Security Symposium Overview
Symposium Topics
Program Committee
Important Dates
Refereed Papers
Tutorials, Invited Talks, WIPs, and BoFs
How and Where to Submit Refereed Papers
Security '99 Products Exhibition
| |
Refereed Papers
Papers that have been formally reviewed and accepted will be presented during the symposium and published in the symposium proceedings. The proceedings are provided free to technical session attendees. Additional copies will be available for purchase from USENIX.
Symposium Topics
If you are working in any practical aspects of security or applications of cryptography, the program committee would like to urge you to submit a paper. Submissions are due on March 16, 1999.
Refereed paper submissions are being solicited in areas including but not limited to:
- Adaptive security and system management
- Analysis of malicious code
- Applications of cryptographic techniques
- Attacks against networks and machines
- Authentication and authorization of users, systems, and applications
- Detecting attacks, intrusions, and computer misuse
- Developing secure systems
- File and file system security
- Network security
- New firewall technologies
- Public key infrastructure
- Security in heterogeneous environments
- Security incident investigation and response
- Security of agents and mobile code
- Technology for rights management and copyright protection
- World Wide Web security
Best Paper Awards
Awards will be given at the conference for the best paper and for the best paper by a student.
|