Call for Proposals
[PDF]
[DOC]
Industry Track Submission Deadline: July 21, 2006
Industry Track Notification Date: September 1, 2006
The Industry and Government Track of the 13th ACM Computer and
Communications Security Conference seeks new, innovative reports on the
development, transition, and deployment of security products and systems
in industry and government.
The track aims to foster tighter interplay between the demands of real-world
security systems and the efforts of the research community. Audience members
would like to learn about pressing security vulnerabilities and deficiencies
in existing products and Internet-facing systems, as well as successful
technology transition of research results into security products and how
these should motivate and shape research programs. Presentation of crisply
framed, open technical problems and discussion of innovative solutions with
practical relevance to real-world problems will be especially valuable. Also
of interest are: Practical and broadly informative experience with the
security aspects of large-scale systems, reports on the scope and content of
sponsored research programs in information security, and government or
commercial requirements for future systems. Technical characteristics of
novel products may be of interest, but marketing pitches will not be accepted!
As one of the most influential conferences in the area, CCS affords industry
and government the opportunity to gain the attention of a skillful and
energetic community of researchers.
Topics of interest include (but are not limited to):
Authentication
Case studies
Database and system security
Embedded systems security
Identity management
Intrusion detection
Mobile-code security
Sensors and RFID
Security Modeling
Smart cards
|
Access control
Cryptographic algorithms
DoS detection and mitigation
Enterprise security policies
Insider threat
Key management
Physical security in computing
Security economics
Security management
Security metrics
|
Accounting and auditing
Cryptographic protocols
Digital rights management
Experimental studies
Intellectual-property protection
Large-scale deployments
Privacy and anonymity
Security in pervasive computing
Security situational awareness
Wireless security
|
Applied cryptography
Data/systems integrity
e-business/e-commerce
Failed-system lessons
Information warfare
MANET security
Risk management
Security insurance
Security verification
|
For this track, we are soliciting panel and presentation proposals. Proposals accepted for the program will be made accessible prior to the conference. The track may include invited speakers as space and time permit. Submission format and other instructions are available below.
Presentation Proposals
A presentation proposal should consist of either a set of slides or a position paper representing the essential matter proposed by the speaker. Proposals must include sufficient material for the reviewers to make an informed decision. We recommend the submission be substantially similar in content to the final presentation. Detailed proposals or presentations are highly recommended and will receive preferential treatment. Abstract-only submissions will not be evaluated. Proposals should identify expected speakers.
Panel Proposals
A panel proposal should be no longer than three (3) pages in length. It should include possible panelists and an indication of which panelists have confirmed their participation.
Submissions:
Submit presentation proposals and panel proposals as described above in PDF
format by email to:
CCS06_SUBMISSION-L @ LISTSERV.JHUAPL.EDU
Organizers:
Program Chair: Rebecca Wright, Stevens Institute of Technology, USA
Program Co-chair: Sabrina De Capitani di Vimercati, University of Milan, Italy
Industry and Government Track Chair: Peter Dinsmore, Johns Hopkins University Applied Physics Lab, USA
General Chair: Ari Juels, RSA Laboratories, USA
Publicity Chairs: Angelos Keromytis / Michael E. Locasto, Columbia University, USA
Publication Chair: Vitaly Shmatikov, University of Texas, USA
Tutorials Chair: Wenliang (Kevin) Du, Syracuse University, USA
Treasurer: Peng Ning, North Carolina State University, USA
Workshops Chair: Marianne Winslett, UIUC, USA
Program Committee:
David Balenson (SPARTS)
Peter Dinsmore (JHU/APL), PC Chair
Steve Lipner (Microsoft Corporation)
Douglas Maughan (Dept. of Homeland Security)
Subhabrata Sen (AT&T Research)
Brent Waters (SRI International)
|
Terry Benzel (USC/ISI)
Brian Hearing (DARPA)
Carl Landwehr (University of Maryland)
Patrick McDaniel (Pennsylvania State University)
Patrick Traynor (Pennsylvania State University)
Ron Watro (BBN)
|
