[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/986655acmconferencesBook PagePublication PagesnspwConference Proceedingsconference-collections
NSPW '03: Proceedings of the 2003 workshop on New security paradigms
ACM2003 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
NSPW03: New Security Paradigms and Workshop Ascona Switzerland August 18 - 21, 2003
ISBN:
978-1-58113-880-1
Published:
13 August 2003
Sponsors:
SIGSAC, ACSA

Reflects downloads up to 11 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Proceedings of the New Security Paradigms Workshop 2003. This was the twelfth year of our very special workshop. The ideas resulting from this year's workshop are presented here for your consideration and enjoyment.If you find the work presented here interesting and provocative and would like to share your own ideas at a future NSPW, please watch for the Call for Papers for our next NSPW on our web site at http://www.nspw.orgNSPW is distinguished by the fact that every selected paper is discussed in a collegial setting at the time of its presentation and often afterwards. The number of papers selected is small enough to allow a comfortable time period for the intensive examination of new concepts. Authors are instructed to prepare for a 20 to 25 minute presentation and then given an hour of actual presentation-cure-discussion time which shows the high degree of interaction with the other workshop participants.NSPW must remain small to provide the high quality interaction between authors and attendees. We try to keep attendance under 30; this year's attendance was 28.One of the most noteworthy features of NSPW is the "psychological contract" by which all workshop participants abide. Because authors are asked to present ideas that might be considered risky in some other venues, all participants are charged with providing feedback in a constructive and gracious manner. And it works! The resulting brainstorming environment has proven to be excellent for furthering the development of these ideas. Authors typically receive a considerable amount of feedback about their presentations and incorporate it into the final version of their paper. The results are reflected in these proceedings, published after the workshop.NSPW is often held in small hotels that provide a picturesque locale, comfortable surroundings, and excellent cuisine. This year's workshop was held at the Centro Stefano Francini in Ascona, Switzerland. The Centro is located on Monte Verià ("Mount Truth") and played host to most of the political, social, and philosophical innovators of the early twentieth century. Today it is managed by the Swiss Federal Technical Institute and provides excellent conference facilities with stunning views of Lago Maggiore and the Swiss Alps. Our conference planner, Carla Notari, was especially helpful in making all arrangements go smoothly.The job of program chair for the New Security Paradigms Workshop (NSPW) is both difficult and rewarding. Selecting the program committee, assigning papers to committee members, and choosing a few among many excellent submissions are all time-consuming tasks. The reward comes with the workshop, when exciting papers stimulate discussions that extend beyond the meeting room into the dinner hour and beyond. We appreciate the hard work of the organizers, who made the workshop so enjoyable for all of us.

Skip Table Of Content Section
SESSION: Surviving threats
Article
Locality: a new paradigm for thinking about normal behavior and outsider threat

Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of malicious anomalous behaviors. The paper notes that locality appears in many ...

Article
Alliance formation for DDoS defense

Currently, there is no effective defense against large-scale distributed denial-of-service (DDoS) attacks. While numerous DDoS defense systems exist that offer excellent protection from specific attack types and scenarios, they can frequently be ...

Article
Merging paradigms of survivability and security: stochastic faults and designed faults

Faults are examined by both the security and fault tolerance communities. These communities have strikingly different views of the types of faults that exist, the way they are modeled, and how they are addressed. One community can pronounce a system ...

SESSION: Language-based security
Article
SELF: a transparent security extension for ELF binaries

The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract models of program behavior and insert inline reference monitors. ...

Article
Dynamic label binding at run-time

Information flow control allows enforcement of end-to-end confidentiality policies but has been difficult to put in practice. This paper introduces a pragmatic new approach for tracking information flow while the process is running at the same time ...

SESSION: Security engineering
Article
Bringing security home: a process for developing secure and usable systems

The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:1. Security requirements tend to be kept separate from other system requirements, and not ...

Article
Security check: a formal yet practical framework for secure software architecture

With security becoming an important concern for both users as well as designers of large-scale software systems, it is necessary to introduce security considerations very early in the system development life-cycle namely in the modeling phase itself. ...

Article
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification

The application of formal methods for rigorously validating cryptographic protocols has been getting increasing attention. The de facto standard for modeling such protocols in formal proof systems is the Dolev-Yao model that, e.g., uses abstract ...

SESSION: Identification control
Article
Secure object identification: or: solving the Chess Grandmaster Problem

Many applications of cryptographic identification protocols are vulnerable against physical adversaries who perform real time attacks. For instance, when identifying a physical object like an automated teller machine, common identification schemes can ...

Article
Public key distribution through "cryptoIDs"

In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in the same way they distribute phone numbers, postal addresses, and the ...

Article
Owner-controlled information

Information about individuals is currently maintained in many thousands of databases, with much of that information, such as name and address, replicated across multiple databases. However, this proliferation of personal information raises issues of ...

SESSION: Ubiquitous computing/security
Article
Towards a new paradigm for securing wireless sensor networks

The network model assumed in this paper consists of tiny, energy-constrained, commodity sensors massively deployed alongside with one or more sink nodes that provide the interface to the outside world. The sensors in the network are initially anonymous ...

Article
Securing nomads: the case for quarantine, examination, and decontamination

The rapid growth and increasing pervasiveness of wireless networks raises serious security concerns. Client devices will migrate between numerous diverse wireless environments, bringing with them software vulnerabilities and possibly malicious code. ...

Contributors
  • Texas A&M University-Commerce
  • Purdue University
  • Dartmouth College
  • Norwegian University of Science and Technology
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%
YearSubmittedAcceptedRate
NSPW '18311135%
NSPW '14321134%
NSPW '13321134%
NSPW '10321341%
NSPW '09361233%
NSPW '07271141%
NSPW '02401435%
NSPW '00351543%
Overall2659837%