|
|
|
ERCIM News No. 49, April 2002 - Contents
|
|
|
|
European Research Area - and Beyond
by Philippe Busquin, Commissioner for Research
|
|
|
|
The Norwegian University of Science and Technology is now a Member of ERCIM |
|
Kick-off Meeting on Image Understanding, by Eric Pauwels, CWI |
|
ERCIM Working Group Matrix Computation and Statistics - Second Workshop,
by Bernard Philippe, INRIA |
|
Call for Candidates: Cor Baayen Award 2002 |
|
Announcement: ERCIM Sponsored Events |
|
Euro-Legal by Heather Weaver, CLRC |
|
|
|
Information Security - Introduction by Michael Waidner, IBM Zurich Research Lab, Switzerland |
|
Methods and Tools against Hacker Attacks by Andreas Wespi, IBM Zurich Research Lab, Switzerland |
|
Regulating Access to Web-published Data by Pierangela Samarati, University of Milan, Italy |
|
An.on - Privacy Protection on the Internet
by Hannes Federrath Hannes Federrath, Dresden University of Technology, Germany |
|
Privacy Protection and Trust Models by Olle Olsson, SICS |
|
idemix for Internet Anonymity by Endre Bangerter, Jan Camenisch, Els Van Herreweghen
and Michael Waidner, IBM Zurich Research Lab, Switzerland |
|
Towards Digital Credentials by Stefan Brands, McGill University, Canada |
|
The Cryptography Group at Aarhus University by Ronald Cramer, Aarhus University, Denmark |
|
New Prime Factorisation Record obtained using the General Number Field Sieve
by Friedrich Bahr, Jens Franke and Thorsten Kleinjung, University of Bonn, Germany |
|
The Heuristic Evolution of Security and Insecurity
by John Clark and Jeremy Jacob, University of York, UK |
|
Cryptography using Hyperelliptic Curves
by Norbert Göb and Georg Kux, FhG-Institute for Industrial Mathematics |
|
Trusted Logic's Approach to Security for Embedded Systems: Innovation and Pragmatism
by Dominique Bolignano, Daniel Le Métayer and Claire Loiseaux, Trusted Logic S.A., France |
|
Verification of Cryptographic Protocols used in Fixed and Mobile Networks
by Tom Coffey, Reiner Dojen and Tomas Flanagan, University of Limerick, Ireland |
|
Security and Safety through Static Analysis by Chris Hankin and Thomas Jensen, IRISA/CNRS, France |
|
Security: Formal Methods at Work
by Stefano Bistarelli, Fabio Martinelli and Marinella Petrocchi, IIT-CNR |
|
CORAS - A Framework for Risk Analysis of Security Critical Systems
by Theo Dimitrakos, Juan Bicarregui, CLRC and Ketil Stølen, NTNU Group, Norway |
|
SMM - Assessing a Companys IT Security by Holger Kurrek, FhG-ISST |
|
MICOSec: CORBA as a Secure Platform for Mobile Applications
by Rudolf Schreiner and Ulrich Lang, ObjectSecurity Ltd, UK |
|
Security for Distributed and Mobile Active Objects with the ProActive Library
by Isabelle Attali, Denis Caromel and Arnaud Contes, INRIA |
|
Mobile IP Security in Foreign Networks by Sami Lehtonen, VTT |
|
Security Issues underpinning Large Virtual Organisations
by Theo Dimitrakos, Brian Matthews and Juan Bicarregui, CLRC |
|
Information Systems Security at CLRC by Trevor Daniels, CLRC |
|
Secure Collaboration in Global Computing Systems by Christian Damsgaard Jensen, TCD |
|
Integrating Biometric Techniques with an Electronic Signature for Remote Authentication
by Luca Bechelli, Stefano Bistarelli, Fabio Martinelli, Marinella Petrocchi and Anna Vaccarelli, IIT-CNR |
|
Secure Resale of Tangible and Digital Goods by Harald Häuschen, University of Zurich, Switzerland |
|
Managing Authorisations by Babak Sadighi Firozabadi and Mads Dam, SICS |
|
The Role of Smart Cards in Practical Information Security
by Javier López, Antonio Maña, Pedro Merino and José M. Troya, University of Málaga, Spain |
|
Realizing Trust through Smart Cards by István Mezgár and Zoltán Kincses, SZTAKI |
|
|
|
Phytoplankton Dynamics - the Struggle for Light by Ben Sommeijer, CWI |
|
Virtual and Interactive Environments for Workplaces of the Future
by John Wilson, University of Nottingham, UK |
|
Blind Image Analysis helps Research in Cosmology
by Emanuele Salerno, Luigi Bedini, Ercan Kuruoglu and Anna Tonazzini, IEI-CNR |
|
Relativistic MHD Computation of Gamma-ray Bursts by Barry Koren, CWI |
|
The CORVAL2 Contribution to achieve Confidence in Middleware
by Ina Schieferdecker, Axel Rennoch and Dorota Witaszek, FhG-FOKUS |
|
COVAX: an Internet Access to Libraries, Archives and Museums by Luciana Bordoni, ENEA/UDA, Italy |
|
|
|
A Cluster of European Projects on Agents and Middleware Technologies
by Massimo Busuoli and Emanuela Rasconi , ENEA UDA-Agency for Sustainable Growth, Italy |
|
Jalios: Master your Content by Vincent Bouthors, Jalios, France |
|
|
|
Reports |
|
SOFSEM 2001 - 28th Conference on Current Trends in Theory and Practice of Informatics
by Gabriela Andrejkova, SRCIM |
|
Workshop on Current Research Directions in Computer Music
by Leonello Tarabella, Graziano Bertini and Gabriele Boschi, CNUCE-, IEI-CNR |
|
For conference announcements, see: |
|
Calendar of Events and Conferences related to IT and Applied Mathematics |
|
|
|
The Research Council of Norway has launched an eight year, 23 million Euro, ICT program |
|
International Review of UK Research in Computer Science |
|
SZTAKI - Tamás Roska received the Bolyai Prize |
|
CNR - Franco Denoth has been appointed as Director of the newly constituted Istituto di Informatica e Telematica |
|
INRIA - The new innovation and communication center (PIC) of the INRIA Rocquencourt unit |
|
|