NDSS Symposium 2001
Network and Distributed System Security Symposium
Catamaran Resort Hotel
San Diego, California
7 February 2001 - Technical Tutorials
8-9 February 2001 - Symposium
Call for Papers
- Paper and panel submissions due: August 22, 2001
- Author notification: October 17, 2001
- Camera-ready final papers due: November 20, 2001
Official Submission Details for ISOC NDSS'02(Last updated: July 31, 2001)
Both technical papers and panel proposals are solicited. All submissions must be made by e-mail to firstname.lastname@example.org. Each e-mail must be under 3 megabytes. Each submission will be acknowledged
by e-mail. If acknowledgement is not received within 7 days, or the 3MB limit poses a problem, contact the Electronic Submissions Contact: Laurent Eschenauer, email@example.com.
Submissions should include a main body of at most 12 pages which the
Program Committee will use as the basis for acceptance, and clearly marked
appendices for any remaining details, for a combined total of at most
20 pages. Accepted papers will appear in the conference proceedings. All
technical paper submissions must be made as either printable PostScript
(see below) or pdf. Each technical paper submitted must also provide the
Submission Overview information (see below) in a separate email.
Panel ProposalsPanel proposals should be at most 2 pages. A description of each accepted
panel will appear in the proceedings, and optionally (at the discretion
of the panel chair) panelists' written position statements. All panel
proposals should contain the following information as the ASCII body of
a single e-mail message: Submission Overview information (see below),
list of 3-4 potential panelists, description of the format of the panel,
and description of the panel topic.
The following must be included as the ASCII body of an e-mail for each
- submission type (paper or panel)
- paper title or panel topic
- author names and organizational affiliation(s)
- contact author or panel chair, and details: postal address, e-mail address, phone and
- an ASCII version of the paper abstract
Generate a PostScript version of your submission formatted for US
Letter paper (8.5 x 11 inches). If you use dvips for generating
PostScript, the appropriate command is "dvips -t letter". If you use another
mechanism, contact your technical support people. Product-specific notes:
If generating PostScript from MS WORD, make sure the printer type is postscript-enabled
when printing to a file, and that the first line of the output file starts
with "%!". FrameMaker may generate either pdf or PostScript, however typically
FrameMaker PostScript is only printable on a particular size of paper
(if generated for A4, it will not print on US Letter) - you must submit
in US Letter format.
2001 - last day for receipt of submissions
Oct. 17, 2001 - notification of acceptance to authors, with instructions
for camera-ready copy
Nov. 20, 2001 - last day for receipt of camera-ready copy for the proceedings
The symposium fosters information exchange among research scientists and practitioners of network and distributed system security services.
The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society.
Submissions are solicited in, but not limited to, the following areas:
- Integrating security in Internet protocols: routing, naming, TCP/IP, multicast, network management, and the Web.
- Intrusion avoidance, detection, and response: systems, experiences and architectures.
- Attack-resistant protocols and services. n Network perimeter controls: firewalls, packet filters, application gateways.
- Virtual private networks.
- Public key infrastructure, key management, certification, and revocation.
- Secure electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing.
- Supporting security mechanisms and APIs; audit trails; accountability.
- Implementation, deployment and management of network security policies.
- Intellectual property protection: protocols, schemas, implementations, metering, watermarking, digital rights management.
- Fundamental services on network and distributed systems: authentication, data integrity, confidentiality, authorization, non-repudiation,
- Integrating security services with system and application security facilities and protocols: e.g., message handling, file transport/access, directories, time synchronization, data base management, boot services, mobile computing.
- Security for emerging technologies: sensor networks, specialized testbeds, wireless/mobile (and ad hoc) networks, personal communication
systems, and large heterogeneous distributed systems.
- Special problems and case studies: e.g., interplay and tradeoffs between security and efficiency, usability, reliability and cost.
- Security for collaborative applications and services: teleconferencing and video-conferencing, groupwork, etc.
Outstanding Paper Award
There will be an Outstanding Paper award. The award will be presented at the symposium to the authors of an outstanding paper, as selected
by the Program Committee.
- GENERAL CHAIR: Clifford Neuman, USC Information Sciences Institute, firstname.lastname@example.org
- PROGRAM CO-CHAIRS: Paul Van Oorschot Entrust, Paul.VanOorschot@entrust.com
- Virgil Gligor, University of Maryland, email@example.com
- TUTORIAL CHAIR: Eric Harder, National Security Agency, firstname.lastname@example.org
- LOCAL ARRANGEMENTS CHAIR: Thomas Hutton, San Diego Supercomputer Center, email@example.com
- PUBLICATIONS CHAIR: Mahesh Tripunitara, Purdue University, firstname.lastname@example.org
- PUBLICITY CHAIR: David Balenson, NAI Labs, Network Associates, email@example.com
- LOGISTICS CHAIR: Terry Weigler, Internet Society, firstname.lastname@example.org
- Steve Bellovin, AT&T Labs Research
- Dan Boneh, Stanford University
- Bill Cheswick, Lumeta Corporation
- Li Gong, Sun Microsystems
- Peter Gutmann, Univ. of Auckland, N.Z.
- Charlie Kaufman, Iris Associates
- Steve Kent, BBN Technologies
- Markus Kuhn, Univ. of Cambridge, U.K.
- Douglas Maughan, DARPA
- Kevin McCurley, IBM Almaden Research
- Gary McGraw, Cigital
- Fabian Monrose, Bell Labs
- Sandra Murphy, Network Associates
- Radha Poovendran, Univ. of Washington
- Michael Roe, Microsoft Research, U.K.
- Christoph Schuba, Sun Microsystems
- Clay Shields, Georgetown University
- Jonathan Trostle, Cisco Systems
- Dan Wallach, Rice University