| |
|
| |
ERCIM News No. 49, April 2002 - Contents
|
| |
 |
| |
European Research Area - and Beyond
by Philippe Busquin, Commissioner for Research
|
| |
 |
| |
The Norwegian University of Science and Technology is now a Member of ERCIM |
| |
Kick-off Meeting on Image Understanding, by Eric Pauwels, CWI |
| |
ERCIM Working Group Matrix Computation and Statistics - Second Workshop,
by Bernard Philippe, INRIA |
| |
Call for Candidates: Cor Baayen Award 2002 |
| |
Announcement: ERCIM Sponsored Events |
 |
Euro-Legal by Heather Weaver, CLRC |
| |
 |
| |
Information Security - Introduction by Michael Waidner, IBM Zurich Research Lab, Switzerland |
| |
Methods and Tools against Hacker Attacks by Andreas Wespi, IBM Zurich Research Lab, Switzerland |
| |
Regulating Access to Web-published Data by Pierangela Samarati, University of Milan, Italy |
| |
An.on - Privacy Protection on the Internet
by Hannes Federrath Hannes Federrath, Dresden University of Technology, Germany |
| |
Privacy Protection and Trust Models by Olle Olsson, SICS |
| |
idemix for Internet Anonymity by Endre Bangerter, Jan Camenisch, Els Van Herreweghen
and Michael Waidner, IBM Zurich Research Lab, Switzerland |
| |
Towards Digital Credentials by Stefan Brands, McGill University, Canada |
| |
The Cryptography Group at Aarhus University by Ronald Cramer, Aarhus University, Denmark |
| |
New Prime Factorisation Record obtained using the General Number Field Sieve
by Friedrich Bahr, Jens Franke and Thorsten Kleinjung, University of Bonn, Germany |
| |
The Heuristic Evolution of Security and Insecurity
by John Clark and Jeremy Jacob, University of York, UK |
| |
Cryptography using Hyperelliptic Curves
by Norbert Göb and Georg Kux, FhG-Institute for Industrial Mathematics |
| |
Trusted Logic's Approach to Security for Embedded Systems: Innovation and Pragmatism
by Dominique Bolignano, Daniel Le Métayer and Claire Loiseaux, Trusted Logic S.A., France |
| |
Verification of Cryptographic Protocols used in Fixed and Mobile Networks
by Tom Coffey, Reiner Dojen and Tomas Flanagan, University of Limerick, Ireland |
| |
Security and Safety through Static Analysis by Chris Hankin and Thomas Jensen, IRISA/CNRS, France |
| |
Security: Formal Methods at Work
by Stefano Bistarelli, Fabio Martinelli and Marinella Petrocchi, IIT-CNR |
| |
CORAS - A Framework for Risk Analysis of Security Critical Systems
by Theo Dimitrakos, Juan Bicarregui, CLRC and Ketil Stølen, NTNU Group, Norway |
| |
SMM - Assessing a Companys IT Security by Holger Kurrek, FhG-ISST |
| |
MICOSec: CORBA as a Secure Platform for Mobile Applications
by Rudolf Schreiner and Ulrich Lang, ObjectSecurity Ltd, UK |
| |
Security for Distributed and Mobile Active Objects with the ProActive Library
by Isabelle Attali, Denis Caromel and Arnaud Contes, INRIA |
| |
Mobile IP Security in Foreign Networks by Sami Lehtonen, VTT |
| |
Security Issues underpinning Large Virtual Organisations
by Theo Dimitrakos, Brian Matthews and Juan Bicarregui, CLRC |
| |
Information Systems Security at CLRC by Trevor Daniels, CLRC |
| |
Secure Collaboration in Global Computing Systems by Christian Damsgaard Jensen, TCD |
| |
Integrating Biometric Techniques with an Electronic Signature for Remote Authentication
by Luca Bechelli, Stefano Bistarelli, Fabio Martinelli, Marinella Petrocchi and Anna Vaccarelli, IIT-CNR |
| |
Secure Resale of Tangible and Digital Goods by Harald Häuschen, University of Zurich, Switzerland |
| |
Managing Authorisations by Babak Sadighi Firozabadi and Mads Dam, SICS |
| |
The Role of Smart Cards in Practical Information Security
by Javier López, Antonio Maña, Pedro Merino and José M. Troya, University of Málaga, Spain |
| |
Realizing Trust through Smart Cards by István Mezgár and Zoltán Kincses, SZTAKI |
| |
 |
| |
Phytoplankton Dynamics - the Struggle for Light by Ben Sommeijer, CWI |
| |
Virtual and Interactive Environments for Workplaces of the Future
by John Wilson, University of Nottingham, UK |
| |
Blind Image Analysis helps Research in Cosmology
by Emanuele Salerno, Luigi Bedini, Ercan Kuruoglu and Anna Tonazzini, IEI-CNR |
| |
Relativistic MHD Computation of Gamma-ray Bursts by Barry Koren, CWI |
| |
The CORVAL2 Contribution to achieve Confidence in Middleware
by Ina Schieferdecker, Axel Rennoch and Dorota Witaszek, FhG-FOKUS |
| |
COVAX: an Internet Access to Libraries, Archives and Museums by Luciana Bordoni, ENEA/UDA, Italy |
| |
 |
| |
A Cluster of European Projects on Agents and Middleware Technologies
by Massimo Busuoli and Emanuela Rasconi , ENEA UDA-Agency for Sustainable Growth, Italy |
| |
Jalios: Master your Content by Vincent Bouthors, Jalios, France |
| |
 |
| |
Reports |
| |
SOFSEM 2001 - 28th Conference on Current Trends in Theory and Practice of Informatics
by Gabriela Andrejkova, SRCIM |
| |
Workshop on Current Research Directions in Computer Music
by Leonello Tarabella, Graziano Bertini and Gabriele Boschi, CNUCE-, IEI-CNR |
| |
For conference announcements, see: |
| |
Calendar of Events and Conferences related to IT and Applied Mathematics |
| |
 |
| |
The Research Council of Norway has launched an eight year, 23 million Euro, ICT program |
| |
International Review of UK Research in Computer Science |
| |
SZTAKI - Tamás Roska received the Bolyai Prize |
| |
CNR - Franco Denoth has been appointed as Director of the newly constituted Istituto di Informatica e Telematica |
| |
INRIA - The new innovation and communication center (PIC) of the INRIA Rocquencourt unit |
| |
|