The 12th Annual
Network and Distributed System Security Symposium

Catamaran Resort Hotel
San Diego, California
3-4 February 2005  Symposium
2 February 2005    Pre-Conference Tutorials

Call for Papers

IMPORTANT DATES
Paper and panel submissions due: 11:59pm PST, Monday, August 23rd, 2004.
Author notification: Friday, October 8th, 2004.
Final version of papers and panels due: Sunday, November 7th, 2004.

GOAL: The symposium fosters information exchange among research
scientists and practitioners of network and distributed system
security services. The target audience includes those interested in
practical aspects of network and distributed system security, with a
focus on actual system design and implementation (rather than
theory). A major goal is to encourage and enable the Internet
community to apply, deploy, and advance the state of available
security technology. The proceedings are published by the Internet
Society.

HOW TO SUBMIT: Submission instructions will be available at
http://crypto.stanford.edu/ndss05/

SUBMISSIONS: Both technical papers and panel proposals are
solicited. Technical papers must not substantially overlap papers that
have been published or that are simultaneously submitted to a journal
or a conference with proceedings. Technical papers should be at most
12 pages excluding the bibliography and well-marked appendices (using
11-point font, single column format, and reasonable margins on
8.5"x11" or A4 paper), and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. Technical papers will appear in the
proceedings. Panel proposals should be one page and must describe the
topic, identify the panel chair, explain the panel format, and list
three to four potential panelists. A description of each panel will
appear in the proceedings, and may, at the discretion of the panel
chair, include written position statements from the panelists.

Submissions are solicited in, but not limited to, the following areas:

    *       Integrating security in Internet protocols: routing, naming,
            TCP/IP, multicast, network management, and the Web.
    *       Intrusion avoidance, detection, and response: systems,
            experiences and architectures.
    *       Privacy and anonymity technologies.
    *       Network perimeter controls: firewalls, packet filters,
            application gateways.  Virtual private networks.
    *       Public key infrastructure, key management, certification, 
            and revocation.
    *       Secure electronic commerce: e.g., payment, barter, EDI,
            notarization, timestamping, endorsement, and licensing.
    *       Supporting security mechanisms and APIs; audit trails; 
            accountability.
    *       Implementation, deployment and management of network security 
            policies.
    *       Intellectual property protection: protocols, implementations,
            metering, watermarking, digital rights management.
    *       Fundamental services on network and distributed systems:
            authentication, data integrity, confidentiality, authorization,
            non-repudiation, and availability.
    *       Integrating security services with system and application
            security facilities and protocols: e.g., message handling, file
            transport/access, directories, time synchronization, data base
            management, boot services, mobile computing.
    *       Security for emerging technologies: sensor networks, specialized
            testbeds, wireless/mobile (and ad hoc) networks, personal
            communication systems, peer-to-peer and overlay network systems.
    *       Special problems and case studies: e.g., tradeoffs between
            security and efficiency, usability, reliability and cost.
    *       Security for collaborative applications: teleconferencing and
            video-conferencing, electronic voting, groupwork, etc.
    *       Software hardening: e.g., detecting and defending against
            software bugs (overflows, etc.)

Each submission must contain a separate Submission Overview specifying
the submission type (paper or panel), the title or topic, author names
with organizational affiliations, and must specify a contact author
along with corresponding phone number, FAX number, postal address and
email address.

Submissions must be received by 11:59pm PST, August 23rd, 2004, and
must be made electronically in PDF format (for example, by using
pdflatex). Each submission will be acknowledged by e-mail; if
acknowledgment is not received within seven days, contact a program
co-chair (see below). Authors and panelists will be notified of
acceptance by October 8th, 2004, and given instructions for preparing
the camera-ready copy. The camera-ready copy must be received by
November 7th, 2004.

CONFERENCE INFORMATION
Contact Karen Seo,  kseo@bbn.com

PROGRAM COMMITTEE

    *      William Arbaugh, University of Maryland
    *      Dirk Balfanz, PARC
    *      Steve Bellovin, AT&T Research
    *      Dan Boneh, Stanford University, Program co-chair
    *      Crispin Cowan, Immunix
    *      Leendert van Doorn, IBM T.J. Watson Research Center
    *      David Evans, University of Virginia
    *      Somesh Jha, UW Madison
    *      Ari Juels, RSA Labs
    *      Steve Kent, BBN
    *      Christopher Kruegel, Technical University Vienna
    *      Ninghui Li, Purdue University
    *      Pat Lincoln, SRI International
    *      Niels Provos, Google Inc.
    *      Eric Rescorla, RTFM
    *      Tatyana Ryutov, USC Information Sciences Institute
    *      Dan Simon, Microsoft Research, Program co-chair
    *      Sean Smith, Dartmouth College
    *      Dawn Song, CMU
    *      Paul Syverson, Naval Research Laboratory
    *      Brent Waters, Princeton University
    *      Nicholas Weaver, ICSI