Difference between revisions of "NDSS 2010"

From Openresearch
Jump to: navigation, search
 
(4 intermediate revisions by 2 users not shown)
Line 3: Line 3:
 
|Title=17th Annual Network and Distributed System Security Symposium
 
|Title=17th Annual Network and Distributed System Security Symposium
 
|Type=Conference
 
|Type=Conference
|Field=Computer science
+
|Field=Computer security and reliability
 
|Start date=2010/02/28
 
|Start date=2010/02/28
 
|End date=2010/03/03
 
|End date=2010/03/03
 
|Homepage=www.isoc.org/ndss10
 
|Homepage=www.isoc.org/ndss10
 +
|Logo=Ndss10 button.gif
 
|City=San Diego
 
|City=San Diego
 
|State=California
 
|State=California
Line 19: Line 20:
  
 
Important dates
 
Important dates
 +
 
- Titles and abstracts of papers due: Friday, September 11, 2009 (11:59 pm EDT)  
 
- Titles and abstracts of papers due: Friday, September 11, 2009 (11:59 pm EDT)  
 
- Full paper and panel submissions due: Friday, September 18, 2009 (11:59 pm EDT)  
 
- Full paper and panel submissions due: Friday, September 18, 2009 (11:59 pm EDT)  
Line 26: Line 28:
  
 
Symposium Goals
 
Symposium Goals
 +
 
The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society (ISOC). Symposium website:
 
The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society (ISOC). Symposium website:
 
http://www.isoc.org/ndss10
 
http://www.isoc.org/ndss10
  
 
How to Submit
 
How to Submit
 +
 
Submission instructions are available at: www.softconf.com/a/ndss2010
 
Submission instructions are available at: www.softconf.com/a/ndss2010
  
 
What to Submit
 
What to Submit
 +
 
Both technical papers and panel proposals are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All papers from authors perpetrating such "double submissions" will be immediately rejected from the symposium. The Program Committee reserves the right to share information with other conference chairs and journal editors so as to detect such cases.
 
Both technical papers and panel proposals are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All papers from authors perpetrating such "double submissions" will be immediately rejected from the symposium. The Program Committee reserves the right to share information with other conference chairs and journal editors so as to detect such cases.
  
Line 63: Line 68:
 
   
 
   
 
Trust and Identity
 
Trust and Identity
 +
 
To promote research in the area of Trust and Identity, the Internet Society will present a USD 500 prize for a paper on a significant development in addressing current problems in on-line identity management. Examples of possible topics include:  
 
To promote research in the area of Trust and Identity, the Internet Society will present a USD 500 prize for a paper on a significant development in addressing current problems in on-line identity management. Examples of possible topics include:  
-On-line reputation management  
+
-On-line [http://www.seop.com/reputation-management/ reputation management]
 
-Third party identity provision  
 
-Third party identity provision  
 
-Privacy and anonymity technologies  
 
-Privacy and anonymity technologies  
Line 73: Line 79:
  
 
A list of NDSS 2010 Program Committee members can be found at:
 
A list of NDSS 2010 Program Committee members can be found at:
 +
 
http://www.isoc.org/isoc/conferences/ndss/10/committee.shtml
 
http://www.isoc.org/isoc/conferences/ndss/10/committee.shtml

Latest revision as of 09:54, 26 April 2010

NDSS 2010
Logo of NDSS 2010
17th Annual Network and Distributed System Security Symposium
Dates 2010/02/28 (iCal) - 2010/03/03
Homepage: www.isoc.org/ndss10
Location
Location: San Diego, California, USA
Loading map...

Important dates
Abstracts: 2009/09/11
Papers: 2009/09/18
Submissions: 2009/09/18
Notification: 2009/11/13
Camera ready due: 2009/12/18
Table of Contents


Call for Papers

Important dates

- Titles and abstracts of papers due: Friday, September 11, 2009 (11:59 pm EDT) - Full paper and panel submissions due: Friday, September 18, 2009 (11:59 pm EDT) - Author notification: Friday, November 13, 2009 - Final version of papers and panels due: Friday, December 18, 2009 - Symposium dates: February 28-March 3, 2010

Symposium Goals

The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society (ISOC). Symposium website: http://www.isoc.org/ndss10

How to Submit

Submission instructions are available at: www.softconf.com/a/ndss2010

What to Submit

Both technical papers and panel proposals are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All papers from authors perpetrating such "double submissions" will be immediately rejected from the symposium. The Program Committee reserves the right to share information with other conference chairs and journal editors so as to detect such cases.

Technical papers should not exceed 20 pages, total, including the bibliography and well-marked appendices (using 11-point font, single column format, and 1-inch margins on 8.5"x11" or A4 paper). Technical papers must include the authors' name and affiliation.

The Program Committee members are not required to read the appendices, so the paper should be intelligible without them. Technical papers will appear in the proceedings. Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists.

Submissions are solicited in, but not limited to, the following areas:

-Security of Web-based applications and services -Anti-malware techniques: detection, analysis, and prevention -Intrusion prevention, detection, and response -Security for electronic voting -Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques -Privacy and anonymity technologies -Network perimeter controls: firewalls, packet filters, and application gateways -Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems -Security for Vehicular Ad-hoc Networks (VANETs) -Security for peer-to-peer and overlay network systems -Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing -Implementation, deployment and management of network security policies -Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management -Integrating security services with system and application security facilities and protocols -Public key infrastructures, key management, certification, and revocation -Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost -Security for collaborative applications: teleconferencing and video-conferencing -Software hardening: e.g., detecting and defending against software bugs (overflows, etc.) -Security for large-scale systems and critical infrastructures -Integrating security in Internet protocols: routing, naming, network management

Trust and Identity

To promote research in the area of Trust and Identity, the Internet Society will present a USD 500 prize for a paper on a significant development in addressing current problems in on-line identity management. Examples of possible topics include: -On-line reputation management -Third party identity provision -Privacy and anonymity technologies -Pseudonimity and user managed identity Submitting authors should follow the same submission guidelines established for other NDSS 2010 topic areas. ISOC will cover travel, registration fee, and hotel accommodation for the designated author to attend NDSS 2010 and present the paper. The USD 500 cash award is the total prize. In the event of co-authors, the cash award will be divided evenly.

The deadline for full submissions, made electronically in PDF format, is 11:59 pm EST, September 18, 2009. However, titles and abstracts of papers must be received by 11:59 pm EST, September 11, 2009. Each submission will be acknowledged by email; if acknowledgement is not received within seven days, contact the Program Chair. Authors and panelists will be notified of acceptance by November 16, 2009, and given instructions for preparing the camera-ready copy.

A list of NDSS 2010 Program Committee members can be found at:

http://www.isoc.org/isoc/conferences/ndss/10/committee.shtml

Facts about "NDSS 2010"
Abstract deadlineSeptember 11, 2009 +
AcronymNDSS 2010 +
Camera ready dueDecember 18, 2009 +
End dateMarch 3, 2010 +
Event typeConference +
Has coordinates32° 43' 3", -117° 9' 46"Latitude: 32.717419444444
Longitude: -117.16277222222
+
Has location citySan Diego +
Has location countryCategory:USA +
Has location stateCalifornia +
Homepagehttp://www.isoc.org/ndss10 +
IsAEvent +
LogoNdss10 button.gif +
NotificationNovember 13, 2009 +
Paper deadlineSeptember 18, 2009 +
Start dateFebruary 28, 2010 +
Submission deadlineSeptember 18, 2009 +
Title17th Annual Network and Distributed System Security Symposium +