NSPW: New Security Paradigms Workshop



Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
NSPW 2016 New Security Paradigms Workshop
Sep 26, 2016 - Sep 29, 2016 Colorado, USA Apr 29, 2016
NSPW 2015 New Security Paradigms Workshop
Sep 8, 2015 - Sep 11, 2015 Twente, The Netherlands Apr 18, 2015
NSPW 2014 New Security Paradigms Workshop (NSPW)
Sep 15, 2014 - Sep 18, 2014 Victoria, BC, Canada Apr 18, 2014
NSPW 2013 New Security Paradigms Workshop
Sep 9, 2013 - Sep 12, 2013 The Banff Centre, Canada Apr 12, 2013
NSPW 2012 New Security Paradigms Workshop
Sep 19, 2012 - Sep 21, 2012 Bertinoro, Italy Apr 6, 2012
NSPW 2011 New Security Paradigms Workshop
Sep 12, 2011 - Sep 15, 2011 Marin County, CA, USA Apr 4, 2011
NSPW 2008 New Security Paradigms Workshop
Sep 22, 2008 - Sep 25, 2008 Olympic Valley, CA, USA Apr 11, 2008

Present CFP : 2016

Since 1992, the New Security Paradigms Workshop (NSPW) has offered a unique forum for information security research involving high-risk, high-opportunity paradigms, perspectives, and positions. The workshop itself is highly interactive with presentations by authors prepared for in-depth discussions, and ample opportunity to exchange views with open-minded peers. NSPW is also distinguished by its deep-rooted tradition of positive feedback, collegiality, and encouragement.

NSPW seeks embryonic, disruptive, and unconventional ideas that benefit from early feedback. The ideas are almost always not yet proven, and sometimes infeasible to validate to the extent expected in traditional forums. NSPW seeks ideas pushing the boundaries of science and engineering beyond what would typically be considered mainstream; papers that would be strong candidates in "conventional" information security venues are, as a rule of thumb, a poor fit for NSPW. We welcome papers with perspectives that augment traditional information security, both from computer science and other disciplines that study adversarial relationships (e.g., biology, economics, the social sciences). Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or view problems from an entirely novel angle leading to new solutions.

In 2015, more than 50% of the presenters had never attended NSPW before. We are actively trying to continue this trend, and therefore we encourage submissions from new NSPW authors.

- REGULAR SUBMISSIONS: NSPW papers vary in approach and style, but often involve a systematic investigation supported by structured argument. Some involve an opinionated analysis, or explore a design space that emerges upon replacing a common assumption (even if this is beyond current technology). Successful submissions show strong scholarship, demonstrate sound knowledge of related literature while placing the contributions in context to it, and are often accompanied by early validation and a research agenda for broader validation. Ideal papers lead to spirited workshop discussion, but NSPW is not a debating society - the discussion should relate to new ideas and perspectives as characterized above, rather than well-known controversial topics.

- NSPHD SUBMISSIONS: This category is for students at an early stage in thesis research that meets the NSPW characteristics noted above, and ideally for thesis work and directions that would benefit from extensive expert feedback; the research thus must be preliminary (mature or completed theses are unsuitable). NSPHD papers may be held to a less rigorous standard than regular NSPW submissions. The format is flexible, but should outline ideas, work completed so far, and what is envisioned as future work. NSPHD papers are typically omitted from the main proceedings, but if desired, can be made available through links on the NSPW site. The NSPHD category is not intended for graduate students simply co-authoring with faculty advisors or work suitable as a regular submission. Student authors of accepted NSPHD papers are invited to present; typically their faculty advisors are not.

- PANEL PROPOSALS: NSPW often includes one or two stimulating panel discussions. Successful panel proposals will include a great idea, a list of potential panelists including moderator, an outline of the topic, and motivation for its suitability for NSPW. The proposers of accepted panels and the panelists are typically invited to prepare a short summary for the proceedings after the workshop.

The workshop itself is invitation-only, with typically 30-35 participants consisting of authors of about 12 accepted papers, panelists, program committee members, and organizers. One author of each accepted paper must attend; additional authors may be invited if space permits. All participants must commit to a "social contract": no one arrives late, no one leaves early, no laptops, and all attend all sessions of the 2.5 day program, sharing meals in a group setting. The workshop is preceded by an evening reception allowing attendees to meet each other beforehand. We expect to offer a limited amount of financial aid to those who absolutely require it.

Submissions must be made in PDF format through EasyChair, as linked on the NSPW site.

Submissions must include a cover page with authors' names, affiliation, justification statement and attendance statement. Papers not including these risk desk rejection. The justification statement should specify exactly one category (Regular, NSPHD, or Panel), briefly explain why the submission is appropriate for NSPW, and summarize the new paradigm, perspective, or position. The attendance statement must specify which author(s) commit to attend upon acceptance/invitation. The cover page is part of the package given to the reviewers, hence NSPW submissions are not double-blind. All submissions should be in ACM SIG proceedings format. Regular and NSPHD submissions are expected to be 6-15 pages. All submissions are treated as confidential as a matter of policy. NSPW does not accept papers published elsewhere, nor submitted to other venues or journals concurrently.

Final proceedings are published post-workshop, allowing revised papers to include feedback received during the workshop.

Matt Bishop (UC Davis, US)
Kevin Butler (University of Florida, US)
Bill Cheswick (University of Pennsylvania, US)
Markus Duermuth (Ruhr-Univ. Bochum, Germany)
Benjamin Edwards (University of New Mexico, US)
Maritza Johnson (Google, US)
Mike Just (Heriot-Watt University, UK)
Shriram Krishnamurthi (Brown Uinversity, US)
M. Mannan (Concordia University, Canada)
Sarah Meiklejohn (University College London, UK)
Paul van Oorschot (Carleton University, Canada)
Sean Peisert (UC Davis / Lawrence Berkeley Lab, US)
Wolter Pieters (TU Delft, The Netherlands)
Christian W. Probst (Technical University of Denmark)
Elizabeth Stobert (ETH Zurich, Switzerland)
Mary Ellen Zurko (Cisco, US)

Rainer Boehme (rainer.boehme@uibk.ac.at), University of Innsbruck, Austria
Serge Egelman (egelman@cs.berkeley.edu), University of California at Berkeley / ICSI

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
Elsevier JOCS NCP&BD 2017   Elsevier Journal of Computational Science (SCI IF=1.078) Special Issue on The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks
MLDM 2017   Machine Learning and Data Mining in Pattern Recognition
ICMWT 2017   4th iCatse Conference on Mobile and Wireless Technology
BDCloud 2017   The 7th IEEE International Conference on Big Data and Cloud Computing
ICDM 2017   IEEE International Conference on Data Mining 2017
AEIJ 2017   Advanced Energy: An International Journal
USENIX Security 2017   USENIX Security '17
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
EuropeanSeC 2017   2017 European Security Conference