[Fwd: Call For Participation: NPSec]

-------- Original Message -------- Subject: Call For Participation: NPSec Date: Fri, 9 Sep 2005 16:18:18 -0400 (EDT) From: James Minseok Kwon jmk@cs.rit.edu To: tcgn@comsoc.org References: Pine.GSO.4.58.0504041610050.15949@rainier.cs.rit.edu Pine.GSO.4.58.0505200741080.16744@rainier.cs.rit.edu
Please accept our apologies if you receive multiple copies of this message. ==========================================================================
******* Early registration ends October 12th, 2005. ******* See http://www.cerias.purdue.edu/npsec/
CALL FOR PARTICIPATION
First Workshop on Secure Network Protocols (NPSec) Boston, Massachusetts, USA November 6, 2005
http://www.cerias.purdue.edu/npsec/
In conjunction with ICNP 2005: The 13th IEEE International Conference on Network Protocols
SCOPE:
The first workshop on Secure Network Protocols (NPSec) is a one-day event held in conjunction with IEEE ICNP 2005. NPSec focuses on two general areas. The first focus is on the development and analysis of secure or hardened protocols for the operation (establishment and maintenance) of network infrastructure, including such targets as secure multidomain, ad-hoc, sensor or overlay networks, or other related target areas. This can include new protocols, enhancements to existing protocols, protocol analysis, and new attacks on existing protocols. The second focus is on employing such secure network protocols to create or enhance network applications. Examples include collaborative firewalls, incentive strategies for multiparty networks, and deployment strategies to enable secure applications.
WORKSHOP PROGRAM:
8:30 Welcome and Introductions
8:45 Keynote, Hari Balakrishnan (Massachusetts Institute of Technology)
10:00 Coffee Break
10:30 L3A: A Protocol for Layer Three Accounting. Alwyn Goodloe, Matthew Jacobs, Gaurav Shah (University of Pennsylvania), Carl Gunter (University of Illinois, Urbana-Champaign)
10:50 Mitigating DoS Attack Through Selective Bin Verification. Micah Sherr, Michael Greenwald, Carl Gunter, Sanjeev Khanna, Santosh Venkatesh (University of Illinois, Urbana-Champaign)
11:10 On Design Tradeoffs between Security and Performance in Wireless Group Communicating Systems. Jin-Hee Cho and Ing-Ray Chen (Virginia Tech)
11:30 Detecting and Filtering Instant Messaging Spam -- A Global and also Personalized Approach. Zhijun Liu, Weili Lin, Na Li, David Lee (The Ohio State University)
11:50 Analysis of IPSec Overheads for VPN Servers. Craig Shue, Youngsang Shin, Minaxi Gupta, Jong Youl Choi (Indiana University, Bloomington)
12:10 Lunch Break
1:30 Practical Security for Disconnected Nodes. Aaditeshwar Seth and Srinivasan Keshav (University of Waterloo)
1:50 Achieving K-Anonymity in Mobile Ad Hoc Networks. Xiaoxin Wu and Elisa Bertino (Purdue University)
2:10 Phyllo: A Peer-to-Peer Overlay Security Framework. William Heinbockel (MITRE) and Minseok Kwon (Rochester Institute of Technology)
2:30 Identity Theft Protection in Structured Overlays. Lakshmi Ganesh and Ben Y. Zhao (UC Santa Barbara)
2:50 Coffee Break
3:30 An Effective Intrusion Detection Approach for OLSR MANET Protocol. M. Wang, L. Lamont (Communications Research Centre), P. Mason, M. Gorlatova (DRDC)
3:50 The Attackers' Influence on the Tactical Assessments Produced by Standard Alert Correlation Systems. Stephen Neville (University of Victoria)
4:10 Policy Segmentation for Intelligent Firewall Testing. Adel El-Atawy, Khaled Ibrahim, Hazem Hamed, Ehab Al-Shaer (DePaul University)
4:30 A Distributed Reputation Approach to Cooperative Internet Routing Protection. Harlan Yu, Jennifer Rexford, Edward Felten (Princeton University)
4:50-5:00 Closing Remarks and Discussion
ORGANIZING COMMITTEE:
General Chair: Sonia Fahmy, Purdue University
Technical Program Committee Chairs: George Kesidis, Pennsylvania State University Nicholas Weaver, International Computer Science Institute
Publicity Chair: James Minseok Kwon, Rochester Institute of Technology
Web Chair: Cristina Nita-Rotaru, Purdue University
TECHNICAL PROGRAM COMMITTEE: Marco Ajmone-Marsan, Politecnico di Torino, Italy Ehab Al-Shaer, DePaul University David Brumley, Carnegie Mellon University Guohong Cao, Pennsylvania State University Joseph Evans, U.S. National Science Foundation Lixin Gao, University of Massachusetts, Amherst Carl A. Gunter, University of Illinois at Urbana-Champaign George Kesidis, Pennsylvania State University Edward Knightly, Rice University Iordanis Koutsopoulos, University of Thessaly, Greece Carl Landwehr, University of Maryland Douglas Maughan, U.S. Department of Homeland Security Patrick McDaniel, Pennsylvania State University Jelena Mirkovic, University of Delaware Peng Ning, North Carolina State University Cristina Nita-Rotaru, Purdue University Phil Porras, SRI Saswati Sarkar, University of Pennsylvania Lakshminarayanan Subramanian, University of California at Berkeley Nina Taft, Intel Research Nicholas Weaver, International Computer Science Institute Felix Wu, University of California at Davis Jun Xu, Georgia Institute of Technology
Bulent Yener, Rensselaer Polytechnic Institute
-----------------------------------------------------------------------------
This is a closed mailing list exclusively for the business of the IEEE ComSoc TCGN. As a member of the list you are encouraged to use it for all messages that meet this general criteria. To make this list "self correcting" please send any concern you may have to mailmanager@comsoc.org.
You can leave this list by sending a blank email from the address you are subscribed under to tcgn-remove@comsoc.org.
participants (1)
-
Lars Wolf