[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: RE: [pki-tc] Call for papers - 3rd Annual PKI R&D Workshops
Excellent. This workshop is as much about the current practices as about research. So please contribute and participate - in the research area as well as current pragmatic aspects like what worked and what didn't, what needs attention and improvement et al. Cheers -k. > > -----Original Message----- > From: leahyt@wellsfargo.com [mailto:leahyt@wellsfargo.com] > Sent: Wednesday, October 22, 2003 9:30 AM > To: steve.hanna@sun.com; evans_paul@bah.com > Cc: pki-tc@lists.oasis-open.org > > Wells may be interested in presenting a case study of PKI > used in the global > space. I need to confirm > I would be interested in participate as a panel representing > the financial > space. > Steve: you have put in so much effort in the survey, > > -----Original Message----- > From: Steve Hanna [mailto:steve.hanna@sun.com] > Sent: Wednesday, October 22, 2003 8:34 AM > To: Evans Paul > Cc: OASIS PKI TC > Subject: Re: [pki-tc] Call for papers - 3rd Annual PKI R&D Workshops > > I spoke to the PKI Workshop organizers yesterday > (briefing them on the PKI Action Plan). They were > enthusiastic about having a paper on the survey > results and plan. They would also like to have a > BOF or panel on the Action Plan with people from > the PKI TC and other groups (maybe The Open Group, > IETF, or whatever). > > Who would like to write the paper? And who would > like to be on the panel? > > Thanks, > > Steve > > P.S. Note that OASIS is involved with sponsoring the > workshop. That's thanks to our PKI Member Section! > > Evans Paul wrote: > > > > Please note the following announcement. I think we have a > story to tell > > that is as compelling as any I've seen in the past two workshops and > > recommend that we develop a paper around the Action Plan. > > > > * * * > > > > 3rd Annual PKI R&D Workshop - Call for Papers > > http://middleware.internet2.edu/pki04/ > > > > Jointly sponsored by NIH, NIST, and Internet2, in cooperation with > > USENIX and OASIS. > > > > This workshop considers the full range of public key technology used > > for security decisions. PKI supports a variety of functionalities > > including authentication, authorization, identity (syndication, > > federation and aggregation) and trust. > > > > We solicit papers, scenarios, war stories, panel proposals, and > > participation from researchers, systems architects, vendor engineers > > and above all users. > > > > Location: NIST, Gaithersburg MD, USA. > > Papers and Proposals due: January 30, 2004 > > Authors Notified: March 1, 2004 > > Final Materials Due: March 22, 2004 > > Workshop Dates: April 12-14, 2004 > > > > This workshop has three goals: > > > > * Explore the current state of public key technology in different > > domains including web services, grid technologies, > authentication > > systems et. al. in academia & research, government and > industry. > > * Share & discuss lessons learned and scenarios from vendors and > > practitioners on current deployments > > * Provide a forum for leading security researchers to explore the > > issues relevant to the PKI space in areas of security > management, > > identity, trust, policy, authentication and authorization. > > > > The results will be promulgated in several ways, including: > > * a published proceedings with refereed papers and summaries of > > workshop discussions > > * the workshop web site: http://middleware.internet2.edu/pki04/ > > * experimental initiatives within higher education > > > > Outstanding papers will be invited for possible publication in ACM > > TISSEC. > > > > Presentation formats will include: > > * Refereed papers > > * Panel discussions > > * Invited talks > > * Work-in-progress updates > > > > Submitted works for panels, papers and reports should address one or > > more critical areas of inquiry. Topics include (but not are not > > limited to): > > * PKI systems in various domains like grid, web services, > > government, industry and academia. > > * PKI and Federated trust > > * Related standards: x509, SDSI/SPKI, PGP, XKMS, SAML, > Shibboleth, > > Liberty Alliance, etc. > > * Cryptographic methods in support of security decisions > > * The characterization and encoding of security decision data > > * Security protocols and choreographies - new ideas, analysis of > > existing systems et al > > * Alternative methods for supporting security decisions > > * Intersection of Policy based systems and PKI > > * Privacy protection and implications of different approaches > > * Scalability of security systems - are there limits to growth? > > * Security of the various components of a system: > private keys, root > > authorities, certificate storage, communications > channels, code, > > directories, etc. > > * Mobility solutions > > * Approaches to attributes and delegation > > * Improved designs for security-related user interfaces > > * Human factors issues with naming, multiple private > keys, selective > > disclosure > > * Discussion of how the "public key infrastructure" may > differ from > > the "PKI" traditionally defined > > * Reports of real-world experience with the use and deployment of > > PKI, especially where future research directions for PKI are > > indicated > > * What is missing? The gaps in PKI research and standards from a > > systems engineering point-of-view > > > > Submissions and Additional Information > > > > Papers should be submitted electronically, in PDF, formatted for > > standard US letter-size paper (8.5 x 11 inches). The final > version of > > refereed papers should ideally be between 8 and 15 pages, and in no > > case more than 20 pages. They should have no header or footer text > > (e.g., no page numbers). > > > > Proposals for panels should be no longer than five pages in > length and > > should include possible panelists and an indication of > which of those > > panelists have confirmed participation. > > > > Please submit the following information by email to > > pkichairs@internet2.edu: > > * The full contact details (name, affiliation, email, > phone, postal > > address) of one author who will act as the primary contact for > > this paper. > > * The full list of authors: you must supply the first > name, the last > > name and the affiliation of each author. > > * The finished paper in PDF format as an attachment. > > > > All submissions will be acknowledged. > > > > The deadline for submission is January 30, 2004. Requests for short > > extensions will be granted on a case-by-case basis, and must be > > requested by January 30th via email to the same address. > > > > When appropriate, authors should arrange for a release for > publication > > from their employer prior to submission. Papers accompanied by > > non-disclosure agreement forms are not acceptable and will > be returned > > to the author(s) unread. > > > > Submissions of papers must not substantially duplicate work that any > > of the authors have published elsewhere or have submitted > in parallel > > to any other conferences or journals. > > > > The registration fee will be waived for presenters. A limited number > > of stipends are available to those unable to obtain funding > to attend > > the workshop. Further information will be available on the > > registration page in January. > > > > Program Committee > > > > Peter Alterman NIH > > Matt Blaze AT&T Labs Research > > Bill Burr NIST > > Yassir Elley Sun Microsystems > > Carl Ellison Microsoft > > Stephen Farrell Trinity College Dublin, > > Richard Guida Johnson & Johnson > > Peter Honeyman University of Michigan > > Russ Housley Vigil Security LLC > > Ken Klingenstein University of Colorado > > Olga Kornievskaia University of Michigan > > Neal McBurnett Internet2 > > Clifford Neuman USC > > Eric Norman University of Wisconsin > > Tim Polk NIST > > Ravi Sandhu George Mason University; NSD Security > > Krishna Sankar Cisco Systems > > Jeff Schiller MIT > > Frank Siebenlist Argonne National Laboratory > > Sean Smith Dartmouth College > > Michael Wiener Cryptographic Clarity > > > > General Chair: > > Ken Klingenstein, University of Colorado. > > > > Program Chair: > > Krishna Sankar, Cisco Systems. > > > > Steering Committee Chair: > > Neal McBurnett, Internet2. > > > > Local Arrangements Chair: > > Nelson Hastings, NIST. > > > > -- > > Eve Maler +1 781 442 3190 > > Sun Microsystems cell +1 781 354 9441 > > Web Products, Technologies, and Standards eve.maler @ sun.com > > > > To unsubscribe from this mailing list (and be removed from > the roster of > > the OASIS TC), go to > > > http://www.oasis-open.org/apps/org/workgroup/security-services > /members/lea > > ve_workgroup.php. > > > > To unsubscribe from this mailing list (and be removed from > the roster of > the OASIS TC), go to > http://www.oasis-open.org/apps/org/workgroup/pki-tc/members/le > ave_workgroup. > php. > > To unsubscribe from this mailing list (and be removed from > the roster of the OASIS TC), go to > http://www.oasis-open.org/apps/org/workgroup/pki-tc/members/le > ave_workgroup.php. > >
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]