[4309] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

FWD: 20th Anniversary IEEE Security and Privacy Call for Participation

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Thu Mar 11 14:45:26 1999

To: cryptography@c2.net
Reply-To: perry@piermont.com
From: "Perry E. Metzger" <perry@piermont.com>
Date: 11 Mar 1999 09:29:07 -0500


From: <cipher-request@itd.nrl.navy.mil>
Subject: 20th Anniversary IEEE Security and Privacy Call for Participation
To: <cipherdist@itd.nrl.navy.mil>
Date: Wed, 10 Mar 1999 18:04:28 -0500 (EST)
Reply-To: <cipher-request@itd.nrl.navy.mil>
X-From-Line: owner-cipherdist@itd.nrl.navy.mil Wed Mar 10 18:24:58 1999
Return-Path: <owner-cipherdist@itd.nrl.navy.mil>
Delivered-To: perry@jekyll.piermont.com
Received: from frankenstein.piermont.com (frankenstein.piermont.com [206.1.51.17])
	by jekyll.piermont.com (Postfix) with ESMTP
	id 010BC166; Wed, 10 Mar 1999 18:24:57 -0500 (EST)
Received: by frankenstein.piermont.com (Postfix)
	id A90CE1825; Wed, 10 Mar 1999 18:24:57 -0500 (EST)
Delivered-To: perry@piermont.com
Received: from itd.nrl.navy.mil (s2.itd.nrl.navy.mil [132.250.83.3])
	by frankenstein.piermont.com (Postfix) with ESMTP id 246921816
	for <perry@piermont.com>; Wed, 10 Mar 1999 18:24:54 -0500 (EST)
Received: from localhost (daemon@localhost)
	by itd.nrl.navy.mil (8.8.8/8.8.8) with SMTP id SAA26205;
	Wed, 10 Mar 1999 18:22:27 -0500 (EST)
Received: by itd.nrl.navy.mil (bulk_mailer v1.9); Wed, 10 Mar 1999 18:04:28 -0500
Received: (from syverson@localhost)
	by itd.nrl.navy.mil (8.8.8/8.8.8) id SAA25653
	for cipherdist; Wed, 10 Mar 1999 18:04:28 -0500 (EST)
Message-Id: <199903102304.SAA25653@itd.nrl.navy.mil>
Return-Path: <owner-cipherdist@itd.nrl.navy.mil>
Sender: owner-cipherdist@itd.nrl.navy.mil
Lines: 350
Xref: jekyll.piermont.com other:3669

An issue of Cipher is coming soon. I am sending this Special 20th
Anniversary Symposium Announcement out now, rather than waiting to
include it in the forthcoming issue.

Sincerely,
Paul Syverson

                 1999 IEEE Symposium on Security and Privacy
                       Special 20th Anniversary Program

                               May 9-12, 1999
                            The Claremont Resort
                            Berkeley, California
     Sponsored by the IEEE Technical Committee on Security and Privacy
  In cooperation with the International Association of Cryptologic Research

                            Symposium Committee:
                         John McLean, General Chair
                         Jonathan Millen, Vice Chair
                           Li Gong, Program Co-Chair
                      Michael Reiter, Program Co-Chair

                            PRELIMINARY PROGRAM

--------------------------------------------------------------------------
Sunday, May 9, 1999
--------------------------------------------------------------------------
5:00pm Registration
6:00pm Reception
--------------------------------------------------------------------------

Monday, May 10, 1999
--------------------------------------------------------------------------
8:00am Registration
8:45am-9:00am Welcome: Chairs
--------------------------------------------------------------------------
9:00am-10:30am Systems
	Session Chair: Roger Needham, Microsoft Research

Hardening COTS software with generic software wrappers
	Timothy Fraser, Lee Badger, Mark Feldman
	TIS Labs at Network Associates, Inc.
 
Firmato: A novel firewall management toolkit
	Yair Bartal, Alain Mayer, Kobbi Nissim, Avishai Wool
	Lucent Bell Labs
 
Flexible policy-directed code safety
	David Evans, Andrew Twyman
	MIT
-------------------------------------------------------------------------
10:30am-11am coffee break
-------------------------------------------------------------------------
11:00am-12:00pm Policy
	Session Chair: Ravi Sandhu, George Mason University
 
Local reconfiguration policies
	Jonathan K. Millen
	SRI International
 
A modular, user-centered authorization service built on an RBAC foundation
	Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo
	Iris Associates, EMC, Groove Networks
 
------------------------------------------------------------------------
12:00pm-12:30pm Surprise
------------------------------------------------------------------------
12:30pm-02:00pm Lunch
------------------------------------------------------------------------
2:00pm-3:00pm Verification
	Session Chair: John Mitchell, Stanford University
 
Secure communications processing for distributed languages
	Martin Abadi, Cedric Fournet, Georges Gonthier
	Compaq Systems Research Center, Microsoft Research, and INRIA
 
Verification of control flow based security policies
	T. Jensen, D. Le Metayer, T. Thorn
	IRISA
 
------------------------------------------------------------------------
3:00pm-3:30pm coffee
------------------------------------------------------------------------
3:30pm-5:00pm Panel Discussion

Brief History of Twenty Years of Computer Security Research
	Panel Chair: Teresa Lunt, Xerox PARC
	Panelists: 

        G.R. Blakley, Texas A&M University
        20 years of cryptography

        Virgil Gligor, U Maryland
        20 years of operating system security (Unix as one focus)

        Steve Lipner, MITRETEK 
        20 years of criteria development/commercial technology

        Jonathan K. Millen, SRI International
        20 years of covert channel modeling and analysis

        John McLean, NRL
        20 years of formal methods

        Steve Kent BBN/GTE
        20 years of network security
------------------------------------------------------------------------
8:00pm Poster Session
------------------------------------------------------------------------
 
Tuesday, May 11, 1999
------------------------------------------------------------------------
9:00am-10:30am Intrusion Detection
 	Session Chair: Cynthia Irvine, Naval Postgraduate School

A data mining framework for building intrusion detection models
	Wenke Lee, Sal Stolfo, Kui Mok
	Columbia University
 
Detecting intrusions using system calls:  Alternative data models
	Christina Warrender, Stephanie Forrest, Barak Pearlmutter
	University of New Mexico
 
Detecting computer and network misuse through the production-based
  expert system toolset (P-BEST)
	Ulf Lindqvist, Phillip A. Porras
	Chalmers University of Technology, SRI International
 
------------------------------------------------------------------------
10:30am-11:00am coffee
------------------------------------------------------------------------
11:00am-12:30pm Panel 2

Near Misses and Hidden Treasures in Early Computer Security Research
	Panel Chair: Stan Ames, MITRE
	Panelists: Tom Berson, Anagram Labs and Xerox PARC
                   Marv Schaefer, Arca
                   Dick Kemmerer, UC Santa Barbara

------------------------------------------------------------------------
12:30pm-2:00pm lunch
------------------------------------------------------------------------
2:00pm-3:30pm Information Flow
 	Session Chair: John McHugh, Portland State University

A multi-threading architecture for multilevel secure transaction processing
	Haruna Isa, William R. Shockley, Cynthia E. Irvine
	U.S. Navy, Cyberscape Computer Services, and
	Naval Postgraduate School
 
Specification and enforcement of classification and inference constraints
	Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati
	SRI International and University of Milan
 
A test for non-disclosure in security level translations
	David Rosenthal, Francis Fung
	Odyssey Research Associates
 
------------------------------------------------------------------------
3:30-4:00pm coffee
------------------------------------------------------------------------
4:00-5:30pm Work-In-Progress (5-minute Presentations)
	Session Chair: Heather Hinton, Ryerson Polytechnic University
------------------------------------------------------------------------
6:00pm IEEE Security and Privacy Technical Committee meeting
        (open to all conference attendees)
------------------------------------------------------------------------
8:00pm Poster Session
------------------------------------------------------------------------
 
Wednesday, May 12, 1999
------------------------------------------------------------------------
9:00am-10:00am Authentication and Key Exchange
	Session Chair: Dieter Gollmann, Microsoft Research

Software smart cards via cryptographic camouflage
	D. Hoover, B. N. Kausik
	Arcot Systems
 
Analysis of the internet key exchange protocol using the NRL protocol analyzer
	Catherine Meadows, 
	Naval Research Laboratory
------------------------------------------------------------------------
10:00am-10:30am coffee
------------------------------------------------------------------------
10:30am-12:00pm. Panel Discussion

Time Capsule -- Twenty Years From Now
	Panel Chair: Michael Reiter, Lucent Bell Labs
	Panelists:

        Mark Weiser, Xerox PARC
        Future of computing

        Roger Needham, Microsoft Research,  Cambridge
        Future of hardware technology

        Howard Shrobe, MIT AI Lab
        Future of software technology

	Hilarie Orman, DARPA
	Future of networking

        Brian Snow, National Security Agency
        Future of Security
------------------------------------------------------------------------
12:00pm Conference Adjourns
------------------------------------------------------------------------

                          Registration Information

Registration must be made in writing either mailed or faxed, by 5 April
1999 to qualify for the advance registration fee. This will be STRICTLY
enforced by postmark or fax time. Sorry, but NO E-Mail registrations will be
accepted.  (The ascii version of the registration form is appended below.)

----------------------------------------------------------------------------

                     Five-Minute Research Talks Session

A continuing feature of the symposium will be a session of 5-minute talks.
We want to hear from people who are advancing the field in the areas of
system design and implementation, but may lack the resources needed to
prepare a full paper. Abstracts of these talks will be distributed at the
Symposium.

Abstracts for 5-minute talks should fit on one 8.5"x11" page,
including the title and all author names and affiliations.  Abstracts
should be sent via email in plain ASCII format to Li Gong at
li.gong@sun.com. The email should state that this abstract is being
submitted for presentation at the 1999 IEEE Symposium on Security and
Privacy, and should include the presenter's name, email and postal
addresses, and phone and fax numbers.

    5-minute abstracts due:  March 12, 1999 
    Acceptance notification: March 26, 1999 

----------------------------------------------------------------------------

                              Evening Sessions

The 1999 IEEE Symposium on Security and Privacy will accommodate poster
sessions and evening discussions. There will be rooms for interested parties
to post presentations on work in progress, recent research results, and
innovative proposals, or to lead discussions on topics of current interest.
These rooms will be available Monday and Tuesday, May 10 and 11. If you are
interested in posting a presentation or organizing a discussion on a
particular topic, please indicate so on the registration form.

----------------------------------------------------------------------------

                  Hotel Reservations - The Claremont Resort

The Claremont Resort in Berkeley, California is situated in the
Oakland-Berkeley hills overlooking the San Francisco Bay on 22 acres of
beautifully landscaped lawns and gardens. Facilities include the Claremont
Pool and Tennis Club and The Spa at the Claremont.

To reach the hotel, allow 35 minutes from the Oakland Airport and 45 minutes
from the San Francisco Airport. Bayporter Express +1-(415)-467-1800 provides
shuttle service from either airport to the Claremont Resort. The charge is
$16 from either the San Francisco or the Oakland Airport, per
person one way. Parking is available at the hotel at a cost of $12 per day
for guests and a maximum of $14 per day for non-guests.

Hotel reservations must be made under the group name IEEE Symposium on
Security and Privacy. The group rate is $121 for singles and $133 for
double occupancy,
plus 11% tax. These rates are available for the period May 7-14, 1999. The
cut-off date for reservations is April 6, 1999. Reservations made
after this date will be accepted on a space available basis. Reservations
must be accompanied by an advance deposit or credit card guarantee.
Individual cancellations will be accepted 24 hours prior to the check-in
date. Please be advised the check-in time is after 3:00 p.m.; check-out is
12 noon.

For reservations and information, contact: The Claremont Resort, 41 Tunnel
Road, Berkeley, CA 94623-0363; Phone: +1-(800)-551-7266 (7 a.m. to
8:30 p.m., PST) or +1-(510)-843-3000; Fax: +1-(510)-549-8582.

----------------------------------------------------------------------------
----------------------------------------------------------------------------

     1999 IEEE Symposium on Security and Privacy Registration Form

Name: _______________________________________
Affiliation: ________________________________
Postal Address: _____________________________
_____________________________________________
_____________________________________________

Phone: ______________________________________                
Fax: ________________________________________
Email: ______________________________________

Note: Address information will be distributed to attendees.

Please enter the appopriate registration category.  Payment must be 
included and must be either by check in U.S. dollars, drawn on a U.S.
bank and made payable to "IEEE Symposium on Security and Privacy," or
by credit card.  Dates are strictly enforced by postmark.

Advance registration (up to 5 April 1999)
__ Member:             $310.00
   IEEE or Computer Society Member #________, required
__ Non-Member:         $385.00
__ Full-time students: $100.00

Late/on-site registration
__ Member:             $370.00
   IEEE or Computer Society Member #________, required
__ Non-Member:         $460.00
__ Full-time students: $100.00

Do you wish to present at a poster session 
or lead an evening discussion? [ ] Yes [ ] No

Do you have any special requirements? ----------------------------------

Please indicate you method of payment by checking the appropriate box:

[ ] Check in U.S. funds drawn on a U.S. bank (PLEASE ENCLOSE WITH THIS FORM)

Credit card authorization: (Charges will appear on your statement as made
by the IEEE COMPUTER SOCIETY.  Your credit card number will be transmitted
to the IEEE over the Internet, using an SSL-protected link.)

[ ] Visa   [ ] Mastercard  [ ] American Express  [ ] Diners Club

Credit Card Number:
Card Holder Name:
Expiration Date:
Signature (required for credit card payments)

Mail registration to:

Jonathan Millen
SRI International EL233
333 Ravenswood Ave.
Menlo Park, CA 94025

Or fax this form (credit card registrations only) to:

FAX +1-650-859-2844
(voice confirmation +1-650-859-2358 or +1-650-859-4751)

NO REGISTRATIONS BY EMAIL.  NO REFUNDS.

----------------------------------------------------------------------------


home help back first fref pref prev next nref lref last post