Forwarded message 1
3rd Annual PKI R&D Workshop - Call for Papers
http://middleware.internet2.edu/pki04/
Jointly sponsored by NIH, NIST, and Internet2, in cooperation with
USENIX and OASIS.
This workshop considers the full range of public key technology used
for security decisions. PKI supports a variety of functionalities
including authentication, authorization, identity (syndication,
federation and aggregation) and trust.
We solicit papers, scenarios, war stories, panel proposals, and
participation from researchers, systems architects, vendor engineers
and above all users.
Location: NIST, Gaithersburg MD, USA.
Papers and Proposals due: January 30, 2004
Authors Notified: March 1, 2004
Final Materials Due: March 22, 2004
Workshop Dates: April 12-14, 2004
This workshop has three goals:
* Explore the current state of public key technology in different
domains including web services, grid technologies, authentication
systems et. al. in academia & research, government and industry.
* Share & discuss lessons learned and scenarios from vendors and
practitioners on current deployments
* Provide a forum for leading security researchers to explore the
issues relevant to the PKI space in areas of security management,
identity, trust, policy, authentication and authorization.
The results will be promulgated in several ways, including:
* a published proceedings with refereed papers and summaries of
workshop discussions
* the workshop web site: http://middleware.internet2.edu/pki04/
* experimental initiatives within higher education
Outstanding papers will be invited for possible publication in ACM
TISSEC.
Presentation formats will include:
* Refereed papers
* Panel discussions
* Invited talks
* Work-in-progress updates
Submitted works for panels, papers and reports should address one or
more critical areas of inquiry. Topics include (but not are not
limited to):
* PKI systems in various domains like grid, web services,
government, industry and academia.
* PKI and Federated trust
* Related standards: x509, SDSI/SPKI, PGP, XKMS, SAML, Shibboleth,
Liberty Alliance, etc.
* Cryptographic methods in support of security decisions
* The characterization and encoding of security decision data
* Security protocols and choreographies - new ideas, analysis of
existing systems et al
* Alternative methods for supporting security decisions
* Intersection of Policy based systems and PKI
* Privacy protection and implications of different approaches
* Scalability of security systems - are there limits to growth?
* Security of the various components of a system: private keys, root
authorities, certificate storage, communications channels, code,
directories, etc.
* Mobility solutions
* Approaches to attributes and delegation
* Improved designs for security-related user interfaces
* Human factors issues with naming, multiple private keys, selective
disclosure
* Discussion of how the "public key infrastructure" may differ from
the "PKI" traditionally defined
* Reports of real-world experience with the use and deployment of
PKI, especially where future research directions for PKI are
indicated
* What is missing? The gaps in PKI research and standards from a
systems engineering point-of-view
Submissions and Additional Information
Papers should be submitted electronically, in PDF, formatted for
standard US letter-size paper (8.5 x 11 inches). The final version of
refereed papers should ideally be between 8 and 15 pages, and in no
case more than 20 pages. They should have no header or footer text
(e.g., no page numbers).
Proposals for panels should be no longer than five pages in length and
should include possible panelists and an indication of which of those
panelists have confirmed participation.
Please submit the following information by email to
pkichairs@internet2.edu:
* The full contact details (name, affiliation, email, phone, postal
address) of one author who will act as the primary contact for
this paper.
* The full list of authors: you must supply the first name, the last
name and the affiliation of each author.
* The finished paper in PDF format as an attachment.
All submissions will be acknowledged.
The deadline for submission is January 30, 2004. Requests for short
extensions will be granted on a case-by-case basis, and must be
requested by January 30th via email to the same address.
When appropriate, authors should arrange for a release for publication
from their employer prior to submission. Papers accompanied by
non-disclosure agreement forms are not acceptable and will be returned
to the author(s) unread.
Submissions of papers must not substantially duplicate work that any
of the authors have published elsewhere or have submitted in parallel
to any other conferences or journals.
The registration fee will be waived for presenters. A limited number
of stipends are available to those unable to obtain funding to attend
the workshop. Further information will be available on the
registration page in January.
Program Committee
Peter Alterman NIH
Matt Blaze AT&T Labs Research
Bill Burr NIST
Yassir Elley Sun Microsystems
Carl Ellison Microsoft
Stephen Farrell Trinity College Dublin,
Richard Guida Johnson & Johnson
Peter Honeyman University of Michigan
Russ Housley Vigil Security LLC
Ken Klingenstein University of Colorado
Olga Kornievskaia University of Michigan
Neal McBurnett Internet2
Clifford Neuman USC
Eric Norman University of Wisconsin
Tim Polk NIST
Ravi Sandhu George Mason University; NSD Security
Krishna Sankar Cisco Systems
Jeff Schiller MIT
Frank Siebenlist Argonne National Laboratory
Sean Smith Dartmouth College
Michael Wiener Cryptographic Clarity
General Chair:
Ken Klingenstein, University of Colorado.
Program Chair:
Krishna Sankar, Cisco Systems.
Steering Committee Chair:
Neal McBurnett, Internet2.
Local Arrangements Chair:
Nelson Hastings, NIST.