[comp.virus] Call for papers--3rd Workshop on Computer Security Incident Handling

gschultz@cheetah.llnl.gov (Gene Schultz) (04/11/91)

____________________________________________________________________________
                               Call for Papers

             Third Workshop on Computer Security Incident Handling
____________________________________________________________________________


Location and Dates:

Hyatt Dulles                                     August 6-8, 1991
At Dulles International Airport
Herndon, Virginia


Description:

The Third Workshop on Computer Security Incident Handling will consist
of tutorials, invited addresses, paper sessions, and workshop/
discussion sessions on topics relevant to responding to computer
security incidents. The presentations will provide a forum to discuss
advances in theory and practice that improve the state of this field.
Theoretical, applied, tutorial, or descriptive papers selected for
presentation will appear in the conference proceedings to be published
after the Workshop.  The Third Workshop on Computer Security Incident
Handling is sponsored by Carnegie Mellon University's Software
Engineering Institute.  Submissions are solicited for the following
sessions:

Tutorials (half-day):

Tutorials should cover topics such as network security and
methodologies/strategies for incident handling.  The purpose of each
tutorial should be to allow someone who has little or no knowledge
about incident handling to learn the basic issues/concepts in this
arena.

Paper Sessions:

Proposals for paper sessions (approximately 30 minutes in length)
should address one of the following areas:

   o Network intrusions (including case studies, etiologies, and
       intrusion detection efforts)
   o Vendor activities
   o Procedures and policies for responding to incidents
   o Threats (including threat and attack models, descriptions of
       coordinated efforts to intrude into networks, and cracking tools)
   o Legal issues
   o Tools
   o Vulnerabilities and malicious code
   o Ethical issues

Workshops (half-day):

Proposals to lead workshop sessions covering topics such as network
security, relationships between incident response teams, and lessons
learned from responding to incidents are also solicited.

Submissions:

Proposals should be 300 - 500 words in length. Please do not send
submissions that are significantly shorter or longer.  Papers must not
have been previously presented or published, nor currently submitted
for journal publication. Each manuscript will be submitted to a
rigorous refereeing process.  Proposals should have a title page that
includes the title of the paper, full name of its author(s),
affiliation(s), complete physical and electronic address(es), telephone
number(s), and a 300-500 word description of the purpose and major
ideas to be presented.

Deadlines:

May 17, 1991
Deadline for receipt of proposal

June 7, 1991
Notification of accepted proposals

July 15, 1991
Camera-ready manuscripts must be received


Address for Submissions:

Send all submissions and questions to one of the Workshop Co-Chairs:

Richard Pethia
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA  15213-3890
E-mail:  rdp@cert.sei.cmu.edu
Phone:  (412) 268-7739

or

Eugene Schultz
Lawrence Livermore National Laboratory
P.O. Box 808, L-303
Livermore, CA  94550
E-mail:  gschultz@cheetah.llnl.gov
Phone:  (415) 422-7781