Colonial Inn, Concord, MA, USA
September 21-23, 2010
The New Security Paradigms Workshop (NSPW) is seeking papers that address the current limitations of information security. Today's security risks are diverse and plentiful -- botnets, database breaches, phishing attacks, distributed denial-of-service attacks -- and yet present tools for combating them are insufficient. To address these limitations, NSPW welcomes unconventional, promising approaches to important security problems and innovative critiques of current security theory and practice.
We are particularly interested in perspectives from outside computer security, both from other areas of computer science (such as operating systems, human-computer interaction, databases, programming languages, algorithms) and other sciences that study adversarial relationships such as biology and economics. We discourage papers that offer incremental improvements to security and mature work that is appropriate for standard information security venues.
To facilitate research interactions, NSPW features informal paper presentations, extended discussions in small and large groups, shared activities, and group meals, all in attractive surroundings. By encouraging researchers to think "outside the box" and giving them an opportunity to communicate with open-minded peers, NSPW seeks to foster paradigm shifts in the field of information security.
|Submission deadline:||April 25, 2010, 23:59 (UTC -12, Y time)|
|Please submit at
http://www.easychair.org/conferences/?conf=nspw2010 as a PDF file (ACM SIG formatting preferred, Option 1).
|Notification of acceptance:||June 11, 2010|
|Pre-proceedings version:||August 20, 2010|
|Workshop:||September 21-23, 2010 in Concord, MA, USA|
|Final version:||October 31, 2010|
NSPW 2010 Organizers:
|General Chair:||Angelos Keromytis, Columbia University|
|Vice-Chair:||Sean Peisert, University of California, Davis and Lawrence Berkeley National Laboratory|
|Program Committee Co-Chairs:||Richard Ford (firstname.lastname@example.org), Florida Institute of Technology
Carrie Gates (email@example.com), CA Labs
|Program Committee:||Matt Bishop, University of California, Davis
Mark Burgess, Oslo University College and Cfengine AS/Inc
Deborah Frincke, Pacific Northwest National Laboratory
Steven J. Greenwald, Independent Consultant
Cormac Herley, Microsoft Corporation
Ben Laurie, Google
Michael Locasto, George Mason University
Tom Longstaff, Johns Hopkins University Applied Research Laboratory
Markus Jakobsson, PARC
Maritza Johnson, Columbia University
Brian Snow, Independent Security Advisor
Tara Whalen, Ofﬁce of the Privacy Commissioner of Canada
NSPW welcomes three categories of submissions:
Submissions should include a cover page with justification and attendance statements. A justification statement specifies the category of your submission, briefly describes why your submission is appropriate for NSPW and highlights the new paradigm proposed. An attendance statement specifies which of the authors wish to attend the workshop. One author of each accepted paper must attend NSPW; other authors may attend on a space-available basis. All submissions are treated as confidential, both as a matter of policy and in accordance with the U.S. Copyright Act of 1976.
NSPW does not accept papers that have been published elsewhere, nor papers that have been submitted to other conferences concurrently. Submissions accompanied by nondisclosure agreement forms will not be considered. Authors uncertain whether their submission meets the NSPW guidelines should contact the program chairs.
All accepted papers are shepherded to help authors incorporate feedback provided throughout the process. In order to ensure that all papers receive equally strong feedback, all attendees are expected to stay for the entire duration of the workshop. Final proceedings are published by the ACM after the workshop.
We expect to offer a limited amount of financial aid to those who absolutely require it.