[2271] in cryptography@c2.net mail archive
INVITATION TO GBI 2000 - CONFERENCE UPDATE AND REGISTRATION
daemon@ATHENA.MIT.EDU (Robert Hettinga)
Tue Mar 10 18:07:55 1998
Date: Tue, 10 Mar 1998 17:17:30 -0500
To: cryptography@c2.net
From: Robert Hettinga <rah@shipwright.com>
--- begin forwarded text
From: "Tracey Shepherd" <shephert@postoffice.co.uk>
To: <GBI2000@ICX.ORG>
Subject: INVITATION TO GBI 2000 - CONFERENCE UPDATE AND REGISTRATION DETA=
ILS
Date: Tue, 10 Mar 1998 17:22:28 -0000
MIME-Version: 1.0
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Importance: Normal
1998 Global Business Infrastructure 2000 (GBI 2000) Conference
Kurhaus Hotel, Scheveningen, The Hague, March 31st - 2nd April 1998
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Key components in creating a secure electronic commerce environment
are the captured in the OECD principles of International Cooperation,
Choice and Market-driven Cryptographic Methods, Privacy, Lawful
Access, Liability & Legal Aspects and Standards & Trust.. The 1998
GBI 2000 conference, organised by International Commerce eXchange
(ICX), will review progress on the implementation of the OECD
Guidelines and continue the dialogue begun last year. ICX is a non
profit making forum for businesses by businesses who take part in
electronic commerce over any network and who need confidence in its
security.
********************** 1998 GBI 2000 Programme **********************
1998 GBI 2000 provides six half day briefing sessions and panel
discussions. Each session will involve representatives from business
users, vendors, governments and international organisations.
On the second day of the conference a parallel meeting of the
International Cryptography Experiment (ICE) meeting will provide ICE
participants with an overview of important technology developments in
the provision of international cryptographic solutions capable of
meeting global business information security needs.
The combination of GBI 2000 and ICE is a unique opportunity to review
and contribute to progress on the issues and technologies enabling
secure electronic commerce in the next millennium.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Tuesday 31st March
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
8 a.m. Registration
9 a.m. Opening Keynote Speech
A senior figure from Shell Services International will explain the
importance of secure electronic commerce.. He will present a business
perspective on the importance of creating a predictable and secure
electronic commerce environment.
9.30 a.m Session 1 International Co-operation
The first session on Tuesday morning will focus on progress on the
principle of International Co-operation. The audience will be able to
judge whether unjustified obstacles to trade are being created.
Business Requirements - Ms. Lily Lin; Lecturer in marketing at
the International Hotel School, The Hague.
Deniz Erocal; Business Industry Advisory
Committee (BIAC) to the OECD
Government Response - A speaker from the European Commission DG3
10.45 a.m. - 11.15 a.m. Coffee
Netherlands Ministry of Economic Affairs
Ake Nilson; Marinade and ICC
Chris Sundt; ICL and the Confederation of British Industry
Session 1 moderator: Ake Nilson, Marinade
12.30 p.m. Lunch
13.30 p.m. Session 2 User Choice and Market Driven Development
In the afternoon progress on the principles of User Choice and Market
Driven Development of security methods will be reviewed.
Representatives from business, vendors and government will give their
different assessments. How open are the choices ? How market driven
is development? These are some of the major issues which will be
reviewed.
David Aucsmith; Intel
Jan Andersson - Sweden Post
14.45 p.m. - 15.15 p.m. Coffee/tea
Dean Adams; The Open Group
TBA; Siemens Ag
Session 2 Moderator: Adolf Doerig, Revisuisse Price Waterhouse
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Wednesday 1st April (Parallel Session)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
9 a.m. Keynote - GBI 2000
A senior manager of The UK Post Office, will give a keynote
introduction on Wednesday. The Post Office will explain their
approach to creating a trusted environment for secure electronic
commerce.
9.30 a.m. Session 3 Liability
The morning session will review the progress of implementing
Liability, coupled with a wider consideration of legal and regulatory
aspects.
Chris Taper, EEMA,
Yves LeRoux, Digital
10. 45 a.m. - 11.15 a.m. Coffee
Clare Wardle, UK Post Office Legal Services
Hany Elmanawy, Universal Postal Union
Session 3 moderator: Chris Taper, ICL
12.30 p.m. - Lunch
13.30 p.m. Session 4 Standardisation and User Trust
The afternoon of day three will review progress towards implementing
Standardisation and User Trust.
Trust In Cryptographic Methods - Ed Roeback; U.S. Department of
Commerce
Jeremy Hilton, The Post Office
Adolf Doerig, Revisuisse Price Waterhouse (Zurich)
14.45 p.m. - 15.15 p.m. Coffee/tea
David Lacey, Shell Services International
Anton Pronk, NNI
Marco Romagnoli, Telecom Italia
Session Moderator: Paolo Rossini, Telsy
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Wednesday 1st April (Parallel Session)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
8. 30 a.m. - 8.35 a.m. ICE Welcome
8. 35 a.m. ICE Keynote
International Cryptography Experiment - Past, Present, and Future
Stephen Walker, President and CEO, Trusted Information Systems
The founder of ICE, Steve Walker, Trusted Information Systems, will
start the day with a presentation on the motivation, history, and
principles of the ICE initiative. The ICE meeting will continue with
a series of technical sessions covering ICE, government initiatives,
cryptographic technologies, and industry perspectives.
Technical topics will include "plug-in" cryptography, cryptographic
security architectures, and cryptographic APIs, as well as public key
infrastructures, certification authorities, trusted third parties,
key recovery systems, encryption systems, key management schemes,
cryptographic algorithms, accreditation and certification, and export
regulatory matters. A number of major vendors will also provide
exhibits and displays.
9 a.m. ICE Session One - Government Initiatives
DARPA ICE Project Overview and Layered Cryptographic Architectures
Mr. David M. Balenson, ICE Project Leader, Trusted Information
Systems
US Crypto Standards Update
Mr. Edward Roback, US National Institute of Standards and Technology
(NIST)
MoD SOS TDP Update
(Invited) Lt. Col. Colin Whittaker, UK MOD
10.45 a.m. - 11.15 a.m. Coffee/tea
11.15 a.m. Session Two - Panel - KRISIS & EuroTrust Initiatives
Mr. Helmut Kurt, IABG
Mr. Alan Liddle, Trusted Information Systems
Mr. Paddy Holahan, Baltimore Technologies
12.30 p.m. - Lunch
Session Three - Cryptographic Technologies
Intel Common Data Security Architecture (CDSA)
Mr. David Aucsmith, Security Architect, Intel
Framework for Interoperability of Key Recovery Systems
Mr. Bob Frith, President, Key Recovery Alliance (KRA)
Mr. David Balenson, KRA Protocol Team
Practical Public Key Infrastructure
Mr. Pierre Boucher, Director of Government Programs, Entrust
14.45 p.m. - 15.15 p.m. Coffee/tea
15.15 p.m. Session Four - Industry Perspectives
Cryptographic Development Activities
Mr. Paddy Holahan, Business Development Manager, Baltimore
Technologies
Cryptographic Systems in Europe: A Manufacturer's Perspective
Mr. Paolo Rossini, Business Development Manager, Telsy
Implementing Cryptography ... in Practice
Prof. Henry Beker, Chairman and Chief Executive, Zergo Limited
Internationalized Cryptography for Developers
Dr. Roger Schell, Senior Development Manager, Novell
(TBD)
Mr. Frank Jorinssen, Utimaco Belgium nv
(TBD)
Mr. Steve Mathews, PC Security Ltd.
(TBD)
(Invited) Mr. Jim Schindler, Hewlett Packard
17.00 p.m. Adjourn
Thursday 2nd April - GBI 2000
9 a.m. Keynote - Trusted Third Party Requirements
Keynote Speaker (Henk de Vries, Netherlands Ministry of Transport &
Public Works) will be the keynote speaker on Thursday morning. This
will provide a Dutch government view on how a predictable and secure
environment for electronic commerce can be created, based on stated
Trusted Third Party requirements.
9.30 a.m. Session 5 Lawful Access
The morning session promises to be lively with a discussion on
progress implementing the principle of Lawful Access to encrypted
confidential data.
Business Requirements - Nick Mansfield, Shell Services International.
UK Government Policy - Nigel Hickson, UK Department of Trade and
Industry.
10. 45 a.m. - 11.15 a.m. Coffee
Business solutions to the recovery of keys:
Interoperability Framework - Bob Frith, Motorola and President of the
Key Recovery Alliance.
David Balenson, Trusted Information Systems
Pierre Boucher, Entrust
Session Moderator: Martin Roe, UK Post Office
12.30 p.m. - Lunch
13.30 p.m. Session 6 Privacy
The afternoon session of day three will consider progress on the
controversial Guideline Principle on privacy. Stephanie Perrin,
Canadian government, will lead what is expected to be a lively
discussion on progress and the way ahead.
Stephanie Perrin - Canadian Government
drs. John J. Borking, Plv. Voorzitter Registratiekamer (NL Data
Protection Registrar)
Francis Aldhouse - UK Deputy Data Protection Registrar
14.45 p.m. - 15.15 p.m. Coffee/tea
Marc Rotenberg - EPIC
Simon Davies - Privacy International
Ross Anderson - Cambridge University
Session Moderator: Stephanie Perrin
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
International Commerce eXchange (ICX)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
ICX was created in response to the need for a single focal point
encompassing all aspects of creating trust in the global information
infrastructure.
ICX addresses this issue by bringing together large, medium and small
business users, suppliers and governments to work for the mutual
benefit of all. ICX will create trust by identifying and satisfying
legal and regulatory requirements, developing and disseminating
business best practices and procedures, pinpointing and promoting
appropriate technical standards and controls.
Active involvement in ICX activities will contribute to bringing
together the wide diversity of knowledge, skills and experience
needed to provide practical secure electronic commerce solutions to
shared problems. ICX will identify and develop best practices that
can be the basis for market driven standards. ICX makes all the
advice and solutions it identifies freely available to its members.
Details on how you can join ICX can be found at http:/www.icx.org
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
International Cryptography Experiment
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
The International Cryptography Experiment (ICE) is seeking to
encourage the provision of international cryptographic solutions
capable of meeting global business information security needs.
Cryptography is a crucial technology for the provision of information
security services within the emerging Global Information
Infrastructure (GII). However, many governments are concerned that
the extensive and unconstrained availability of strong cryptography
may undermine their law enforcement and national security interests.
These conflicting pressures have resulted in a wide range of
technical and non-technical activities that are seeking to offer
solutions that achieve a widely accepted balance between the
different interests involved. The ICE an initiative has been running
since early 1994 as an informal international alliance of government
and industry groups with a common interest in promoting
internationally interoperable cryptographic security solutions.
More information on ICE is available at:
http://www.tis.com/crypto/ice.html.
******************** Delegate Registration Form *********************
Global Business Infrastructure 2000 Conference
The Hague, The Netherlands
2nd - 4th April 1997
Fax to Anne Hilton, JH Consulting Ltd, +44 (0)1249 783289
or Email to gbi2000@icx.org
Name:
Company:
Address:
Phone:
Fax:
E-Mail:
Payment Method: Credit Card/Cheque
Credit Card Number: Expiry Date:
************************** Payment Details **************************
The conference is organised on a not-for-profit basis. Charge per
delegate per day payable in advance is =A3250 or =A3580 for all 3 days,
which covers beverages, lunch, administration and conference
location. Optional conference dinner on Thursday night is =A360.
Charges cover administration, conference location, beverages and
lunch. All payments by credit card, cheque or bankers order in
advance, please.
Attendance fee includes coffee, tea and soft drinks at Registration
and during Conference breaks, plus a full Buffet Lunch.
Tuesday, 31st April 1998:...Y/N
Wednesday, 1st April 1998:...Y/N
Thursday, 2nd April 1998:...Y/N
All 3 days, 31st-2nd April 1998:...Y/N
Tickets are required for the following event:
I will attend the dinner on Wednesday, 2nd April 1998:...Y/N..
Total Amount:...............
Value Added tax is included in all quoted conference prices
Payment Methods
By Credit Card (Mastercard and Visa Only)
By faxing +44 (0)1249 783289 - Anne Hilton (JHCL) with your credit
card number and expiry date.
By Cheque
Cheques payable to: International Computers Limited
Send to: Anne Hilton, JH Consulting Ltd, 1 Hunters Meadow, Yatton
Keynell, Chippenham, Wilts, SN14 7JF, UK.
Your registration will be confirmed after processing. Please remember
to make suitable travel and accommodation arrangements in good time.
We look forward to welcoming you at the conference.
************************* Accommodation *************************
We have arranged a block booking in the Kurhaus Hotel where the
conference takes place for participants of the 1998 Global Business
Infrastructure 2000 (GBI 2000) Conference, March 31st - 2nd April
1998.
You can book a single room for the special rate of NLG 247.50 per
night, including breakfast and tax. Please do not forget to mention
the GBI 2000 conference as reference by booking your accommodation.
Kurhaus Hotel (NLG 247.50 incl. Breakfast and tax)
Gevers Deynootplein 30
2586 CK Den Haag
The Netherlands
Tel. +31 (0)70 - 4 16 26 36
Fax +31 (0)70 - 4 16 26 46
Other hotels in the surroundings of the Kurhaus:
Europa hotel ( NLG 308, 35 incl. Breakfast and tax)
Zwolsestraat 2
2587VJ Scheveningen
Tel. +31 (0)70 - 3 51 26 51
Fax+31 (0)70 - 3 50 64 73
Carlton Beach Hotel (NLG 290,-- incl. Breakfast and tax)
Gevers Deynootweg 201
2508AK Scheveningen
Tel. +31 (0)70 - 3 54 14 14
Fax + 31(0)70 - 3 52 00 20
Hotel in the centre of The Hague:
Novotel (NLG 240,-- incl. Breakfast and tax)
Hofweg 5-7
2511 AA Den Haag
Tel. +31 (0)70 - 3 64 88 46
Fax +31 (0)70 - 3 56 28 89
************************* Travel Details *************************
Local Airport - Schiphol Amsterdam (International airport with
regular flights from around the globe)
By taxi:
>From Schiphol Amsterdam airport a taxi will cost approx. NLG 150.
Please do not forget to agree a fixed price in advance.
By train:
>From the airport direct to The Hague CS (Central Sation). This takes
approx. 40 minutes. From the Hague CS you can take tram number 1 or 9
to Scheveningen. The tram stop is almost at the end of the line just
in front of the Kurhaus hotel. You can also take a taxi from The
Hague CS which will cost approx. NLG 25.
By car:
>From Amsterdam you take the A44 via Wassenaar to the Haque or the A4
to the Hague. Arriving in the Hague you follow the signs
Scheveningen, following the road Scheveningen Strand (Beach) you will
end up at the Gevers Deynootplein where the Kurhaus is located.Tracey
Shepherd
Post Office Research Group
Tel: 01246-214943
Fax: 01246-523325
--- end forwarded text
-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/