Holleran@DOCKMASTER.ARPA (Jack Holleran) (12/23/89)
CALL FOR PAPERS: 13th NATIONAL COMPUTER SECURITY CONFERENCE Sponsored by the National Computer Security Center and the National Institute of Standards and Technology Theme: Information Systems Security: Standards - The Key to the Future Date: OCTOBER 1-4, 1990 Location: WASHINGTON, D.C. This conference provides a forum for the Government and the private sector to share current information that is useful and of general interest to the conference participants on technologies, present and future, that are designed to meet the ever-growing challenge of telecommunications and automated information systems security. The conference will offer multiple tracks for the needs of users, vendors, and the research and development communities. The focus of the conference will be on: Systems Application Guidance, Awareness, Training, and Education, Ethics and Issues, Evaluation and Certification, Innovations and New Products, Management and Administration, and Disaster Prevention and Recovery. We encourage submission of papers on the following topics of high interest: Systems Application Guidance - Access Control Strategies - Achieving Network Security - Building on Trusted Computing Bases - Integrating INFOSEC into Systems - Preparing Security Plans - Secure Architectures - Securing Heterogeneous Networks - Small Systems Security Innovations and New Products - Approved/Endorsed Products - Audit Reduction Tools and Techniques - Biometric Authentication - Data Base Security - Personal Identification and Authentication - Smart Card Applications - Tools and Technology Awareness, Training and Education - Building Security Awareness - Compusec Training: Curricula, Effectiveness, Media - Curriculum for Differing Levels of Users - Keeping Security In Step With Technology - Policies, Standards, and Guidelines - Understanding the Threat Evaluation and Certification - Assurance and Analytic Techniques - Conducting Security Evaluations - Covert Channel Analysis - Experiences in Applying Verification - Formal Policy Models - Techniques Management and Administration - Accrediting Information Systems and Networks - Defining and Specifying Computer Security Requirements - Life Cycle Management - Managing Risk - Role of Standards - Security Requirements Disaster Prevention and Recovery - Assurance of Service - Computer Viruses - Contingency Planning - Disaster Recovery - Malicious Code - Survivability Ethics and Issues - Computer Abuse/Misuse - Ethics in the Workplace - Individual Rights - Laws - Relationship of Ethics to Technology - Standards of Ethics in Information Technology BY FEBRUARY 16, 1990: Send eight copies of your draft paper* or panel suggestions to one of the following addresses. Include the topical category of your submission, author name(s), address, and telephone number on the cover sheet only. 1. FOR PAPERS SENT VIA National Computer Security Conference U.S. or Foreign ATTN: NCS Conference Secretary Government MAIL National Computer Security Center ONLY: Fort George G. Meade, MD 20755-6000 2. FOR PAPERS SENT VIA National Computer Security Conference COMMERCIAL COURIER c/o NCS Conference Secretary SERVICES (e.g.-FEDERAL National Computer Security Center EXPRESS, EMERY, UPS, 911 Elkridge Landing Road etc.): Linthicum, MD 21090 3. FOR Electronic Mail: NCS_Conference@DOCKMASTER.NCSC.MIL (1 copy) BY MAY 4, 1990: Speakers selected to participate in the conference will be notified. BY JUNE 22, 1990: Final, camera-ready papers are due. * Government employees or those under Government sponsorship must so identify their papers. For additional information on submissions, please call (301) 850-0272. To assist the Technical Review Committee, the following is required for all submissions: Page 1: Title of paper or submission Topical Category & keywords Author(s) Organization(s) Phone number(s) Net address(es), if available Point of Contact Additionally, submissions sponsored by the U.S. Government must provide the following information: U.S. Government Program Sponsor or Procuring Element Contract number (if applicable) U.S. Government Publication Release Authority (Note: Responsibility for U.S. Government pre-publication review lies with the author(s).) Page 2: Title of the paper or submission -last abstract The paper (Suggested length: 6 pages, double columns) A Technical Review Committee, composed of U.S. Government and Industry Computer Security experts, will referee submissions only for technical merit for publication and presentation at the National Computer Security (NCS) Conference. No classified submissions will be accepted for review. Papers drafted as part of the author's official U.S. Government duties may not be subject to copyright. Papers submitted that are subject to copyright must be accompanied by a written assignment to the NCS Conference Committee or written authorization to publish and release the paper at the Committee's discretion. Papers selected for presentation at the NCS Conference requiring U.S. Government pre-publication review must include, with the submission of the final paper no later than June 22, 1990 to the committee, a written release from the U.S. Government Department or Agency responsible for pre-publication review. Failure to comply may result in rescinding selection for publication and for presentation at the 13th NCS Conference. Technical questions can be addressed to the NCS Conference Committee through the following means: Phone: (301) 850-0CSC [0272] Electronic Mail: NCS_Conference@DOCKMASTER.NCSC.MIL Government Mail: National Computer Security Conference National Computer Security Center Fort George G. Meade, MD 20755-6000 Commercial Carriers: National Computer Security Conference c/o NCS Conference Secretary National Computer Security Center 911 Elkridge Landing Road Linthicum, MD 21090