Category: Events&Venues

Sep 11

FC 2013 : Financial Cryptography and Data Security

FC 2013 : Financial Cryptography and Data Security.

Sep 11

RISE 2012 : Workshop on Redefining and Integrating Security Engineering

RISE 2012 : Workshop on Redefining and Integrating Security Engineering.

Aug 14

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013

 

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013

Link: http://www.accesscongress.org
When Jun 5, 2013 – Jun 7, 2013
Where Singapore
Submission Deadline Oct 15, 2012
Notification Due Nov 19, 2012
Final Version Due Jan 7, 2013
Categories    research   informatics   environment   security

Call For Papers

The ACCESS Congress 2013 seeks for original research papers in the following areas, but are not limited to the domains listed below. The submission topics are divided into 4 domains:

(A) Human Safety & Security

Ageing
Stroke
Healthcare & Wellness
Pandemic Management
Infectious Diseases
Low Fertility
Human Performance

(B) Environment Safety &Security

Energy Sustainability
Food & Water
Climate Change
Building Infrastructures
Biodiversity
Disaster Management

(C) Information Safety & Security

Cloud Security
Social Media
Mobile Security
Electronic Crimes
Online Child Pornography

(D) Homeland Safety & Security

Sensors Systems
Microsystem Technologies
Geo-spatial
Transport & Logistics
Analytics & Intelligence
Immigrants and Social Issues

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013.

Aug 14

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration

 

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration

Link: http://www.igi-global.com/publish/call-for-papers/call-details/763
When N/A
Where N/A
Submission Deadline Aug 31, 2012
Notification Due Oct 15, 2012
Final Version Due Nov 30, 2012
Categories    system administration   security   legal issues

Call For Papers

Introduction
A large quantity of digital information is being created every moment by individual and corporate consumers of IT. This information is increasingly being recognized as a key economic resource and as one of the firm’s most important assets, just as much as capital infrastructure and people. Managing the digital information at the right time and place is essential for the survival of a company.

However, the complexity of information management is huge, particularly in large organizations. The data explosion continues to drive the demand for increased storage capacity and a parallel need to secure that information. Companies are facing increased security threats from both within the organization and externally. A company’s data is one of its most valuable assets an organization needs to implement a thorough security plan, taking all aspects of securing the data into account. Currently, all organizations have a system administrator, which is part of the organization’s policy. The administrator’s role is mainly developed in the dark to avoid data leaks, safeguard the integrity of databases, etc.; but when there is a failure, a breach of competition rules, a violation of confidentiality, the responsibility relies in the administrator.

Objective of the Book
The mission of the book is to discuss the main issues, challenges, opportunities and solutions related to the role and responsibility of the system’s administrator. Therefore, we intend to discuss the mission and challenges of a system’s administration in the 21st century, the importance of proper information security policy, the drivers and barriers to address a completely safe and reliable ICT system, and the organizational and legal implications of system administration. Furthermore, we expect to present some practical solutions that would make it possible to implement a reliable system administration policy.

Target Audience
This book is expected to be a support to disciplines (post-graduate studies) of Management, Enterprise Information Systems, Information Systems Management and Management Information Systems in general. It intends, also, to serve as guidance for top managers and information technologies (IT) professionals (system developers and IT specialists).

Recommended topics include, but are not limited to, the following:
Role and responsibilities of the system’s administrator
Importance of a proper information security policy
Drivers and barriers to address a completely safe and reliable ICT system
Critical success factors for its adoption by SME
Network security policies and best practices
Threats and countermeasures for information system security
Legal and regulatory frameworks
Organizational and legal implications
Compared studies of regulations
Surveys and case studies

Submission Procedure
Researchers and practitioners are invited to submit on or before August 30, 2012, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by October 15, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by November 30, 2012. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2013.

Important Dates
August 30, 2012: 1st Proposal Submission Deadline
October 15, 2012: Notification of Acceptance
November 30, 2012:Full Chapter Submission
January 30, 2013: Review Results Returned
March 30, 2013: Final Chapter Submission
May 15, 2013: Final Deadline

Inquiries and submissions can be forwarded electronically (Word document):

Prof. Dr. Fernando Almeida
ISPGaya, School of Technology and Science
Av. dos Descobrimentos, 333 • 4400-103 Santa Marinha – Vila Nova de Gaia
Tel.: +351 223 745 730/1 • Fax: +351 220 134 479
E-mail: portelalmd@gmail.com

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration.

Aug 14

UDD 2012 : Special Session on Undesirable Data Detection

 

UDD 2012 : Special Session on Undesirable Data Detection

Link: http://www.mirlabs.net/ias12/ss1.html
When Nov 21, 2012 – Nov 23, 2012
Where São Carlos, Brazil
Submission Deadline Aug 15, 2012
Notification Due Sep 15, 2012
Final Version Due Sep 30, 2012
Categories    undesirable data detection   security

Call For Papers

Call for Papers of the Special Session on
Undesirable Data Detection — UDD 2012

Under the framework of the 8th International Conference on Information Assurance and Security (IAS 2012), 21-23 November 2012 in São Carlos, Brazil

Objectives
In recent years, research in the area of ICT security grows rapidly, mainly thanks to growing number of security threats arising internally or externally. Undesirable behavior comprising any intentionally or unintentionally misuse of resources in information systems produces growing quantity of new undesirable data every day. Undesirable Data Detection (http://www.mirlabs.net/ias12/ss1.html) Special Session aims at presenting novel approaches for evaluating or detecting potentially malicious activity threatening the security of ICT.
The special session seeks contributions about foundations of undesirable data detection as well as case studies, empirical, and other methodological works. It will provide an opportunity to disseminate latest results in this important field.
This section is focused on mining or detection of the undesirable data (such as spam emails and other unsolicited message in any communication system) and on its optimization for all possible aspects of security. Moreover, the session focuses on engines for Intrusion Detection Systems detection based on rules and on data elaboration, with special care of solution able to support data parallelization and GPU computing. Last but not least the special session aims at collecting case studies and real application of Undesirable data detection.

Specific topics of interest
The preferred topics for this special session are (but not limited to):
• Detection techniques and Methodologies
o Spam detection
o Intrusion detection
o Similarity detection
o Plagiarism detection
o Dangerous patterns in data streams
o Steganography detection
• Detection Techniques Application
o Scalable IDs architecture
o GPU and parallel Computing for Undesirable Data and Intrusion Detection
• Intrusion and Undesirable Data Detection Case Studies
o Detection in network systems
o Intrusion Detection in Cloud systems
o Industrial and real case studies

Submission
Special Session paper submission will be done through IAS 2012 submission system and been evaluated with the same standard as the regular conference paper. All accepted papers will be included in the IAS 2012 conference proceedings.
Papers must be submitted within the stipulated time and electronic submission in PDF is required. A full paper (6 pages, A4 size) for oral presentation should in the IEEE 8.5 two-column format. Papers should contain up to 5 keywords. Papers will be evaluated for originality, significance, clarity, and soundness, and will be reviewed by at least three independent reviewers.

Details are available at the conference website http://www.mirlabs.net/ias12/. Submit your paper at the submission site https://www.easychair.org/account/signin.cgi?conf=ias12.

Program Chair
Vaclav Snášel, Department of Computer Science, VSB – Technical University of Ostrava, vaclav.snasel@vsb.cz

Session Coordinators
Eliška Ochodková, eliska.ochodkova@vsb.cz
Pavel Krömer, pavel.kromer@vsb.cz

Program committee
Vaclav Snasel, VSB-Technical University of Ostrava, Czech Republic, vaclav.snasel@vsb.cz
Milos Kudelka, VSB-Technical University of Ostrava, Czech Republic, milos.kudelka@vsb.cz
Pavel Kromer, VSB-Technical University of Ostrava, Czech Republic, pavel.kromer@vsb.cz
Jan Platos, VSB-Technical University of Ostrava, Czech Republic, jan.platos@vsb.cz
Pavel Moravec, VSB-Technical University of Ostrava, Czech Republic, pavel.moravec@vsb.cz
Petr Gajdos, VSB-Technical University of Ostrava, Czech Republic, petr.gajdos@vsb.cz
Jan Martinovic, VSB-Technical University of Ostrava, Czech Republic, jan.martinovic@vsb.cz
Petr Musilek, University of Alberta, Canada, musilek@ece.ualberta.ca
Suhail S. Owais, AL-Balaqa University, Jordan, suhailowais@yahoo.com
Hideyasu Sasaki, University of Hong Kong, Hong Kong, hsasaki@uchicago.edu
Juan D. Velasquez, University of Chile, Santiago, Chile, juansensei@gmail.com
Miroslav Voznak, VSB-Technical University of Ostrava, Czech Republic, miroslav.voznak@vsb.cz

UDD 2012 : Special Session on Undesirable Data Detection.

Aug 14

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

 

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

Link: http://www.crysys.hu/recent-news/229-wisec-2013.html
When Apr 17, 2013 – Apr 19, 2013
Where Budapest, Hungary
Submission Deadline Oct 29, 2012
Notification Due Jan 20, 2013
Final Version Due Feb 15, 2013
Categories    wireless   security   communications   networks

Call For Papers

* ACM approval pending

*** PRELIMINARY CALL FOR PAPERS ***

IMPORTANT DATES

Submission Deadline: Oct 29
Notification Date: Jan 20
Camera-Ready Deadline: Feb 15

BROADENED SCOPE

WiSec has been broadening its scope and seeks to present high quality
research papers exploring security and privacy aspects of wireless
communications, mobile networks, and their applications. Beyond the
traditional Wisec staples of physical, link, and network layer security, we
also welcome papers focusing on the security and privacy of mobile software
platforms and the increasingly diverse range of mobile or wireless
applications. The conference welcomes both theoretical as well as systems
contributions.

Topics of interest include, but are not limited to:
* Mobile malware and platform security
* Security & Privacy for Smart Devices (e.g., Smartphones)
* Wireless and mobile privacy and anonymity
* Secure localization and location privacy
* Cellular network fraud and security
* Jamming attacks and defenses
* Key extraction, agreement, or distribution in wireless and mobile
settings
* Theoretical foundations, cryptographic primitives, and formal
methods for wireless security and privacy
* NFC and smart payment applications
* Security and privacy for mobile sensing systems
* Wireless or mobile security and privacy in health, automotive,
avionics, or smart grid applications

The proceedings of ACM WiSec will be published by the ACM (pending
approval).

FULL AND SHORT PAPERS: Full paper submissions to WiSec 2013 can be up to 10
pages in the ACM conference style excluding the bibliography and well marked
appendices, and up to 12 pages in total. WiSec also encourages the
submission of short papers with a length of up to 6 pages, which describe
mature work of a more succinct nature. All papers must be thoroughly
anonymized for double-blind reviewing. Detailed submission instructions
will appear on the conference website
(http://www.sigsac.org/wisec/WiSec2013/SubInstructions.php).

DOUBLE SUBMISSIONS: It is a policy of the ACM
(http://www.acm.org/publications/policies/RightsResponsibilities) to
disallow double submissions, where the same (or substantially similar)
paper is concurrently submitted to multiple conferences/journals. Any
double submissions detected will be immediately rejected from all
conferences/journals involved.

ORGANIZERS

General Chair
Levente Buttyan, Budapest University of Technology and Economics, Hungary

Technical Program Chairs
Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany
Marco Gruteser, Rutgers University, USA

Steering committee
N. Asokan, NRC, Finland
Levente Buttyan, BME, Hungary
Claude Castelluccia, INRIA, France
Jean-Pierre Hubaux, EPFL, Switzerland
Douglas Maughan, DHS, USA
Adrian Perrig, CMU, USA
Gene Tsudik, UCI, USA (chair)
Dirk Westhoff, HAW, Germany

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks.

Aug 14

ELS 2012 : The 7th Workshop on E-Learning Security

 

ELS 2012 : The 7th Workshop on E-Learning Security

Link: http://www.icitst.org/ELS-2012.pdf
When Dec 10, 2012 – Dec 12, 2012
Where London, UK
Submission Deadline Oct 1, 2012
Categories    e-learning    security

Call For Papers

The 7th Workshop on E-Learning Security (ELS-2012)
In Conjunction With
The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)
Technical Co-Sponsored by IEEE UK/RI Computer Chapter
December 10-12, 2012
London, UK
http://www.icitst.org/Workshops.html

—————-
Important Dates:
—————-
Submission Date: October 1, 2012
Notification Date: October 10, 2012
Camera Ready: October 30, 2012
Conference Dates: December 10-12, 2012

————————————————–
Topics of interest include but are not limited to:
————————————————–
*Security and Privacy in E-Learning
*Security Issues on E-Learning Assessments
*E-Learning Security Auditing
*Biometrics in E-Learning
*Secure E-Learning Development and Application
*Digital Rights Management (DRM) for E-Learning
*Emerging E-Learning Markets
*Collaborative Research
*Ongoing research from undergraduates, graduates/postgraduates and professionals
*Future Technologies

—————–
Paper submission:
—————–
Length of paper:
* Full-paper: 6 pages
* Extended Abstract: 2 pages
The style file and templates are available at Paper Submission.
Please submit your full paper(s) in PDF format via email to: els-2012@icitst.org

For further details, please visit http://www.icitst.org/ELS-2012.pdf

ELS 2012 : The 7th Workshop on E-Learning Security.

Aug 14

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

 

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

Link: http://hise.hznu.edu.cn/asiaccs/
When May 8, 2013 – May 10, 2013
Where Hangzhou, China
Submission Deadline Nov 30, 2012
Categories    security

Call For Papers

Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), and Seoul (2012). ASIACCS 2013 is the eighth conference of the series.

ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2012 include, but are not limited to:

access control

identity management

privacy-enhancing technology

accounting and audit

Inference control and disclosure

security in ubiquitous computing

applied cryptography

information warfare

security management

authentication

intellectual-property protection

smartcards

cloud computing security

intrusion detection

software security

data/system integrity

key management

trusted computing

data and application security

malware and botnets

wireless security

digital-rights management

mobile-computing security

web security

formal methods for security

operating system security

hardware-based security

phishing and countermeasures

Important Dates

Submission Deadline: 30 November 2012, 23:59 UTC (Firm Deadline)
Acceptance Notification: 29 January 2013
Camera-ready Copy Due: 18 February 2013
Conference: 8-10 May 2013

Instructions for authors Submissions must be written in English, and must be at most 10 pages in 10pt, double-column format excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in ACM SIGPLAN format (http://www.sigplan.org/authorInformation.htm) with page numbers (so, LaTeX users should specify documentclass[10pt,preprint]{sigplanconf}). No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library. Final proceedings versions will be 10 pages in double-column ACM format, although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings.

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security.

Aug 06

e-voting.cc – Proceedings 2012

e-voting.cc – Proceedings 2012.

Jul 03

SSRR 2012 : 10th IEEE International Symposium on Safety, Security, and Rescue Robotics

When Nov 5, 2012 – Nov 8, 2012
Where College Station, Texas, USA
Submission Deadline Aug 15, 2012
Notification Due Oct 1, 2012
Final Version Due Oct 22, 2012

SSRR 2012 : 10th IEEE International Symposium on Safety, Security, and Rescue Robotics.