7th USENIX Security Symposium
January 26-29, 1998
Sponsored by the USENIX Association, the UNIX and Advanced Computing
Systems Professional and Technical Association
|Papers due:||September 9, 1997|
|Author notification:||October 8, 1997|
|Camera-ready final papers due:||December 9, 1997|
|Registration Materials Available:||End October, 1997|
Avi Rubin, AT&T Labs - Research
Carlisle Adams, Entrust Technologies
Dave Balenson, Trusted Information Systems
Steve Bellovin, AT&T Research
Dan Boneh, Stanford University
Diane Coe, Concept Five Technologies
Ed Felten, Princeton University
Li Gong, JavaSoft
Peter Honeyman, CITI, University of Michigan
Hugo Krawczyk, Technion
Jack Lacy, AT&T Research
Hilarie Orman, DARPA/ITO
Mike Reiter, AT&T Research
David Wagner, University of California, Berkeley
Katherine T. Fithen, CERT
Trent Jaeger, IBM Watson Labs
This will be a four day symposium with two days of tutorials, followed by two days of refereed paper presentations, invited talks, works-in-progress presentations, and panel discussions.
Tutorials for both technical staff and managers will provide immediately useful, practical information on topics such as local and network security precautions, what cryptography can and cannot do, security mechanisms and policies, firewalls and monitoring systems.
If you are interested in proposing a tutorial, contact the tutorial coordinator, Dan Klein: phone (412)421-2332 email firstname.lastname@example.org
In addition to the keynote presentation, the technical program includes refereed papers, invited talks, a Works-in-Progress session, and panel sessions. There will be Birds-of-a-Feather sessions the last two evenings. You are invited to make suggestions to the program committee via email to email@example.com.
Papers that have been formally reviewed and accepted will be presented during the symposium and published in the symposium proceedings, and provided free to technical session attendees. Additional copies will be available for purchase from USENIX.
Papers must represent novel scientific contributions in computer security with direct relevance to the engineering of secure systems for the commercial sector.
Along with your paper, please submit a separate email message containing the title, all authors, and their complete contact information (phone, fax, postal address, email), indicating which author is the contact author.
Authors will be notified of acceptance on October 8, 1997.
All submissions will be judged on originality, relevance, and correctness. Each accepted submission may be assigned a member of the program committee to act as its shepherd through the preparation of the final paper. The assigned member will act as a conduit for feedback from the committee to the authors. Camera-ready final papers are due on December 9, 1997.
If you would like to receive detailed guidelines for submission
and examples of extended abstracts, you may send email to:
or telephone the USENIX Association office at (510) 528-8649.
The Security Symposium, like most conferences and journals, requires that papers not be submitted simultaneously to another conference or publication and that submitted papers not be previously or subsequently published elsewhere. Papers accompanied by non-disclosure agreement forms are not acceptable and will be returned to the author(s) unread. All submissions are held in the highest confidentiality prior to publication in the Proceedings, both as a matter of policy and in accord with the U.S. Copyright Act of 1976.
There will be one or two prizes awarded for best paper(s).
USENIX Conference Office
22672 Lambert Street, Suite 613
Lake Forest, CA USA 92630
Phone: (714) 588-8649
Fax: (714) 588-9706
Need help? Use our Contacts page.
Last changed: Aug 28, 1997 efc