W3C home > Mailing lists > Public > w3c-ietf-xmldsig@w3.org > April to June 2000

RE: ISOC Netw & Distr Sys Security Symp (NDSS'01)

From: Peter Hesse <pmhesse@cygnacom.com>
Date: Tue, 9 May 2000 12:03:32 -0400
Message-ID: <F19999D192F6D211AA1700207810B4340EE31B@SOLO>
To: "'Joseph M. Reagle Jr.'" <reagle@w3.org>, IETF/W3C XML-DSig WG <w3c-ietf-xmldsig@w3.org>
Cc: "Tim Polk (E-mail)" <wpolk@nist.gov>, "Nelson Hastings (E-mail)" <nelson.hastings@nist.gov>
CygnaCom, under contract to NIST, has been developing an implementation of
the XML Digital Signature draft while it has been in the draft process.  We
(CygnaCom) would be happy to participate in a presentation/paper for NDSS
detailing the successes of our implementation and of the standard.

Although I have not asked them yet, I have a feeling that Tim Polk and/or
Nelson Hastings from NIST would also be willing to lend a hand.


Peter M. Hesse   pmhesse@cygnacom.com   http://www.cygnacom.com
      CygnaCom Solutions, An Entrust Technologies Company
      (703)848-0883(voice) (703)848-0960(fax) ICQ#1942828 
"Pay no attention to what the critics say; there has never been 
a statue set up in honor of a critic." --Jean Sibelius

-----Original Message-----
From: Joseph M. Reagle Jr. [mailto:reagle@w3.org]
Sent: Tuesday, May 09, 2000 11:05 AM
Subject: CFP: ISOC Netw & Distr Sys Security Symp (NDSS'01)

Would anyone be interested in presenting on XML Signature? (I generally
don't forward or encourage CFPs to the list unless they are relevant to
getting information about our work product out.)

Forwarded Text ----

             C  A  L  L       F  O  R       P  A  P  E  R  S
                           The Internet Society
          2001 Network and Distributed System Security Symposium
                            February 7-9, 2001
                 Catamaran Resort, San Diego, California
                             IMPORTANT DATES
           Paper Submission due:           August 2, 2000
           Author Notification:            September 27, 2000
           Camera-ready final papers due:  October 31, 2000
   This symposium will foster information exchange among researchers 
   and practioners of network and distributed system security 
   services.  The intended audience includes those who are interested 
   in the practical aspects of network and distributed system security,
   focusing on actual system design and implementation, rather than
   theory.  A major goal of the symposium is to encourage and enable 
   the Internet community to apply, deploy, and advance the state of
   available security technology.  The proceedings of the symposium 
   will be published by the Internet Society.
 Submissions are solicited for, but are not limited to, the following
  * Secure Electronic Commerce: e.g., payment, barter, EDI,
    notarization/timestamping, endorsement and licensing.
  * Intellectual Property Protection: protocols, schemas,
    implementations, metering, watermarking, other forms of rights
  * Implementation, deployment and management of network security
  * Integrating Security in Internet protocols: routing, naming,
    TCP/IP, multicast, network management, and the Web.
  * Attack-resistant protocols and services.
  * Special problems and case studies: e.g., interplay and tradeoffs
    between security and efficiency, usability, reliability and cost.
  * Security for collaborative applications and services: tele- and
    video-conferencing, groupwork, etc.
  * Fundamental services: authentication, data integrity,
    confidentiality, authorization, non-repudiation, and availability.
  * Supporting mechanisms and APIs: key management and certification,
    revocation, audit trails and accountability.
  * Public Key Infrastructure.
  * Integrating security services with system and application security
    facilities and protocols: e.g., message handling, file
    transport/access, directories, time synchronization, database
    management, boot services, mobile computing.
  * Security for emerging technologies: sensor networks, specialized
    testbeds, wireless/mobile (and ad hoc) networks, personal
    communication systems, and large heterogeneous distributed systems.
  * Intrusion Avoidance, Detection, and Response: systems, experiences
    and architectures.
  * Network Perimeter Controls: firewalls, packet filters, application
  * Virtual Private Networks.
   There will be a best paper award again this year. The award will
   be presented at the symposium to the authors of the best overall
   paper as selected by the Program Committee.
   The Program Committee invites both technical papers and panel
   proposals. Technical papers should be at most 20 pages long. Panel
   proposals should be at most two pages and should describe the
   topic, identify the panel chair, explain the format of the panel,
   and list three to four potential panelists. Technical papers will
   appear in the proceedings. A description of each panel will appear
   in the proceedings, and may - at the discretion of the panel chair
   - include written position statements from the panelists.
   Each submission must contain a separate title page with the type
   of submission (paper or panel), the title or topic, the names of
   the author(s), organizational affiliation(s), telephone and FAX
   numbers, postal addresses, e-mail addresses, and must specify the
   contact author in case of multi-author submissions. The names of
   authors, affiliations, and other identifying information should
   appear only on the separate title page. Submissions must be
   received by August 2, 2000, and must be made via electronically
   in either PostScript or ASCII format. If the Committee is unable
   to print a PostScript submission, a hardcopy will be requested.
   Therefore, PostScript submissions must arrive well before the
   Submission information can be found at
   http://www.isoc.org/ndss01/cfp. Dates, final call for papers,
   advance program, and registration information will be available
   soon at http://www.isoc.org/ndss01.
   Each submission will be acknowledged by e-mail. If acknowledgment
   is not received within seven days, please contact the program
   Co-chairs as indicated below. Authors and panelists will be
   notified of acceptance by September 27, 2000. Instructions for
   preparing camera-ready copy for the proceedings will be sent at
   that time. The camera-ready copy must be received by October 31,
   Stephen Welke, Trusted Computer Solutions
   Avi Rubin, AT&T Labs - Research
   Paul Van Oorschot, Entrust Technologies
   Eric Harder, National Security Agency
   Thomas Hutton, San Diego Supercomputer Center
   Mahesh Tripunitara, Purdue University
   David Balenson, NAI Labs, Network Associates
   Carla Rosenfeld, Internet Society
   Bennet Yee, University of California San Diego
   Bill Cheswick, Bell Labs
   Dave Kormann, AT&T Labs - Research
   David Aucksmith, Intel Corportation
   David P. Maher, Intertrust
   David Wagner, UC Berkeley
   Edward W. Felten, Princeton University
   Fabian Monrose, Bell Labs
   Gary McGraw, Reliable Software Technologies
   James Ellis, Sun Microsystems
   Kevin McCurley, IBM Almaden Research Center
   Matt Bishop, UC Davis
   Mudge, L0pht Heavy Industries, Inc.
   Peter Gutmann, University of Auckland, New Zealand
   Radia Perlman, Sun Microsystems
   Sandra Murphy, Network Associates
   Tom Berson, Anagram Laboratories
   Virgil D. Gligor, University of Maryland
End Forwarded Text ----

Joseph Reagle Jr.   
W3C Policy Analyst                mailto:reagle@w3.org
IETF/W3C XML-Signature Co-Chair   http://www.w3.org/People/Reagle/
Received on Tuesday, 9 May 2000 11:50:58 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 21:21:33 UTC