Skip to Content.
Sympa Menu

mw-announce - Symposium on Identity and Trust on the Internet (IDtrust 2010) - Submission deadline extended

Subject: Middleware Announcements

List archive

Symposium on Identity and Trust on the Internet (IDtrust 2010) - Submission deadline extended


Chronological Thread 
  • From: Renee Woodten Frost <>
  • To:
  • Subject: Symposium on Identity and Trust on the Internet (IDtrust 2010) - Submission deadline extended
  • Date: Wed, 2 Dec 2009 10:36:31 -0500

The paper submission deadline for IDtrust 2010 has been extended to
December 20, 2009.  Panel proposals are due January 24, 2010.  See the
Call for Papers below.  Full information is on the website at:

http://middleware.internet2.edu/idtrust/2010/


****************************************************************************************


9th Symposium on Identity and Trust on the Internet (IDtrust 2010)
Apr 13-15, 2010
in Gaithersburg, MD

Sponsored by NIST,  Internet2, OASIS IDtrust Member Section, and Federal PKI
Policy Authority.

Theme: Secure and convenient access control

IDtrust is looking for papers related to all parts of the public-key mediated
authentication and access control problem.

All software systems, from enterprise data centers to small businesses and
consumer-facing applications, must make access control decisions for protected
data. IDtrust is a venue for the discussion of the complete access control
process (authentication, authorization, provisioning and security decision
workflow), addressing questions such as: "What are the authorization strategies
that will succeed in the next decade?" "What technologies exist to address
complex requirements today?" "What research is academia and industry pursuing
to solve the problems likely to show up in the next few years?"

Identity as used here refers to not just the principal identifier, but also to
attributes and claims.

Call for Papers

We solicit technical papers and panel proposals from researchers, systems
architects, vendor engineers, and users. Suggested topics include but are not
limited to:

   * Analysis of existing identity management protocols and ceremonies (SAML,
Liberty, CardSpace, OpenID, and PKI-related protocols)
   * Analysis or extension of identity metasystems, frameworks, and systems
(Shibboleth, Higgins, etc.)
   * Design and analysis of new access control protocols and ceremonies
   * Cloud/grid computing implications on authorization and authentication
   * Assembly of requirements for access control protocols and ceremonies
involving strong identity establishment
   * Reports of real-world experience with the use and deployment of identity
and trust applications for broad use on the Internet (where the population of
users is diverse) and within enterprises who use the Internet (where the
population of users may be more limited), how best to integrate such usage into
legacy systems, and future research directions. Reports may include use cases,
business case scenarios, requirements, best practices, implementation and
interoperability reports, usage experience, etc.
   * User-centric identity, delegation, reputation
   * Identity and Web 2.0, secure mash-ups, social networking, trust fabric
and mechanisms of  invited networks 
   * Identity management of devices from RFID tags to cell phones; Host
Identity Protocol (HIP)
   * Federated approaches to trust
   * Standards related to identity and trust, including X.509, S/MIME, PGP,
SPKI/SDSI, XKMS, XACML, XRML, and XML signatures
   * Intersection of policy-based systems, identity, and trust; identity and
trust policy enforcement, policy and attribute mapping and standardization
   * Attribute management, attribute-based access control
   * Trust path building and certificate validation in open and closed
environments
   * Analysis and improvements to the usability of identity and trust systems
for users and administrators, including usability design for authorization and
policy management, naming, signing, verification, encryption, use of multiple
private keys, and selective disclosure
   * Identity and privacy
   * Levels of trust and assurance
   * Trust infrastructure issues of scalability, performance, adoption,
discovery, and interoperability
   * Use of PKI in emerging technologies (e.g., sensor networks, disaggregated
computers, etc.)
   * Application domain requirements: web services, grid technologies,
document signatures, (including signature validity over time), data privacy,
etc.

Important Dates

Papers due:
   Dec 20, 2009 (Extended)
Notification to authors:
   Jan 15, 2010
Panel proposals due:
   Jan 24, 2010
Final papers due:
   Feb 21, 2010
Registration deadline:
   Apr 5, 2010
Symposium:
   Apr 13-15, 2010

Submissions

Submissions should be provided electronically, in PDF, for standard US
letter-size paper (8.5 x 11 inches). Paper submissions must not exceed 15 pages
(single space, two column format with 1" margins using a 10 pt or larger font)
and should adhere to the ACM SIG proceedings template at http://www.acm.org/
sigs/pubs/proceed/template.html (LaTeX users should use template Option 2).
Successful technical papers should clearly describe the contribution to the
field and cite related work. Submissions of papers must not substantially
duplicate work that any of the authors have published elsewhere or have
submitted in parallel to any other conferences or journals. Proposals for
panels should be no longer than five pages and include possible panelists and
an indication of which panelists have confirmed participation.

Detailed submission instructions can be found at our submissions page. All
submissions will be acknowledged.

Accepted papers will be published in a conference proceedings at the symposium.
Accepted papers will also appear in the ACM Digital Library as part of the ACM
International Conference Proceedings Series.


Program Committee

Carl Ellison (chair), Independent
Gail-Joon Ahn, Arizona State University
Peter Alterman, National Institutes of Health
Abbie Barbir, Nortel
John Bradley, ooTao
David Chadwick, University of Kent
Stephen Farrell, Trinity College Dublin
Peter Gutmann, University of Auckland
Adam J. Lee, University of Pittsburgh
June Leung,    jULE Consulting Inc.
Neal McBurnett, Internet2
Mike McIntosh, IBM
Clifford Neuman, University of Southern California
Elaine Newton, NIST
Massimiliano Pala, Dartmouth College / OpenCA Labs
Radia Perlman, Sun Microsystems
Scott Rea, Dartmouth College
Andrew Regenscheid, NIST
John Sabo, Computer Associates
Anil Saldhana, Red Hat
Kent Seamons, Brigham Young University
Frank Siebenlist, Argonne National Lab
Sean Smith, Dartmouth College
Jon Solworth, University of Illinois at Chicago
Von Welch, NCSA
Stephen Whitlock, Boeing
Michael Wiener, Cryptographic Clarity



General Chair:
Ken Klingenstein
Internet2


Program Chair:
Carl Ellison


Panels Chair:
Radia Perlman
Sun Microsystems


Steering Committee Chair, and web site:
Neal McBurnett
Internet2


Local Arrangements Chair:
Sara Caswell
NIST


Registration:





  • Symposium on Identity and Trust on the Internet (IDtrust 2010) - Submission deadline extended, Renee Woodten Frost, 12/02/2009

Archive powered by MHonArc 2.6.16.

Top of Page