NDSS Symposium 2007
Call for Papers
NDSS '07

The 14th Annual
Network and Distributed System Security Symposium
Catamaran Resort Hotel
San Diego, California
Feb 28-March 2, 2007-Symposium

Paper and panel submissions due: 11:59pm PDT, Sunday, September 10,
2006. (This deadline is firm--no extensions will be granted except in
the most extreme circumstances.)

Author notification: Monday, October 23, 2006.

Final version of papers and panels due: December 1, 2006.


The symposium fosters information exchange among research scientists
and practitioners of network and distributed system security
services. The target audience includes those interested in practical
aspects of network and distributed system security, with a focus on
actual system design and implementation (rather than theory). A major
goal is to encourage and enable the Internet community to apply,
deploy, and advance the state of available security technology. This
year's conference will also feature invited talks and other industry
related forums to help software engineers and developers build more
secure products and services.

The proceedings are published by the Internet Society.

Authors may submit papers here:


Both technical papers and panel proposals are solicited. Technical
papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All papers from authors perpetrating such
"double submissions" will be immediately rejected from the
conference. The Program Committee reserves the right to share
information with other conference chairs and journal editors so as to
detect such cases.

Technical papers should be at most 12 pages excluding the bibliography
and well-marked appendices (using 11-point font, single column format,
and reasonable margins on 8.5"x11" or A4 paper), and at most 20 pages
total. Committee members are not required to read the appendices, so
the paper should be intelligible without them. Technical papers will
appear in the proceedings. Panel proposals should be one page and must
describe the topic, identify the panel chair, explain the panel
format, and list three to four potential panelists. A description of
each panel will appear in the proceedings, and may, at the discretion
of the panel chair, include written position statements from the

Submissions are solicited in, but not limited to, the following areas:

    * Integrating security in Internet protocols: routing, naming,
      TCP/IP, multicast, network management, and the Web.

    * Intrusion prevention, detection, and response: systems,
      experiences and architectures.

    * Privacy and anonymity technologies.

    * Network perimeter controls: firewalls, packet filters,
      application gateways.

    * Virtual private networks.

    * Security for emerging technologies: sensor networks, specialized
      testbeds, wireless/mobile (and ad hoc) networks, personal
      communication systems, RFID systems, peer-to-peer and overlay network

    * Secure electronic commerce: e.g., payment, barter, EDI,
      notarization, timestamping, endorsement, and licensing.

    * Supporting security mechanisms and APIs; audit trails; accountability.

    * Implementation, deployment and management of network security policies.

    * Intellectual property protection: protocols, implementations,
      metering, watermarking, digital rights management.

    * Fundamental services on network and distributed systems:
      authentication, data integrity, confidentiality, authorization,
      non-repudiation, and availability.

    * Integrating security services with system and application
      security facilities and protocols: e.g., message handling, file
      transport/access, directories, time synchronization, data base
      management, boot services, mobile computing.

    * Public key infrastructure, key management, certification, and revocation.

    * Special problems and case studies: e.g., tradeoffs between
      security and efficiency, usability, reliability and cost.

    * Security for collaborative applications: teleconferencing and
      video-conferencing, electronic voting, groupwork, etc.

    * Software hardening: e.g., detecting and defending against
      software bugs (overflows, etc.)

    * Security for large-scale systems and critical infrastructures.

Each submission must be accompanied by a separate, electronically
submitted Submission Overview specifying the submission type (paper or
panel), the title or topic, author names with organizational
affiliations, and must specify a contact author along with
corresponding phone number, FAX number, postal address and email

Submissions must be received by 11:59pm PDT, September 10, 2006, and
must be made electronically in PDF format (for example, by using
pdflatex). Each submission will be acknowledged by e-mail; if
acknowledgment is not received within seven days, contact a program
co-chair (see below).

Authors and panelists will be notified of acceptance by October 23rd,
2006, and given instructions for preparing the camera-ready copy.


    * William Arbaugh, University of Maryland (Program co-chair)
    * Crispin Cowan, Novell (Program co-chair)
    * Angelos D. Keromytis, Columbia University
    * Helen Wang, Microsoft Research
    * Mike Reiter, CMU
    * Wenke Lee, Georgia Tech
    * John Ioannidis, Columbia University
    * Fabian Monrose, Johns Hopkins University
    * Lee Badger, DARPA
    * Bill Cheswick, Lumeta
    * Jonathan Shapiro, Johns Hopkins University
    * Barton Miller, University of Wisconsin
    * Trent Jaeger, Penn State University
    * Jon Callas, PGP
    * Rodney Thayer, Network World
    * Charles Clarke, U. Waterloo
    * Jay Beale, Bastille Linux Security Project
    * Virgil Gligor, University of Maryland
    * Jesse Walker, Intel
    * Dan Boneh, Stanford
    * Sean Smith, Dartmouth
    * Radia Perlman, Sun
    * Others pending