NDSS Symposium 2007
The 14th Annual Network & Distributed System Security Symposium
Catamaran Resort Hotel - San Diego, CA - 28th February - 2nd March
Call for Papers
Call for Papers now closed
Paper and panel submissions due: 11:59pm PDT, Sunday, September
10, 2006. (This deadline is firm--no extensions will be granted except
in the most extreme circumstances.)
Author notification: Monday, October 23,
Final version of papers and panels due:
December 1, 2006.
The symposium fosters information exchange among research scientists and
practitioners of network and distributed system security services. The
target audience includes those interested in practical aspects of network
and distributed system security, with a focus on actual system design
and implementation (rather than theory). A major goal is to encourage
and enable the Internet community to apply, deploy, and advance the state
of available security technology. This year's conference will also feature
invited talks and other industry related forums to help software engineers
and developers build more secure products and services.
The proceedings are published by the Internet Society.
Both technical papers and panel proposals are solicited. Technical papers
must not substantially overlap with papers that have been published or
that are simultaneously submitted to a journal or a conference with proceedings.
All papers from authors perpetrating such "double submissions" will be
immediately rejected from the conference. The Program Committee reserves
the right to share information with other conference chairs and journal
editors so as to detect such cases.
Technical papers should be at most 12 pages excluding the
bibliography and well-marked appendices (using 11-point font, single column
format, and reasonable margins on 8.5"x11" or A4 paper), and at most 20
pages total. Committee members are not required to read the appendices,
so the paper should be intelligible without them. Technical papers will
appear in the proceedings. Panel proposals should be one page and must
describe the topic, identify the panel chair, explain the panel format,
and list three to four potential panelists. A description of each panel
will appear in the proceedings, and may, at the discretion of the panel
chair, include written position statements from the panelists.
Submissions are solicited in, but not limited to, the following areas:
- Integrating security in Internet protocols: routing, naming, TCP/IP,
multicast, network management, and the Web.
- Intrusion prevention, detection, and response: systems, experiences
- Privacy and anonymity technologies.
- Network perimeter controls: firewalls, packet filters, application
gateways. o Virtual private networks.
- Security for emerging technologies: sensor networks, specialized testbeds,
wireless/mobile (and ad hoc) networks, personal communication systems,
RFID systems, peer-to-peer and overlay network systems.
- Secure electronic commerce: e.g., payment, barter, EDI, notarization,
timestamping, endorsement, and licensing.
- Supporting security mechanisms and APIs; audit trails; accountability.
- Implementation, deployment and management of network security policies.
- Intellectual property protection: protocols, implementations, metering,
watermarking, digital rights management.
- Fundamental services on network and distributed systems: authentication,
data integrity, confidentiality, authorization, non-repudiation, and
- Integrating security services with system and application security
facilities and protocols: e.g., message handling, file transport/access,
directories, time synchronization, data base management, boot services,
- Public key infrastructure, key management, certification, and revocation.
- Special problems and case studies: e.g., tradeoffs between security
and efficiency, usability, reliability and cost.
- Security for collaborative applications: teleconferencing and video-conferencing,
electronic voting, groupwork, etc.
- Software hardening: e.g., detecting and defending against software
bugs (overflows, etc.)
- Security for large-scale systems and critical infrastructures.
Each submission must be accompanied by a separate, electronically
submitted Submission Overview specifying the submission type (paper or
panel), the title or topic, author names with organizational affiliations,
and must specify a contact author along with corresponding phone number,
FAX number, postal address and email address.
Submissions must be received by 11:59pm PDT, September 10,
2006, and must be made electronically in PDF format (for example, by using
pdflatex). Each submission will be acknowledged by e-mail; if acknowledgment
is not received within seven days, contact a program co-chair (see below).
Authors and panelists will be notified of acceptance by
October 23rd, 2006, and given instructions for preparing the camera-ready