From: <[EMAIL PROTECTED]>
Subject: 20th Anniversary IEEE Security and Privacy Call for Participation
To: <[EMAIL PROTECTED]>
Date: Wed, 10 Mar 1999 18:04:28 -0500 (EST)
Reply-To: <[EMAIL PROTECTED]>
X-From-Line: [EMAIL PROTECTED] Wed Mar 10 18:24:58 1999
Return-Path: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
Received: from frankenstein.piermont.com (frankenstein.piermont.com [206.1.51.17])
        by jekyll.piermont.com (Postfix) with ESMTP
        id 010BC166; Wed, 10 Mar 1999 18:24:57 -0500 (EST)
Received: by frankenstein.piermont.com (Postfix)
        id A90CE1825; Wed, 10 Mar 1999 18:24:57 -0500 (EST)
Delivered-To: [EMAIL PROTECTED]
Received: from itd.nrl.navy.mil (s2.itd.nrl.navy.mil [132.250.83.3])
        by frankenstein.piermont.com (Postfix) with ESMTP id 246921816
        for <[EMAIL PROTECTED]>; Wed, 10 Mar 1999 18:24:54 -0500 (EST)
Received: from localhost (daemon@localhost)
        by itd.nrl.navy.mil (8.8.8/8.8.8) with SMTP id SAA26205;
        Wed, 10 Mar 1999 18:22:27 -0500 (EST)
Received: by itd.nrl.navy.mil (bulk_mailer v1.9); Wed, 10 Mar 1999 18:04:28 -0500
Received: (from syverson@localhost)
        by itd.nrl.navy.mil (8.8.8/8.8.8) id SAA25653
        for cipherdist; Wed, 10 Mar 1999 18:04:28 -0500 (EST)
Message-Id: <[EMAIL PROTECTED]>
Return-Path: <[EMAIL PROTECTED]>
Sender: [EMAIL PROTECTED]
Lines: 350
Xref: jekyll.piermont.com other:3669

An issue of Cipher is coming soon. I am sending this Special 20th
Anniversary Symposium Announcement out now, rather than waiting to
include it in the forthcoming issue.

Sincerely,
Paul Syverson

                 1999 IEEE Symposium on Security and Privacy
                       Special 20th Anniversary Program

                               May 9-12, 1999
                            The Claremont Resort
                            Berkeley, California
     Sponsored by the IEEE Technical Committee on Security and Privacy
  In cooperation with the International Association of Cryptologic Research

                            Symposium Committee:
                         John McLean, General Chair
                         Jonathan Millen, Vice Chair
                           Li Gong, Program Co-Chair
                      Michael Reiter, Program Co-Chair

                            PRELIMINARY PROGRAM

--------------------------------------------------------------------------
Sunday, May 9, 1999
--------------------------------------------------------------------------
5:00pm Registration
6:00pm Reception
--------------------------------------------------------------------------

Monday, May 10, 1999
--------------------------------------------------------------------------
8:00am Registration
8:45am-9:00am Welcome: Chairs
--------------------------------------------------------------------------
9:00am-10:30am Systems
        Session Chair: Roger Needham, Microsoft Research

Hardening COTS software with generic software wrappers
        Timothy Fraser, Lee Badger, Mark Feldman
        TIS Labs at Network Associates, Inc.
 
Firmato: A novel firewall management toolkit
        Yair Bartal, Alain Mayer, Kobbi Nissim, Avishai Wool
        Lucent Bell Labs
 
Flexible policy-directed code safety
        David Evans, Andrew Twyman
        MIT
-------------------------------------------------------------------------
10:30am-11am coffee break
-------------------------------------------------------------------------
11:00am-12:00pm Policy
        Session Chair: Ravi Sandhu, George Mason University
 
Local reconfiguration policies
        Jonathan K. Millen
        SRI International
 
A modular, user-centered authorization service built on an RBAC foundation
        Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo
        Iris Associates, EMC, Groove Networks
 
------------------------------------------------------------------------
12:00pm-12:30pm Surprise
------------------------------------------------------------------------
12:30pm-02:00pm Lunch
------------------------------------------------------------------------
2:00pm-3:00pm Verification
        Session Chair: John Mitchell, Stanford University
 
Secure communications processing for distributed languages
        Martin Abadi, Cedric Fournet, Georges Gonthier
        Compaq Systems Research Center, Microsoft Research, and INRIA
 
Verification of control flow based security policies
        T. Jensen, D. Le Metayer, T. Thorn
        IRISA
 
------------------------------------------------------------------------
3:00pm-3:30pm coffee
------------------------------------------------------------------------
3:30pm-5:00pm Panel Discussion

Brief History of Twenty Years of Computer Security Research
        Panel Chair: Teresa Lunt, Xerox PARC
        Panelists: 

        G.R. Blakley, Texas A&M University
        20 years of cryptography

        Virgil Gligor, U Maryland
        20 years of operating system security (Unix as one focus)

        Steve Lipner, MITRETEK 
        20 years of criteria development/commercial technology

        Jonathan K. Millen, SRI International
        20 years of covert channel modeling and analysis

        John McLean, NRL
        20 years of formal methods

        Steve Kent BBN/GTE
        20 years of network security
------------------------------------------------------------------------
8:00pm Poster Session
------------------------------------------------------------------------
 
Tuesday, May 11, 1999
------------------------------------------------------------------------
9:00am-10:30am Intrusion Detection
        Session Chair: Cynthia Irvine, Naval Postgraduate School

A data mining framework for building intrusion detection models
        Wenke Lee, Sal Stolfo, Kui Mok
        Columbia University
 
Detecting intrusions using system calls:  Alternative data models
        Christina Warrender, Stephanie Forrest, Barak Pearlmutter
        University of New Mexico
 
Detecting computer and network misuse through the production-based
  expert system toolset (P-BEST)
        Ulf Lindqvist, Phillip A. Porras
        Chalmers University of Technology, SRI International
 
------------------------------------------------------------------------
10:30am-11:00am coffee
------------------------------------------------------------------------
11:00am-12:30pm Panel 2

Near Misses and Hidden Treasures in Early Computer Security Research
        Panel Chair: Stan Ames, MITRE
        Panelists: Tom Berson, Anagram Labs and Xerox PARC
                   Marv Schaefer, Arca
                   Dick Kemmerer, UC Santa Barbara

------------------------------------------------------------------------
12:30pm-2:00pm lunch
------------------------------------------------------------------------
2:00pm-3:30pm Information Flow
        Session Chair: John McHugh, Portland State University

A multi-threading architecture for multilevel secure transaction processing
        Haruna Isa, William R. Shockley, Cynthia E. Irvine
        U.S. Navy, Cyberscape Computer Services, and
        Naval Postgraduate School
 
Specification and enforcement of classification and inference constraints
        Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati
        SRI International and University of Milan
 
A test for non-disclosure in security level translations
        David Rosenthal, Francis Fung
        Odyssey Research Associates
 
------------------------------------------------------------------------
3:30-4:00pm coffee
------------------------------------------------------------------------
4:00-5:30pm Work-In-Progress (5-minute Presentations)
        Session Chair: Heather Hinton, Ryerson Polytechnic University
------------------------------------------------------------------------
6:00pm IEEE Security and Privacy Technical Committee meeting
        (open to all conference attendees)
------------------------------------------------------------------------
8:00pm Poster Session
------------------------------------------------------------------------
 
Wednesday, May 12, 1999
------------------------------------------------------------------------
9:00am-10:00am Authentication and Key Exchange
        Session Chair: Dieter Gollmann, Microsoft Research

Software smart cards via cryptographic camouflage
        D. Hoover, B. N. Kausik
        Arcot Systems
 
Analysis of the internet key exchange protocol using the NRL protocol analyzer
        Catherine Meadows, 
        Naval Research Laboratory
------------------------------------------------------------------------
10:00am-10:30am coffee
------------------------------------------------------------------------
10:30am-12:00pm. Panel Discussion

Time Capsule -- Twenty Years From Now
        Panel Chair: Michael Reiter, Lucent Bell Labs
        Panelists:

        Mark Weiser, Xerox PARC
        Future of computing

        Roger Needham, Microsoft Research,  Cambridge
        Future of hardware technology

        Howard Shrobe, MIT AI Lab
        Future of software technology

        Hilarie Orman, DARPA
        Future of networking

        Brian Snow, National Security Agency
        Future of Security
------------------------------------------------------------------------
12:00pm Conference Adjourns
------------------------------------------------------------------------

                          Registration Information

Registration must be made in writing either mailed or faxed, by 5 April
1999 to qualify for the advance registration fee. This will be STRICTLY
enforced by postmark or fax time. Sorry, but NO E-Mail registrations will be
accepted.  (The ascii version of the registration form is appended below.)

----------------------------------------------------------------------------

                     Five-Minute Research Talks Session

A continuing feature of the symposium will be a session of 5-minute talks.
We want to hear from people who are advancing the field in the areas of
system design and implementation, but may lack the resources needed to
prepare a full paper. Abstracts of these talks will be distributed at the
Symposium.

Abstracts for 5-minute talks should fit on one 8.5"x11" page,
including the title and all author names and affiliations.  Abstracts
should be sent via email in plain ASCII format to Li Gong at
[EMAIL PROTECTED] The email should state that this abstract is being
submitted for presentation at the 1999 IEEE Symposium on Security and
Privacy, and should include the presenter's name, email and postal
addresses, and phone and fax numbers.

    5-minute abstracts due:  March 12, 1999 
    Acceptance notification: March 26, 1999 

----------------------------------------------------------------------------

                              Evening Sessions

The 1999 IEEE Symposium on Security and Privacy will accommodate poster
sessions and evening discussions. There will be rooms for interested parties
to post presentations on work in progress, recent research results, and
innovative proposals, or to lead discussions on topics of current interest.
These rooms will be available Monday and Tuesday, May 10 and 11. If you are
interested in posting a presentation or organizing a discussion on a
particular topic, please indicate so on the registration form.

----------------------------------------------------------------------------

                  Hotel Reservations - The Claremont Resort

The Claremont Resort in Berkeley, California is situated in the
Oakland-Berkeley hills overlooking the San Francisco Bay on 22 acres of
beautifully landscaped lawns and gardens. Facilities include the Claremont
Pool and Tennis Club and The Spa at the Claremont.

To reach the hotel, allow 35 minutes from the Oakland Airport and 45 minutes
from the San Francisco Airport. Bayporter Express +1-(415)-467-1800 provides
shuttle service from either airport to the Claremont Resort. The charge is
$16 from either the San Francisco or the Oakland Airport, per
person one way. Parking is available at the hotel at a cost of $12 per day
for guests and a maximum of $14 per day for non-guests.

Hotel reservations must be made under the group name IEEE Symposium on
Security and Privacy. The group rate is $121 for singles and $133 for
double occupancy,
plus 11% tax. These rates are available for the period May 7-14, 1999. The
cut-off date for reservations is April 6, 1999. Reservations made
after this date will be accepted on a space available basis. Reservations
must be accompanied by an advance deposit or credit card guarantee.
Individual cancellations will be accepted 24 hours prior to the check-in
date. Please be advised the check-in time is after 3:00 p.m.; check-out is
12 noon.

For reservations and information, contact: The Claremont Resort, 41 Tunnel
Road, Berkeley, CA 94623-0363; Phone: +1-(800)-551-7266 (7 a.m. to
8:30 p.m., PST) or +1-(510)-843-3000; Fax: +1-(510)-549-8582.

----------------------------------------------------------------------------
----------------------------------------------------------------------------

     1999 IEEE Symposium on Security and Privacy Registration Form

Name: _______________________________________
Affiliation: ________________________________
Postal Address: _____________________________
_____________________________________________
_____________________________________________

Phone: ______________________________________                
Fax: ________________________________________
Email: ______________________________________

Note: Address information will be distributed to attendees.

Please enter the appopriate registration category.  Payment must be 
included and must be either by check in U.S. dollars, drawn on a U.S.
bank and made payable to "IEEE Symposium on Security and Privacy," or
by credit card.  Dates are strictly enforced by postmark.

Advance registration (up to 5 April 1999)
__ Member:             $310.00
   IEEE or Computer Society Member #________, required
__ Non-Member:         $385.00
__ Full-time students: $100.00

Late/on-site registration
__ Member:             $370.00
   IEEE or Computer Society Member #________, required
__ Non-Member:         $460.00
__ Full-time students: $100.00

Do you wish to present at a poster session 
or lead an evening discussion? [ ] Yes [ ] No

Do you have any special requirements? ----------------------------------

Please indicate you method of payment by checking the appropriate box:

[ ] Check in U.S. funds drawn on a U.S. bank (PLEASE ENCLOSE WITH THIS FORM)

Credit card authorization: (Charges will appear on your statement as made
by the IEEE COMPUTER SOCIETY.  Your credit card number will be transmitted
to the IEEE over the Internet, using an SSL-protected link.)

[ ] Visa   [ ] Mastercard  [ ] American Express  [ ] Diners Club

Credit Card Number:
Card Holder Name:
Expiration Date:
Signature (required for credit card payments)

Mail registration to:

Jonathan Millen
SRI International EL233
333 Ravenswood Ave.
Menlo Park, CA 94025

Or fax this form (credit card registrations only) to:

FAX +1-650-859-2844
(voice confirmation +1-650-859-2358 or +1-650-859-4751)

NO REGISTRATIONS BY EMAIL.  NO REFUNDS.

----------------------------------------------------------------------------

Reply via email to