You should submit your paper today to
ensure a slot in an event that has proven to be even more exciting
every year. This symposium will be a great opportunity for you
to share your work with the growing ranks of the Consortium, security
industry experts as well as rising stars from the academic world.
Each presenter of an accepted paper will be entitled to one complimentary
full VIP symposium pass.
The Symposium will focus on Security
R&D, its application and taking it beyond theory into real world
practice. Papers should focus on new research and developments
from the past calendar year or research in pursuit of funding.
Abstracts are specifically sought, but not limited to, those that
address the following related topics:
- Authentication Solutions — Smart
Cards, Biometrics, Passwords
- Open Source v. Closed Source —
Pros and Cons: Is one better than the other?
- Open Source Licensing — What
really can and can't be done?
- Common Criteria Certifications —
Pros, cons and real world application
- Developing a winning proposal —
Getting funding for open source R&D
- Practical lessons learned and common
pitfalls in developing secure software
- Challenges in incorporating Open Source
into a COTS product
- Security Configuration Guidelines
— Public, Private & Academic approaches
- Auditing, Auditing, Auditing —
How do you know who did what and when?
- Intrusion Prevention — Building
- Multiple Level Security — MLS
- Challenges in deploying PKI —
Lessons learned in practical deployments
- Security personnel training & curriculum
— Certifications, materials, best practices
- Legal implications relating to Security
- Future and unexplored technologies
Step 1: Abstract submission
- Indicate the most appropriate Topic / Category (from above)
for your research
- Title of Paper
- Abstract of your active work or proposal (limit 300 words)
- Presenter(s): Name, Title & Agency/Company (as it should
appear in agenda)
- If a proposal for funding, provide estimated resources required
to complete (estimated man months and $$$ for completion)
- Preferred time for presentation: (Morning or Afternoon /
Wed, Thu or Fri)
Submit via email to: STOS
Only Abstract submissions that include
all required information will be reviewed. Priority will be given
to those topics and areas of research not presented at previous
Step 2: Speaker notification
Speakers will be notified upon acceptance.
You will then be required to respond back via email to acknowledge
the acceptance of your submission and affirm your commitment to
the time slot you are given or to coordinate an alternate time
Step 3: Presentation submission
- Presentation in PDF format (will be posted on web site)
- Content should be appropriate length to cover in 45 - 50
- If your presentation requires a longer time slot or additional
technical requirements, we will make every effort to accommodate
Submit via email to: STOS
All submissions and presentations should
be submitted and presented as 'open source' and as such, may not
be restricted by any nondisclosure agreements, nor other such
limitations. All presentations and related content will be made
available to ALL Consortium Members in good standing.
If for various reasons you would like
to discuss your work or proposal with a selected audience under
an NDA, please provide justification along with the abstract submission
as to the motivation for not fully disclosing to the [STOS] Consortium
and Symposium attendees at large. If appropriate, arrangements
will be made to provide this. There is no promise other than to
review the submission.
If you have any questions on submitting
a Paper for the STOS 2003 Symposium "Security: From Theory to
Practice," please contact STOS
DC03 Submissions as soon as possible.
Thank You! We all look forward to continued
and successful collaboration on enhancing security!