NDSS Symposium 2003
Program Chairs' Message
The Network and Distributed System Security (NDSS) symposium held its first meeting in February 1993 with an exciting program of ten papers, selected from a total of twenty submissions, and two panels debating the controversial technical topics of the time (i.e., where to place security in a network, a.k.a the ``layer wars,'' and smartcard use in networks security). During its first decade, NDSS evolved into one of the premier symposia in information security without losing its congenial character: it still relies on a small number of research-paper presentations and, more often than not, two panels analyzing the latest technical, as well as policy, challenges. With this, tenth annual meeting, the NDSS symposium promises to be at least as professionally rewarding as its first.
Within the past year we witnessed the deployment of new networking technologies, particularly in PDAs and wireless devices, including security features that are the result of research and development reported in recent technical conferences and symposia, such as NDSS. We also witnessed significant new efforts directed at removing security vulnerabilities of deployed systems by developers, government organizations, and businesses. Every indication is that the pace of security-technology transfer to product development and deployment is accelerating. Although much remains to be done, particularly in improving the usability of security mechanisms, network security administration, software security, and protection of devices subject to capture by skilled adversaries, we are encouraged by the growing awareness that network and distributed systems security is indeed a fundamental concern of every user, system administrator, and information owner. The future of network security research and development is brighter than ever.
This year's program committee meeting and dinner were hosted, once again, by Virgil at his residence in Chevy Chase, Maryland. The program committee selected 17 papers from a record 82 submissions. The small acceptance rate illustrates both the competitive nature of the symposium and the extremely challenging task faced by the program committee. Many high-quality papers could not be included in this program, and we expect that these papers will see the light of day in other, equally selective, conferences and workshops. Topics of this year's technical program include active network defenses, network monitoring and intrusion detection, access control and penetration resistance, mobility and secure routing, cryptographic protocols, and multicast security. This year's program also included a special panel, chaired by Steve Kent, that examined individual authentication through the lens of personal privacy.
The symposium benefited from the careful review and expertise of a dedicated program committee and their external reviewers, whose names are listed on an adjacent page. We are grateful to them for their dedication and care in reviewing the large number of
submissions under the pressure of very tight deadlines. We are also grateful to our webmasters, Rakesh Bobba and Emilian Dinu, for processing the electronic submissions, reviewers' comments, and author notices. We thank all those who helped us in putting together the technical program, especially Michele Estadt (logistics), Mahesh Tripunitara (publications), William Flanigan (publicity) and Clifford Neuman (general chair). It was a pleasure to serve this community.Mike Reiter
Carnegie Mellon University, Reiter@cmu.eduVirgil Gligor
University of Maryland, email@example.com