CFP: Symposium on Network and Distributed System Security (2/97)

CFP: Symposium on Network and Distributed System Security (2/97)

Post by Matt Bish » Tue, 09 Jul 1996 04:00:00

The Internet Society Symposium on Network and Distributed System Security

February 10-11, 1997, San Diego Princess Resort, San Diego, California

Submissions due: August 1, 1996
Notification to Authors: October 1, 1996
Camera-Ready Copy due: November 1, 1996

GOAL: The symposium will bring together people who are building hardware
and software to provide network and distributed system security services.
The symposium is intended for those interested in the practical aspects of
network and distributed system security, focusing on actual system design
and implementation, rather than theory.  We hope to foster the exchange of
technical information that will encourage and enable the Internet community
to apply, deploy, and advance the state of available security technology.
Symposium proceedings will be published by the IEEE Computer Society Press.
Topics for the symposium include, but are not limited to, the following:
* Design and implementation of communication security services:
  authentication, integrity, confidentiality, authorization, non-repudiation,
  and availability.
* Design and implementation of security mechanisms, services, and APIs to
  support communication security services, key management and certification
  infrastructures, audit, and intrusion detection.
* Requirements and designs for securing network information resources and
  tools -- WorldWide Web (WWW), Gopher, archie, and WAIS.
* Requirements and designs for systems supporting electronic commerce --
  payment services, fee-for-access, EDI, notary -- endor*t, licensing,
  bonding, and other forms of assurance.
* Design and implementation of measures for controlling network communication
  -- firewalls, packet filters, application gateways, and user/host
  authentication schemes.
* Requirements and designs for telecommunications security especially for
  emerging technologies -- very large systems like the Internet, high-speed
  systems like the gigabit testbeds, wireless systems, and personal
  communication systems.
* Special issues and problems in security architecture, such as interplay
  between security goals and other goals -- efficiency, reliability,
  interoperability, resource sharing, and cost.
* Integration of security services with system and application security
  facilities, and application protocols -- including but not limited to
  message handling, file transport, remote file access, directories, time
  synchronization, data base management, routing, voice and video multicast,
  network management, boot services, and mobile computing.

        David Balenson, Trusted Information Systems
        Clifford Neuman, University of Southern California
        Matt Bishop, University of California at Davis
        Steve Bellovin, AT&T Research
        Tom Berson, Anagram Laboratories
        Doug Engert, Argonne National Laboratory
        Warwick Ford, Bell Northern Research
        Richard Graveman, Bellcore
        Li Gong, SRI
        Burt Kaliski, RSA Laboratories
        Steve Kent, BBN
        Tom Longstaff, CERT
        Doug Maughan, National Security Agency
        Dan Nessett, Sun Microsystems
        Hilarie Orman, DARPA
        Michael Roe, Cambridge University
        Christoph Schuba, Purdue University
        Jonathan Trostle, *Safe
        Theodore Ts'o, Massachusetts Institute of Technology
        Doug Tygar, Carnegie Mellon University
        Vijay Varadharajan, University of W. Sydney
        Roberto Zamparo, Telia Research
        Thomas Hutton, San Diego Supercomputer Center
         Steve Welke, Institute for Defense Analyses
        Donna Leggett, Internet Society

SUBMISSIONS: The committee invites technical papers and panel proposals for
topics of technical and general interest.  Technical papers should be 10-20
pages in length.  Panel proposals should be two pages and should describe
the topic, identify the panel chair, explain the format of the panel, and
list three to four potential panelists.  Technical papers will appear in the
proceedings.  A description of each panel will appear in the proceedings,
and may at the discretion of the panel chair, include written position
statements from each panelist.
  Each submission must contain a separate title page with the type of
submission (paper or panel), the title or topic, the names of the author(s),
organizational affiliation(s), telephone and FAX numbers, postal addresses,
Internet electronic mail addresses, and must list a single point of contact
if more than one author.  The names of authors, affiliations, and other
identifying information should appear only on the separate title page.
  Submissions must be received by 1 August 1996, and should be made
via electronic mail in either PostScript or ASCII format.  If the committee
is unable to print a PostScript submission, it will be returned and hardcopy
requested.  Therefore, PostScript submissions should arrive well before
1 August.  If electronic submission is difficult, submissions should be
sent via postal mail.
  All submissions and program related correspondence (only) should be
directed to the program chair:  Clifford Neuman, University of Southern
California, Information Sciences Institute, 4676 Admiralty Way, Marina
del Rey, California 90292-6695, Phone: +1 (310) 822-1511,

  Dates, final call for papers, advance program, and registration information
will be available at the URL:
  Each submission will be acknowledged by e-mail.  If acknowledgment is not
received within seven days, please contact the program chair as indicated
above.  Authors and panelists will be notified of acceptance by 1 October
1996. Instructions for preparing camera-ready copy for the proceedings will
be sent at that time.  The camera-ready copy must be received by 1 November