OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

xacml message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: [Fwd: [Fwd: 3rd Annual PKI R&D Workshop - Call for Papers]]

I am posting this on behalf of Yassir Elley (yassir.elley@sun.com). Please
direct questions/comments in his direction.


-------- Original Message --------
Subject: 3rd Annual PKI R&D Workshop - Call for Papers
Date: Fri, 17 Oct 2003 01:11:57 -0600
From: Neal McBurnett <neal@bcn.boulder.co.us>
Reply-To: neal@bcn.boulder.co.us
To: MW-PKIPrgmCommittee@internet2.edu,PKILabs Announcement List <pkilabs-announce@internet2.edu>,hepki-tag@internet2.edu, mace@internet2.edu, steve.hanna@sun.com
CC: stephen.farrell@cs.tcd.ie, Russ Housley <housley@vigilsec.com>

        3rd Annual PKI R&D Workshop - Call for Papers

Jointly sponsored by NIH, NIST, and Internet2, in cooperation with

This workshop considers the full range of public key technology used
for security decisions. PKI supports a variety of functionalities
including authentication, authorization, identity (syndication,
federation and aggregation) and trust.

We solicit papers, scenarios, war stories, panel proposals, and
participation from researchers, systems architects, vendor engineers
and above all users.

Location:                 NIST, Gaithersburg MD, USA.
Papers and Proposals due: January 30, 2004
Authors Notified:         March 1, 2004
Final Materials Due:      March 22, 2004
Workshop Dates:           April 12-14, 2004

This workshop has three goals:

  * Explore the current state of public key technology in different
    domains including web services, grid technologies, authentication
    systems et. al. in academia & research, government and industry.
  * Share & discuss lessons learned and scenarios from vendors and
    practitioners on current deployments
  * Provide a forum for leading security researchers to explore the
    issues relevant to the PKI space in areas of security management,
    identity, trust, policy, authentication and authorization.

The results will be promulgated in several ways, including:
  * a published proceedings with refereed papers and summaries of
    workshop discussions
  * the workshop web site: http://middleware.internet2.edu/pki04/
  * experimental initiatives within higher education

Outstanding papers will be invited for possible publication in ACM

Presentation formats will include:
  * Refereed papers
  * Panel discussions
  * Invited talks
  * Work-in-progress updates

Submitted works for panels, papers and reports should address one or
more critical areas of inquiry. Topics include (but not are not
limited to):
  * PKI systems in various domains like grid, web services,
    government, industry and academia.
  * PKI and Federated trust
  * Related standards: x509, SDSI/SPKI, PGP, XKMS, SAML, Shibboleth,
    Liberty Alliance, etc.
  * Cryptographic methods in support of security decisions
  * The characterization and encoding of security decision data
  * Security protocols and choreographies - new ideas, analysis of
    existing systems et al
  * Alternative methods for supporting security decisions
  * Intersection of Policy based systems and PKI
  * Privacy protection and implications of different approaches
  * Scalability of security systems - are there limits to growth?
  * Security of the various components of a system: private keys, root
    authorities, certificate storage, communications channels, code,
    directories, etc.
  * Mobility solutions
  * Approaches to attributes and delegation
  * Improved designs for security-related user interfaces
  * Human factors issues with naming, multiple private keys, selective
  * Discussion of how the "public key infrastructure" may differ from
    the "PKI" traditionally defined
  * Reports of real-world experience with the use and deployment of
    PKI, especially where future research directions for PKI are
  * What is missing? The gaps in PKI research and standards from a
    systems engineering point-of-view

Submissions and Additional Information

Papers should be submitted electronically, in PDF, formatted for
standard US letter-size paper (8.5 x 11 inches). The final version of
refereed papers should ideally be between 8 and 15 pages, and in no
case more than 20 pages. They should have no header or footer text
(e.g., no page numbers).

Proposals for panels should be no longer than five pages in length and
should include possible panelists and an indication of which of those
panelists have confirmed participation.

Please submit the following information by email to
  * The full contact details (name, affiliation, email, phone, postal
    address) of one author who will act as the primary contact for
    this paper.
  * The full list of authors: you must supply the first name, the last
    name and the affiliation of each author.
  * The finished paper in PDF format as an attachment.

All submissions will be acknowledged.

The deadline for submission is January 30, 2004. Requests for short
extensions will be granted on a case-by-case basis, and must be
requested by January 30th via email to the same address.

When appropriate, authors should arrange for a release for publication
from their employer prior to submission. Papers accompanied by
non-disclosure agreement forms are not acceptable and will be returned
to the author(s) unread.

Submissions of papers must not substantially duplicate work that any
of the authors have published elsewhere or have submitted in parallel
to any other conferences or journals.

The registration fee will be waived for presenters. A limited number
of stipends are available to those unable to obtain funding to attend
the workshop. Further information will be available on the
registration page in January.

Program Committee

   Peter Alterman       NIH
   Matt Blaze           AT&T Labs Research
   Bill Burr            NIST
   Yassir Elley         Sun Microsystems
   Carl Ellison         Microsoft
   Stephen Farrell      Trinity College Dublin, 
   Richard Guida        Johnson & Johnson
   Peter Honeyman       University of Michigan
   Russ Housley         Vigil Security LLC
   Ken Klingenstein     University of Colorado
   Olga Kornievskaia    University of Michigan
   Neal McBurnett       Internet2
   Clifford Neuman      USC
   Eric Norman          University of Wisconsin
   Tim Polk             NIST
   Ravi Sandhu          George Mason University; NSD Security
   Krishna Sankar       Cisco Systems
   Jeff Schiller        MIT
   Frank Siebenlist     Argonne National Laboratory
   Sean Smith           Dartmouth College
   Michael Wiener       Cryptographic Clarity

General Chair: 
   Ken Klingenstein, University of Colorado.

Program Chair:
   Krishna Sankar, Cisco Systems.

Steering Committee Chair:
   Neal McBurnett, Internet2.

Local Arrangements Chair:
   Nelson Hastings, NIST.

For list utilities, archives, subscribe, unsubscribe, etc. please visit the
ListProc web interface at 



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]