netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [ANNOUNCE] Linux Security Summit 2016 - CFP
@ 2016-03-24 22:55 James Morris
  0 siblings, 0 replies; only message in thread
From: James Morris @ 2016-03-24 22:55 UTC (permalink / raw)
  To: linux-security-module
  Cc: linux-kernel, lwn, fedora-selinux-list, selinux, ubuntu-hardened,
	Linux Security Summit Program Committee, netfilter-devel,
	linux-crypto, Audit-ML, gentoo-hardened, keyrings, tpmdd-devel,
	kernel-hardening, oss-security

[-- Attachment #1: Type: text/plain, Size: 3061 bytes --]

==========================================================================
                 ANNOUNCEMENT AND CALL FOR PARTICIPATION

                       LINUX SECURITY SUMMIT 2016
                              25-26 AUGUST
                            TORONTO, CANADA
                           
==========================================================================


DESCRIPTION

  The Linux Security Summit (LSS) is a technical forum for collaboration
  between Linux developers, researchers, and end users.  Its primary aim
  is to foster community efforts in analyzing and solving Linux security
  challenges.

  The format of the summit will be:
  
    * Refereed presentations
    * Discussion topics
    * Subsystem reports
    * Breakout development sessions 


WEB SITE

  http://events.linuxfoundation.org/events/linux-security-summit


TWITTER

  For event updates and announcements, follow:

  https://twitter.com/LinuxSecSummit


DATES / LOCATION

  The Linux Security Summit for 2016 will be held  August 25th and 26th
  in Toronto, Canada.  It will be co-located with LinuxCon.

  The Linux Security Summit CFP is now open, and will close on June 10th.
  
  Accepted speakers will be notified by June 17th.


WHO SHOULD ATTEND

  We're seeking a diverse range of attendees, and welcome participation
  by people involved in Linux security development, operations, and research.

  The LSS is a unique global event which provides the opportunity to present
  and discuss your work or research with key Linux security community
  members and maintainers.  It’s also useful for those who wish to keep up
  with the latest in Linux security development, and to provide input to
  the development process.


CALL FOR PARTICIPATION

  The program committee currently seeks proposals for:

  * Refereed Presentations:
      45 minutes in length, including at least 10 minutes of discussion.
      One-page abstracts are encouraged.

  * Discussion Topics:
      30 minutes in length.
 
  Topic areas include, but are not limited to:
  
    * Kernel self-protection
    * Access control
    * Cryptography and key management
    * Integrity control
    * Hardware security
    * Trust systems
    * Storage and file systems
    * Virtualization and containers
    * Case studies
    * Identity management
    * Code analysis
    * Security analytics
    * Secure development and operational practices
    * Emerging technologies, threats & techniques 
    
  Proposals should be submitted via the event web site:

    http://events.linuxfoundation.org/events/linux-security-summit/program/cfp


PROGRAM COMMITTEE

  The Linux Security Summit for 2016 is organized by:

    * James Morris, Oracle
    * Serge Hallyn, Canonical
    * Paul Moore, Red Hat
    * Stephen Smalley, NSA
    * Elena Reshetova, Intel
    * Herbert Xu, Red Hat
    * John Johansen, Canonical
    * Kees Cook, Google
    * Casey Schaufler, Intel
    * Mimi Zohar, IBM

  The program committee may be contacted as a group via email:

    lss-pc@lists.linuxfoundation.org

   

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2016-03-24 22:55 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-03-24 22:55 [ANNOUNCE] Linux Security Summit 2016 - CFP James Morris

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).