Category: Events&Venues

May 15

CeDEM12 Summary « Digital Government & Society

CeDEM12 Summary « Digital Government & Society.

May 15

PEP-NET Summit 2012: Out in the Open (14 May, Hamburg) « Digital Government & Society

PEP-NET Summit 2012: Out in the Open (14 May, Hamburg) « Digital Government & Society.

May 15

CEDEM 12, Day 1, Afternoon Sessions #cedem12 « Digital Government & Society

CEDEM 12, Day 1, Afternoon Sessions #cedem12 « Digital Government & Society.

May 15

Mobisec 2012 : The 4th International Conference on Security and Privacy in Mobile Information and Communication Systems

When Jun 25, 2012 – Jun 26, 2012
Where Frankfurt, Germany
Submission Deadline May 25, 2012
Notification Due May 31, 2012
Final Version Due Jul 7, 2012

Mobisec 2012 : The 4th International Conference on Security and Privacy in Mobile Information and Communication Systems.

The 4th International Conference on Security and Privacy in Mobile
Information and Communication Systems Mobisec 2012,
Mövenpick Hotel Frankfurt City, Frankfurt, Germany
25 – 26 June 2012
http://mobisec.org/2012
============================================================================

CALL FOR POSTERS

KEYNOTE SPEAKERS
================
Kim Cameron, Distinguished Engineer and Chief Architect, Microsoft
Prof. Dr. Kai Rannenberg, Deutsche Telekom Chair of Mobile Business&
Multilateral Security, Goethe University Frankfurt
Amardeo Sarma, Deputy General Manager, NEC Laboratories

SCOPE
=====
The poster session will provide a forum for researchers to show their
work and obtain constructive feedback on their ongoing research. While
the poster need not describe completed work, it should report on
research for which at least preliminary results are available.

At least one of the authors of the poster must register for the
conference for the poster to be included as part of the poster session.
Authors of accepted poster proposals will have a chance to present the
poster to interested attendees during a special poster session at the
conference.

The abstracts of accepted posters will be posted on the conference
website and will appear in the conference proceedings.

TOPICS
======
Topics of interest include, but are not limited to, the following focus
areas:

Privacy and Security in Emerging Mobile Applications and Services:

* Privacy-respecting Authentication
* Mobile Identity Management
* Mobile Wallets, Mobile Payments
* Location-based Services and Mobile Sensing

Smartphone Security and Privacy:

* Advanced Security Mechanisms
* Virtualisation Solutions
* Rogue Mobile Application Detection and Protection
* Forensic Analysis

Machine-to-Machine Secure Communication:

* Device Identities and Authentication
* Remote Integrity Validation and Remediation
* Remote Management and Provisioning
* Machine-to-Machine Application Layer Security
* Secure Elements and Trusted Environments

Important Dates
===============
Submission Date : May. 25, 2012
Notification of acceptance: May. 31, 2012
Camera Ready submission : Jun. 7, 2012
Conference dates : June 25-26, 2012

SUBMISSION INSTRUCTIONS
=======================

Please submit your abstracts to the TCP chairs at the Email:
posters2012@mobisec.org in PDF format. Optionally, besides the abstract,
submissions may also include an electronic copy of the poster to be
presented at the conference.

Steering Committee
==================
* Imrich Chlamtac (Chair), President, CREATE-NET Research Consortium,
Trento, Italy
* Ramjee Prasad, Aalborg University, Denmark
* Andreas U. Schmidt, Director, Novalyst IT AG, Karben, Germany

Organising Committee
====================
General Chair / General Co-Chairs:
* Neeli R. Prasad, Aalborg University, Denmark
* Andreas U. Schmidt, Novalyst IT AG, Karben, Germany

TPC Chair/TPC Co-Chairs:
* Ioannis Krontiris, Goethe University Frankfurt, Germany
* Giovanni Russello, University of Auckland, New Zealand

– Publication Chair: Shiguo Lian, France Telecom R&D, Beijing, China
– Publicity Chair(s): Mauro Conti, University of Padua, Italy; Rasmus
Hjorth Nielsen, CTIF, Princeton, USA
– Workshops Chair(s): Vincent Naessens, KaHo Sint-Lieven, Gent, Belgium
– Panels Chair:Dirk Kröselberg, Siemens CERT, Munich, Germany
– Web Chair: Andreas Leicher, Novalyst IT AG, Karben, Germany
– Conference Coordinator: Justina Senkus, EAI/ICST Trento, Italy

ABOUT EAI
The European Alliance for Innovation is a dynamic eco-system for
fostering ICT enabled innovation to improve European competitiveness and
to benefit society. EAI uses open e-platforms to inspire grassroots
collaboration among all relevant actors, from organizations to
individuals, to stimulate community driven innovation to its
institutional and individual members worldwide. Through EAI,
organizations find ideas and talent, and individual innovators find
organizations for their ingenuity and craft. Join the innovation
community at www.eai.eu

May 15

PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks

When Nov 1, 2012 – Nov 3, 2012
Where Xiangtan, China
Submission Deadline Jun 25, 2012

The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to:

Security and privacy in Big Data management
Application of modern cryptography in cloud and social networks
Emerging threats in cloud-based services
Multi-tenancy related security/privacy issues
Secure virtualisation mechanisms
Vulnerabilities in cloud infrastructure
Vulnerabilities in MapReduce
Security modelling and threats in cloud computing
Security/privacy in hybrid cloud
Auditing in cloud computing
Access control in cloud computing
Secure Job deployment and scheduling
Secure resource allocation and indexing
User authentication in cloud services
Practical privacy and integrity mechanisms for data outsourcing
Foundations of cloud-centric threat models
Information hiding
Trust and policy management in cloud
Secure identity management mechanisms
Security/privacy/trust issues in SaaS/PaaS/IaaS
Business and security risk models
Cost and usability models related security issues in clouds
Security for emerging cloud programming models
Remote data integrity protection
Securing distributed data storage in the cloud
Data-centric security and data classification
Security and privacy in mobile cloud
Intrusion detection/prevention
Malware propagation in social networks
Information leakage via social networks
Social currency mechanisms – potential and risks
Privacy management in social networks – access controls, permissions
Identity theft in social networks
Collaborative detection of distributed network attacks
Peer-to-peer based security mechanisms
Trust and reputation in social networks
Socially inspired network security architectures
Socially aware network security protocols
Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.)
Configuring security protocol parameters based on social information
Privacy-preserving methods for data access and data mining
Domain Security
Privacy Requirements Engineering
Private Information Retrieval
Privacy and Security in Personal Health Records
Online Social Footprints
Secure Multi-party Computation
Privacy Mechanisms in Services
Pseudonymity and Anonymity Modelling
Software Security Engineering
Integrity Verification
Trust Development in Collaboration Teams
Usable Privacy Design
Privacy Aware Access Control Model
Multi-Faceted Privacy Preservation
Access Control and RBAC Policies

via PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks.

May 15

NPSec 2012 : 7th Workshop on Secure Network Protocols

When Oct 30, 2012 – Oct 30, 2012
Where Austin, TX, USA
Submission Deadline Jul 2, 2012
Notification Due Aug 31, 2012
Final Version Due Sep 20, 2012

NPSec 2012 : 7th Workshop on Secure Network Protocols.

CALL FOR PAPERS
NPSec 2012
7th Workshop on Secure Network Protocols
Austin, TX, USA, October 30, 2012

In conjunction with ICNP 2012
(Austin, TX, USA, October 30 – November 2, 2012)

http://www.cse.msu.edu/~feichen/NPSec2012/

=== Scope ===

The 7th workshop on Secure Network Protocols (NPSec 2012) is a one-day
event held in conjunction with the 20th IEEE International Conference on
Network Protocols (ICNP 2012). NPSec 2012 focuses on two general areas.
The first focus is on the development and analysis of secure or hardened
protocols for the operation (establishment and maintenance) of network
infrastructure, including such targets as secure multidomain, ad hoc,
sensor or overlay networks, or other related target areas. This can
include new protocols, enhancements to existing protocols, protocol
analysis, and new attacks on existing protocols. The second focus is on
employing such secure network protocols to create or enhance network
applications. Examples include collaborative firewalls, incentive
strategies for multiparty networks, and deployment strategies to enable
secure applications.

NPSec 2012 particularly welcomes new ideas on security in the context of
future Internet design, such as architectural considerations for future
Internet security and new primitives for supporting secure network
protocol and application design.

Topics of interest include but are not limited to:

* Security in future Internet architectures (role of security in
future architectures, integrating security in future protocols and
applications)
* Secure and/or resilient network protocols (e.g., internetworking/routing,
MANETs, LANs and WLANs, mobile/cellular data networks, P2P and other
overlay networks, federated trust systems, sensor networks)
* Vulnerabilities of existing protocols and applications (both
theoretical and case studies), including attacks
* Key distribution/management
* Intrusion detection and response
* Incentive systems for P2P systems and MANET routing
* Secure protocol configuration and deployment
* Challenges and security protocols for social networks

The submission website is now available, and papers may be submitted at
http://www.easychair.org/conferences/?conf=npsec2012. Formatting and
submission instructions are available on the NPSec website, at
http://www.cse.msu.edu/~feichen/NPSec2012.

=== Important dates ===

* Submission Deadline: July 2, 2012 (11:59pm PDT)
* Notification of acceptance: August 31, 2012
* Camera ready version: September 20, 2012
* Workshop: October 30, 2012

=== Organizers ===

Technical Program Committee Chairs:
* Ivan Martinovic, University of Oxford, UK
* Alex Liu, Michigan State University, USA

Publicity Chair:
* Kevin Butler, University of Oregon, USA

Web Chair:
* Fei Chen, VMware Inc., USA

Proceedings/Submission Chair:
* Matthias Wilhelm, TU Kaiserslautern, DE

NPSec Steering Committee:
* Sonia Fahmy, Purdue University, USA (chair)
* George Kesidis, Penn State University, USA
* Cristina Nita-Rotaru, Purdue University, USA
* Gene Tsudik, UC Irvine, USA

May 15

AISEC 2012 : 5th ACM Workshop on Artificial Intelligence and Security

When Oct 19, 2012 – Oct 19, 2012
Where Raleigh, NC USA
Submission Deadline Jul 16, 2012
Notification Due Aug 13, 2012
Final Version Due Aug 24, 2012

AISEC 2012 : 5th ACM Workshop on Artificial Intelligence and Security.

May 03

WISA 2012 : The 13th International Workshop on Information Security Applications

When Aug 16, 2012 – Aug 18, 2012
Where Jeju Island, Korea
Submission Deadline May 25, 2012
Notification Due Jun 13, 2012

WISA 2012 : The 13th International Workshop on Information Security Applications.

May 03

CIS 2012 : The 8th International Conference on Computational Intelligence and Security

When Nov 17, 2012 – Nov 18, 2012
Where Guangzhou, China
Submission Deadline Jun 15, 2012
Notification Due Aug 15, 2012

CIS 2012 : The 8th International Conference on Computational Intelligence and Security.

May 03

SPSN 2012 : Third Int. Workshop on Security and Privacy in Social Networks 2012

When Sep 3, 2012 – Sep 6, 2012
Where Amsterdam, The Netherlands
Submission Deadline May 26, 2012

SPSN 2012 : Third Int. Workshop on Security and Privacy in Social Networks 2012.