Message posted on 08/03/2018

CfP: New Security Paradigms Workshop (NSPW2018)

                http://nspw.org/2018/cfp
<br>
<br>NSPW 2018: Call for Papers
<br>
<br>Cumberland Lodge, Windsor, UK
<br>
<br>August 28-31, 2018
<br>
<br>
<br>Submission deadline:             April 13, 2018  23:59 (UTC -11) firm
<br>Format:                                   PDF file (ACM SIG formatting) via
<br>Easychair
<br>Author responses:                  May 25-June 1, 2018
<br>Notification of acceptance:     June 11, 2018
<br>Pre-proceedings deadline:     July 2, 2018
<br>Invitations sent:                      July 6, 2018
<br>Early registration:                   July 20, 2018
<br>Late registration:                     July 27, 2018
<br>Workshop:                              August 28-31, 2018
<br>Final version:                         October 15, 2018
<br>
<br>
<br>The New Security Paradigms Workshop (NSPW) seeks embryonic, disruptive, and
<br>unconventional ideas on information and cyber security that benefit from early
<br>feedback. Submissions typically address current limitations of information
<br>security, directly challenge long-held beliefs or the very foundations of
<br>security, or discuss problems from an entirely novel angle, leading to new
<br>solutions. We welcome papers both from computer science and other disciplines
<br>that study adversarial relationships, as well as from practice. The workshop
<br>is invitation-only; all accepted papers receive a 1 hour plenary time slot for
<br>presentation and discussion. In order to maximize diversity of perspectives,
<br>we particularly encourage submissions from new NSPW authors, from Ph.D.
<br>students, and from non-obvious disciplines and institutions.
<br>
<br>
<br>In 2018, NSPW invites theme submissions around "Security in 2038" next to
<br>regular submissions. We know from past experience that every security advance
<br>brings with it new security failures. Automated software updates open the door
<br>to malicious software updates; DNSSEC is subject to cryptography-based
<br>denial-of-service attacks; antivirus software can be compromised by data files
<br>that are otherwise harmless. We encourage authors to imagine the security
<br>problems of the next 20 years, how they are currently being created through
<br>fallible solutions and paradigms, and what alternative paradigms would be
<br>available to mitigate those anomalies (as meant by Kuhn). Theme submissions
<br>can take any form, but we suggest writing them as if they were a submission
<br>for NSPW 2038 (including citations to future work). We particularly invite
<br>submissions (co-)authored by historians and futurologists.
<br>
<br>
<br>NSPW 2018 will be held at the Cumberland Lodge in Windsor, UK. As in the past,
<br>this choice of venue is designed to facilitate interactions between the
<br>invited attendees throughout the workshop.
<br>
<br>Submission Instructions
<br>
<br>NSPW accepts three categories of submissions:
<br>
<br>*        Regular Submissions present a new approach (paradigm) to a security
<br>problem or critique existing approaches. While regular submissions may present
<br>research results (mathematical or experimental), unlike papers submitted to
<br>most computer security venues, these results should not be the focus of the
<br>submission; instead, the change in approach should be the focus.
<br>
<br>*        Theme Submissions are focused on "Security in 2038", possibly written
<br>as a NSPW 2038 submission. While following the format of a regular submission,
<br>the work could be more speculative, satirical, or even science fiction.
<br>
<br>*        Panel Proposals describe a debatable topic of interest to to the
<br>security community that merits significant discussion. Proposals should
<br>describe the major perspectives on the chosen topic. They should also present
<br>the background of the panelists, explaining how they are the right people to
<br>discuss the chosen topic at NSPW.
<br>
<br>
<br>Submissions must be made in PDF format, 6-15 pages, ACM SIG
<br>formatting, through
<br>EasyChair, as linked on the NSPW site. Submissions must include a cover page
<br>with authors' names, affiliation, justification statement and attendance
<br>statement. Papers not including these risk rejection without review. The
<br>justification statement briefly explains why the submission is appropriate for
<br>NSPW and the chosen submission category. The attendance statement must specify
<br>which author(s) will attend upon acceptance/invitation. Submissions should not
<br>be blinded. Organizers and PC members are allowed to submit, but will not be
<br>involved in the evaluation of their own papers. All submissions are treated as
<br>confidential as a matter of policy. NSPW does not accept previously published
<br>or concurrently submitted papers.
<br>
<br>
<br>Authors may submit review responses during the review process indicating the
<br>changes they wish to commit to. Papers are accepted conditionally and are
<br>shepherded, with final proceedings being published after the workshop.
<br>
<br>Attendance
<br>
<br>The workshop itself is invitation-only, with typically 30-35 participants
<br>consisting of authors of about 12 accepted papers, panelists, program
<br>committee members, and organizers. One author of each accepted paper must
<br>attend; additional authors may be invited if space permits. All participants
<br>must commit to a "social contract": no one arrives late, no one leaves early,
<br>no laptops, and all attend all sessions of the 2.5 day program, sharing meals
<br>in a group setting. The workshop is preceded by an evening reception allowing
<br>attendees to meet each other beforehand.
<br>
<br>
<br>Financial Aid: NSF has provided financial aid especially for U.S.-based
<br>students and
<br>junior faculty. We have a limited amount of financial aid available for
<br>others, as well. We encourage submissions from students, junior faculty, and
<br>others, especially if support may be required to attend.
<br>
<br>
<br>
<br>Program Committee Co-chairs:
<br>
<br>            Anil Somayaji, Carleton University,
<br>soma@ccsl.carleton.ca
<br>
<br>            Wolter Pieters, Delft University of Technology,
<br>w.pieters@tudelft.nl
<br>
<br>
<br>Program Committee:
<br>
<br>            Dave Ackley, University of New Mexico
<br>
<br>            Mark Burgess, Consultant
<br>
<br>L. Jean Camp, Indiana University
<br>
<br>            Markus Christen, Universitat Zurich
<br>
<br>            Benjamin Edwards, IBM
<br>
<br>            Carrie Gates, Securelytix
<br>
<br>            Cormac Herley, Microsoft Research
<br>
<br>            Eireann Leverett, University of Cambridge
<br>
<br>            Sean Peisert, Lawrence Berkeley National Laboratory & University
<br>of California Davis
<br>
<br>Olgierd Pieczul, IBM
<br>
<br>            Christian W. Probst, Unitech Institute of Technology
<br>
<br>Karen Renaud, Abertay University
<br>
<br>Jonathan M. Spring, University College London
<br>
<br>Heather Vescent, Futurist & Author
<br>
<br>Mary Ellen Zurko, MIT Lincoln Laboratory
<br>
<br>
<br>Dr.ir. Wolter Pieters
<br>Associate professor cyber risk - TU Delft
<br>Safety & Security Science | Technology, Policy & Management
<br>
<br>Recent papers:
<br>Beyond individual-centric privacy:
<br>http://dx.doi.org/10.1080/01972243.2017.1354108
<br>The navigation metaphor in security: http://dx.doi.org/10.1109/MSP.2016.47
<br>Security-by-experiment: http://dx.doi.org/10.1007/s11948-015-9648-y
<br>
<br>TU Delft
<br>Faculty of Technology, Policy and Management; Section S3
<br>Building 31, Jaffalaan 5, 2628 BX  Delft; P.O. Box 5015, 2600 GA  Delft
<br>T +31 (0)15 27 88989    F +31 (0)15 27 83422
<br>E w.pieters@tudelft.nl    W
<br>http://homepage.tudelft.nl/e7x9k
<br>_______________________________________________
<br>EASST's Eurograd mailing list
<br>Eurograd (at) lists.easst.net
<br>Unsubscribe or edit subscription options: http://lists.easst.net/listinfo.cgi/eurograd-easst.net
<br>
<br>Meet us via https://twitter.com/STSeasst
<br>
<br>Report abuses of this list to Eurograd-owner@lists.easst.net
            
view formatted text

EASST-Eurograd RSS

mailing list
30 recent messages