krvw@cert.sei.cmu.edu (Kenneth R. van Wyk) (04/08/91)
CALL FOR FIFTH ANNUAL COMPUTER
PAPERS VIRUS & SECURITY
CONFERENCE
Thursday-Friday, March 12-13, 1992
World Trade Center, New York City
Sponsored by DPMA Financial Ind. Ch. in
cooperation with
ACM SIGSAC, IEEE-CS [pdg],
Communications Mgrs. Assn.; ICCP, etc., credits
Your Audience: Past attendees have represented industry, military,
government, forensic and academic - creators and users of related
software and hardware.
They travel from U.S. and many international locations, and have
titles such as MIS Director, Security Analyst, Operations Manager,
Investigator, Programming Leader
Topics of Interest Include:
o Prevention, Detection, and Recovery from
Viruses and other Unauthorized Usage
o Case studies of mainframe, pc &/or network security
o Access control, accountability, audit, data recovery
o Surveys or demonstrations of products & techniques
o Particulars of LAN, UNIX, cryptography, military use
o Computer crime, law, data liability, related contexts
o US/international sharing of research & techniques
Paper Submission:
A submission may take the format of either a long abstract (3-5 double
spaced pages) or a draft final paper. Final papers will usually be
6-20 pages in length. Four copies of the submission should be
received regular mail by the Program Chair no later than Tuesday,
December 24, 1991. It's best to include a small photo and
introductory bio not exceeding 50 words. Successful submitters or
co-authors are expected to present in person. Presenters receive
Proceedings.
Paper Format:
Typed double spaced, with last name/page# below bottom line (may be
hand-written), brief (to 200 words) abstract following four centered
heading lines: TITLE (caps); Name; Position Affiliation; Telephone,
City/State/Zip, Electronic Address (optl). Notification: Written and
(where practicable) telephoned con-firmation will be initiated by
Monday, January 29, 1992, to facilitate low cost travel.
Those needing earlier notification should submit papers sooner and
attach a note to this effect. You may be asked to perform specific
revisions to be accepted. Nobody can guarantee you a place without an
acceptable paper.
At the Conference:
There are five tracks. Time your presentation to last 40 minutes and
have clear relation to your paper. A Committee member will preside
over your assigned room and adhere to schedule. Don't hesitate to
submit a presentation you've given elsewhere to a more specialized
audience: Most attendees will find it new - and necessary. On-site
Schedule is duplicated early on first day. If you may have a work
emergency you can reschedule or substitute your co-author.
COMMITTEE:
GENERAL CHAIRPERSON:
Judy S. Brand
Nationwide Computing
(800) 835-2246, x190
PROGRAM CHAIRPERSON:
Richard G. Lefkon
NYU, DPMA Fin. Ind. Ch.
609 West 114th Street
New York, NY 10025
(212) 663-2315
H. Carol Bernstein
IBM, Vassar
Klaus Brunnstein
U. of Hamburg
Tom Duff
AT&T Bell Laboratories
Frederick B. Cohen
ASP
Harold J. Highland
Computers & Security
Jack Holleran
NCSC
William H. Murray
Deloitte & Touche
Donn B. Parker
SRI International
A. Padgett Peterson
Martin-Marietta
Fridrick Skulason
U. of Iceland
Dennis D. Steinauer
NIST
Gail M. Thackeray
Maricopa County, AZ
Kenneth R. van Wyk
CERT, Carnegie-Mellon