DISC 98

Area de Seguridad en Computo asc@conga.super.unam.mx
Fri, 5 Jun 1998 11:58:28 -0600 (GMT-0600)


==========================================================================

                    Computer Security Area (ASC) / DGSCA

                                  DISC    98

                           "Individual Responsability"
                      
                     Fifth Computer Security Event In Mexico

                      Mexico, D.F.     November 2-6, 1998

==========================================================================

                        C A L L   F O R   P A P E R S

The goal of DISC 98 event is to create  a conscience about the strategies 
of security to protect information between the community who uses computers.
This year the DISC belongs to the most important events of Mexico.  

The computing general congress (http://www.org.org.mx/cuarenta) 
celebrates forty years of computing in Mexico and convoques those 
specialist in computer sucurity to participate on this as lecture.

"Individual responsability" is the slogan of this year and suggest 
that the security of an organization should be totally supported 
by directive, security responsables, managers, and system's users.

The community is convocated to participate at DISC 98 event through 
the performance of theorics, technical, and applyed documents and 
those who presents practical experience in the following topics: 

                o Applied Cryptography
                o Cryptograhic Protocols
                o Intrusion Detection
                o Electronic Commerce 
                o Privacy
                o Protection of software and Intellectual Property
                o Security Architecture and Models
                o Security Protocols
                o Incident Handling and the Internet
                o Security on Large Networks other than the Internet
                o New Tools for Incident Handling
                o Preventing Incidents
                o Intrusion/Vulnerability Detection Tools
                o System/Network Monitoring Tools
		o Analysis of malicious code
	        o Applications of cryptographic techniques
       		o Attacks against networks and machines
       		o Detecting attacks, intrusions, and computer misuse
       		o Developing secure systems
       		o File and file system security
       		o Network security
       		o New firewall technologies
       		o Public key infrastructure
       		o Security in heterogeneous environments
       		o Security incident investigation and response


====================
Who should attend ?
====================

        * All the systems administrators who are interested in computer
Security.

        * All the people who are working into the field of Computer
Security, and handling  the Computer Security Incident.

        * Any person who is interested on Computer Security area, and wants 
to meet another expert on it. Consequently, it will help him or her to improve
security programs, security plans, and security tools by sharing and getting
a wide experience and knowladgement.

        * Those persons who want to stablish a groups of people who response
computer security incidents.

        * All of the who have a particular interest in configurating network
security, tools, Firewalls and related.


================
Important Dates:
================

Paper submission:       August 30 
Acceptance decision:    September 12
Final papers due:       September 26
Event's Date:           November 2-6


===================
Conference Location
===================

Hotel Royal, Mexico D.F.


========================
Workshop Format:
========================

We are going to perform tha parallel tutorial style presentations during
November 2,3 and 6. On November 4 and 5 will consist of conference paper
and workshop style presentations, as well as business sessions.
Two evenings are allocated for participants to hold events devoted to subjects
of particular interest ("birds of a feather" sessions).

Contributions should follow the following guidelines:
 
1. Tutorials:      Half or full day tutorial proposals will be considered.
 
2. Papers:         Written papers may be as long as desired, but
                   presentations must be limited to 30 minutes.
 
3. Workshop:       These informal sessions should either follow a more
                   "hands-on" approach or provide for a high degree of
                   audience participation. They should be tailored to
                   address specific issues and should be from 60 to 90 minutes
                   in duration. Panel Sessions on a particular topic are
                   acceptable.

========================
Instruction for authors:
========================
 
Under the following guidelines we will receive papers about conferences, worksho
p, and tutorials:
         

        * The documents should be delivered during the indicated date.

        * The documents should be contented high quality and original. It also s
hould include a summary that describes the content and style of the presentation. 

        * We will evaluate the papers depending upon the author's proporsal, in 
which it has to contain:

                - workshop title
                - workshop format (workshop, tutorials or conference)
                - workshop summary has to be less than two quarter sheets
                - requirements for the presentation (pc, datashow, etc.)
                - author's datum
                        = name
                        = adress
                        = curriculum vitae
                        = fax and telephone number
                        = e-mail

        * Is necessary include the next points in case of tutorials

                - goal
                - presentation and summary
                - the table of content
                - duration (half or full day)
                - tutorial stuffs (transparencies)


================
Accepted formats
================

        Those papers, which were selected, must present the complete paper of 
the conference to be include into the DISC 98 memories.  

Submmision should be accepted such as:

                - TeX/LaTex
                - Postcript
                - Word for Windows
                - ASCII 
                - Please contact the committe (disc98@asc.unam.mx) in case to us
e another format.


        Note: The specifications of the papers such as: margen, letter size, bla
nk spaces, etc. will be indicated in the DISC 98 page

                        http://www.asc.unam.mx/disc98


======================
Workshop Submissions 
=======================

Submissions will be delivered :

        o By E-mail (disc98@asc.unam.mx)

        o By Mail to the following adress:
                Area de Seguridad en C'omputo
                Direcci'on General de C'omputo Acad'emico
                Circuito Exterior, Ciudad Universitaria
                ZIP 04510
                Mexico, D.F.
                MEXICO


====================
Further Information
====================

E-mail :        disc98@asc.unam.mx

WWW    :        http://www.asc.unam.mx/disc98

Adress :
                Area de Seguridad en C'omputo
                Direcci'on General de C'omputo Acad'emico
                Circuito Exterior, Ciudad Universitaria
                ZIP 04510
                Mexico, D.F.
                MEXICO


Telephone Number : (52-5) 622 81 69 and  (52-5) 685 22 29
 
Facsimile        : (52 5) 6 22 80 43
                   Subject: DISC 98 


***********************************************************************


-- 
Juan Carlos Guel Lopez
Area de Seguridad en C'omputo   E-mail: asc@ds5000.super.unam.mx
DGSCA, UNAM                     Tel. (5) 622-81-69  Fax (5) 622-80-43
Circuito Exterior, C. U.        WWW: http://www.super.unam.mx/asc/
04510 Mexico D. F.              PGP: finger asc@ds5000.super.unam.mx