CFP: PKI research workshop
Carl Ellison
cme at acm.org
Sat Dec 1 17:13:40 EST 2001
Included below is the ASCII CFP for our upcoming PKI research
workshop. We're especially soliciting papers on ways to use public
key authentication/authorization that solve real problems, rather
than merely follow the traditional marketing patter about PKI.
======================================================================
===
1st Annual PKI Research Workshop
April 24-25, 2002. NIST, Gaithersburg MD, USA.
www.cs.dartmouth.edu/~pki02/
Sponsors include NIST, NIH, and Internet2.
To a large extent, the hoped-for public key infrastructure (PKI) has
not "happened yet." PKI for large, eclectic populations has not
materialized; PKI for smaller, less diverse "enterprise" populations
is beginning to emerge, but at a slower rate than many would like or
had expected. Why is this?
This workshop among leading security researchers will explore the
issues relevant to this question, and will seek to foster a long-term
research agenda for authentication and authorization in large
populations via public key cryptography. The workshop is intended to
promote a vigorous and structured discussion---a discussion
well-informed by the problems and issues in deployment today.
We solicit papers, panel proposals, and participation.
* Papers and Proposals Due: January 28, 2002
* Authors Notified: March 5, 2002
* Final Materials Due: April 1, 2002
* Workshop: April 24-25, 2002.
Submitted works for panels and papers should address one or more
critical areas of inquiry. Topics include (but not are not limited
to):
* Cryptographic methods in support of security decisions
* The characterization and encoding of security decision data
(e.g.,
name spaces, x509, SDSI/SPKI, XKMS, PGP, SAML, KeyNote,
PolicyMaker),
policy mappings and languages, etc.
* The relative security of alternative methods for supporting
security
decisions;
* Privacy protection and implications of different approaches;
* Scalability of security systems; (are there limits to growth?)
* Security of the rest of the components of a system;
* User interface issues with naming, multiple private keys,
selective
disclosure
* Mobility solutions
* Approaches to attributes and delegation
* Discussion of how the "public key infrastructure" required may
differ from the ``PKI'' traditionally defined
Papers should be submitted electronically in PDF. The final version
of refereed papers should ideally be between 8 and 15 pages, and in
no
case more than 20 pages. Proposals for panels should be no longer
than five pages in length, and should include possible panelists, and
an indication of which of those panelists have confirmed
participation.
Full instructions will appear on our Web site by December 15, 2001.
Program Committee
Peter Alterman NIH
Steve Bellovin AT&T Labs Research
Stefan Brands McGill University
Bill Burr NIST
Carl Ellison Intel
Stephen Farrell Baltimore Technologies
Richard Guida Johnson and Johnson
Peter Honeyman University of Michigan
Ken Klingenstein University of Colorado
Larry Landweber University of Wisconsin
Neal McBurnett Internet2
Clifford Neuman USC
Sean Smith (chair) Dartmouth College
Steve Tuecke Argonne National Laboratory
Contacts
General Chair: Ken Klingenstein, University of Colorado.
Ken.Klingenstein at Colorado.edu
Program Chair: Sean Smith, Dartmouth College.
sws at cs.dartmouth.edu
+------------------------------------------------------------------+
|Carl M. Ellison cme at acm.org http://world.std.com/~cme |
| PGP: 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list