[ISN] 2012 NDSS: Three Amazing Speakers (David Brin - New York Times Bestselling Author, Eric Grosse - Google, Stephen Schmidt - Amazon)

From: InfoSec News <alerts_at_private>
Date: Wed, 11 May 2011 03:12:37 -0500 (CDT)
Forwarded from: noreply (at) crypto.cs.stonybrook.edu

2012 Network and Distributed System Security Symposium

February 5-8, 2012
Hilton San Diego Resort & Spa
San Diego, California

http://www.isoc.org/tools/conferences/ndss/12		 

Call for Papers

The Network and Distributed System Security Symposium fosters 
information exchange among research scientists and practitioners of 
network and distributed system security. The target audience includes 
those interested in practical aspects of network and distributed system 
security, with a focus on system design and implementation. A major goal 
is to encourage and enable the Internet community to apply, deploy, and 
advance the state of available security technology. The proceedings are 
published by the Internet Society (ISOC).

SPEAKERS 

We are happy to continue the tradition of highly distinguished and fun 
speakers. The three distinguished speakers this year are as follows.

---------------------------------------------------------------------
David Brin, Scientist and Award-Winning Author ----------------------

David Brin is a scientist, inventor, and New York Times bestselling 
author.  With books ranslated into 25 languages, he has won multiple 
Hugo, Nebula, and other awards.  A film directed by Kevin Costner was 
based on David's novel The Postman.  Other works have been optioned by 
Paramount and Warner Bros.  One of them .  Kiln People .  has been 
called a book of ideas disguised as a fast-moving and fun noir detective 
story, set in a vividly original future; while a hardcover graphic novel 
"The Life Eaters"  explored alternate outcomes to World War II.  
David's science-fictional Uplift Universe explores a future when humans 
genetically engineer higher animals, like dolphins, to speak.

As a "scientist/futurist", David is seen frequently on television shows 
such as The ArchiTechs, Universe, and Life After People (the most 
popular show ever, on the History Channel).  along with many appearances 
on PBS and NPR.  He is also much in-demand to speak about future trends, 
keynoting for IBM, Google, Procter & Gamble, SAP, Microsoft, Qualcomm, 
the Mauldin Group, and Casey Research, all the way to think tanks, 
Homeland Security, and the CIA.

With degrees from Caltech and the University of California-San Diego, 
David serves serves on advisory panels ranging from astronomy, space 
exploration, nanotech, and SETI to national defense and technological 
ethics.  His nonfiction book The Transparent Society explores the 
dangers of secrecy and loss of privacy in our modern world.  It garnered 
the prestigious Freedom of Speech Prize from the American Library 
Association.

---------------------------------------------------------------------
Eric Grosse, Google Security Director -------------------------------

Eric Grosse is currently an Engineering Director at Google in Mountain 
View CA, working to ensure systems and data stay safe and users' privacy 
remains secure.

Before retiring from Alcatel-Lucent's Bell Laboratories in Murray Hill 
NJ, Eric was a Director and Fellow, where he founded an internal 
venture, CloudControl, that offered enterprise security officers a 
unique opportunity to quickly install up to a million address filters in 
carrier networks to block or rate-limit unwanted traffic hitting their 
enterprise from the Internet, based on automated analysis of web server 
and other logs.

He applied encrypted key exchange to build an incrementally and quietly 
deployable single-signon solution, called Factotum, that stores 
credentials in the network and improves the security even of legacy 
authentication protocols, all without requiring new central or federated 
trust relationships.  This was part of a redesign of security in the 
Plan 9 operating system, which was well received at the USENIX Security 
conference.

In an earlier security project, he supervised the team that built the 
prototype Lucent Managed Firewall, designed to be used like watertight 
compartment doors throughout an enterprise or provider with delegated 
control but central supervision.  He also collaborated on a VPN 
appliance that separates security administration from PC administration.  
He built a smartcard based system for Lucent licensing applications.

He co-founded and continues to help run the Netlib repository of 
mathematical software, widely used by the scientific computing 
community.  The systems issues involved in scaling that up were 
intriguing and led him to his current focus on security from his earlier 
work on numerical analysis.

Algorithms for approximation and visualization, especially ones driven 
by problems from semiconductor design and fabrication, were the main 
theme of his first years at Bell Labs.  Powerful tools like splines 
enabled rapid addition of new transistor designs into circuit simulators 
that had previously used ad hoc, labor intensive semi-analytic models.  
This was a challenge because of the multiple variables, the need to 
preserve monotonicity, and the continuity and performance requirements.  
In combination with numerical optimization, some of these spline 
techniques allow unique nondestructive measurement of heterostructure 
lasers.  Other multivariate approximation innovations include: 
isosurface-aligned grids, critical to more accurate silicon energy band 
models for Boltzman transport; multivariate generalization of the lowess 
moving least squares algorithm, widely used in the statistical community 
for smoothing scattered data; first proof of non-obtuse, no-small-angle 
triangulation of polygons, a result that launched a flurry of additional 
work on the outside leading to some of today's best grid generators.

He majored in mathematics as an undergraduate, then earned a PhD in 
Computer Science at Stanford University under Gene Golub with a thesis 
on tensor splines.  He has served on the editorial boards of ACM Trans.  
Math.  Software, IEEE Computational Science & Engineering, Netlib/NHSE, 
Numerical Algorithms, SIAM Journal on Scientific Computing, SIAM News, 
SIAM Software Environments and Tools, SIAM Electronic Publishing and the 
SIAM Council and Board of Trustees.

---------------------------------------------------------------------
Stephen Schmidt, Chief Information Security Officer, Amazon AWS -----

Stephen Schmidt is Chief Information Security Officer for Amazon Web 
Services (AWS).  In addition to being responsible for AWS's 
standards-based security compliance, he currently leads security-centric 
product design, management, and engineering development.  Prior to 
joining AWS, he had an extensive career as a senior executive at the US 
Federal Bureau of Investigation, including a term as chief technology 
officer and section chief of the FBI.s Cyber Division, overseeing areas 
of malicious code analysis, computer exploitation tool 
reverse-engineering and technical analysis of computer intrusions.

---------------------------------------------------------------------

SUBMISSIONS

Technical full and ***short*** papers and panel proposals are solicited.  
Technical papers must not substantially overlap with material published 
at or simultaneously submitted to a venue with proceedings.  
Double-submission will result in immediate rejection. Reviewing of 
technical papers is double-blind, and they should be properly anonymized 
to conceal the authors' identity.  ***All*** technical papers should be 
at most 15 pages (11-point font, single column, 1-inch margins, US 
letter or A4) excluding the bibliography and well-marked appendices, and 
at most 20 pages total.  Papers accepted as short will be limited to 10 
pages total (8 + 2 bibliography) in the proceedings.  Papers should be 
intelligible without appendices.  Panel proposals should be one page and 
must identify the panel chair, explain the topic and format, and list 
potential panelists.  A panel description will appear in the 
proceedings, and may include written position statements from panelists.

Overall, we are looking not only for solid results but also for crazy 
out of the box ideas.  Areas of interest include (but are not limited 
to):

+ Network perimeter controls: firewalls, packet filters, gateways
+ Network protocol security: routing, naming, network management
+ Cloud computing security
+ Security issues in Future Internet architecture and design
+ Security of web-based applications and services
+ Anti-malware techniques: detection, analysis, and prevention
+ Secure future home networks, Internet of Things, body-area networks
+ Intrusion prevention, detection, and response
+ Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
+ Privacy and anonymity technologies
+ Security for wireless, mobile networks
+ Security of personal communication systems
+ Vehicular Ad-hoc Network (VANETs) Security
+ Security of peer-to-peer and overlay network systems
+ Electronic commerce security: e.g., payments, notarization, timestamping.
+ Network security policies: implementation deployment, management
+ Intellectual property protection: protocols, implementations, DRM
+ Public key infrastructures, key management, certification, and revocation
+ Security for Emerging Technologies
+ Special problems and case studies: cost, usability, security vs. efficiency
+ Collaborative applications: teleconferencing and video-conferencing
+ Smart Grid Security
+ Secure Electronic Voting
+ Security of large-scale critical infrastructures
+ Trustworthy Computing for network protocols and distributed systems
+ Network and distributed systems forensics

DATES

Abstracts: August 9, 2011 (11:59 pm ET)
Papers: August 16, 2011 (11:59 pm ET)
Notification: October 23, 2011
Camera-ready: December 2, 2011
Conference: February 5-8, 2012

PROGRAM COMMITTEE

Ross Anderson, University of Cambridge
Davide Balzarotti, EURECOM Sophia Antipolis
Lujo Bauer, Carnegie Mellon
Kosta Beznosov, University of British Columbia
Matt Bishop, UC Davis
Nikita Borisov, UIUC
Elie Bursztein, Stanford University
Christian Cachin, IBM Research Zurich
Bogdan Carbunar, Motorola Labs
Jeff Chase, Duke University
Yan Chen, Northwestern University
Landon Cox, Duke University
Marc Dacier, Symantec Research Labs
George Danezis, Microsoft Research
Sven Dietrich, Stevens Institute of Technology
Dave Evans, University of Virginia
Nick Feamster, Georgia Tech
Michael Freedman, Princeton University
Carrie Gates, CA Technologies
Russ Housley, Internet Engineering Task Force
Xuxian Jiang, North Carolina State University
Rob Johnson, Stony Brook University
Ari Juels, RSA Labs
Stefan Katzenbeisser, TU Darmstadt
Angelos Keromytis, Columbia University
Yongdae Kim, University of Minnesota
Wenke Lee, Georgia Tech
Brian Levine, UMASS Amherst
Morley Mao, University of Michigan
Patrick McDaniel, Penn State University
John Mitchell, Stanford University
David Molnar, Microsoft Research
Peng Ning, North Carolina State University
Cristina Nita-Rotaru, Purdue University
Bryan Parno, Microsoft Research
Vern Paxson, UC Berkeley / ICSI
Giuseppe Persiano, Universita di Salerno
Michael Reiter, UNC at Chapel Hill
Volker Roth, Freie Universitaet Berlin
Radu Sion, Stony Brook University (chair)
Ahmad-Reza Sadeghi, Fraunhofer Institute 
Nitesh Saxena, NYU Poly
R. Sekar, Stony Brook University
Elaine Shi, UC Berkeley and Parc 
Vitaly Shmatikov, University of Texas at Austin
Alex Snoeren, UC San Diego
Robin Sommer, ICSI
Paul Syverson, Naval Research Laboratory
Doug Szaida, University of Richmond
Wade Trappe, Rutgers University
Arun Venkataramani, UMASS Amherst
Dan Wallach, Rice University
Cliff Wang, US Army Research Office
Nick Weaver, ICSI
Peter Williams, Stony Brook University
Dongyan Xu, Purdue University
Moti Yung, Google Inc.

---

We appologize if you receive multiple copies of this (we have made every 
effort to avoid this).  If you would like to not receive further emails 
from us please do not hesitate to email sion (at) cs.stonybrook.edu and 
we will promptly remove your address.


___________________________________________________________      
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery 
Network, Cisco Switches, SAS 70 Type II Datacenter. 
Find peace of mind, Defend your Critical Infrastructure.
http://www.tegataiphoenix.com/
Received on Wed May 11 2011 - 01:12:37 PDT

This archive was generated by hypermail 2.2.0 : Wed May 11 2011 - 01:22:24 PDT