TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 08491

Theoretical Foundations of Practical Information Security

( 30. Nov – 05. Dec, 2008 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/08491

Organisatoren



Programm

Summary

Designing, building, and operating secure information processing systems is a complex task, and the only scientific way to address the diverse challenges arising throughout the life-cycle of security criticial systems is to consolidate and increase the knowledge of the theoretical foundations of practical security problems. To this aim, the mutual exchange of ideas across individual security research communities can be extraordinary beneficial. Accordingly, the motivation of this Dagstuhl seminar was the integration of different research areas with the common goal of providing an integral theoretical basis that is needed for the design of secure information processing systems.

Coping with the full spectrum of challenges in information security is far beyond the scope of a single seminar, and thus participants were selected from a number of different, but still related, fields, so that a common scientific language or similarity of theoretical tools can facilitate an efficient exchange of ideas. Ideally, the seminar would help in identifying possibilities of cross-fertilization among seemingly different research directions within information security.

In addition to senior experts from academics, an effort was made to include participants with experience in industry, and also to include young researchers in the field who had already demonstrated a strong research potential.

Atmosphere, Organization, and Participation

It is fair to say that the seminar brought together some of the world experts on theoretical foundations of information security. The organizers are indebted for excellent presentations that were delivered by participants at this Dagstuhl seminar. More than 30 participants from several countries came together, and the additional flexibility offered by a Dagstuhl seminar in comparison to traditional conferences turned out to be of invaluable help:

Talks of different lengths were scheduled, and lively technical discussions during talks where the norm. This resulted in various program changes and the scheduling of additional talks. The possibility to discuss results in technical depth when needed was of great benefit and together with the infrastructure offered by Schloss Dagstuhl resulted in an extremely fruitful reasearch atmosphere with rather long working hours. Feedback of seminar participants to the organizers was extremely positive, and it is no exaggeration to consider this Dagstuhl seminar as a world class research meeting.

Summary of Topics

Owing to the nature of the workshop, the topics presented covered quite different subjects of information security. Because of the significance of cryptographic techniques, it is not surprising that many talks made use the the technical machinery offered by research on theoretical foundations of cryptography. These talks were supplemented by presentations on several other aspects of information security and privacy.

Given the topic of the workshop, it is not surprising that presentations often focused on theoretical models and provable constructions. However, the techniques used in different presentations varied greatly, therewith giving seminar participants the possibility of experiencing techniques not typically encountered in their own line of research. This type of crossing the boundaries of individual subareas of research on the theoretical foundations of information security was hoped for in the organization of this seminar and greatly added to the diversity of the discussions.

The organizers are indebted to all participants for making this Dagstuhl seminar a great success. Moreover, it is our pleasure to thank the team of Schloss Dagstuhl for providing an excellent research environment for this seminar. Their efficient help and endless patience in dealing with requests and deviations from the time schedule is greatly appreciated.


Teilnehmer
  • Jens-Matthias Bohli (NEC Laboratories Europe - Heidelberg, DE)
  • Zvika Brakerski (Weizmann Institute - Rehovot, IL) [dblp]
  • Ran Canetti (Tel Aviv University, IL) [dblp]
  • Ronald Cramer (CWI - Amsterdam, NL)
  • Yevgeniy Dodis (New York University, US) [dblp]
  • Craig Gentry (IBM TJ Watson Research Center - Yorktown Heights, US)
  • Shafi Goldwasser (MIT - Cambridge, US) [dblp]
  • Dieter Gollmann (TU Hamburg-Harburg, DE) [dblp]
  • Iftach Haitner (Microsoft New England R&D Center - Cambridge, US) [dblp]
  • Dennis Hofheinz (CWI - Amsterdam, NL) [dblp]
  • Jonathan Katz (University of Maryland - College Park, US) [dblp]
  • Aggelos Kiayias (University of Connecticut - Storrs, US) [dblp]
  • Ralf Küsters (Universität Trier, DE) [dblp]
  • Tal Malkin (Columbia University - New York, US) [dblp]
  • Günter Müller (Universität Freiburg, DE)
  • Jörn Müller-Quade (KIT - Karlsruher Institut für Technologie, DE) [dblp]
  • Moni Naor (Weizmann Institute - Rehovot, IL) [dblp]
  • Rafael Pass (Cornell University, US) [dblp]
  • Christopher J. Peikert (SRI - Menlo Park, US)
  • Olivier Pereira (University of Louvain, BE)
  • Krzysztof Pietrzak (CWI - Amsterdam, NL) [dblp]
  • Manoj Prabhakaran (University of Illinois - Urbana-Champaign, US)
  • Michael Roe (Microsoft Research UK - Cambridge, GB)
  • Alon Rosen (The Interdisciplinary Center - Herzliya, IL) [dblp]
  • Guy Rothblum (MIT - Cambridge, US)
  • Gil Segev (Weizmann Institute - Rehovot, IL) [dblp]
  • Christoph Sprenger (ETH Zürich, CH)
  • Rainer Steinwandt (Florida Atlantic University - Boca Raton, US) [dblp]
  • Yael Tauman Kalai (Microsoft New England R&D Center - Cambridge, US)
  • Max Tuengerthal (Universität Trier, DE) [dblp]
  • Dominique Unruh (Universität des Saarlandes, DE) [dblp]
  • Vinod Vaikuntanathan (MIT - Cambridge, US) [dblp]
  • Mayank Varia (MIT - Cambridge, US)
  • Moti Yung (Google - New York, US) [dblp]

Klassifikation
  • artificial intelligence / robotics
  • modelling / simulation
  • mobile computing
  • networks
  • semantics / specification / formal methods
  • soft computing / evol. algorithms

Schlagworte
  • organic computing
  • self-organisation
  • design
  • adaptivity