August 18th -- 21st, 2003

Centro Stefano Francini
Ascona, Switzerland

Call for Papers and Participation

What makes a paper acceptable for NSPW?

While we reject plenty of excellent papers that would do very well at other venues, our eclectic program committee particularly looks for new paradigms, innovative approaches to older problems, early thinking on new topics that are not necessarily fully polished, and controversial issues that might not make it into other conferences but deserve to have their try at shaking and breaking the mold. Conversely, a great paper that does not have a new paradigm, does not challenge the status quo, or does not critique an older paradigm will almost certainly get rejected.

NSPW is highly interactive in nature. Authors are encouraged to present ideas that might be considered risky in some other forum. All participants are charged with providing feedback in a constructive manner. The resulting brainstorming environment has proven to be an excellent medium for furthering the development of these ideas. The proceedings, which are published after the workshop, have consistently benefited from the inclusion of workshop feedback.

Because we expect new paradigms, we accept wide-ranging topics in information security. Papers that present a significant shift in thinking about difficult security issues or builds on a previous shift are welcomed. Our program committee particularly looks for new paradigms, innovative approaches to older problems, early thinking on new topics, and controversial issues that might not make it into other conferences but deserve to have their try at shaking and breaking the mold.

Submission will will be done via an online web page which will be activated soon.

The submission deadline is Friday, April 4, 2003.

If you have difficulty submitting, please contact the program chairs - Simon Foley (s.foley@cs.ucc.ie) and R. Sekar (sekar@cs.sunysb.edu)

Submissions must include the following:

1 - Your Paper

We welcome three categories of submission: research papers, 5 - 10 page position papers, and discussion topic proposals. Please indicate the category of your submission. No submission may have been published elsewhere. Discussion topic proposals should include an in-depth description of the topic to be discussed, a convincing argument that the topic will lead to a lively discussion, and supporting materials.

Submissions should be in PDF format.

2 - Justification

Describe, in one page or less, why your paper is appropriate for the New Security Paradigms Workshop. A good justification will describe the new paradigm being proposed, explain how it departs from existing theory or practice, and identify those aspects of the status quo it challenges or rejects.

3 - Attendance Statement

State how many authors wish to attend the workshop. Accepted papers require the attendance of at least one author. In order to ensure that all papers receive equally strong feedback, all attendees are expected to stay for the entire duration of the workshop. Attendance is limited. We cannot guarantee attendance for more than one author.

The program committee will notify authors of acceptance status by June 10, 2003. We expect to offer a limited amount of financial aid to those who require it. More information will be provided on our web site as it becomes available.

ACSA
An  ACSA Conference
CISC/JMU
Proceedings Sponsored by the
Online Information Security Masters Program
James Madison University
 
SDSC
Web Site Courtesy of the San Diego Supercomputer Center