[3233] in WWW Security List Archive
IEEE Symposium on Security and Privacy - call for papers
daemon@ATHENA.MIT.EDU (Mary Ellen Zurko)
Mon Oct 14 13:19:17 1996
To: www-security@ns2.rutgers.edu
cc: zurko@osf.org
Date: Mon, 14 Oct 1996 10:48:37 -0400
From: Mary Ellen Zurko <zurko@osf.org>
Errors-To: owner-www-security@ns2.rutgers.edu
CALL FOR PAPERS
1997 IEEE Symposium on May 4-7, 1997
Security and Privacy Oakland, California
sponsored by
IEEE Computer Society Technical Committee on Security and Privacy
in cooperation with
The International Association for Cryptologic Research (IACR)
The Symposium on Security and Privacy has, for 16 years, been the
premier forum for the presentation of developments in computer
security and for bringing together researchers and practitioners in the
field. We seek to build on this tradition of excellence by
re-emphasizing work on engineering and applications while maintaining
our interest in theoretical advances.
We continue to seek to broaden the scope of the Symposium. We want to
hear not only about new theoretical results, but also about the design
and implementation of secure systems in specific application areas and
about policies relating to system security. We are particularly
interested in papers on policy and technical issues relating to privacy
in the context of the information infrastructure, papers that relate
software and system engineering technology to the design of secure
systems and papers on hardware and architectural support for secure
systems. Papers or Panels which discuss the application of theory to
practice which describe not only the successes but the failures and
the lessons learned are of special interest.
Topics on which papers and panel sessions proposals are invited
include, but are not limited to, the following:
Commercial and Industrial Security,
Security and other Critical System Properties,
Secure Systems,
Distributed Systems,
Network Security,
Database Security,
Data Integrity,
Access Controls,
Information Flow ,
Security Verification,
Viruses and Worms,
Security Protocols,
Authentication,
Biometrics,
Smartcards,
Auditing,
Intrusion Detection,
Privacy Issues,
Policy Modeling
A continuing feature of the symposium will be a session of 5-minute
talks. We want to hear from people who are advancing the field in the
areas of system design and implementation, but may lack the resources
needed to prepare a full paper. Abstracts of these talks will be
distributed at the Symposium.
INSTRUCTIONS FOR AUTHORS:
This year we are instituting mechanisms for "electronic" submission
of papers for the refereeing process. Final papers will still be
submitted in hard copy.
We will continue to accept papers submitted via various forms of mail,
but not fax. Papers should include an abstract, must not exceed 7500
words, and must report original work that has not been published
previously and is not under consideration for publication
elsewhere. The names and affiliations of authors should appear on a
separate cover page only, as "blind" refereeing is used. Authors must
certify prior to December 27, 1996 that all necessary clearances for
publication have been obtained. The committee strongly encourages
authors to include archival sources as references (books, journal
articles, etc.) and to include references to "WEB" or other "NET"
sources only if they can be backed up by some archival source. In this
way, we can ensure that people who read the paper 5 years from now
will have access to the information used as background and
justification of the arguments presented.
Panel proposals should include a title, an abstract which describes
the topic(s) to be discussed, the names of all proposed participants
and assurances that the participants agree to serve on the panel, a
proposed length and format for the panel and any other information
that the panel proposer thinks would support their proposal. We will
publish the Panel Abstract in the Proceedings as well as any position
papers submitted by the panelists in support of the panel proposal.
Those submitting papers via "hard copy" should send six copies of
their paper or panel proposal to:
George W. Dinolt, Program Co-Chair
Lockheed Martin Western Development Laboratories,
Mail Stop X20,
3200 Zanker Road,
San Jose, CA 95134.
Please mark the envelope "IEEE Security and Privacy Symposium."
The title, abstract and authors names should be on a separate cover
page so that we can support the "blind refereeing process." We would
also like to have an electronic, ascii text version of the abstract
sent seperately to secprv97@wdl.lmco.com. The electronic version of
the abstract should include the title and the abstract as it appears
in the paper.
Authors who wish to submit an electronic version of a paper or panel proposal
for evaluation should follow the instructions that will be posted
on our "Web" site at
<a href=http://www.itd.nrl.navy.mil/ITD/5540/ieee>
http://www.itd.nrl.navy.mil/ITD/5540/ieee</a>
or by sending mail to secprv97@wdl.lmco.com with the word
"Instructions" in the Subject line. Instructions will be included in
the reply. Papers and panel proposals must be received (however sent)
by 6:00 P.M. (PST) on Monday Dec. 2, 1996 (The deadline has been
extended from the original call). Authors will be notified by
mid-January about the status of their papers.
Authors who submit an abstract for a 5-minute talk should include a
title, all authors names and their affiliations, where appropriate,
and text. The whole should fit easily on one 8.5" by 11" page.
Abstracts for 5-minute talks should be sent to George W. Dinolt at the
above address U.S. Postal address to be received no later than Friday,
April 19, 1997 at 6:00 P.M local time. We will review abstracts and
accept as many as we can. Please mark the envelope
"IEEE Security and Privacy Symposium - 5 minute Abstracts"
General Chair: Steve Kent, BBN, USA
Vice Chair: Mike Reiter, AT&T Laboratories - Research, USA
Program Co-Chairs: George Dinolt, Lockheed Martin WDL, USA
Paul Karger, IBM, USA
Treasurer: Charlie Payne, SCTC, USA
Program Committee:
Deborah Cooper, The DMC Company
Terry Vickers Benzel, Trusted Information Systems
Lee Benzinger, Lockheed Martin WDL
Yair Frankel, Sandia Labs
Li Gong, Sun Microsystems
Heather Hinton, Ryerson Polytechnic University Canada
Cynthia Irvine, Naval Postgraduate School
Suchil Jajodia, George Mason University
Dale Johnson, MITRE
Carl Landwehr, Naval Research Laboratory
Teresa Lunt, DARPA/ITO
John McHugh, Portland State University
John McLean, Naval Research Laboratory
Catherine A. Meadows, Naval Research Laboratory
Richard B. Neely, CTA
Richard E. Newman-Wolfe, Univeristy of Florida
Sylvan Pinsky, National Security Agency
Sue Rho, Trusted Information Systems
Mike Reiter,AT&T Laboratories --- Research
Peter Ryan, DRA Malvern, United Kingdom
Pierangela Samarati, Universita' di Milano, Italy
Tom Schubert, Portland State University
Elisabeth Sullivan, Sequent
Paul Syverson, Naval Reseach Laboratory
Tom Van Vleck, CyberCash Inc.
Shyhtsun F. Wu, North Carolina State University
Mary Ellen Zurko, OSF