STOS Logo

STOS Symposium 2003

Call for Participation

You should submit your paper today to ensure a slot in an event that has proven to be even more exciting every year. This symposium will be a great opportunity for you to share your work with the growing ranks of the Consortium, security industry experts as well as rising stars from the academic world.

Each presenter of an accepted paper will be entitled to one complimentary full VIP symposium pass.

Conference Topics

The Symposium will focus on Security R&D, its application and taking it beyond theory into real world practice. Papers should focus on new research and developments from the past calendar year or research in pursuit of funding. Abstracts are specifically sought, but not limited to, those that address the following related topics:

  • Authentication Solutions — Smart Cards, Biometrics, Passwords
  • Open Source v. Closed Source — Pros and Cons: Is one better than the other?
  • Open Source Licensing — What really can and can't be done?
  • Common Criteria Certifications — Pros, cons and real world application
  • Developing a winning proposal — Getting funding for open source R&D
  • Practical lessons learned and common pitfalls in developing secure software
  • Challenges in incorporating Open Source into a COTS product
  • Security Configuration Guidelines — Public, Private & Academic approaches
  • Auditing, Auditing, Auditing — How do you know who did what and when?
  • Intrusion Prevention — Building in resiliency
  • Multiple Level Security — MLS
  • Challenges in deploying PKI — Lessons learned in practical deployments
  • Security personnel training & curriculum — Certifications, materials, best practices
  • Legal implications relating to Security Failures
  • Future and unexplored technologies

Submissions

Step 1: Abstract submission format

  • Indicate the most appropriate Topic / Category (from above) for your research
  • Title of Paper
  • Abstract of your active work or proposal (limit 300 words)
  • Presenter(s): Name, Title & Agency/Company (as it should appear in agenda)
  • If a proposal for funding, provide estimated resources required to complete (estimated man months and $$$ for completion)
  • Preferred time for presentation: (Morning or Afternoon / Wed, Thu or Fri)

    Submit via email to: STOS DC03 Submissions

Only Abstract submissions that include all required information will be reviewed. Priority will be given to those topics and areas of research not presented at previous Symposiums.

Step 2: Speaker notification

Speakers will be notified upon acceptance. You will then be required to respond back via email to acknowledge the acceptance of your submission and affirm your commitment to the time slot you are given or to coordinate an alternate time slot.

Step 3: Presentation submission

  • Presentation in PDF format (will be posted on web site)
  • Content should be appropriate length to cover in 45 - 50 minutes
  • If your presentation requires a longer time slot or additional technical requirements, we will make every effort to accommodate you.

    Submit via email to: STOS DC03 Submissions

Content Guidelines

All submissions and presentations should be submitted and presented as 'open source' and as such, may not be restricted by any nondisclosure agreements, nor other such limitations. All presentations and related content will be made available to ALL Consortium Members in good standing.

Nondisclosure Presentations

If for various reasons you would like to discuss your work or proposal with a selected audience under an NDA, please provide justification along with the abstract submission as to the motivation for not fully disclosing to the [STOS] Consortium and Symposium attendees at large. If appropriate, arrangements will be made to provide this. There is no promise other than to review the submission.

Questions

If you have any questions on submitting a Paper for the STOS 2003 Symposium "Security: From Theory to Practice," please contact STOS DC03 Submissions as soon as possible.

Thank You! We all look forward to continued and successful collaboration on enhancing security!