[crypto] [mab@crypto.com: USENIX Security '04 Call for Papers]

R. Hirschfeld ray@unipay.nl
Sun, 7 Sep 2003 11:10:07 +0200


------- Start of forwarded message -------
Subject: USENIX Security '04 Call for Papers
Date: Sat, 06 Sep 2003 13:53:14 -0400
From: Matt Blaze <mab@crypto.com>

USENIX SECURITY '04 - AUGUST 9-13, 2004 - SAN DIEGO, CA
 
CALL FOR PAPERS

The USENIX Security Symposium brings together researchers,
practitioners, system administrators, system programmers, and others
interested in the latest advances in security of computer systems.
The 13th USENIX Security Symposium will be held August 9-13, 2003 in
San Diego, CA.

If you are working on any practical aspects of security or
applications of cryptography, the program committee encourages you to
submit a paper.  Submissions are due at 23h59 (Pacific time) January
25, 2004.  The symposium will span five days: Two days of tutorials
will be followed by a two and one half day technical program, which
will include refereed papers, invited talks, Work-in-Progress reports,
panel discussions, and Birds-of-a-Feather sessions.


IMPORTANT DATES

Submissions Due:         25 January 2004
Notification to Authors: 31 March 2004
Camera-Ready Papers Due: 18 May 2004


ORGANIZERS

Program Chair:
Matt Blaze, AT&T / University of Pennsylvania

Program Committee:
Bill Aiello, AT&T Labs - Research
Tina Bird, Stanford University
Drew Dean, SRI International
Carl Ellison, Microsoft
Eu-Jin Goh, Stanford University
Sotiris Ioannidis, University of Pennsylvania
Angelos Keromytis, Columbia University
Patrick McDaniel, AT&T Labs - Research
Adrian Perrig, Carnegie-Mellon University
Niels Provos, Google
Greg Rose, Qualcomm
Sean Smith, Dartmouth College
Leendert van Doorn, IBM Research
Paul van Oorschot, Carleton University
Dave Wagner, University of California, Berkeley
Rebecca Wright, Stevens Institute of Technology 

Invited Talks Co-Chairs:
Vern Paxson, ICSI
Avi Rubin, Johns Hopkins University


SYMPOSIUM TOPICS

Refereed paper submissions are solicited in all areas relating
to systems and network security, including: 

	* Adaptive security and system management 
	* Analysis of malicious code 
	* Analysis of network and security protocols 
	* Applications of cryptographic techniques 
	* Attacks against networks and machines 
	* Authentication and authorization of users, systems,
	  and applications 
	* Automated tools for source code analysis 
	* Denial-of-service attacks and countermeasures
	* File and filesystem security 
	* Firewall technologies 
	* Intrusion detection 
	* Privacy preserving (and compromising) systems 
	* Public key infrastructure 
	* Rights management and copyright protection 
	* Security in heterogeneous and large-scale environments 
	* Security of agents and mobile code 
	* Security of Internet voting systems 
	* Techniques for developing secure systems 
	* World Wide Web security 

Note that USENIX Security is primarily a systems security conference.
Papers whose contributions are primarily in the area of new
cryptographic algorithms or protocols, cryptanalysis, electronic
commerce primitives, etc, may not be appropriate for this conference.


REFEREED PAPERS & AWARDS 

Papers that have been formally reviewed and accepted will be presented
during the symposium and published in the symposium proceedings. The
proceedings will be distributed to attendees and, following the
conference, will be available online to USENIX members and for
purchase.

One author per accepted paper is offered a $200 discount against the
registration fee; USENIX will waive the fee for presenters for whom
the fee would present a hardship.

Awards may be given at the conference for the best overall paper and
for the best paper that is primarily the work of a student.


TUTORIALS, INVITED TALKS, PANELS, WIPS, AND BOFS 

In addition to the refereed papers and the keynote presentation,
the technical program will include tutorials, invited talks, panel
discussions, a Work-in-Progress session (WiPs), and Birds-of-a-Feather
Sessions. You are invited to make suggestions regarding topics or
speakers in any of these sessions via email to the contacts listed
below or to the program chair at sec04chair@usenix.org.

Tutorials

Tutorials for both technical staff and managers will provide
immediately useful, practical information on topics such as local
and network security precautions, what cryptography can and cannot
do, security mechanisms and policies, firewalls, and monitoring
systems. If you are interested in proposing a tutorial or suggesting
a topic, contact the USENIX Tutorial Coordinator, Dan Klein, by
email to dvk@usenix.org.

Invited Talks

There will be several outstanding invited talks in parallel with the
refereed papers. Please submit topic suggestions and talk proposals
via email to sec04it@usenix.org.

Panel Discussions

The technical sessions may include topical panel discussions.
Please send topic suggestions and proposals to sec04chair@usenix.org.

Work-in-Progress Reports (WiPs)

The last session of the symposium will be a Works-in-Progress
session. This session will consist of short presentations about
work-in-progress, new results, or timely topics. Speakers should
submit a one- or two-paragraph abstract to sec04wips@usenix.org by
18h00 on Wednesday, 11 August, 2004.  Make sure to include your name,
affiliation, and the title of your talk. The accepted abstracts
will be posted on the symposium Web site after the symposium. The
time available will be distributed among the presenters with each
speaker allocated between 5 and 10 minutes. The time limit will be
strictly enforced.  The schedule of presentations will be posted at
the symposium.

Birds-of-a-Feather Sessions (BoFs)

There will be Birds-of-a-Feather sessions (BoFs) Tuesday, Wednesday
and Thursday evenings. Birds-of-a-Feather sessions are informal
gatherings of persons interested in a particular topic. BoFs often
feature a presentation or a demonstration followed by discussion,
announcements, and the sharing of strategies. BoFs can be scheduled
on-site, but if you wish to pre-schedule a BoF, please email the
conference office, conference@usenix.org. They will need the title of
the BoF with a brief description, the name, title, affiliation, and
email address of the facilitator, your preference of date, and whether
an overhead projector and screen is desired.


PAPER SUBMISSION INSTRUCTIONS

Papers should represent novel scientific contributions in computer
security with direct relevance to the engineering of secure systems
and networks. Submissions should be finished, complete papers.  Papers
should be about 8 to a maximum of 16 typeset pages (10 point type on
12 point leading).  Submissions must be received by 23h59 (Pacific
time) on 25 January, 2004.

Submissions will only be accepted electronically via the symposium Web
form, and must be in PDF format (e.g., processed by Adobe's Acrobat
Distiller or equivalent). Note that LaTeX users can use the "dvipdf"
command to convert a DVI file into PDF format. Please make sure your
submission can be opened using Adobe Acrobat 4.0.  For more details on
the submission process, authors are encouraged to consult the detailed
author guidelines at http://www.usenix.org.

To ensure that we can read your PDF file, authors are urged to follow
the NSF "Fastlane" guidelines for document preparation
(http://www.fastlane.nsf.gov/a1/pdfcreat.htm), and to pay special
attention to unusual fonts.

A link to the web submission system will be available on the
symposium web site, at http://www.usenix.org, on or about
1 January, 2004.

All submissions will be judged on originality, relevance, and
correctness.  The USENIX Security Symposium, like most conferences and
journals, requires that papers not be submitted simultaneously to
another conference or publication and that submitted papers not be
previously published elsewhere, or subsequently published within 12
months of acceptance at the Symposium. (We may share information about
submissions with the program chairs of other conferences considering
papers during the review period.)  Papers accompanied by
non-disclosure agreement forms will not be considered.  All
submissions are treated as confidential, both as a matter of policy
and in accord with the U.S. Copyright Act of 1976.

Authors will be notified of acceptance by 31 March, 2004.  The
camera-ready final paper due date is 18 May, 2004.  Each accepted
submission may be assigned a member of the program committee to
act as its shepherd through the preparation of the final paper.
The assigned member will act as a conduit for feedback from the
committee to the authors.

Specific questions about submissions may be sent via e-mail to
the program chair at sec04chair@usenix.org.

The current version of this call for papers can be found online at
http://www.crypto.com/security04cfp.html .
------- End of forwarded message -------