[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Usenix symposium on crypto applications
Newsgroups: comp.org.usenix,comp.org.uniforum,comp.org.sug,comp.unix.admin,comp.unix.large,comp.org.decus,comp.security.unix
Path: paperboy.osf.org!bone.think.com!blanket.mitre.org!agate!spool.mu.edu!howland.reston.ans.net!tank.news.pipex.net!pipex!in2.uu.net!usenix!toni
>From: [email protected] (Toni Veglia)
Subject: 6th USENIX UNIX Security Symposium - Call-for-Papers
Message-ID: <[email protected]>
Reply-To: [email protected] (Toni Veglia)
Organization: USENIX Association, Berkeley, CA
Date: Wed, 6 Sep 1995 19:25:37 GMT
Lines: 218
Xref: paperboy.osf.org comp.org.usenix:3623 comp.org.uniforum:20 comp.org.sug:940 comp.unix.admin:33851 comp.unix.large:1699 comp.org.decus:6147 comp.security.unix:19702
Announcement and Preliminary Call for Papers
6th USENIX UNIX Security Symposium
Focusing on Applications of Cryptography
July 22-25, 1996
Fairmont Hotel
San Jose, California
Sponsored by the USENIX Association, the UNIX and
Advanced Computing Systems Professional and
Technical Association
Co-sponsored by UniForum (pending)
In cooperation with: The Computer Emergency
Response Team (CERT), and IFIP WG 11.4
Important Dates
Dates for Refereed Paper Submissions
Extended abstracts due: Mar 19, 1996
Program Committee decisions made: Apr 15, 1996
Camera-ready final papers due: June 10, 1996
Registration Materials Available: End April 1996
Program Committee
Program Chair: Greg Rose, Sterling Software.
Fred Avolio, Trusted Information Systems, Inc.
Steve Bellovin, AT&T Bell Laboratories
Brent Chapman, Great Circle Associates
Diane Coe, Mitre
Ed DeHart, CERT
Dan Geer, Open Market Inc.
Peter Gutmann, University of Auckland
Kent Landfield, Sterling Software
Clifford Neuman, Information Sciences Institute
Avi Rubin, Bellcore
Eugene Spafford, COAST Laboratory, Purdue University
Ken van Wyk, Defense Information Systems Agency
Karen Worstell, The Boeing Company
Readers: Matt Bishop, U.C. Davis; Phil Karn, Qualcomm
Overview
The goal of this symposium is to bring together
security and cryptography practitioners,
researchers, system administrators, systems
programmers, and others with an interest in
applying cryptography, network and computer
security, and especially the area where these
overlap. The focus on applications of
cryptography is intended to attract papers in the
fields of electronic commerce and information
processing, as well as security. Please note that
papers about new cryptographic algorithms are not
solicited; however new applications are.
This will be a four day single track symposium
with tutorials, refereed and technical
presentations, and panel discussions. Tutorials
will take place the first two days followed by
two days of technical sessions.
Tutorials
July 22-23
Tutorials for both technical staff and managers
will provide immediately useful, practical
information on topics such as local and network
security precautions, what cryptography can and
cannot do, security mechanisms and policies,
firewalls and monitoring systems.
Technical Sessions
July 24-25
In addition to the keynote presentation, the
technical program includes refereed papers and
invited talks. There may be panel sessions.
There will be Birds-of-a-Feather sessions and
Works-in- Progress Reports on two evenings. You
are invited to make suggestions to the program
committee via email <[email protected]>.
Papers that have been formally reviewed and
accepted will be presented during the symposium
and published in the symposium proceedings.
Proceedings of the symposium will be published by
USENIX and will be provided free to technical
session attendees; additional copies will be
available for purchase from USENIX.
Symposium Topics
Presentations are being solicited in areas
including but not limited to:
*Anonymous transactions
*Applications of cryptographic techniques
*Attacks against secure networks/machines
*Cryptanalysis and codebreaking as attacks
*Cryptographic tools
*Electronic commerce security
*Firewalls and firewall toolkits
*Legislative and legal issues
*Case studies
*Computer misuse and anomaly detection
*File and File system security
*Network security
*Security and system management
*Security in heterogeneous environments
*Security incident investigation and response
*Security tools
*User/system authentication
*Penetration testing
*Malicious code analysis
Note that this symposium is not about new codes
or ciphers, or cryptanalysis for its own sake.
How to Submit a Refereed Paper
Submissions must be received by Mar 19, 1996.
Authors are encouraged to submit an extended
abstract which discusses key ideas and
demonstrates the structure of the finished
paper. Extended abstracts should be 3-5 pages
long (about 1500-2500 words), not counting
references and figures. The body of the extended
abstract should be in complete paragraphs. The
object of an extended abstract is to convince the
reviewers that a good paper and presentation will
result. Full papers can be submitted if they are
complete in advance of the date. Full papers
should be 8 to 15 typeset pages.
Authors will be notified of acceptance on April
15, 1996.
All submissions will be judged on originality,
relevance, and correctness. Each accepted
submission will be assigned a member of the
program committee to act as its shepherd through
the preparation of the final paper. The assigned
member will act as a conduit for feedback from
the committee to the authors. Camera-ready final
papers are due June 10, 1996.
Please accompany each submission by a cover
letter stating the paper title and authors along
with the name of the person who will act as the
contact to the program committee. Please include
a surface mail address, daytime and evening phone
number, and, if available, an email address and
fax number for the contact person.
If you would like to receive detailed guidelines
for submission and examples of extended
abstracts, you may send email to:
[email protected]
or telephone the USENIX Association office at
+1 510 528 8649.
The UNIX Security Symposium, like most
conferences and journals, requires that papers
not be submitted simultaneously to another
conference or publication and that submitted
papers not be previously or subsequently
published elsewhere. Papers accompanied by
"non-disclosure agreement" forms are not
acceptable and will be returned to the author(s)
unread. All submissions are held in the highest
confidentiality prior to publication in the
Proceedings, both as a matter of policy and in
accord with the U.S. Copyright Act of 1976.
Where To Submit
Please send one copy of an extended abstract or a
full paper to the program committee via each of
two, for reliability, of the following methods.
All submissions will be acknowledged.
o Preferred Method: email (Postscript or ASCII) to:
[email protected]
o Alternate Method: postal delivery to
Security Symposium
USENIX
2560 Ninth St., Ste. #215
Berkeley CA 94710
U.S.A.
Phone: +1 510 528 8649
o Fax: +1 510 548 5738
Registration Materials
Materials containing all details of the technical and tutorial
programs, registration fees and forms, and hotel information
will be available at the end of April 1996. If you wish to
receive the registration materials, please contact USENIX at:
USENIX Conference Office
22672 Lambert Street, Suite 613
Lake Forest, CA USA 92630
+1 714 588 8649; Fax: +1 714 588 9706
email: [email protected]
Information can also be found under the USENIX Association
WWW page URL: http://www.usenix.org