-84).

Goals of this Dagstuhl Seminar

In March 1982 the first open research meeting in Europe on the then "new" topic Cryptography took place at Burg Feuerstein (Springer LNCS 149). While that workshop is considered to be the first of the EUROCRYPT suite of conferences, it also brought together many researchers in specialist workshops on the topics of the field, primarily at locations like Oberwolfach, Luminy and Cirencester. Meeting the needs of communication security and data integrity in theory and practice, cryptology apparently failed to address the wider system aspects arising from requirements of dependability encompassing security, safety and reliability.

Following an assessment workshop at Ascona in late 1989 and an Oberwolfach Workshop on "Mathematical Concepts of Dependable Systems" in spring 1990, where research problems of secure systems design especially under the aspects of specification and verification has been identified, the present workshop has been convened to address the topics of security and safety of (distributed) systems by emphasizing the points of view of cryptology, information theory, formal methods and system architecture.


Participants
  • G.J. Simmons
  • T. Beth
  • W. Diffie