This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "IBWAS10"

From OWASP
Jump to: navigation, search
(β†’β€ŽDraft Agenda)
(Replaced content with '#REDIRECT OWASP IBWAS10')
 
(23 intermediate revisions by 2 users not shown)
Line 1: Line 1:
βˆ’
__NOTOC__
+
#REDIRECT [[OWASP IBWAS10]]
βˆ’
 
 
βˆ’
= 2nd. OWASP Ibero-American Web Application Security Conference (IBWAS'10)  =
 
βˆ’
 
 
βˆ’
held at [http://www.iscte.pt/ ISCTE - Lisbon University Institute] |
 
βˆ’
 
 
βˆ’
[http://ibwas09.netmust.eu IBWAS'09 (last year editon)] - [http://www.owasp.org/index.php/IBWAS09 Internal OWASP site]
 
βˆ’
 
 
βˆ’
'''16 - 17 December 2010''' (NEW DATES - PREVIOUS DATES CANCELLED DUE TO A GENERAL STRIKE IN PORTUGAL)
 
βˆ’
 
 
βˆ’
(a joint organization of the [http://www.owasp.org/index.php/Portuguese Portuguese] and [http://www.owasp.org/index.php/Spain Spanish] OWASP chapters)
 
βˆ’
 
 
βˆ’
<br> <!-- Header -->
 
βˆ’
 
 
βˆ’
==== Welcome  ====
 
βˆ’
 
 
βˆ’
{| style="width: 100%;"
 
βˆ’
|-
 
βˆ’
| style="width: 100%; color: rgb(0, 0, 0);" |
 
βˆ’
{| style="border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;"
 
βˆ’
|-
 
βˆ’
| style="width: 80%; color: rgb(0, 0, 0);" | [[Image:IBWAS10 logo.gif|621x280px]]
 
βˆ’
 
 
βˆ’
IBWAS'10, the 2nd. OWASP Ibero-American Web Application Security conference will be held in Lisbon (Portugal), on the '''16th and 17th December 2010''' ('''dates have been changed''').
 
βˆ’
 
 
βˆ’
The conference will take place at the [http://www.iscte.pt ISCTE - Lisbon University Institute]. The location details can be found [http://www.owasp.org/index.php/Ibwas10#tab=Venue here].
 
βˆ’
 
 
βˆ’
Registration is now '''open''', for both the [http://www.eventbrite.com/event/1073670377?ref=elink Training Day] on the 16th and for the [http://ibwas10.eventbrite.com Conference Day] on the 17th.
 
βˆ’
 
 
βˆ’
Conference proceedings will be '''published by OWASP, and distributed in electronic format'''. Last year proceedings were published by Springer ('''this year the proceedings will not be published by Springer due to a low number of submissions''').
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|-
 
βˆ’
|http://ibwas09.netmust.eu/files/ibwas10/CCIS_72.png
 
βˆ’
|This conference aims to bring together application security experts, researchers, educators and practitioners from the industry, academia and international communities such as OWASP, in order to discuss open problems and new solutions in application security. In the context of this track academic researchers will be able to combine interesting results with the experience of practitioners and software engineers.
 
βˆ’
 
 
βˆ’
In addition to the technical issues of the conference programme, our website provides you with tourist information on the city of Lisbon, unique for its cultural and historical richness, lovely surroundings and other nice places to visit around the city.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
'''Who Should Attend IBWAS'10:'''
 
βˆ’
 
 
βˆ’
*Academics
 
βˆ’
*Researchers
 
βˆ’
*Lifelong learning educators
 
βˆ’
*Technical staff
 
βˆ’
*Secondary, vocational, or tertiary educators
 
βˆ’
*Professionals from the private and public sector
 
βˆ’
*Technologists and Scientifics
 
βˆ’
*School counsellors, principals and teachers
 
βˆ’
*Education policy development representatives
 
βˆ’
*General personnel from vocational sectors
 
βˆ’
*Student counsellors
 
βˆ’
*Career/employment officers
 
βˆ’
*Education advisers
 
βˆ’
*Student Unions
 
βˆ’
*Bridging program lecturers &amp; support staff
 
βˆ’
*Library personnel
 
βˆ’
*International support and services staff
 
βˆ’
*Open learning specialists
 
βˆ’
*Application Developers
 
βˆ’
*Application Testers and Quality Assurance
 
βˆ’
*Application Project Management and Staff
 
βˆ’
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
 
βˆ’
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
 
βˆ’
*Security Managers and Staff
 
βˆ’
*Executives, Managers, and Staff Responsible for IT Security Governance
 
βˆ’
*IT Professionals Interesting in Improving IT Security
 
βˆ’
 
 
βˆ’
...and any person interested in Web Application and Services Security and Information Security in general.
 
βˆ’
 
 
βˆ’
We look forward to seeing you in Lisbon!
 
βˆ’
 
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
<!-- Twitter Box -->
 
βˆ’
 
 
βˆ’
| valign="top" style="border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);" | <!-- DON'T REMOVE ME, I'M STRUCTURAL --> <br>[http://www.twitter.com/ibwas10 http://twitter-badges.s3.amazonaws.com/twitter-a.png]
 
βˆ’
[http://www.facebook.com/#!/group.php?gid=113336378677245 http://www.allofads.com/files/images/facebook-logo.jpg]
 
βˆ’
[http://events.linkedin.com/2nd-Ibero-American-Web-Application/pub/273820 http://static03.linkedin.com/img/logos/logo_linkedin_88x22.png]
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|-
 
βˆ’
| style="border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);" |
 
βˆ’
Use the '''[http://search.twitter.com/search?q=%23ibwas10 #ibwas10]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?)
 
βˆ’
 
 
βˆ’
'''@ibwas10 Twitter Feed ([http://twitter.com/ibwas10 follow us on Twitter!])'''
 
βˆ’
| style="width: 110px; font-size: 95%; color: rgb(0, 0, 0);" |
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
<!-- End Banner -->
 
βˆ’
==== Call for Papers (CLOSED)  ====
 
βˆ’
 
 
βˆ’
'''THE IBWAS'10 CALL FOR PAPERS IS NOW CLOSED!!!'''
 
βˆ’
 
 
βˆ’
=== Call for Papers (english version) ===
 
βˆ’
[[#Call for Papers (portuguese version)]] [[#Call for Papers (spanish version)]]
 
βˆ’
 
 
βˆ’
You can find here a [http://ibwas09.netmust.eu/files/ibwas10/IBWAS10-CfP.pdf PDF version] of the Call for Papers. Also in [http://ibwas09.netmust.eu/files/ibwas10/IBWAS10-CfP-PT.pdf Portuguese]  (PortuguΓͺs)
 
βˆ’
 
 
βˆ’
== Introduction ==
 
βˆ’
 
 
βˆ’
There is a change in the information systems development paradigm. The emergence of Web 2.0 technologies led to the extensive deployment and use of web-based applications and web services as a way to developed new and flexible information systems. Such systems are easy to develop, deploy and maintain and demonstrate impressive features for users, resulting in their current wide use.
 
βˆ’
 
 
βˆ’
As a result of this paradigm shift, the security requirements have also changed. These web-based information systems have different security requirements, when compared to traditional systems. Important security issues have been found and privacy concerns have also been raised recently. In addition, the emerging Cloud Computing paradigm promises even greater flexibility; however corresponding security and privacy issues still need to be examined. The security environment should involve not only the surrounding environment but also the application core.
 
βˆ’
 
 
βˆ’
This conference aims to bring together application security experts, researchers, educators and practitioners from the industry, academia and international communities such as OWASP, in order to discuss open problems and new solutions in application security. In the context of this track academic researchers will be able to combine interesting results with the experience of practitioners and software engineers.
 
βˆ’
 
 
βˆ’
== Conference Topics ==
 
βˆ’
 
 
βˆ’
Suggested topics for papers submission include (but are not limited to):
 
βˆ’
*Secure application development
 
βˆ’
*Security of service oriented architectures
 
βˆ’
*Security of development frameworks
 
βˆ’
*Threat modelling of web applications
 
βˆ’
*Cloud computing security
 
βˆ’
*Web applications vulnerabilities and analysis (code review, pen-test, static analysis etc.)
 
βˆ’
*Metrics for application security
 
βˆ’
*Countermeasures for web application vulnerabilities
 
βˆ’
*Secure coding techniques
 
βˆ’
*Platform or language security features that help secure web applications
 
βˆ’
*Secure database usage in web applications
 
βˆ’
*Access control in web applications
 
βˆ’
*Web services security
 
βˆ’
*Browser security
 
βˆ’
*Privacy in web applications
 
βˆ’
*Standards, certifications and security evaluation criteria for web applications
 
βˆ’
*Application security awareness and education
 
βˆ’
*Security for the mobile web
 
βˆ’
*Attacks and Vulnerability Exploitation
 
βˆ’
 
 
βˆ’
== Paper Submission Instructions ==
 
βˆ’
 
 
βˆ’
Authors should submit an original paper in English, carefully checked for correct grammar and spelling, using the on-line submission procedure ([http://www.easychair.org/conferences/?conf=ibwas10 submission site]). Please check the paper formats so you may be aware of the accepted paper page limits (12 pages, in accordance to a supplied template, that can be downloaded from here: [ftp://ftp.springer.de/pub/tex/latex/llncs/word/LNCS-Office2007.zip in Word Format] and in [ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip LateX format]).
 
βˆ’
 
 
βˆ’
The guidelines for paper formatting provided at the conference web site must be strictly used for all submitted papers. The submission format is the same as the camera-ready format. Please check and carefully follow the instructions and templates provided.
 
βˆ’
 
 
βˆ’
Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable.
 
βˆ’
 
 
βˆ’
Papers that are out of the conference scope or contain any form of plagiarism will be rejected without reviews.
 
βˆ’
 
 
βˆ’
Remarks about the on-line submission procedure:
 
βˆ’
 
 
βˆ’
1. A "double-blind" paper evaluation method will be used. To facilitate that, the authors are kindly requested to produce and provide the paper, WITHOUT any reference to any of the authors. This means that is necessary to remove the author’s personal details, the acknowledgements section and any reference that may disclose the authors identity
 
βˆ’
 
 
βˆ’
2. Papers in ODF, PDF, DOC, DOCX or RTF format are accepted
 
βˆ’
 
 
βˆ’
3. The web submission procedure automatically sends an acknowledgement, by e-mail, to the contact author.
 
βˆ’
 
 
βˆ’
= Paper submission types=
 
βˆ’
 
 
βˆ’
'''Regular Paper Submission'''
 
βˆ’
 
 
βˆ’
A regular paper presents a work where the research is completed or almost finished. It does not necessary means that the acceptance is as a full paper. It may be accepted as a "full paper" (30 min. oral presentation), a "short paper" (15 min. oral presentation) or a "poster".
 
βˆ’
 
 
βˆ’
'''Position Paper Submission'''
 
βˆ’
 
 
βˆ’
A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topic areas. The acceptance of a position paper is restricted to the categories of "short paper" or "poster", i.e. a position paper is not a candidate to acceptance as "full paper".
 
βˆ’
 
 
βˆ’
= Camera-ready =
 
βˆ’
 
 
βˆ’
After the reviewing process is completed, the contact author (the author who submits the paper) of each paper will be notified of the result, by e-mail. The authors are required to follow the reviews in order to improve their paper before the camera-ready submission.
 
βˆ’
 
 
βˆ’
= Publications =
 
βˆ’
 
 
βˆ’
All accepted papers will be published in the conference proceedings, under an ISBN reference. Conference proceedings will be published by OWASP in electronic format ('''Springer proceedings have been canceled due to a low number of paper submissions''').
 
βˆ’
 
 
βˆ’
 
 
βˆ’
== Web-site ==
 
βˆ’
 
 
βˆ’
http://www.ibwas.com
 
βˆ’
 
 
βˆ’
== Secretariat ==
 
βˆ’
 
 
βˆ’
E-mail: secretariat@ibwas.com
 
βˆ’
 
 
βˆ’
== Important Dates ==
 
βˆ’
 
 
βˆ’
Submission of papers and all other contributions due: '''31st October 2010'''
 
βˆ’
 
 
βˆ’
Notification of acceptance: '''28th November 2010''' (delayed)
 
βˆ’
 
 
βˆ’
Camera-ready version of accepted contributions: '''5th December 2010'''
 
βˆ’
 
 
βˆ’
Conference: '''16th – 17th December 2010'''
 
βˆ’
 
 
βˆ’
=== Call for Papers (portuguese version) ===
 
βˆ’
 
 
βˆ’
== IntroduΓ§Γ£o ==
 
βˆ’
 
 
βˆ’
Existe uma mudanΓ§a profunda no paradigma de desenvolvimento de sistemas de informaΓ§Γ£o nos nossos dias. A emergΓͺncia de tecnologias Web 2.0 levaram a um desenvolvimento e implantaΓ§Γ£o massiva de aplicaΓ§Γ΅es e serviΓ§os Web, como a forma de desenvolvimento de sistemas de informaΓ§Γ£o flexΓ­veis. Tais sistemas sΓ£o simples de desenvolver, instalar e manter e demonstram um conjunto de funcionalidades atractivas para os utilizadores, o que as tornam tΓ£o apetecΓ­veis.
 
βˆ’
 
 
βˆ’
Como resultado desta mudanΓ§a paradigmΓ‘tica, os requisitos de seguranΓ§a tambΓ©m se alteraram. Estes sistemas de informaΓ§Γ£o baseados na Web possuem diferentes requisitos de seguranΓ§a, quando comparados com sistemas tradicionais. Neste tipo de sistemas Γ© possΓ­vel encontrar aspectos importantes de seguranΓ§a e de privacidade que podem afectar a forma como os mesmos operam e comprometer os seus utilizadores. Acresce o facto de que a emergΓͺncia da ComputaΓ§Γ£o na Nuvem, que promete ainda mais flexibilidade, tem ainda um impacto mais forte nestes requisitos de seguranΓ§a e de privacidade. O ambiente de seguranΓ§a deve envolver nΓ£o apenas o ambiente circundante mas igualmente o nΓΊcleo aplicacional.
 
βˆ’
 
 
βˆ’
Esta conferΓͺncia pretende juntar peritos em seguranΓ§a aplicacional, investigadores, educadores e profissionais da indΓΊstria, academia e comunidades internacionais como a OWASP, por forma a discutirem de forma aberta os problemas e as soluΓ§Γ΅es de seguranΓ§a aplicacional. Neste contexto, investigadores provenientes da academia e da indΓΊstria poderΓ£o combinar os resultados da sua investigaΓ§Γ£o com a experiΓͺncia de profissionais e de engenheiros de software.
 
βˆ’
 
 
βˆ’
== Temas da ConferΓͺncia ==
 
βˆ’
Os temas sugeridos para submissΓ£o de trabalhos incluem os seguintes (mas nΓ£o se limitam apenas aos listados):
 
βˆ’
*Desenvolvimento Seguro de AplicaΓ§Γ΅es
 
βˆ’
*SeguranΓ§a de Arquitecturas Orientadas por ServiΓ§os
 
βˆ’
*SeguranΓ§a das Estruturas e Ferramentas de Desenvolvimento
 
βˆ’
*ModelaΓ§Γ£o de AmeaΓ§as a AplicaΓ§Γ΅es Web
 
βˆ’
*SeguranΓ§a em Cloud Computing
 
βˆ’
*Vulnerabilidades e AnΓ‘lise de AplicaΓ§Γ΅es Web (revisΓ£o de cΓ³digo, testes de penetraΓ§Γ£o, anΓ‘lise estΓ‘tica, etc)
 
βˆ’
*MΓ©tricas para SeguranΓ§a Aplicacional
 
βˆ’
*Contra-medidas para Vulnerabilidades em AplicaΓ§Γ΅es Web
 
βˆ’
*TΓ©cnicas de Desenvolvimento e CodificaΓ§Γ£o em SeguranΓ§a
 
βˆ’
*Funcionalidades da Plataforma ou Linguagem de Desenvolvimento para a SeguranΓ§a de AplicaΓ§Γ΅es Web
 
βˆ’
*UtilizaΓ§Γ£o Segura de Bases de Dados em AplicaΓ§Γ΅es Web
 
βˆ’
*Controlo de Acesso em AplicaΓ§Γ΅es Web
 
βˆ’
*SeguranΓ§a em ServiΓ§os Web
 
βˆ’
*SeguranΓ§a do Browser Web
 
βˆ’
*Privacidade em AplicaΓ§Γ΅es Web
 
βˆ’
*Normas, CertificaΓ§Γ΅es e CritΓ©rios para AvaliaΓ§Γ£o da SeguranΓ§a em AplicaΓ§Γ΅es Web
 
βˆ’
*SensibilizaΓ§Γ£o e EducaΓ§Γ£o para a SeguranΓ§a Aplicacional
 
βˆ’
*SeguranΓ§a para a Web MΓ³vel
 
βˆ’
*Ataques e ExploraΓ§Γ£o de Vulnerabilidades
 
βˆ’
 
 
βˆ’
== InstruΓ§Γ΅es para a submissΓ£o de trabalhos ==
 
βˆ’
 
 
βˆ’
Os autores deve submeter um trabalho original escrito em InglΓͺs, devidamente verificado para evitar incorrecΓ§Γ΅es gramaticais ou sintΓ‘cticas, usando o procedimento de submissΓ£o on-line (http://www.easychair.org/conferences/?conf=ibwas10). Por favor, verifique os formatos aceites para os trabalhos e tenha atenΓ§Γ£o a dimensΓ£o mΓ‘xima dos mesmos (limite de 12 pΓ‘ginas, de acordo com o modelo fornecido e que pode ser obtido a partir da seguinte URL: ftp://ftp.springer.de/pub/tex/latex/llncs/word/LNCS-Office2007.zip).
 
βˆ’
 
 
βˆ’
As indicaΓ§Γ΅es para a formataΓ§Γ£o dos trabalhos fornecidos no site da conferΓͺncia e no template devem ser estritamente seguidas pelos autores que desejem submeter trabalhos. O formato de submissΓ£o Γ© o mesmo do formato final. Por favor, siga as instruΓ§Γ΅es de formataΓ§Γ£o usadas no template.
 
βˆ’
 
 
βˆ’
Cada trabalho deve indicar com clareza a natureza da sua contribuiΓ§Γ£o tΓ©cnica/cientΓ­fica e os problemas, domΓ­nios ou ambientes para o qual Γ© aplicΓ‘vel.
 
βˆ’
 
 
βˆ’
Todos os artigos que estejam fora do Γ’mbito da conferΓͺncia ou que sob os quais sejam detectados actos de plΓ‘gio, serΓ£o liminarmente rejeitados.
 
βˆ’
 
 
βˆ’
Alguns detalhes sobre o procedimento de submissΓ£o:
 
βˆ’
 
 
βˆ’
1. SerΓ‘ utilizado um procedimento de revisΓ£o anΓ³nimo, que serΓ‘ repetido por pelo menos dois revisores autΓ³nomos. Para facilitar este processo, que se pretende seja rΓ‘pido, eficiente e justo, Γ© solicitado aos autores que produzam os seu trabalho e que o submetam, SEM qualquer referΓͺncia a algum dos autores do mesmo. Isto significa que Γ© necessΓ‘rio remover os detalhes pessoais do autor, a secΓ§Γ£o de agradecimentos e qualquer outra referΓͺncia que possa revelar a identidade dos autores;
 
βˆ’
 
 
βˆ’
2. SerΓ£o aceites os seguintes formatos de ficheiros na submissΓ£o: ODF, PDF, DOC, DOCX e RTF;
 
βˆ’
 
 
βˆ’
3. O processo de submissΓ£o on-line envia automaticamente uma notificaΓ§Γ£o, atravΓ©s do correio electrΓ³nico, do resultado da submissΓ£o ao autor correspondente.
 
βˆ’
 
 
βˆ’
= Tipos de submissΓ£o de trabalhos =
 
βˆ’
 
 
βˆ’
'''SubmissΓ£o de trabalhos regulares'''
 
βˆ’
 
 
βˆ’
Um trabalho regular apresenta o trabalho em que a pesquisa estΓ‘ terminada ou muito prΓ³ximo de estar completa. NΓ£o significa que o trabalho seja aceite na categoria de β€œtrabalho completo”. Pode ser aceite como β€œtrabalho completo” (apresentaΓ§Γ£o oral de 30 minutos), β€œtrabalho curto” (apresentaΓ§Γ£o oral de 15 minutos) ou β€œposter”.
 
βˆ’
 
 
βˆ’
'''SubmissΓ£o de trabalhos de posiΓ§Γ£o'''
 
βˆ’
 
 
βˆ’
Um trabalho de posiΓ§Γ£o apresenta uma opiniΓ£o para discussΓ£o num determinado assunto. O objectivo de um trabalho deste tipo Γ© o de convencer a audiΓͺncia de que a sua opiniΓ£o Γ© vΓ‘lida e vale a pena ser escutada, sem ser necessΓ‘rio apresentar trabalho completo de pesquisa e/ou resultados devidamente validados. Γ‰ no entanto importante suportar os seus argumentos com provas e assegurar a validade das mesmas. Um trabalho deste tipo pode ser relatΓ³rio curto e a discussΓ£o de ideias, factos, situaΓ§Γ΅es, mΓ©todos, procedimentos ou resultados de pesquisa cientΓ­fica (bibliogrΓ‘fica, experimental, teΓ³rica ou outra) focada num dos temas da conferΓͺncia. A aceitaΓ§Γ£o de um trabalho de posiΓ§Γ£o estΓ‘ restringido Γ s categorias de β€œartigo curto” ou β€œposter”.
 
βˆ’
 
 
βˆ’
= Formato Final =
 
βˆ’
 
 
βˆ’
Depois de concluΓ­do o processo de revisΓ£o dos trabalhos submetidos, o autor de contacto (que submeteu o trabalho para a conferΓͺncia) serΓ‘ notificado do resultado da apreciaΓ§Γ£o. Os autores cujos trabalhos forem aceites devem seguir as recomendaΓ§Γ΅es dos revisores de melhoria dos seus trabalhos antes de submeterem a versΓ£o final dos mesmos.
 
βˆ’
 
 
βˆ’
= PublicaΓ§Γ΅es =
 
βˆ’
 
 
βˆ’
Todos os trabalhos aceites serΓ£o publicados na acta de conferΓͺncia, com uma identificaΓ§Γ£o ISBN. A acta da conferΓͺncia serΓ‘ publicada pela OWASP em formato electrΓ³nico ('''a ediΓ§Γ£o pela Springer foi cancelada devido ao nΓΊmero baixo de submissΓ΅es recebidas''').
 
βˆ’
 
 
βˆ’
== Site de Web ==
 
βˆ’
 
 
βˆ’
http://www.ibwas.com
 
βˆ’
 
 
βˆ’
== Secretariado ==
 
βˆ’
 
 
βˆ’
EndereΓ§o de correio electrΓ³nico: secretariat@ibwas.com
 
βˆ’
 
 
βˆ’
== Datas importantes ==
 
βˆ’
 
 
βˆ’
SubmissΓ£o de trabalhos: '''31 de Outubro de 2010'''
 
βˆ’
 
 
βˆ’
NotificaΓ§Γ£o de AceitaΓ§Γ£o: '''28 de Novembro de 2010'''
 
βˆ’
 
 
βˆ’
VersΓ£o final dos trabalhos aceites: '''5 de Dezembro de 2010'''
 
βˆ’
 
 
βˆ’
ConferΓͺncia: '''16 e 17 de Dezembro de 2010'''
 
βˆ’
 
 
βˆ’
=== Call for Papers (spanish version) ===
 
βˆ’
 
 
βˆ’
== IntroducciΓ³n ==
 
βˆ’
 
 
βˆ’
Existen importantes cambios en el paradigma del desarrollo de los sistemas de informaciΓ³n. La apariciΓ³n de tecnologΓ­as Web 2.0 ha permitido el desarrollo e implantaciΓ³n de forma masiva de aplicaciones y servicios web como una manera de desarrollar nuevos y flexibles sistemas de informaciΓ³n. Estos sistemas son fΓ‘ciles de desarrollar, implementar y mantener, ademΓ‘s de aportar atractivas caracterΓ­sticas para los usuarios favoreciendo asΓ­ el uso masivo que encontramos actualmente.
 
βˆ’
 
 
βˆ’
Como resultado de este cambio de paradigma, los requisitos de seguridad tambiΓ©n han cambiado. Estos sistemas de informaciΓ³n basados en la Web tienen diferentes requisitos de seguridad en comparaciΓ³n con los sistemas tradicionales. Se han identificado los aspectos de seguridad mΓ‘s importantes y la privacidad tambiΓ©n es un problema que se ha planteado recientemente. AdemΓ‘s, el emergente paradigma Cloud Computing promete una mayor flexibilidad; sin embargo, los problemas de seguridad y privacidad aΓΊn necesitan ser revisados. El entorno de seguridad deberΓ­a implicar no sΓ³lo al ambiente circundante, sino tambiΓ©n el nΓΊcleo de la aplicaciΓ³n.
 
βˆ’
 
 
βˆ’
Esta conferencia pretende reunir a expertos en seguridad de aplicaciones, investigadores, educadores y profesionales de la industria, el sector acadΓ©mico  y comunidades internacionales, como OWASP, con el fin de discutir los problemas abiertos y nuevas soluciones en seguridad de aplicaciones. En este contexto, los investigadores acadΓ©micos serΓ‘n capaces de combinar resultados interesantes con la experiencia de los profesionales y los ingenieros de software.
 
βˆ’
 
 
βˆ’
== Temas de la Conferencia ==
 
βˆ’
 
 
βˆ’
Los temas sugeridos para el envΓ­o de presentaciones incluyen (pero no estan limitados a):
 
βˆ’
 
 
βˆ’
* Desarrollo seguro de aplicaciones
 
βˆ’
* Seguridad en arquitecturas orientadas a servicios
 
βˆ’
* Seguridad en frameworks de desarrollo
 
βˆ’
* Modelado de amenazas en aplicaciones Web
 
βˆ’
* Seguridad en Cloud Computing
 
βˆ’
* Vulnerabilidades y AnaΔΊisis de aplicaciones Web (revisiΓ³n de cΓ³digo, pruebas de intrusiΓ³n, anΓ‘lisis estΓ‘tico, etc.)
 
βˆ’
* MΓ©tricas para seguridad en aplicaciones
 
βˆ’
* Soluciones y recomendaciones para las vulnerabilidades en aplicaciones Web
 
βˆ’
* TΓ©cnicas de codificaciΓ³n segura
 
βˆ’
* CaracterΓ­sticas de seguridad de la plataforma o lenguaje que ayuda a incrementar el nivel de seguridad en las aplicaciones Web
 
βˆ’
* Uso seguro de bases de datos en aplicaciones Web
 
βˆ’
* Control de acceso en aplicaciones Web
 
βˆ’
* Seguridad en servicios Web
 
βˆ’
* Seguridad en navegadores Web
 
βˆ’
* Privacidad en las aplicaciones Web
 
βˆ’
* EstΓ‘ndares, certificaciones y criterios de evaluaciΓ³n de la seguridad para aplicaciones Web
 
βˆ’
* SensibilizaciΓ³n y educaciΓ³n sobre seguridad en aplicaciones
 
βˆ’
* Seguridad para la Web mΓ³vil
 
βˆ’
* Ataques y explotaciΓ³n de vulnerabilidades
 
βˆ’
 
 
βˆ’
== Instrucciones para el envΓ­o de presentaciones ==
 
βˆ’
 
 
βˆ’
Los autores deben presentar un documento original en inglΓ©s, tras revisar cuidadosamente la gramΓ‘tica y ortografΓ­a, utilizando el procedimiento de envΓ­o on-line. Por favor, compruebe las caracterΓ­sticas del documento ya que debe ser consciente del lΓ­mite de pΓ‘ginas aceptadas (12 pΓ‘ginas, de acuerdo a una plantilla que se facilita y que pueden descargar desde aquΓ­ [ftp://ftp.springer.de/pub/tex/latex/llncs/word/LNCS-Office2007.zip en formato Word]).
 
βˆ’
 
 
βˆ’
Las directrices para el formato del documento facilitadas en el sitio web de la conferencia deben ser seguidas estrictamente para todos los trabajos presentados. El formato de presentaciΓ³n es el mismo que el formato final para impresiΓ³n. Por favor revise y siga cuidadosamente las instrucciones y las plantillas proporcionadas.
 
βˆ’
 
 
βˆ’
Cada trabajo debe indicar claramente la naturaleza de su contribuciΓ³n tΓ©cnica/cientΓ­fica, y los problemas, dominios o entornos en los que es aplicable.
 
βˆ’
 
 
βˆ’
Los trabajos que estΓ©n fuera del alcance de conferencias o puedan contener cualquier forma de plagio serΓ‘n descartados directamente.
 
βˆ’
 
 
βˆ’
Comentarios sobre el procedimiento de presentaciΓ³n on-line:
 
βˆ’
 
 
βˆ’
1. Se utilizarΓ‘ un mΓ©todo de revisiΓ³n anΓ³nimo, que serΓ‘ repetido al menos por dos revisores. Para facilitar esto, se ruega a los autores que proporcionen el trabajo sin ninguna referencia a los autores. Esto significa que es necesario eliminar los datos personales del autor, la secciΓ³n de agradecimientos y toda referencia que pueda revelar la identidad de los autores.
 
βˆ’
 
 
βˆ’
2. Se aceptan documentos en formato: ODF, PDF, DOC, DOCX o RTF.
 
βˆ’
 
 
βˆ’
3. El procedimiento de presentaciΓ³n Web automΓ‘ticamente envΓ­a un acuse de recibo, por correo electrΓ³nico, al autor de contacto.
 
βˆ’
 
 
βˆ’
= Tipos de envΓ­o de presentaciones =
 
βˆ’
 
 
βˆ’
'''EnvΓ­o de presentaciones normales'''
 
βˆ’
 
 
βˆ’
Una presentaciΓ³n normal presenta un trabajo donde la investigaciΓ³n se ha completado o casi finalizado. Esto no necesariamente significa que la aceptaciΓ³n sea sobre un trabajo completo. Puede ser aceptado como un "trabajo completo" (30 min. de presentaciΓ³n oral), un "trabajo corto" (15 min. de presentaciΓ³n oral) o "poster".
 
βˆ’
 
 
βˆ’
'''EnvΓ­o de presentaciones de posiciΓ³n'''
 
βˆ’
 
 
βˆ’
Una presentaciΓ³n de posiciΓ³n presenta una opiniΓ³n discutible sobre un tema. El objetivo de un trabajo de posiciΓ³n es convencer a la audiencia que su opiniΓ³n es vΓ‘lida y merece la pena ser escuchada, sin la necesidad de presentar un trabajo de investigaciΓ³n finalizado y/o los resultados validados. Es importante, sin embargo, apoyar su argumento con evidencias para asegurar la validez de sus opiniones. Un trabajo de posiciΓ³n puede ser un breve documento y discusiΓ³n de ideas, hechos, situaciones, mΓ©todos, procedimientos o resultados de la investigaciΓ³n cientΓ­fica (bibliogrΓ‘fica, experimental, teΓ³rico o de otro tipo) centrado en uno de los temas de la conferencia. La aceptaciΓ³n de una presentaciΓ³n de posiciΓ³n se limita a las categorΓ­as de "trabajo corto" o "poster", es decir, una presentaciΓ³n de posiciΓ³n no es candidata para ser aceptada como "trabajo completo".
 
βˆ’
 
 
βˆ’
= VersiΓ³n Final =
 
βˆ’
 
 
βˆ’
DespuΓ©s de que el proceso de revisiΓ³n se complete, el autor de contacto (el autor que presenta el documento) de cada trabajo serΓ‘ notificado del resultado, por correo electrΓ³nico. Los autores estΓ‘n obligados a seguir las revisiones con el objetivo de mejorar su trabajo antes del envΓ­o de la versiΓ³n final.
 
βˆ’
 
 
βˆ’
= Publicaciones =
 
βˆ’
 
 
βˆ’
Todos los trabajos aceptados serΓ‘n publicados por OWASP en los materiales de las conferencias, bajo una referencia ISBN.
 
βˆ’
 
 
βˆ’
== Sitio de las Conferencias ==
 
βˆ’
 
 
βˆ’
http://www.ibwas.com
 
βˆ’
 
 
βˆ’
== SecretarΓ­a ==
 
βˆ’
 
 
βˆ’
DirecciΓ³n de correo electrΓ³nicio: secretariat@ibwas.com
 
βˆ’
 
 
βˆ’
== Fechas importantes ==
 
βˆ’
 
 
βˆ’
EnvΓ­o de presentaciones: '''31 de Octubre de 2010'''
 
βˆ’
 
 
βˆ’
NotificaciΓ³n de aceptaciΓ³n: '''28 de Noviembre de 2010'''
 
βˆ’
 
 
βˆ’
VersiΓ³n final de presentaciones aceptadas: '''5 de Deciembre de 2010'''
 
βˆ’
 
 
βˆ’
Conferencias: '''16 y 17 de Deciembre de 2010'''
 
βˆ’
 
 
βˆ’
==== Organization and Program Committee  ====
 
βˆ’
 
 
βˆ’
=== IBWAS'10 Chairs  ===
 
βˆ’
 
 
βˆ’
'''Carlos SerrΓ£o''', ISCTE-IUL Instituto UniversitΓ‘rio de Lisboa, OWASP Portugal, Portugal
 
βˆ’
 
 
βˆ’
'''Vicente Aguilera DΓ­az''', Internet Security Auditors, OWASP Spain, Spain
 
βˆ’
 
 
βˆ’
=== IBWAS'10 Organization  ===
 
βˆ’
'''Fabio Cerullo''', OWASP Global Education Committee, Ireland
 
βˆ’
 
 
βˆ’
'''Dinis Cruz''', OWASP Board Member, UK
 
βˆ’
 
 
βˆ’
'''Paulo Coimbra''', OWASP Project Manager, UK
 
βˆ’
 
 
βˆ’
'''Miguel Correia''', Universidade de Lisboa, Portugal
 
βˆ’
 
 
βˆ’
'''Paulo Sousa''', Universidade de Lisboa, Portugal
 
βˆ’
 
 
βˆ’
'''Lucas C. Ferreira''', CΓ’mara dos Deputados, Brasil
 
βˆ’
 
 
βˆ’
'''Arturo "Buanzo" Busleiman''', OWASP Argentina, Argentina
 
βˆ’
 
 
βˆ’
'''Martin Tartarelli''', OWASP Argentina, Argentina
 
βˆ’
 
 
βˆ’
'''Paulo Querido''', Portugal
 
βˆ’
 
 
βˆ’
=== IBWAS'10 Program Committee  ===
 
βˆ’
 
 
βˆ’
'''André Zúquete''', Universidade De Aveiro, Portugal<br> '''Candelaria HernÑndez-Goya''', Universidad De La Laguna, Spain<br> '''Carlos Costa''', Universidade De Aveiro, Portugal<br> '''Carlos Ribeiro''', Instituto Superior Técnico, Portugal<br> '''Eduardo Neves''', OWASP Education Committee, OWASP Brazil, Brazil<br> '''Francesc Rovirosa i Raduà''', Universitat Oberta de Catalunya (UOC), Spain<br> '''Gonzalo Álvarez Marañón''', Consejo Superior de Investigaciones Científicas (CSIC), Spain<br> '''Isaac Agudo''', University of Malaga, Spain<br> '''Jaime Delgado''', Universitat Politecnica De Catalunya, Spain<br> '''Javier Hernando''', Universitat Politecnica De Catalunya, Spain<br> '''Javier Rodríguez Saeta''', Herta Security, Spain<br> '''Joaquim Castro Ferreira''', Universidade de Aveiro, Portugal<br> '''Joaquim Marques''', Instituto Politécnico de Castelo Branco, Portugal<br> '''Jorge DÑvila Muro''', Universidad Politécnica de Madrid (UPM), Spain<br> '''Jorge E. López de Vergara''', Universidad Autónoma de Madrid, Spain<br> '''José Carlos Metrôlho''', Instituto Politécnico de Castelo Branco, Portugal<br> '''José Luis Oliveira''', Universidade De Aveiro, Portugal<br> '''Kuai Hinojosa''', OWASP Global Education Committee, New York University, United States<br> '''Leonardo Chiariglione''', Cedeo, Italy<br> '''Leonardo Lemes''', Unisinos, Brasil<br> '''Manuel Sequeira''', ISCTE-IUL Instituto UniversitÑrio de Lisboa, Portugal<br> '''Marco Vieira''', Universidade de Coimbra, Portugal<br> '''Mariemma I. Yagüe''', University of MÑlaga, Spain<br> '''Miguel Correia''', Universidade de Lisboa, Portugal<br> '''Miguel Dias''', Microsoft, Portugal<br> '''Nuno Neves''', Universidade de Lisboa, Portugal<br> '''Osvaldo Santos''', Instituto Politécnico de Castelo Branco, Portugal<br> '''Panos Kudumakis''', Queen Mary University of London, United Kingdom<br> '''Paulo Sousa''', Universidade de Lisboa, Portugal<br> '''Rodrigo Roman''', University of Malaga, Spain<br> '''Rui Cruz''', Instituto Superior Técnico, Portugal<br> '''Rui Marinheiro''', ISCTE-IUL Instituto UniversitÑrio de Lisboa, Portugal<br> '''Sérgio Lopes''', Universidade do Minho, Portugal<br> '''Tiejun Huang''', Pekin University, China<br> '''Víctor VillagrÑ''', Universidad Politécnica de Madrid (UPM), Spain<br> '''Vitor Filipe''', Universidade de TrÑs-os-Montes e Alto Douro, Portugal<br> '''Vitor Santos''', Microsoft, Portugal<br> '''Vitor Torres''', Universitat Pompeu Fabra, Spain<br> '''Wagner Elias''', OWASP Brazil Chapter Leader, Brazil
 
βˆ’
 
 
βˆ’
==== Registration  ====
 
βˆ’
 
 
βˆ’
== Important Dates ==
 
βˆ’
 
 
βˆ’
Submission of papers and all other contributions due: '''31st October 2010'''
 
βˆ’
 
 
βˆ’
Notification of acceptance: '''28th November 2010'''
 
βˆ’
 
 
βˆ’
Camera-ready version of accepted contributions: '''5th December 2010'''
 
βˆ’
 
 
βˆ’
Conference: '''16th – 17th December 2010'''
 
βˆ’
 
 
βˆ’
== Registration ==
 
βˆ’
* [http://www.eventbrite.com/event/1073670377?ref=elink Registration on the OWASP IBWAS'10 Training Day] (part of the Conference) - 16th. December
 
βˆ’
* [http://ibwas10.eventbrite.com/ Registration on the OWASP IBWAS'10 Conference] - 17th. December
 
βˆ’
 
 
βˆ’
==== 16th December  ====
 
βˆ’
{{:IBWAS10 Training}}
 
βˆ’
 
 
βˆ’
==== 17th December  ====
 
βˆ’
 
 
βˆ’
== Draft Agenda  ==
 
βˆ’
 
 
βˆ’
{| style="border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;"
 
βˆ’
|- valign="middle"
 
βˆ’
| height="60" align="center" bgcolor="#8888BB"  colspan="3" style="none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''OWASP IBWAS'10 Conference Day'''</font>
 
βˆ’
|- valign="middle"
 
βˆ’
| height="60" width="100" bgcolor="#BBBBFF" align="center" rowspan="2"| 08:30 - 09:00
 
βˆ’
| width="750" bgcolor="#666699" style="color:white;" align="center" colspan="2"  | <b>Welcome Desk</b>
 
βˆ’
|-
 
βˆ’
| width="750" bgcolor="#CCCCEE" align="center" colspan="2"| <b>PARTICIPANTS RECEPTION</b>
 
βˆ’
|- valign="middle"
 
βˆ’
| height="60" width="100" bgcolor="#BBBBFF" align="center"  rowspan="2"| 09:00 - 09:30
 
βˆ’
| width="750" bgcolor="#666699" style="color:white;" align="center" colspan="2" |  <b>Room B2.04</b>
 
βˆ’
|-
 
βˆ’
| width="750" bgcolor="#CCCCEE" align="center" colspan="2" |  <b>OPENING SESSION</b><br>Professor LuΓ­s Reto (ISCTE-IUL Dean), Professor Francisco Cercas (ISTA President), Carlos SerrΓ£o (ISCTE-IUL, OWASP.Portugal), Vicente Aguillera (OWASP.Spain)
 
βˆ’
|- valign="middle"
 
βˆ’
| height="120" width="100" bgcolor="#BBBBFF" align="center" rowspan="2"| 09:30 - 10:30
 
βˆ’
| width="750" bgcolor="#666699" style="color:white;" align="center" colspan="2" |  <b>Room B2.04</b>
 
βˆ’
|-
 
βˆ’
| width="750" bgcolor="#CCCCEE" align="center" colspan="2" | <b>KEYNOTE SPEECH</b><br>Professor Carlos Ribeiro<br>[[#Keynote: How cryptography can rescue the web]]
 
βˆ’
|- valign="middle"
 
βˆ’
| height="30" width="100" bgcolor="#BBBBFF" align="center" | 10:30 - 10:45
 
βˆ’
| width="750" bgcolor="#EEEEFF" align="center" colspan="2" | <b>COFFEE BREAK</b>
 
βˆ’
|- valign="middle"
 
βˆ’
| height="120" width="100" bgcolor="#BBBBFF" align="center" rowspan="2" | 10:45 - 11:45
 
βˆ’
| width="750" bgcolor="#666699" style="color:white;" align="center" colspan="2"  | <b>Room B2.04</b>
 
βˆ’
|-
 
βˆ’
| width="750" bgcolor="#CCCCEE" align="center" colspan="2" | <b>KEYNOTE SPEECH</b><br>Dinis Cruz<br>"Keynote Title"
 
βˆ’
|- valign="middle"
 
βˆ’
| height="180" width="100" bgcolor="#BBBBFF" align="center" rowspan="2" | 11:45 - 13:15
 
βˆ’
| width="375" bgcolor="#666699" style="color:white;" align="center" | <b>Room B2.04</b>
 
βˆ’
| width="375" bgcolor="#666699" style="color:white;" align="center"  | <b>Room TBD</b>
 
βˆ’
|-
 
βˆ’
| width="375" bgcolor="#CCCCEE" align="center" | <b>TECHNICAL TRACK</b><br>LuΓ­s Grangeia<br>"Talk Title"<br>Arturo 'Buanzo' Busleiman<br>[[#Talk: Jiffy - A secure instant messenger]]
 
βˆ’
| width="375" bgcolor="#CCCCEE" align="center" | <b>TECHNICAL TRACK</b><br>Martin Knobloch<br>[[#Talk: Developing Secure Applications with OWASP]]<br>Bruno Morisson<br>[[#Talk: The Thing That Should Not Be (a glimpse into the future of web application security)]]
 
βˆ’
|- valign="middle"
 
βˆ’
| height="60" width="100" bgcolor="#BBBBFF" align="center" | 13:15 - 14:30
 
βˆ’
| width="750" bgcolor="#EEEEFF" align="center" colspan="2"  | <b>LUNCH BREAK</b>
 
βˆ’
|- valign="middle"
 
βˆ’
| height="300" width="100" bgcolor="#BBBBFF" align="center" rowspan="2" | 14:30 - 17:00
 
βˆ’
| width="375" bgcolor="#666699" style="color:white;" align="center" | <b>Room B2.04</b>
 
βˆ’
| width="375" bgcolor="#666699" style="color:white;" align="center"  | <b>Room TBD</b>
 
βˆ’
|-
 
βˆ’
| width="375" bgcolor="#CCCCEE" align="center" | <b>TECHNICAL TRACK</b><br>Miguel Correia<br>[[#Talk: Software Security in the Clouds]]<br>Bruno Pedro<br>[[#Talk: Is OAuth really secure?]]<br>Francisco Rente<br>"Talk Title"<br>Christian Martorella<br>[[#Talk: 2010 and still bruteforcing]]
 
βˆ’
| width="375" bgcolor="#CCCCEE" align="center" | <b>RESEARCH TRACK</b><br>Accepted Papers Presentations
 
βˆ’
|- valign="middle"
 
βˆ’
| height="30" width="100" bgcolor="#BBBBFF" align="center" | 17:00 - 17:15
 
βˆ’
| width="750" bgcolor="#EEEEFF" align="center" colspan="2"  | <b>COFFEE BREAK</b>
 
βˆ’
|- valign="middle"
 
βˆ’
| height="180" width="100" width="100" bgcolor="#BBBBFF" align="center" rowspan="2"| 17:15 - 18:45
 
βˆ’
| width="375" bgcolor="#666699" style="color:white;" align="center" | <b>Room B2.04</b>
 
βˆ’
| width="375" bgcolor="#666699" style="color:white;" align="center"  | <b>Room TBD</b>
 
βˆ’
|-
 
βˆ’
| width="375" bgcolor="#CCCCEE" align="center" | <b>TECHNICAL TRACK</b><br>John Wilander<br>[[#Talk: Will new HTTP headers save us?]]<br>Martin Knobloch<br>[[#Talk: Developing compliant applications]]
 
βˆ’
| width="375" bgcolor="#CCCCEE" align="center" | <b>... TRACK</b><br>
 
βˆ’
|- valign="middle"
 
βˆ’
| height="30" width="100" bgcolor="#BBBBFF" align="center" rowspan="2"| 18:45 - 19:00
 
βˆ’
| width="750" bgcolor="#666699" style="color:white;" align="center"  colspan="2" | <b>Room B2.04</b>
 
βˆ’
|-
 
βˆ’
| width="750" bgcolor="#CCCCEE" align="center" colspan="2" | <b>CLOSING SESSION</b>
 
βˆ’
|}
 
βˆ’
<br>
 
βˆ’
 
 
βˆ’
== Keynote: How cryptography can rescue the web  ==
 
βˆ’
 
 
βˆ’
'''Professor Carlos Ribeiro'''
 
βˆ’
 
 
βˆ’
[[File:carlosribeiro.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.ist.utl.pt/ Instituto Superior TΓ©cnico], [http://www.utl.pt/ Universidade TΓ©cnica de Lisboa], Portugal
 
βˆ’
 
 
βˆ’
The Web is gaining more and more commercial relevance and with that becoming a more interesting target for attack. On the other hand the Web communications foundations have not change much, and the programming skills of the average programmer are decreasing with the increasing number of programmers. This talk will focus on the first issue and how cryptography may be used to prevent several attacks. Crucial to this goal is the recent release of DNSSEC and several other Certificate infrastructures (e.g. Stork  - a pan-European authentication infrastructure that may become keystones of this change.
 
βˆ’
 
 
βˆ’
== Talk: The Thing That Should Not Be (a glimpse into the future of web application security) ==
 
βˆ’
 
 
βˆ’
'''Bruno Morisson'''
 
βˆ’
 
 
βˆ’
[[File:brunomorisson.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.integrity.pt/ Integrity, S.A.], Portugal
 
βˆ’
 
 
βˆ’
Developers are not security practicioners. Security practitioners are not developers. Developers create web applications. Security practitioners want those apps to be secure (sometimes even if security breaks functionality).
 
βˆ’
Are developers and security practitioners like oil and water ? Are security practitioners taking the right approach to help web developers understand and prevent security issues, or are we simply trying to brute force developers into security gurus ?
 
βˆ’
 
 
βˆ’
== Talk: Developing Secure Applications with OWASP  ==
 
βˆ’
 
 
βˆ’
'''Martin Knobloch'''
 
βˆ’
 
 
βˆ’
[[File:martinknobloch.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.sogeti.nl/ Sogeti Netherlands], [http://www.owasp.org/index.php/Netherlands OWASP Netherlands], Netherlands
 
βˆ’
 
 
βˆ’
After an introduction about OWASP, Martin will higlight the top projects of OWASP. During the presentation Martin does explain how OWASP material can be used to raise awareness about secure appliation development and how OWASP material does fit into a (secure) development lifecycle.
 
βˆ’
 
 
βˆ’
== Talk: Developing compliant applications  ==
 
βˆ’
 
 
βˆ’
'''Martin Knobloch'''
 
βˆ’
 
 
βˆ’
[[File:martinknobloch.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.sogeti.nl/ Sogeti Netherlands], [http://www.owasp.org/index.php/Netherlands OWASP Netherlands], Netherlands
 
βˆ’
 
 
βˆ’
How to develop applications to be compliant to security related laws and regulations?
 
βˆ’
To be compliant means to follow the regulations, most of the times not known by the developers. To be compliant includes to proof to be compliant.
 
βˆ’
This presentation is about how to develop compliant (Web) applications that prove to be compliant!
 
βˆ’
 
 
βˆ’
== Talk: Software Security in the Clouds  ==
 
βˆ’
 
 
βˆ’
'''Miguel Correia'''
 
βˆ’
 
 
βˆ’
[[File:miguelcorreia.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.ul.pt/ University of Lisboa], [http://www.fc.ul.pt/ Faculty of Sciences], Portugal
 
βˆ’
 
 
βˆ’
Recently an expert wrote rather enfatically that "the current state of security in commercial software is rather distasteful, marked by embarrassing public reports of vulnerabilities and actual attacks". This situation is particularly concerning in times when companies are exporting their applications and data to cloud computing systems. The first part of the talk will be a personal vision of the combination of techniques and tools needed for protecing software. The second part will argue that this combination is still insuficient for critical applications in the cloud and propose solutions based on distributing trust among different clouds.
 
βˆ’
 
 
βˆ’
== Talk: Jiffy - A secure instant messenger  ==
 
βˆ’
 
 
βˆ’
'''Arturo 'Buanzo' Busleiman'''
 
βˆ’
 
 
βˆ’
[[File:arturobuanzo.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.owasp.org/index.php/Argentina OWASP Argentina], Argentina
 
βˆ’
 
 
βˆ’
Jiffy - "Just for you" is an instant messaging system baseed
 
βˆ’
on OWASP's Enigform, SSL and the OpenPGP Web-of-Trust. In this talk,
 
βˆ’
Buanzo will introduce us to OpenPGP, Enigform and Jiffy.
 
βˆ’
 
 
βˆ’
== Talk: Is OAuth really secure?  ==
 
βˆ’
 
 
βˆ’
'''Bruno Pedro'''
 
βˆ’
 
 
βˆ’
[[File:brunopedro.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.tarpipe.com Tarpipe], Portugal
 
βˆ’
 
 
βˆ’
Is the OAuth protocol really secure? Even though the OAuth authorization protocol has been published as the RFC 5849 and is being widely adopted by large Internet companies, it's important to stress out its possible security vulnerabilities.
 
βˆ’
 
 
βˆ’
This talk will focus on the OWASP Top 10 Application Security Risks and how OAuth is affected by them. While some of the security risks are mitigated by OAuth, developers need to take some action to prevent other risks from affecting their implementations.
 
βˆ’
 
 
βˆ’
== Talk: Will new HTTP headers save us?  ==
 
βˆ’
 
 
βˆ’
'''John Wilander'''
 
βˆ’
 
 
βˆ’
[[File:johnwilander.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.omegapoint.se/ Omegapoint], Sweden
 
βˆ’
 
 
βˆ’
Browser vendors and Internet techies are teaming up to find solutions to some of the most common and dangerous security problems on the web. New HTTP headers seems to be a favorite carrier of security instructions from the server to the browser. During this talk John will demo three such headers – '''Strict-Transport-Security, X-Frame-Options, and X-Content-Security-Policy''' – and discuss if they can solve cross-site scripting, clickjacking, phising, and man-in-the-middle attacks.
 
βˆ’
 
 
βˆ’
== Talk: 2010 and still bruteforcing  ==
 
βˆ’
 
 
βˆ’
'''Christian Martorella'''
 
βˆ’
 
 
βˆ’
[[File:christianmartorella.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.verizonbusiness.com/ Verizon Business], UK
 
βˆ’
 
 
βˆ’
The presentation will review some of the latest attacks that affected big companies and involved Brute force attacks, showing that this attack is still very effective. The second part of the presentation will introduce Webslayer, an OWASP project, that intend to cover all needs for web application brute force tests.
 
βˆ’
 
 
βˆ’
 
 
βˆ’
==== Papers  ====
 
βˆ’
=== Papers  ===
 
βˆ’
Authors should submit an original paper in English, carefully checked for correct grammar and spelling, using the on-line submission procedure ([http://www.easychair.org/conferences/?conf=ibwas10 submission site]). Please check the paper formats so you may be aware of the accepted paper page limits (12 pages, in accordance to a supplied template, that can be downloaded from here: [ftp://ftp.springer.de/pub/tex/latex/llncs/word/LNCS-Office2007.zip in Word Format]).
 
βˆ’
 
 
βˆ’
The guidelines for paper formatting provided at the conference web site must be strictly used for all submitted papers. The submission format is the same as the camera-ready format. Please check and carefully follow the instructions and templates provided.
 
βˆ’
 
 
βˆ’
=== Accepted Papers  ===
 
βˆ’
 
 
βˆ’
==== Speakers  ====
 
βˆ’
 
 
βˆ’
=== Keynote Speakers  ===
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|-
 
βˆ’
|'''Professor Carlos Ribeiro'''
 
βˆ’
 
 
βˆ’
[[File:carlosribeiro.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.ist.utl.pt/ Instituto Superior TΓ©cnico], [http://www.utl.pt/ Universidade TΓ©cnica de Lisboa], Portugal
 
βˆ’
 
 
βˆ’
|Carlos Ribeiro (Ph.D.) is Professor at the Computer and Information Systems Department at the IST/UTL, where he teaches Network Security, Computer Security, Security Protocols and Operating Systems courses. He has received his PhD degree in Computer Science in 2002 from IST/UTL. Carlos Ribeiro's main research area is Security. He is co-coordenator of the PhD in Information Security, and vice-president of IST computer and network unit. He has been a researcher at Inesc-id since 2002, where he is currently the leader of the Distributed Systems research Group. He has participated in several National and International research projects in computer and network security, and has been an active researcher in the e-voting field since 2002.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
=== Panel Speakers  ===
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|-
 
βˆ’
|'''Bruno Morisson'''
 
βˆ’
[[File:brunomorisson.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.integrity.pt/ Integrity, S.A.], Portugal
 
βˆ’
 
 
βˆ’
|Bruno Morisson is a Consultant and Partner at INTEGRITY S.A., a
 
βˆ’
Consulting and Advisory firm focusing on Information Security
 
βˆ’
Management, Telecom Management and IT Governance, where he provides
 
βˆ’
consultancy, auditing and advisory services. In a past life he has
 
βˆ’
held positions as a Senior Information Security Consultant and as
 
βˆ’
Security Operations Manager, providing information security management
 
βˆ’
services to customers in the financial, public and energy sectors in
 
βˆ’
Portugal.
 
βˆ’
 
 
βˆ’
For the last 12 years he's been involved in several areas of
 
βˆ’
Information Security, from consulting, architecture, engineering,
 
βˆ’
auditing and penetration testing, as well as integration of OpenSource
 
βˆ’
security solutions. He's been actively involved with the InfoSec
 
βˆ’
community in Portugal, being one of the founders of the portuguese
 
βˆ’
chapter of The Honeynet Project, leading the InfoSec-Pros-PT
 
βˆ’
mailing-list and currently helping gather the community in a monthly
 
βˆ’
informal meeting - Confraria Security&IT.
 
βˆ’
Bruno also holds several certifications in Information Security
 
βˆ’
(CISSP-ISSMP, CISA, ISO27001LA).
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|-
 
βˆ’
|'''LuΓ­s Grangeia'''
 
βˆ’
[[File:luisgrangeia.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.sysvalue.pt/ Sysvalue, S.A.], Portugal
 
βˆ’
 
 
βˆ’
|Luis Grangeia is Partner at SysValue, S.A., currently leading the company’s Information Systems Auditing practice. SysValue S.A. is a Portuguese Company focused on the reliability of Information Systems with practices in Auditing, Consulting, Integration, Training and Research and Development.
 
βˆ’
 
 
βˆ’
Since 2001 he has been conducting IS audits and penetration tests to major national and foreign companies, such as Portugal Telecom, Banco EspΓ­rito Santo, Banco Santander, UNICRE, DirecΓ§Γ£o-Geral do Tesouro, among others. Luis also contributes occasionally to information security research, with an article of note on the technique of DNS cache snooping.
 
βˆ’
 
 
βˆ’
Luis has attended Computer Science Engineering at Instituto Superior TΓ©cnico and currently holds the SANS GSNA, CISSP, CISA and ISO 27001 Lead Auditor certifications.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|-
 
βˆ’
|'''Francisco Rente'''
 
βˆ’
[[File:franciscorente.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.uc.pt/fctuc Faculdade de CiΓͺncia e Tecnologia], [http://www.uc.pt Universidade de Coimbra], Portugal
 
βˆ’
 
 
βˆ’
|Francisco Nina Rente, is an enthusiast and an evangelist of information security, especially in matters of privacy. He had his BsC and MsC in Computer Science on University of Coimbra. Back in 2006, he founded CERT-IPN, a CSIRT team of IPN Institute, where he did R&D, consultancy and management of InfoSec until June of 2010. Francisco, is currently PhD student in University of Coimbra, where he works in "Malicious Stealth Communications". Since July of 2010, Francisco is CEO of Dognædis, a company based in Portugal, focused in Information Security and Software Assurance.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|'''Martin Knobloch'''
 
βˆ’
[[File:martinknobloch.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.sogeti.nl/ Sogeti Netherlands], [http://www.owasp.org/index.php/Netherlands OWASP Netherlands], Netherlands
 
βˆ’
 
 
βˆ’
|Martin Knobloch is employed at Sogeti Netherlands as Senior Security Consultant. He is founder and thought leader of the Sogeti task force  PaSS, Proactive Security Strategy, with an integral solution of information security within organisation, infrastructure and software.
 
βˆ’
At OWASP, Martin is board member of the OWASP Netherlands Chapter and member of the Global Education Committee.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|'''Miguel Correia'''
 
βˆ’
[[File:miguelcorreia.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.ul.pt/ University of Lisboa], [http://www.fc.ul.pt/ Faculty of Sciences], Portugal
 
βˆ’
 
 
βˆ’
|Miguel Correia is Assistant Professor of the [http://www.di.fc.ul.pt/ Department of Informatics], [http://www.ul.pt/ University of Lisboa] [http://www.fc.ul.pt/ Faculty of Sciences], and Adjunct Faculty of the [http://www.cmu.edu/ Carnegie Mellon] [http://www.ini.cmu.edu/ Information Networking Institute]. He is a member of the [http://lasige.di.fc.ul.pt/ LASIGE] research unit and the [http://www.navigators.di.fc.ul.pt/ Navigators] research team. He has been involved in several international and national research projects related to intrusion tolerance and security, including the TCLOUDS, MAFTIA and CRUTIAL EC-IST projects, and the ReSIST NoE. He is currently the coordinator and an instructor of the joint Carnegie Mellon University and University of Lisboa [http://msi.di.fc.ul.pt/ MSc in Information Security]. He has more than 50 publications in international journals, conferences and workshops. He authored with Paulo Sousa a book titled "SeguranΓ§a no Software" (FCA, 2010). More information about him is available at [http://www.di.fc.ul.pt/~mpc http://www.di.fc.ul.pt/~mpc].
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|'''Arturo 'Buanzo' Busleiman'''
 
βˆ’
[[File:arturobuanzo.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.owasp.org/index.php/Argentina OWASP Argentina], Argentina
 
βˆ’
 
 
βˆ’
|Buanzo is a nerd. Yes, a so-called geek. Why? Simple: he started programming at the age of 8, got into information security by
 
βˆ’
12 (Oh, the BBS era...!) and now he performs as a Security Consultant
 
βˆ’
for the Argentinian Computer Emergency Response Team (ArCERT). If you
 
βˆ’
enjoy programming, Open Source Software, Linux and all things security
 
βˆ’
and geeky, you might enjoy one of his talks.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|'''John Wilander'''
 
βˆ’
[[File:johnwilander.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.omegapoint.se/ Omegapoint], Sweeden
 
βˆ’
 
 
βˆ’
|John Wilander is an application security researcher and consultant. He is a partner and evangelist at Omegapoint, a consultancy firm based in Sweden. John typically works as a security focused software developer. Java and JavaScript are his languages of choice.
 
βˆ’
 
 
βˆ’
After his Master's degree in Computer Science and Engineering from LinkΓΆping University (Sweden) and Nanyang Technological University (Singapore) he pursued a PhD in application security. Last paper still pending but John's research publications can be found here.
 
βˆ’
 
 
βˆ’
John started the Swedish OWASP Chapter in 2007 and has since been leader and co-leader. In 2010 he chaired the most successful OWASP AppSec EU conference so far – OWASP AppSec Research 2010. John along with the Swedish chapter are listed as contributors to OWASP Top 10 2010.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|'''Bruno Pedro'''
 
βˆ’
[[File:brunopedro.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.tarpipe.com/ Tarpipe], Portugal
 
βˆ’
 
 
βˆ’
|Bruno Pedro is a systems engineer with over 15 years’ experience in database related applications who’s been developing Web Applications since 1995. He’s the author of the O'Reilly book "PHP and Smarty on Large-Scale Web Development" and has spoken on numerous technical conferences and events.
 
βˆ’
 
 
βˆ’
He’s the author of Auth_Container_SOAP, PEAR’s SOAP based plug-and-play authentication package and, more recently, a big proponent of the OpenID and OAuth protocols.
 
βˆ’
 
 
βˆ’
Bruno started tarpipe.com in 2008 because he couldn't find any Web applications that could easily automate his publishing needs to social media Web sites.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|'''Christian Martorella'''
 
βˆ’
[[File:christianmartorella.jpg]]
 
βˆ’
 
 
βˆ’
[http://www.verizonbusiness.com/ Verizon Business], UK
 
βˆ’
 
 
βˆ’
|Christian Martorella has been working in the field of information security for the last 10 years, starting his career in Argentina IRS as security consultant, now he's Practice Leader in Threat and Vulnerability - EMEA in Verizon Business. He is cofounder an active member of Edge-Security team, where security tools and research is released. He has been speaker at What The Hack!, NoConName, FIST Conferences, OWASP Summit 2008 and OWASP Spain IV & VI, Source Conference Barcelona and Hack.LU. Christian has contributed with open source assessment tools like OWASP WebSlayer and Metagoofil. He likes all related to Information Gathering and Penetration testing. Christian currently holds the President position at the FIST Conferences board, and in the past taught Ethical Hacking at the IT Security Master of La Salle University.
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
==== Venue  ====
 
βˆ’
 
 
βˆ’
IBWAS'10 will be taking place at the [http://www.iscte.pt ISCTE - Lisbon University Institute] in Lisbon, Portugal.
 
βˆ’
 
 
βˆ’
== Location ==
 
βˆ’
Ed. ISCTE <br> Av. das ForΓ§as Armadas<br> 1600- Lisboa<br> Portugal<br>
 
βˆ’
 
 
βˆ’
Find the [http://maps.google.com/maps?q=iscte,+lisboa,+portugal&hl=en&cd=1&ei=JFx0S_ScKYyGONOz1YkB&sig2=FsC9HEg2JrBD00ARc_U3IA&sll=38.724358,-9.148865&sspn=0.077408,0.150719&ie=UTF8&view=map&cid=7285641604236232209&ved=0CBgQpQY&hq=iscte,+lisboa,+portugal&hnear=&ll=38.749766,-9.154122&spn=0.009673,0.01884&t=h&z=16&iwloc=A location on Google Maps].
 
βˆ’
 
 
βˆ’
<googlemap lat="38.749565" lon="-9.15277" zoom="15">
 
βˆ’
38.748862, -9.152384, ISCTE-IUL
 
βˆ’
</googlemap>
 
βˆ’
 
 
βˆ’
 
 
βˆ’
http://www.allofads.com/files/images/mapa_iscte.jpg
 
βˆ’
 
 
βˆ’
== How to get there? ==
 
βˆ’
'''Car'''
 
βˆ’
* Go up the Av.Βͺ das ForΓ§as Armadas.
 
βˆ’
* Turn north at the crossing with Av.Βͺ Prof. Gama Pinto. The crossing is located at the highest point of Av.Βͺ das ForΓ§as Armadas.
 
βˆ’
* Turn to the second street right.
 
βˆ’
* Turn to the first street right.
 
βˆ’
* The main entrance of ISCTE is at your left.
 
βˆ’
 
 
βˆ’
'''Train'''
 
βˆ’
* Leave the train at the Entrecampus station. Look for the exit leading to Av.Βͺ da RepΓΊblica.
 
βˆ’
* Walk north for about 250 m towards the Rotunda de Entrecampus (a circle).
 
βˆ’
* At the circle, turn left to the Av.Βͺ das ForΓ§as Armadas.
 
βˆ’
* Climb west for about 300 m towards Sete Rios. Use the sidewalk on the right.
 
βˆ’
* The entry leading to ISCTE will be at your right, immediatly after the canteen of the University of Lisbon.
 
βˆ’
 
 
βˆ’
'''Bus'''
 
βˆ’
* Get on any [http://www.carris.pt/ Carris] bus with numbers [http://www.carris.pt/horarios/a054_1.pdf 54], [http://www.carris.pt/horarios/a701_1.pdf 701], or [http://www.carris.pt/horarios/a732_2.pdf 732].
 
βˆ’
* Leave the bus at the "Faculdade de FarmΓ‘cia" stop, at the top of Av.Βͺ das ForΓ§as Armadas, close to an old house with ia battlemented roof.
 
βˆ’
* Walk down the avenue for about 50 m. The entry leading to ISCTE will be at your left, immediatly before the canteen of the University of Lisbon.
 
βˆ’
 
 
βˆ’
'''Subway'''
 
βˆ’
 
 
βˆ’
''First alternative:''
 
βˆ’
* Leave the train at the [http://www.metrolisboa.pt/portals/0/pdfs/mapasEstacoes/linhaAmarela/ec_aid.pdf Entrecampos] station.
 
βˆ’
* Exit the station through the north exit, leading to the Rotunda de Entrecampos (a circle), close to Av.Βͺ das ForΓ§as Armadas.
 
βˆ’
* From the circle, go west, up the Av.Βͺ das ForΓ§as Armadas, for about 300 m.
 
βˆ’
* Use the sidewalk on the right.
 
βˆ’
* The entry leading to ISCTE will be at your right, immediatly after the canteen of the University of Lisbon.
 
βˆ’
 
 
βˆ’
''Second alternative:''
 
βˆ’
* Leave the train at the [http://www.metrolisboa.pt/portals/0/pdfs/mapasEstacoes/linhaAmarela/cu_aid.pdf Cidade UniversitΓ‘ria] station.
 
βˆ’
* Exit the station through the passage leading to Hospital de Santa Maria.
 
βˆ’
* Walk south, along the left sidewalk of Av.Βͺ Prof. Gama Pinto, for about 150 m (i.e., walk towards the Av.Βͺ das ForΓ§as Armadas).
 
βˆ’
* After the crossing with the Av.Βͺ Prof. Egas Moniz (at your right), turn into the first street at your left.
 
βˆ’
* Turn to the first street right.
 
βˆ’
* The main entrance of ISCTE is at your left.
 
βˆ’
 
 
βˆ’
Here is the representation of the walking on the map.
 
βˆ’
 
 
βˆ’
http://www.allofads.com/files/images/mapa_iscte_1.jpg
 
βˆ’
 
 
βˆ’
 
 
βˆ’
'''Links'''
 
βˆ’
 
 
βˆ’
Metro: [http://www.metrolisboa.pt www.metrolisboa.pt] <br>
 
βˆ’
Buses [http://www.carris.pt www.carris.pt]<br>
 
βˆ’
Trains: [http://www.cp.pt www.cp.pt]<br>
 
βˆ’
Taxis: [http://www.antral.pt www.antral.pt]
 
βˆ’
 
 
βˆ’
==== Hotels  ====
 
βˆ’
=== Hotels ===
 
βˆ’
This page contains information about the recommended hotels for the conference. All of the hotels are near to the conference place at a 5 to 15 minutes walking distance. PLease use the following reference when reserving your hotel: "'''ConferΓͺncia IBWAS'10'''".
 
βˆ’
 
 
βˆ’
== SANA Metropolitan Hotel **** ==
 
βˆ’
Rua Soeiro Pereira Gomes, Parcela 2, Entrecampos, 1600-198 Lisboa, Lisboa
 
βˆ’
 
 
βˆ’
[[File:sanametro01.jpg]]
 
βˆ’
[[File:sanametro02.jpg]]
 
βˆ’
 
 
βˆ’
Location on [http://maps.google.com/maps/ms?ie=UTF8&hl=pt-PT&msa=0&msid=104715835640056575562.00044cb43ee4b9e509aca&ll=38.748762,-9.159701&spn=0.009204,0.011802&z=16&iwloc=00044cb52de8286b65d85&source=embed Google Maps].
 
βˆ’
 
 
βˆ’
Hotel [http://www.sanahotels.com/gca/index.php?hotelId=50&lng=en web-site].
 
βˆ’
 
 
βˆ’
{|cellspacing="1" cellpading="1" border="1"
 
βˆ’
|-
 
βˆ’
|bgcolor="#cccccc"|'''Room type'''
 
βˆ’
|bgcolor="#cccccc"|'''Individual'''
 
βˆ’
|bgcolor="#cccccc"|'''Double'''
 
βˆ’
|-
 
βˆ’
|bgcolor="#eeeeee"|'''Standard'''
 
βˆ’
|67 euros
 
βˆ’
|72 euros
 
βˆ’
|-
 
βˆ’
|bgcolor="#eeeeee"|'''Extra Bed'''
 
βˆ’
|30 euros
 
βˆ’
|
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
== Vip Executive Villa Rica Hotel **** ==
 
βˆ’
Av.5 de Outubro Nr. 295, Entrecampos, 1600-035 Lisboa (Lisboa)
 
βˆ’
 
 
βˆ’
http://www.viphotels.com/Images/VIPExecutiveVillaRica/galeria/Exterior/01.jpg
 
βˆ’
 
 
βˆ’
Location on [http://www.viphotels.com/pt/Hoteis/VipExecutive/VipExecutiveVillaRica/Localizacao.aspx Google Maps].
 
βˆ’
 
 
βˆ’
Hotel [http://www.viphotels.com/pt/Hoteis/VipExecutive/VipExecutiveVillaRica/OHotel.aspx web-site].
 
βˆ’
 
 
βˆ’
== NH Campo Grande **** ==
 
βˆ’
Campo Grande, 7, 1700-087 Lisboa, Lisboa
 
βˆ’
 
 
βˆ’
http://www.nh-hoteles.pt/nh/hotel-gallery/1101383-t2-z2w.jpg
 
βˆ’
http://www.nh-hoteles.pt/nh/hotel-gallery/1101375-t2-z2w.jpg
 
βˆ’
 
 
βˆ’
Location on [http://www.nh-hoteles.pt/nh/pt/hotels/portugal/lisbon/nh-campo-grande.html?type=location Google Maps].
 
βˆ’
 
 
βˆ’
Hotel [http://www.nh-hoteles.pt/nh/pt/hotels/portugal/lisbon/nh-campo-grande.html web-site].
 
βˆ’
 
 
βˆ’
{|cellspacing="1" cellpading="1" border="1"
 
βˆ’
|-
 
βˆ’
|bgcolor="#cccccc"|'''Room type'''
 
βˆ’
|bgcolor="#cccccc"|'''Individual'''
 
βˆ’
|bgcolor="#cccccc"|'''Double'''
 
βˆ’
|-
 
βˆ’
|bgcolor="#eeeeee"|'''Standard'''
 
βˆ’
|83 euros
 
βˆ’
|90 euros
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
== Hotel VIP Executive Zurique *** ==
 
βˆ’
Rua Ivone Silva 18, 1050 Lisboa
 
βˆ’
 
 
βˆ’
http://www.viphotels.com/Images/VIPExecutiveZurique/galeria/Exterior/03.jpg
 
βˆ’
 
 
βˆ’
http://www.viphotels.com/Images/VIPExecutiveZurique/galeria/Interior/05.jpg
 
βˆ’
 
 
βˆ’
Location on [http://www.viphotels.com/pt/Hoteis/VipExecutive/VipExecutiveZurique/Localizacao.aspx Google Maps].
 
βˆ’
 
 
βˆ’
Hotel [http://www.viphotels.com/pt/Hoteis/VipExecutive/VipExecutiveZurique/OHotel.aspx web-site].
 
βˆ’
 
 
βˆ’
{|cellspacing="1" cellpading="1" border="1"
 
βˆ’
|-
 
βˆ’
|bgcolor="#cccccc"|'''Room type'''
 
βˆ’
|bgcolor="#cccccc"|'''Individual'''
 
βˆ’
|bgcolor="#cccccc"|'''Double'''
 
βˆ’
|-
 
βˆ’
|bgcolor="#eeeeee"|'''Standard'''
 
βˆ’
|65 euros
 
βˆ’
|70 euros
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
== Hotel Berna *** ==
 
βˆ’
Avenida AntΓ³nio Serpa 13, 1069 Lisboa
 
βˆ’
 
 
βˆ’
http://www.viphotels.com/Images/VIPInnBerna/galeria/Exterior/02.jpg
 
βˆ’
 
 
βˆ’
http://www.viphotels.com/Images/VIPInnBerna/galeria/Interior/05.jpg
 
βˆ’
 
 
βˆ’
Location on [http://www.viphotels.com/pt/Hoteis/VipInn/VipInnBerna/Localizacao.aspx Google Maps].
 
βˆ’
 
 
βˆ’
Hotel [http://www.viphotels.com/pt/Hoteis/VipInn/VipInnBerna/OHotel.aspx web-site].
 
βˆ’
 
 
βˆ’
{|cellspacing="1" cellpading="1" border="1"
 
βˆ’
|-
 
βˆ’
|bgcolor="#cccccc"|'''Room type'''
 
βˆ’
|bgcolor="#cccccc"|'''Individual'''
 
βˆ’
|bgcolor="#cccccc"|'''Double'''
 
βˆ’
|-
 
βˆ’
|bgcolor="#eeeeee"|'''Standard'''
 
βˆ’
|47,30 euros
 
βˆ’
|53,60 euros
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
== Holiday Inn Hotel Continental **** ==
 
βˆ’
Rua Laura Alves 9, 1050 Lisboaβ€Ž
 
βˆ’
 
 
βˆ’
[[File:hinn01.jpg]]
 
βˆ’
[[File:hinn02.jpg]]
 
βˆ’
 
 
βˆ’
Location on [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=Rua+Laura+Alves,+9++1069-169+Lisboa+Portugal&sll=38.74144,-9.149605&sspn=0.039833,0.073471&ie=UTF8&hq=&hnear=R.+Laura+Alves+9,+Ns.+de+F%C3%A1tima,+1050+Lisbon,+Portugal&ll=38.741666,-9.149873&spn=0.009958,0.018368&t=h&z=16&iwloc=r1 Google Maps].
 
βˆ’
 
 
βˆ’
Hotel [http://www.grupo-continental.com/home/index.php?option=com_content&view=article&id=55&Itemid=77 web-site].
 
βˆ’
 
 
βˆ’
{|cellspacing="1" cellpading="1" border="1"
 
βˆ’
|-
 
βˆ’
|bgcolor="#cccccc"|'''Room type'''
 
βˆ’
|bgcolor="#cccccc"|'''Individual'''
 
βˆ’
|bgcolor="#cccccc"|'''Double'''
 
βˆ’
|-
 
βˆ’
|bgcolor="#eeeeee"|'''Standard'''
 
βˆ’
|78 euros
 
βˆ’
|88 euros
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
== Radisson Blu Lisboa **** ==
 
βˆ’
Av. Marechal Craveiro Lopes, 390, Entrecampos, Lisboa (Lisboa)
 
βˆ’
 
 
βˆ’
http://www.hoteis.com/13/hotels/1000000/530000/524600/524550/hcom_524550_7_b.jpg
 
βˆ’
http://static.laterooms.com/hotelphotos/laterooms/179198/gallery/radisson-blu-lisboa-lisboa_250520090848039933.jpg
 
βˆ’
 
 
βˆ’
Location on [http://www.radissonblu.com/hotel-lisbon/location Google Maps].
 
βˆ’
 
 
βˆ’
Hotel [http://www.radissonblu.com/hotel-lisbon web-site].
 
βˆ’
 
 
βˆ’
==== Sponsors  ====
 
βˆ’
 
 
βˆ’
== Sponsors  ==
 
βˆ’
 
 
βˆ’
We are currently soliciting sponsors for the IBWAS'10 Conference. Please refer to our '''[https://docs.google.com/fileview?id=0B6VV6XaEAb3dNjEzNDIyYTAtOTc3NC00Njg3LWIxNGQtZmEwYmYxNzEwMzRi&hl=en&authkey=CL_NweEF sponsorship opportunities]''' for details.
 
βˆ’
 
 
βˆ’
Slots are going fast so [mailto:secretariat@ibwas.com contact us] to sponsor today!
 
βˆ’
 
 
βˆ’
{| cellspacing="10" border="0" align="center" style="background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;"
 
βˆ’
|-
 
βˆ’
|
 
βˆ’
 
 
βˆ’
== Sponsors  ==
 
βˆ’
 
 
βˆ’
| [http://www.iscte.pt http://ibwas09.netmust.eu/files/iscte-iul.png]
 
βˆ’
| [http://www.adetti.pt http://ibwas09.netmust.eu/files/adetti.png]
 
βˆ’
| [http://www.isecauditors.com http://ibwas09.netmust.eu/files/pasted-graphic.jpg]
 
βˆ’
| [http://lasige.di.fc.ul.pt/ http://ibwas09.netmust.eu/files/lasige.png]
 
βˆ’
|-
 
βˆ’
| &nbps;
 
βˆ’
| [http://www.maxdata.pt http://ibwas09.netmust.eu/files/ibwas10/maxdata.png]
 
βˆ’
| [http://www.noesis.pt http://ibwas09.netmust.eu/files/ibwas10/noesis.png]
 
βˆ’
| [http://www.neoglobeconsulting.com/ http://ibwas09.netmust.eu/files/ibwas10/neoglobeconsulting.png]
 
βˆ’
|-
 
βˆ’
|
 
βˆ’
 
 
βˆ’
== Media Sponsors ==
 
βˆ’
 
 
βˆ’
|  [http://www.aeiou.pt http://ibwas09.netmust.eu/files/ibwas10/aeiou.png]
 
βˆ’
|  [http://www.borrmart.es/redseguridad.php http://ibwas09.netmust.eu/files/redseguridad.jpg]
 
βˆ’
|
 
βˆ’
|-
 
βˆ’
| &nbsp;
 
βˆ’
|-
 
βˆ’
|
 
βˆ’
 
 
βˆ’
== Supported by ==
 
βˆ’
 
 
βˆ’
| [[Image:]]
 
βˆ’
| [[Image:]]
 
βˆ’
| [[Image:]]
 
βˆ’
|-
 
βˆ’
|
 
βˆ’
| [[Image:]]
 
βˆ’
| [[Image:]]
 
βˆ’
| [[Image:]]
 
βˆ’
|-
 
βˆ’
|
 
βˆ’
| [[Image:]]
 
βˆ’
 
βˆ’
|
 
βˆ’
|-
 
βˆ’
|
 
βˆ’
|}
 
βˆ’
==== Tourism  ====
 
βˆ’
 
 
βˆ’
=== Visit Lisbon ===
 
βˆ’
For Tourist Information and more: [http://www.visitlisboa.com/home.asp?lng=uk Visit Lisbon] (website of the Lisbon Tourism Office). See also [http://www.atl-turismolisboa.pt/home.asp?lng=uk here]. About Portugal, see [http://www.visitportugal.com/ here].
 
βˆ’
 
 
βˆ’
LISBON is beautiful, historic, modern, sunny & it never stops! It is an enchanting city with delightful cuisine and unforgettable sites. The city holds many pleasant surprises to visitors who wish to enjoy their stay. The capital of Portugal since its conquest from the Moors in 1147, Lisbon is a legendary city with over 20 centuries of History. The Alfama is one of the oldest quarters in Lisbon. It survived the earthquake of 1755 and still retains much of its original layout. In addition to Alfama are the likewise old quarters of Castelo and Mouraria, on the western and northern slopes of the hill that is crowned by St. George's Castle. Radiant skies brighten the monumental city, with its typical tile covered building faΓ§ades and narrow medieval streets, where one can hear the fado being played and sung at night.
 
βˆ’
 
 
βˆ’
Here's a taste of what you can find here in Lisbon, or nearby.
 
βˆ’
 
 
βˆ’
{|
 
βˆ’
|-
 
βˆ’
|'''Torre de BelΓ©m'''
 
βˆ’
|'''Mosteiro dos JerΓ³nimos'''
 
βˆ’
|'''Ponte 25 de Abril'''
 
βˆ’
|-
 
βˆ’
|[[File:torredebelem.jpg]]
 
βˆ’
|[[File:mosteirojeronimos.jpg]]
 
βˆ’
|[[File:ponte21abril.jpg]]
 
βˆ’
|-
 
βˆ’
|'''Castelo de SΓ£o Jorge'''
 
βˆ’
|'''Alfama'''
 
βˆ’
|'''Parque Eduardo VII'''
 
βˆ’
|-
 
βˆ’
|[[File:castelosjorge.jpg]]
 
βˆ’
|[[File:algfama.jpg]]
 
βˆ’
|[[File:parqueeduardo7.jpg]]
 
βˆ’
|-
 
βˆ’
|'''Aqueduto das Águas Livres'''
 
βˆ’
|'''Museu dos Coches'''
 
βˆ’
|'''Casa dos Bicos'''
 
βˆ’
|-
 
βˆ’
|[[File:aqueduto.jpg]]
 
βˆ’
|[[File:coches.jpg]]
 
βˆ’
|[[File:bicos.jpg]]
 
βˆ’
|-
 
βˆ’
|'''Parque das NaΓ§Γ΅es'''
 
βˆ’
|'''OceanΓ‘rio'''
 
βˆ’
|'''PavilhΓ£o Multiusos'''
 
βˆ’
|-
 
βˆ’
|[[File:pnacoes.jpg]]
 
βˆ’
|[[File:oceanario.jpg]]
 
βˆ’
|[[File:multiusos.jpg]]
 
βˆ’
|-
 
βˆ’
|'''Cacilheiros'''
 
βˆ’
|'''Linha de Cascais - Praias'''
 
βˆ’
|'''Linha da Caparica - Praias'''
 
βˆ’
|-
 
βˆ’
|[[File:cacilheiros.jpg]]
 
βˆ’
|[[File:cascais.jpg]]
 
βˆ’
|[[File:caparica.jpg]]
 
βˆ’
|-
 
βˆ’
|'''Casino Lisboa'''
 
βˆ’
|'''Docas - DiversΓ£o Nocturna'''
 
βˆ’
|'''Fado'''
 
βˆ’
|-
 
βˆ’
|[[File:casino.jpg]]
 
βˆ’
|[[File:docas.jpg]]
 
βˆ’
|[[File:fado.jpg]]
 
βˆ’
|-
 
βˆ’
|'''Sintra Vila'''
 
βˆ’
|'''Sintra - PalΓ‘cio da Pena'''
 
βˆ’
|'''Cristo Rei'''
 
βˆ’
|-
 
βˆ’
|[[File:sintravila.jpg]]
 
βˆ’
|[[File:sintrapalacio.jpg]]
 
βˆ’
|[[File:cristorei.jpg]]
 
βˆ’
|-
 
βˆ’
|}
 
βˆ’
 
 
βˆ’
 
 
βˆ’
==== In the News  ====
 
βˆ’
 
 
βˆ’
List of places where the IBWAS'10 conference has been referenced.
 
βˆ’
 
 
βˆ’
*[http://ibwas09.netmust.eu/files/ibwas10/IBWAS-RedSeguridad.pdf RedSeguridad Magazine], September 2010
 
βˆ’
 
 
βˆ’
 
 
βˆ’
==== IBWAS'10 Internals ====
 
βˆ’
 
 
βˆ’
 
 
βˆ’
* [https://spreadsheets.google.com/ccc?key=0AqVV6XaEAb3ddDI2ZkNsSjhDdWdQNl9ISW0tc19Sa3c&hl=en&authkey=CKyFt_AO IBWAS'10 Conference financials]
 
βˆ’
 
 
βˆ’
* [https://spreadsheets.google.com/ccc?key=0AtbsrC_uKJLudDJtcEpEYXN3QUV4cmVDUmdwWE9Ib0E&hl=en&authkey=CP2244AK IBWAS'10 Training Day financials]
 
βˆ’
 
 
βˆ’
 
 
βˆ’
<headertabs />
 
βˆ’
 
 
βˆ’
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_IBWAS]]
 

Latest revision as of 01:05, 9 December 2010

Redirect to: