Cover ERCIM News 48

This issue in pdf
(56 pages; 6,5 Mb)

Issue no. 47
previous issue

(January 2002):
Special theme:

all previous issues

Next issue:
July 2002

Next Special theme:


ERCIM News No. 49, April 2002 - Contents


European Research Area - and Beyond
spacerby Philippe Busquin, Commissioner for Research

  The Norwegian University of Science and Technology is now a Member of ERCIM
  Kick-off Meeting on Image Understanding, by Eric Pauwels, CWI
  ERCIM Working Group Matrix Computation and Statistics - Second Workshop,
spacerby Bernard Philippe, INRIA
  Call for Candidates: Cor Baayen Award 2002
  Announcement: ERCIM Sponsored Events
spacer Euro-Legal by Heather Weaver, CLRC
  Information Security - Introduction by Michael Waidner, IBM Zurich Research Lab, Switzerland
  Methods and Tools against Hacker Attacks by Andreas Wespi, IBM Zurich Research Lab, Switzerland
  Regulating Access to Web-published Data by Pierangela Samarati, University of Milan, Italy
  An.on - Privacy Protection on the Internet
spacerby Hannes Federrath Hannes Federrath, Dresden University of Technology, Germany
  Privacy Protection and Trust Models by Olle Olsson, SICS
  idemix for Internet Anonymity by Endre Bangerter, Jan Camenisch, Els Van Herreweghen
spacerand Michael Waidner, IBM Zurich Research Lab, Switzerland
  Towards Digital Credentials by Stefan Brands, McGill University, Canada
  The Cryptography Group at Aarhus University by Ronald Cramer, Aarhus University, Denmark
  New Prime Factorisation Record obtained using the General Number Field Sieve
spacerby Friedrich Bahr, Jens Franke and Thorsten Kleinjung, University of Bonn, Germany
  The Heuristic Evolution of Security and Insecurity
spacerby John Clark and Jeremy Jacob, University of York, UK
  Cryptography using Hyperelliptic Curves
spacerby Norbert Göb and Georg Kux, FhG-Institute for Industrial Mathematics
  Trusted Logic's Approach to Security for Embedded Systems: Innovation and Pragmatism
spacerby Dominique Bolignano, Daniel Le Métayer and Claire Loiseaux, Trusted Logic S.A., France
  Verification of Cryptographic Protocols used in Fixed and Mobile Networks
spacerby Tom Coffey, Reiner Dojen and Tomas Flanagan, University of Limerick, Ireland
  Security and Safety through Static Analysis by Chris Hankin and Thomas Jensen, IRISA/CNRS, France
  Security: Formal Methods at Work
spacerby Stefano Bistarelli, Fabio Martinelli and Marinella Petrocchi, IIT-CNR
  CORAS - A Framework for Risk Analysis of Security Critical Systems
spacerby Theo Dimitrakos, Juan Bicarregui, CLRC and Ketil Stølen, NTNU Group, Norway
  SMM - Assessing a Company’s IT Security by Holger Kurrek, FhG-ISST
  MICOSec: CORBA as a Secure Platform for Mobile Applications
spacerby Rudolf Schreiner and Ulrich Lang, ObjectSecurity Ltd, UK
  Security for Distributed and Mobile Active Objects with the ProActive Library
spacerby Isabelle Attali, Denis Caromel and Arnaud Contes, INRIA
  Mobile IP Security in Foreign Networks by Sami Lehtonen, VTT
  Security Issues underpinning Large Virtual Organisations
spacerby Theo Dimitrakos, Brian Matthews and Juan Bicarregui, CLRC
  Information Systems Security at CLRC by Trevor Daniels, CLRC
  Secure Collaboration in Global Computing Systems by Christian Damsgaard Jensen, TCD
  Integrating Biometric Techniques with an Electronic Signature for Remote Authentication
spacerby Luca Bechelli, Stefano Bistarelli, Fabio Martinelli, Marinella Petrocchi and Anna Vaccarelli, IIT-CNR
  Secure Resale of Tangible and Digital Goods by Harald Häuschen, University of Zurich, Switzerland
  Managing Authorisations by Babak Sadighi Firozabadi and Mads Dam, SICS
  The Role of Smart Cards in Practical Information Security
spacerby Javier López, Antonio Maña, Pedro Merino and José M. Troya, University of Málaga, Spain
  Realizing Trust through Smart Cards by István Mezgár and Zoltán Kincses, SZTAKI
  Phytoplankton Dynamics - the Struggle for Light by Ben Sommeijer, CWI
  Virtual and Interactive Environments for Workplaces of the Future
spacerby John Wilson, University of Nottingham, UK
  Blind Image Analysis helps Research in Cosmology
spacerby Emanuele Salerno, Luigi Bedini, Ercan Kuruoglu and Anna Tonazzini, IEI-CNR
  Relativistic MHD Computation of Gamma-ray Bursts by Barry Koren, CWI
  The CORVAL2 Contribution to achieve Confidence in Middleware
spacerby Ina Schieferdecker, Axel Rennoch and Dorota Witaszek, FhG-FOKUS
  COVAX: an Internet Access to Libraries, Archives and Museums by Luciana Bordoni, ENEA/UDA, Italy
  A Cluster of European Projects on Agents and Middleware Technologies
spacerby Massimo Busuoli and Emanuela Rasconi , ENEA UDA-Agency for Sustainable Growth, Italy
  Jalios: Master your Content by Vincent Bouthors, Jalios, France
  SOFSEM 2001 - 28th Conference on Current Trends in Theory and Practice of Informatics
spacerby Gabriela Andrejkova, SRCIM
  Workshop on Current Research Directions in Computer Music
spacerby Leonello Tarabella, Graziano Bertini and Gabriele Boschi, CNUCE-, IEI-CNR
  For conference announcements, see:
  Calendar of Events and Conferences related to IT and Applied Mathematics
  The Research Council of Norway has launched an eight year, 23 million Euro, ICT program
  International Review of UK Research in Computer Science
  SZTAKI - Tamás Roska received the Bolyai Prize
  CNR - Franco Denoth has been appointed as Director of the newly constituted Istituto di Informatica e Telematica
  INRIA - The new innovation and communication center (PIC) of the INRIA Rocquencourt unit