1 |
FYI |
2 |
|
3 |
-------- Original Message -------- |
4 |
Subject: SELinux Symposium - Call for papers reminder |
5 |
Date: Thu, 01 Sep 2005 14:59:36 -0400 |
6 |
From: SELinux Symposium Chair <chair@×××××××××××××××××.org> |
7 |
To: SELinux <SELinux@×××××××××.gov>, announce@×××××××××××××××××.org, |
8 |
fedora-selinux-list@××××××.com, trustedbsd-discuss@××××××××××.org |
9 |
|
10 |
|
11 |
|
12 |
This is a reminder that paper proposals for the Second Security Enhanced |
13 |
Linux Symposium are due on September 19, 2005. For more information or |
14 |
to submit your proposal please visit http://www.selinux-symposium.org/. |
15 |
The full text of the call is included below for reference. |
16 |
|
17 |
SECOND SECURITY ENHANCED LINUX SYMPOSIUM (www.selinux-symposium.org) |
18 |
Call for Papers |
19 |
|
20 |
The call for papers for the Second Security Enhanced Linux (SELinux) |
21 |
Symposium is now open. The Symposium is scheduled for February 28-March |
22 |
2, 2006, at the Wyndham Hotel, Baltimore, Maryland, USA. The event is |
23 |
the only of its kind to examine SELinux and the power of the flexible |
24 |
mandatory access control security it brings to Linux. Last year's |
25 |
inaugural symposium was a tremendous success providing the SELinux |
26 |
development and user community the opportunity to discuss related |
27 |
research results, development plans, and applications. |
28 |
|
29 |
Any topics relating to SELinux technology, flexible mandatory access |
30 |
control, and its application to real-world problem are of interest for |
31 |
this symposium. Such topic include: |
32 |
|
33 |
+ Innovations and advancement in SELinux technology |
34 |
+ Use and application of SELinux and Type Enforcement |
35 |
+ SELinux development experiences and tools |
36 |
+ Use and Configuration of MLS and RBAC in securing systems |
37 |
+ Updates on the various Linux distributions using SELinux |
38 |
+ Practical "root"-less system administration policies |
39 |
+ Case studies and application experience SELinux |
40 |
+ Related research and development activities |
41 |
+ Tools and products supporting/using SELinux |
42 |
+ Security evaluation and certification issues |
43 |
+ User and customers concerns and needs |
44 |
+ Tutorials |
45 |
|
46 |
No marketing pitches will be accepted. |
47 |
|
48 |
The call for papers is open until September 19, 2005. For additional |
49 |
information and submittal requirements, see www.selinux-symposium.org. |
50 |
|
51 |
Technical Committee: |
52 |
|
53 |
Joshua Brindle, Tresys |
54 |
Russell Coker, Red Hat |
55 |
Chad Hanson, TCS |
56 |
Trent Jaeger, Penn State University |
57 |
Pete Loscocco, NSA |
58 |
Karl MacMillan, Tresys |
59 |
Frank Mayer (Chair), Tresys |
60 |
James Morris, Red Hat |
61 |
Doc Shankar, IBM |
62 |
Stephen Smalley, NSA |
63 |
Daniel Walsh, Red Hat |
64 |
|
65 |
|
66 |
-- |
67 |
gentoo-hardened@g.o mailing list |