NSPW Rabbit

New Security Paradigms Workshop 2008

September 22-25, 2008

Plumpjack Squaw Valley Inn
Lake Tahoe, California, USA

Call for Papers and Participation

NSPW 2008 Call For Papers

2008 New Security Paradigms Workshop

Plumpjack Squaw Valley Inn, Lake Tahoe, CA, USA -- September 22-25, 2008

Call for Papers and Participation

The computers of the world are under siege. Denial of service attacks plague commercial sites, large and small. Major companies are hacked for consumer credit card numbers. Phishing attacks for personal information are commonplace, and million-machine botnets are a reality. Our tools for combating these threats--cryptography, firewalls, access controls, vulnerability scanners, malware and intrusion detectors--are insufficient. We need radical new solutions, but most security researchers propose only incremental improvements. Since 1992, the New Security Paradigm Workshop (NSPW) has been a home for research that addresses the fundamental limitations of current work in information security.

NSPW welcomes unconventional, promising solutions to important problems and critiques of standard security practice. To facilitate research interactions, NSPW features supportive paper presentations, extended discussions, group meals, and shared activities, all in attractive surroundings. By encouraging researchers to think "outside the box" and giving them an opportunity to communicate with open-minded peers, NSPW fosters paradigm shifts in the field of information security.

In 2008, NSPW will be held in Lake Tahoe (Olympic Valley, CA) at the Plumpjack Squaw Valley Inn, from September 22nd to 25th. We will accept about a dozen papers and invite the authors to attend the three-day workshop. One author of each accepted paper must attend NSPW; other authors may attend on a space-available basis. In order to ensure that all papers receive equally strong feedback, all attendees are expected to stay for the entire duration of the workshop. (We expect to offer a limited amount of financial aid to those who absolutely require it.) Final proceedings are published after the workshop. Authors always revise their papers to include feedback received at NSPW.

Important Dates.

  • The submission deadline is April 18, 2008, 23:59 (GMT -12, or Y time).
  • Notification of acceptance will be June 3, 2008.
  • Camera-ready papers for pre-proceedings due August 28, 2008.
  • Camera-ready papers for proceedings due November 1, 2008.

Submissions. NSPW welcomes papers that present a significant shift in thinking about difficult security issues, build on such a recent shift, offer a contrarian view of accepted practice or policy, or address non-technological aspects of security. Our program committee particularly looks for new approaches to information security, early thinking on new topics, innovative solutions to long-time problems, and controversial issues which might not be accepted at other conferences but merit a hearing. We discourage papers that represent completed or established works, or offer incremental improvements to well-established models. NSPW expects a high level of scholarship from contributors, including awareness of prior work produced before the World Wide Web.

We welcome three categories of submission:

  1. Research papers should be of a length commensurate with the significance of the work and the amount of material that the reviewer must assimilate for evaluation.
  2. Position papers should be 5-10 pages in length and should espouse a well reasoned and carefully documented position on a security related topic that merits challenge and/or discussion.
  3. Discussion panel proposals should include an in-depth description of the topic to be discussed, an argument for why the topic will lead to a lively discussion, and other optional supporting materials such as the credentials of the proposed panelists.

Submissions are accepted at www.nspw.org. Submissions should be in PDF format and should include justification and attendance statements. A justification statement specifies the category of your submission and describes, in one page or less, why your submission is appropriate for NSPW. A good justification will describe the new approach being proposed, explain how it departs from existing theory or practice, and identify those aspects of the status quo it challenges or rejects. An attendance statement specifies which of the authors wish to attend the workshop. Accepted papers require the attendance of at least one author for the entire duration of the workshop. As attendance is limited, we cannot guarantee space for more than one author.

All submissions are treated as confidential, both as a matter of policy and in accordance with the U.S. Copyright Act of 1976. Workshop proceedings will be published by the ACM and put in the ACM digital library. As such, prospective authors are encouraged (but not required) to submit their manuscripts in the format of ACM SIG proceedings, preferably using the corresponding template.

Submissions accompanied by nondisclosure agreement forms will not be considered. No submission to NSPW may have been published elsewhere nor may a similar submission be under consideration for publication or presentation in any other forum during the NSPW review process. NSPW, like other research and technical conferences and journals, prohibits these practices and may, on the recommendation of a program chair, take action against authors who have committed them. In some cases, program committees may discreetly share information about submitted papers with other conference chairs and journal editors to ensure the integrity of papers under consideration. If a violation of these principles is found, sanctions may include, but are not limited to, barring the authors from submitting to or participating in future NSPW meetings for a set period, contacting the authors' institutions, and publicizing the details of the case. Authors uncertain whether their submission meets the NSPW guidelines should contact the program chairs.

NSPW 2008 Organizers:
   
General Chair: Matt Bishop (bishop at cs.ucdavis.edu), University of California, Davis, US
   
Program Committee Co-Chairs: Angelos Keromytis (angelos at cs.columbia.edu), Columbia University, US
  Anil Somayaji (soma at scs.carleton.ca), Carleton University, Canada
   
Program Committee: Matt Beaumont-Gay, University of California, Los Angeles, US
  Kosta Beznosov, University of British Columbia, Canada
  Matt Bishop, University of California, Davis, US
  Steve Borbash, US Department of Defense
  Stanley Chow, Alcatel-Lucent Bell Labs, Canada
  Keith Edwards, Georgia Institute of Technology, US
  Jan Feyereisl, University of Nottingham, UK
  Stephanie Forrest, University of New Mexico, US
  Carrie Gates, CA Labs, US
  Steven J. Greenwald, Independent Consultant, US
  Jeffrey Hunker, Carnegie Mellon University, US
  Klaus Kursawe, Philips Research, Netherlands
  Michael Locasto, Dartmouth College, US
  Carla Marceau, Architecture Technology Corporation, US
  Ken Olthoff, U.S. Department of Defense, US
  Paul Van Oorschot, Carleton University, Canada
  Christian Probst, Technical University of Denmark
  Vidyaraman Sankaranarayanan, University at Buffalo, US
  M. Angela Sasse, University College London, UK
  Jon Solworth, University of Illinois at Chicago, US
  Brian Snow, Independent Security Advisor, US
  Carol Taylor, Eastern Washington University, US

An 
ACSA
Conference
Web Site Courtesy of

SDSC
the San Diego Supercomputer Center


Sponsored by

Online Information Security Masters Program, James Madison University


Sponsored by

CA Labs

 

Sponsored by

Zakon Group