[Soups-announce] new deadline: Workshop on Assurable & Usable Security Configuration (SafeConfig)
Lorrie Faith Cranor
lorrie at cs.cmu.edu
Thu Jul 2 14:39:27 EDT 2009
This workshop is not affiliated with SOUPS, but likely to be of
interest to SOUPS attendees.
Workshop on Assurable & Usable Security Configuration (SafeConfig)
******** NEW SUBMISSION DEADLINE: 7/15 **********
http://www.arc.cs.depaul.edu/~ehab/ccs/safeconfig09/
Collocated with ACM CCS 2009, Chicago, USA
November 9, 2009
Sponsors: ACM SIGSAC, NSF
A typical enterprise network might have hundreds of security devices
such as firewalls, IPSec gateways, IDS/IPS, authentication servers,
authorization/RBAC servers and crypto systems. These must be logically
integrated into a security architecture satisfying security goals at
and across multiple networks. Logical integration is accomplished by
consistently setting thousands of configuration variables and rules on
the devices. The configuration must be constantly adapted to optimize
protection and block prospective attacks. The configuration must be
tuned to balance security with usability. These challenges are
compounded by the deployment of mobile devices and ad hoc networks.
The resulting security configuration complexity places a heavy burden
on both regular users and experienced administrators and dramatically
reduces overall network assurability and usability. For example, a
December 2008 report from Center for Strategic and International
Studies "Securing Cyberspace for the 44th Presidency" states that
"inappropriate or incorrect security configurations … were responsible
for 80% of Air Force vulnerabilities" and a May 2008 report from
Juniper Networks "What is Behind Network Downtime?" states that "human
factors … [are] responsible for 50 to 80 percent of network device
outages".
The fist event of this workshop was invitation-only and sponsored by
NSF to promote research in this area. This workshop has an open call
for paper and aims to bring together academic as well as industry
researchers to exchange experiences, discuss challenges and propose
solutions for offering assurable and usable security. This workshop is
an open call for submission workshop will consist of presentations and
panel discussions on the following topics:
Topics
* Integrating network and host configuration
* Automated forensics and mitigation
* Metrics for measuring assurability and usability: Usable security
often involves trade offs between security or privacy and usability/
utility
* Abstract models and languages for configuration specification
* Configuration refinement and enforcement
* Configuration of MANETS and coalition networks
* Formal semantics of security policies
* Configuration testing, debugging and evaluation
* Reasoning about uncertainly in configuration management
* Representation of belief, trust, and risk in security policies
* Configuration/misconfiguration visualization
* Configuration reasoning and conflict analysis
* Risk adaptive configuration systems
* Context-aware security configuration for pervasive and mobile
computing
* Configuration accountability
* Automated signature and patch management
* Automated alarm management
* Protecting the privacy and integrity of security configuration
* Optimizing security, flexibility and performance
* Measurable metric of flexibility and usability
* Design for flexibility and manageability – clean slate approach
* Configuration management vs. least-privilege
Papers must present original work and must be written in English. We
require that the authors use the ACM format for papers, using one of
the ACM SIG Proceeding Templates (http://www.acm.org/sigs/pubs/proceed/template.html
). We solicit two types of papers, regular papers and position papers.
The length of the regular papers in the proceedings format should not
exceed 8 US letter pages, excluding well-marked appendices. Committee
members are not required to read the appendices, so papers must be
intelligible without them. Position papers may not exceed 4 pages.
Papers are to be submitted electronically as a single PDF file.
Further submission details will be available on-line. The accepted
papers will be published in the workshop proceedings and the ACM
Digital Library
Important Dates:
Abstract Registration (optional) 6/26
Submission deadline **EXTENDED** 7/15
Notification 8/14
Camera Ready 8/21
Committee
General Chairs:
Ehab Al-Shaer, DePaul University
Mohamed Gouda, UT Austin
TPC Co-Chairs
Jorge Lobo, IBM Watson
Sanjai Narain, Telcordia
Felix Wu, UC Davis
Technical Program Committee
Gail-Joon Ahn Arizona State University
Steven Bellovin Columbia University
ElisaBertino Purdue University
Lorrie Cranor Carnegie Mellon University
AnnaritaGiani UC Berkeley
VincentHu NIST
Chin-Tser Huang University of South Carolina
George Kesidis Pennsylvania State University
Hong Li Intel Corporation
Ninghui Li Purdue University
Heather Lipford UNCC
Alex Liu Michigan State University
Xinming Ou Kansas State University
Sanjay Rao Purdue University
Indrajit Ray Colorado State University
Subhabrata Sen AT&T Labs - Research
Mohamed Shehab University of North Carolina at Charlotte
Frederick Sheldon Oak Ridge National Laboratory
Sreedhar Vugranam IBM T.J. Watson Research Center
Jia Wang AT&T Labs - Research
Geoffrey Xie Naval Postgraduate School
More information about the Soups-announce
mailing list