[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

New Security Paradigm Workshop '98 Call For Papers





========================================================================
                           Call For Papers
                   New Security Paradigms Workshop '98
                      A workshop sponsored by ACM
                        22 - 25 September 1998
========================================================================

Paradigm shifts disrupt the status quo, destroy outdated ideas and 
open the way to new possibilities. This workshop explores deficiencies 
of current computer security paradigms and examines radical new models 
that address those deficiencies. Previous years' workshops have 
identified problematic aspects of traditional security paradigms and 
explored a variety of possible alternatives. Participants have discussed 
alternative models for access control, intrusion detection, new 
definitions of security, privacy and trust, biological and economic 
models of security and a wide variety of other topics. The 1998 workshop 
will strike a balance between building on the foundations laid in past 
years and exploring new directions.

To participate, please submit the following, preferably via e-mail, to 
both Program Chairs (Mary Ellen Zurko and Steven J. Greenwald) by
Friday, 3-April-1998.

1 - Your Paper

You should submit either a research paper, a 5 - 10 page position 
paper or a discussion topic proposal. Softcopy submissions should be 
in Postscript or ASCII format. Papers may besubmitted in hardcopy. 
To submit hardcopy, please mail five 
(5) copies to Program co-chair Steven Greenwald. Please allow adequate 
time for delivery. The hardcopy deadline is 27-March-1998.

Discussion topic proposals should include a description of the topic to 
be discussed, a pro and con position statement on the topic, 
identification of the parties who will uphold each position, any assurances 
that the participants agree to attend, and any other
information that the proposer thinks would support their proposal
(such as who will moderate). One potential topic for discussion is
"Is there a current security paradigm?".

2 - Justification
You should describe, in one page or less, why you think your paper is 
appropriate for the New Security Paradigms Workshop. A good 
justification will describe which aspects of the status-quo security paradignm 
your paper challenges or rejects and which new model or models
your paper proposes or extends.

3 - Attendance Statement
You should state how many authors wish to attend the workshop and should 
indicate whether at least one author will be able to attend for the 
entire duration of the workshop. The program committee will referee the 
papers and notify the authors of acceptance status by 12-June-1998. We 
expect to be able to offer a limited number of scholarships. More 
information will be provided on-line as it becomes available.

4 - The Workshop 
The workshop will offer a creative and constructive environment for 
approximately 25 participants. It will be held at the Boar's Head Inn in 
the vicinity of "historic" Charlottesville, Virginia.


Steering Committee

Bob Blakley, Mary Ellen Zurko, Steven J. Greenwald, 
Darrell Kienzle, Hilary Hosmer


Workshop Co-Chairs

Bob Blakley
IBM
11400 Burnet Road, Mail Stop 9134
Austin, TX 78758 USA
e-mail: [email protected]
voice: +1 (512) 838-8133
fax: +1 (512) 838-0156

Darrell Kienzle
MITRE, Mail Stop W422
1820 Dolley Madison Blvd.
McLean, VA 22102 USA
e-mail: [email protected]
voice: +1 (703) 883-5836
fax: +1 (703) 883-1397

Program Committee Co-Chairs
 
Mary Ellen Zurko
The Open Group Research Institute
11 Cambridge Center
Cambridge, MA 02142 USA
e-mail: [email protected]
voice: +1 (617) 621-7231
fax: +1 (617) 225-2943

Steven J. Greenwald
2521 NE 135th Street
North Miami, FL 33181 
USA
voice: +1 (305) 944-7842
fax: +1 (305) 944-5746
e-mail: [email protected]

Program Committee

Alfarez Abdul-Rahman, University College London
Steven Cheung, University of California, Davis
Shaw-Cheng Chuang, University of Cambridge
John Dobson, University of Newcastle, UK
Heather Hinton, Ryerson Polytechnic University, Canada
Tom Lincoln, RAND
Masahiro Mambo, Tohoku University
Catherine Meadows, Naval Research Laboratory
Ruth Nelson, Information System Security
Thomas Riechmann, University of Erlangen-Nuernberg
Marvin Schaefer, Arca Systems, Inc.
Cristina Serban, AT&T Labs
Anil Somayaji, University of New Mexico
Brenda Timmerman, University of Southern California / ISI
Ian Welch, University of Newcastle upon Tyne
John Michael Williams

Local Arrangements
Chenxi Wang (University of Virginia) +1 (804)982-2291

Scholarships
Hilary Hosmer (Data Security Inc.) +1 (781) 275-8231

Publications
Marv Schaefer (ARCA Systems) +1 (410) 309-1780

Publicity
Daniel Essin (University of Southern California) +1 (213) 226-3188

Treasurer/Registration
Dixie Baker (SAIC) +1 (310) 615-0305

ACM-SIGSAC Chair
Ravi Sandhu (George Mason University) +1 (703) 993-1659