SECOND CALL FOR PAPERS
Submission deadline is 14 August
LESS THAN ONE MONTH AWAY
The Internet Society Symposium on
Network and Distributed System Security
February 22-23, 1996
San Diego Princess Resort, San Diego, California
GOAL: The symposium will bring together people who are building hardware
and software to provide network and distributed system security services.
The symposium is intended for those interested in the practical aspects of
network and distributed system security, focusing on actual system design
and implementation, rather than theory. We hope to foster the exchange of
technical information that will encourage and enable the Internet community
to apply, deploy, and advance the state of available security technology.
Symposium proceedings will be published by the IEEE Computer Society Press.
Topics for the symposium include, but are not limited to, the following:
* Design and implementation of communication security services:
authentication, integrity, confidentiality, authorization,
non-repudiation, and availability.
* Design and implementation of security mechanisms, services, and
APIs to support communication security services, key management
and certification infrastructures, audit, and intrusion detection.
* Requirements and designs for securing network information resources
and tools -- WorldWide Web (WWW), Gopher, archie, and WAIS.
* Requirements and designs for systems supporting electronic commerce --
payment services, fee-for-access, EDI, notary -- endorsement,
licensing, bonding, and other forms of assurance.
* Design and implementation of measures for controlling network
communication -- firewalls, packet filters, application gateways, and
user/host authentication schemes.
* Requirements and designs for telecommunications security especially
for emerging technologies -- very large systems like the Internet,
high-speed systems like the gigabit testbeds, wireless systems, and
personal communication systems.
* Special issues and problems in security architecture, such as
interplay between security goals and other goals -- efficiency,
reliability, interoperability, resource sharing, and cost.
* Integration of security services with system and application security
facilities, and application protocols -- including but not limited to
message handling, file transport, remote file access, directories, time
synchronization, data base management, routing, voice and video
multicast, network management, boot services, and mobile computing.
GENERAL CHAIR:
Jim Ellis, CERT Coordination Center
PROGRAM CHAIRS:
David Balenson, Trusted Information Systems
Clifford Neuman, USC Information Sciences Institute
LOCAL ARRANGEMENTS CHAIR:
Thomas Hutton, San Diego Supercomputer Center
PUBLICATIONS CHAIR:
Steve Welke, Institute for Defense Analyses
REGISTRATIONS CHAIR:
Donna Leggett, Internet Society
PROGRAM COMMITTEE:
Tom Berson, Anagram Laboratories
Matt Bishop, University of California at Davis
Doug Engert, Argonne National Laboratory
Warwick Ford, Bell Northern Research (Canada)
Burt Kaliski, RSA Laboratories
Steve Kent, Bolt Beranek and Newman
Paul Lambert, Motorola
John Linn, OpenVision Technologies
Teresa Lunt, Advanced Research Projects Agency
Dan Nessett, Sun Microsystems
Hilarie Orman, University of Arizona
Michael Roe, Cambridge University (UK)
Rob Rosenthal, U.S. National Institute of Standards and Technology
Avi Rubin, Bellcore
Jeff Schiller, Massachusetts Institute of Technology
Rob Shirey, Bolt Beranek and Newman
Doug Tygar, Carnegie Mellon University
Roberto Zamparo, Telia Research (Sweden)
SUBMISSIONS: The committee invites technical papers and panel proposals
for topics of technical and general interest. Technical papers should
be 10-20 pages in length. Panel proposals should be two pages and
should describe the topic, identify the panel chair, explain the format
of the panel, and list three to four potential panelists. Technical
papers will appear in the proceedings. A description of each panel will
appear in the proceedings, and may at the discretion of the panel chair,
include written position statements from each panelist.
Each submission must contain a separate title page with the type of
submission (paper or panel), the title or topic, the names of the
author(s), organizational affiliation(s), telephone and FAX numbers,
postal addresses, Internet electronic mail addresses, and must list a
single point of contact if more than one author. The names of authors,
affiliations, and other identifying information should appear only on
the separate title page.
Deadline for paper submission: August 14, 1995
Notification sent to authors by: October 16, 1995
Deadline for camera-ready copy: November 13, 1995
Submissions must be received by 14 August 1995. Submissions should be
made via electronic mail. Submissions may be in either of two formats:
PostScript or ASCII. If the committee is unable to print a PostScript
submission, it will be returned and hardcopy requested. Therefore,
PostScript submissions should arrive well before 14 August. If
electronic submission is difficult, submissions should be sent via
postal mail.
All submissions and program related correspondence (only) should be
directed to the program chair:
Clifford Neuman
University of Southern California
Information Sciences Institute
4676 Admiralty Way
Marina del Rey, California 90292-6695
Phone: +1 (310) 822-1511
FAX: +1 (310) 823-6714
Email: sndss96-submissions(_at_)isi(_dot_)edu
Dates, final call for papers, advance program, and registration
information will be made available at the URL:
http://nii.isi.edu/info/sndss
Each submission will be acknowledged by e-mail. If acknowledgment is
not received within seven days, please contact the program chair as
indicated above. Authors and panelists will be notified of acceptance
by 16 October 1995. Instructions for preparing camera-ready copy for
the proceedings will be sent at that time. The camera-ready
copy must be received by 13 November 1995.