Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

Event category

Content archived on 2022-07-14

Article available in the following languages:

ISSE 2000

‘The Information Security Solutions Europe’ Conference for the year 2000 will be held in Barcelona, Spain, on 27 to 29 September.

The conference will focus on information security for e-business, based on cryptography and emerging technologies. It is prepared by independent o...

13 December 1999 - 13 December 1999
 
‘The Information Security Solutions Europe’ Conference for the year 2000 will be held in Barcelona, Spain, on 27 to 29 September.

The conference will focus on information security for e-business, based on cryptography and emerging technologies. It is prepared by independent organisations under the auspices of the Information Society Directorate General, and supported by the German Federal Ministry of Economics.

There will be presentations and discussions of technical, organisational, legal and political concepts for information security and data protection. This year’s event is scheduled to cover information security solutions for large scale corporations, enterprises, especially for SMEs, commerce, financial & public sector, health care, legal practitioners and security professionals.

Conference organisers are looking for papers and panel discussions on the following topics:

-- Technology / Cryptography:

- Technical concepts
- Cryptography: experiences and trends
- Technical standards
- Evaluation criteria
-Internet security: e-mail security, VPN, web-security, firewalls and protocols
- Smartcard technology
- Security in wireless communications
- Emerging technologies, Biometrics
- Security of mobile code
- Tamper resistant and high performance hardware
- Operating systems security
- Open source developments (OS and security tools)
- Global Interoperability
- Privacy enhancing technologies
- Copyright protection
-- Infrastructure:

- Public key infrastructures
- International Solutions
- Certification authorities: accreditation, evaluation, business cases
- Liability and insurance
- Evaluation / licensing of components and methods
- Infrastructure standards
- Interoperability studies and trials
- Infrastructure policies and best practices
- Key-management concepts
- Trusted services: notary, time-stamping
- Cross-certification
- Attribute certificates

-- Applications and case studies:

- Securing e-business, e-banking, e-government
- Business sector case studies
- Risk management concepts
- Public services (citizen / community / public authorities / health care): practical experiences
- Enterprise IT-security solutions and requirements
- Integration aspects of enterprise IT-security
- Securing document management, workflow systems
- Archiving of evidence
- Electronic signature
- End-to-end security
- Multimedia security and copyright protection
- Protection of critical information and infrastructures
- Digital Ids

-- Legal and political issues (national/European/global):

- Role of governments (EU, national)
- Role of international organisations/agreements
- Electronic Signature and Electronic Commerce regulations
- Legal conditions and the development of technology
– Liability
- Self-regulation, accreditation
- IT-security market / export restrictions
- Wassenaar / Dual-Use regulation
- Applicable law and jurisdiction
- Data protection regulations
- Anonymity, pseudonyms, privacy and regulations
- Privacy and national security
- Information society and human rights

Where possible presentations should address ‘benefits to the users’ and ‘impact on society’. The programme committee is open to further suggestions, but attention to subjects such as the following would be of particular interest:

- Threats and risks in everyday life, and typical limitations of currently available mass-market implementations
- Trap doors: myth or reality?
- Protection against industrial espionage
- Users risks / insurance
- What do people want to use? What can they use?
- User perception and "critical success factors" to the adoption of security technologies.
For further information please contact:

Ulrike Schulte
Programme Manager
TeleTrusT Deutschland e.V.
Association for the Promotion of Trustworthiness of IT-Systems
Tel. +49-241-9632639
E-mail: ulrike.schulte@kryptokom.de
URL: http://www.eema.org/isse(opens in new window)
My booklet 0 0