Tag: acm

Dec 22

2nd International Conference on Cloud Computing and Services Science

CALL FOR PAPERS

2nd International Conference on Cloud Computing and Services Science
http://closer.scitevents.org/


Porto, Portugal
18 – 21 April, 2012

In cooperation with ACM-SIGMIS, EuroCloud and EuroCloud Portugal
Technically Sponsored by SINTEF
Sponsored by INSTICC
INSTICC is Member of WfMC and OMG
Partner & Supporter: PenTest Magazine

IMPORTANT DATES:            
Position Paper Submission: January 31, 2012  
Authors Notification (position papers): February 24, 2012
Final Position Paper Submission and Registration: March 8, 2012 

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

CLOSER 2012 (2nd International Conference on Cloud Computing and Services Science – http://closer.scitevents.org/) is now welcoming the submission of position papers whose deadline is scheduled for next January 31.

A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. 
The acceptance of a position paper is restricted to the categories of "short paper" or "poster". Please check further details about position papers submission at the conference website (http://closer.scitevents.org/SubmissionGuidelines.aspx).

We would like to highlight the presence of the following keynote speakers: Dave Cliff (University of Bristol, United Kingdom), Helen Karatza (Aristotle University of Thessaloniki, Greece), Frederic Desprez (LIP/INRIA, France), Fernando Teixeira de Sousa (IBM, Portugal) and Fabrizio Gagliardi (Microsoft Research, Switzerland). Please check the website for further information (http://closer.scitevents.org/KeynoteSpeakers.aspx).

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and CD-ROM support. EHHC
A short list of presented papers will be selected so that revised and extended versions of  these papers will be published by Springer-Verlag in a SSRI Series book.
Additionally a short list of papers presented will be selected for publication of extended and revised versions in a special issue of Cluster Computing.
The proceedings will be submitted for indexation by major international indexers, including Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI). 
Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

There is still another opportunity of publication, in the following satellite events (with different deadlines, see the conference website for details): 
– Special Session on Security Governance and SLAs in Cloud Computing – CloudSecGov (http://closer.scitevents.org/CloudSecGov.aspx)
– International Workshop on Enterprise Cloud Computing: Solutions and Strategies – ECCSS (http://closer.scitevents.org/ECCSS.aspx)

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

Please check further details at the CLOSER 2012 conference web site (http://closer.scitevents.org/). There you will find detailed information about the conference structure and its main topic areas. This conference is co-located with WEBIST 2012 (8th International Conference on Web Information Systems and Technologies – http://www.webist.org/), CSEDU 2012 (4th International Conference on Computer Supported Education – http://www.csedu.org/) and SMARTGREENS 2012 (1st International Conference on Smart Grids and Green IT Systems – http://www.smartgreens.org). Registration to CLOSER will enable free attendance to any sessions of WEBIST, CSEDU and SMARTGREENS 2012 as a non-speaker.

Dec 21

WEBIST: 8th International Conference on Web Information Systems and Technologies

CALL FOR PAPERS

8th International Conference on Web Information Systems and Technologies 
WEBIST website: http://www.webist.org


Porto, Portugal
18-21 April, 2012

In cooperation with ACM-SIGMIS
Sponsored by INSTICC
INSTICC is Member of WfMC and OMG
Partner & Supporter: PenTest Magazine

IMPORTANT DATES:            
Position Paper Submission: January 31, 2012  
Authors Notification (position papers): February 27, 2012
Final Position Paper Submission and Registration: March 9, 2012 

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Dear Olivier Markowitch,

WEBIST 2012 (8th International Conference on Web Information Systems and Technologies – http://www.webist.org/) is now welcoming the submission of position papers whose deadline is scheduled for next January 31.

A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. 
The acceptance of a position paper is restricted to the categories of "short paper" or "poster". Please check further details about position papers submission at the conference website (http://www.webist.org/SubmissionGuidelines.aspx).

We would like to highlight the presence of the following keynote speakers: Dave Cliff (University of Bristol, United Kingdom), Fernando Sousa (IBM, Portugal) and David De Roure (University of Oxford, United Kingdom). Please check the website for further information (http://www.webist.org/KeynoteSpeakers.aspx).

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and CD-ROM support. BYOU
A short list of presented papers will be selected so that revised and extended versions of  these papers will be published by Springer-Verlag in a LNBIP Series book.
The proceedings will be submitted for indexation by major international indexers, including Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI). 
Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://www.webist.org/BestPaperAward.aspx).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

Please check further details at the WEBIST 2012 conference web site (http://www.webist.org). There you will find detailed information about the conference structure and its main topic areas. This conference is co-located with CSEDU 2012 (4th International Conference on Computer Supported Education – http://www.csedu.org/), CLOSER 2012 (2nd International Conference on Cloud Computing and Services Science – http://closer.scitevents.org/) and SMARTGREENS 2012 (1st International Conference on Smart Grids and Green IT Systems – http://www.smartgreens.org). Registration to WEBIST will enable free attendance to any sessions of CSEDU, CLOSER and SMARTGREENS 2012 as a non-speaker.

Dec 20

Third International Symposium on Architecting Critical Systems (ISARCS 2012)

 

C A L L     F O R     P A P E R S
 
Third International Symposium on Architecting Critical Systems (ISARCS 2012)
Bertinoro, Italy, June 26-28 2012 
 
— Federated with COMPARCH 2012 —
 
ISARCS is at the third edition and it is the perfect venue for exchanging ideas on both theory and practice for architecting critical systems. Architecting these systems has the big challenge to guarantee both the perceived and objective dependability and security even accepting service degradation. This requires trade-off among the various attributes of dependability and security that cannot be considered in isolation. We are interested in submissions from both industry and academia, including, but not limited to, the following main areas:
 
Architectural styles and patterns
Architectural support for evolution
Aspects-oriented development
Assurance-based development
Automotive and avionic systems
Component-based development
Critical infrastructures
E-commerce, e-business, and e-government
Embedded, mobile, and ubiquitous systems
Extensible ADLs
Fault injection
Industrial case studies, challenges, problems, and solutions
Inspection techniques
Integration of processes, tools, and analysis techniques
Integrators (wrappers) for dependability
Model checking
Model-driven development
Redundancy and diversity
Runtime checks
Self-healing
Survivability and error confinement
Testing and simulation
Theorem proving
Tolerating architectural mismatches
Type checking techniques 
 
Paper submissions: Accepted contributions will be published in the ACM Digital Library. Papers should not exceed 10 pages, must be written in English, and prepared according to the ACM style (http://www.acm.org/sigs/publications/proceedings-templates). Papers must not have been previously published or currently submitted elsewhere for publication. If accepted, the paper must be personally presented at ISARCS 2012 by one author. Submissions will be made through the EasyChair on-line submission system (see website).
 
IMPORTANT DATES
Abstract submission: February 14, 2012
Paper submission: February 21, 2012
Authors notification: April 9, 2012
Camera-Ready version: May 1, 2012
 
PC CHAIRS
Jorge Cuellar, SIEMENS CT, Germany
Javier Lopez, University of Malaga, Spain
 
GENERAL CHAIRS
Vincenzo Grassi, Università di Roma Tor Vergata, Italy
Raffaela Mirandola, Politecnico di Milano, Italy
 
PROGRAM COMMITTEE 
Rami Bahsoon (University of Birmingham, UK)
Marco Bernardo (University of Urbino, Italy)
Wing-Kwong Chan (City University of Hong Kong, Hong Kong)
Michel R.V. Chaudron (Leiden University, The Netherlands)
Erik de Vink (TUE, The Netherlands)

Massimo Felici (The University of Edinburgh, UK) 
Anthony Hall (Praxis Critical Systems, UK)
Bernhard Hämmerli (Acris GmbH/HSLU&HIG, Switzerland)
Valérie Issarny (INRIA, UR de Rocquencourt, France)
Christian D. Jensen (TUD, Denmark)
Tim Kelly (University of York, UK)
John C. Knight(University of Virginia, US)
Yves Le Traon (University of Luxembourg, Luxembourg)
Jorge Lopez (INDRA, Spain)
Volkmar Lotz (SAP, France)
Fabio Martinelli (CNR, Italy)
Fabio Massacci (University of Trento, Italy)
Martin Naedele (ABB, Switzerland)
Sebastian Nanz (ETH Zurich, Switzerland)
Bashar Nuseibeh (Open University, UK)
Flavio Oquendo (European University of Brittany, France)
Patrizio Pelliccione (University of L’Aquila, Italy)
Sampath Prahladavaradan (India Science Lab, India)
Ernesto Pimentel (University of Malaga, Spain)
Richard V. Robinson (Boeing, US)
Erich Rome (Fraunhofer IAIS, Germany)
Bill Roscoe (Oxford University, UK)
Roshana Roshandel (Seattle University, US)
Carsten Rudolph (Fraunhofer SIT, Germany)
Bernhard Rumpe (RWTH Aachen University, Germany)
John Rushby (SRI, US)
Riccardo Scandariato (KUL, Belgium)
Bran Selic (Malina Software, Canada)
Roberto Setola (Università Campus Bio-Medico, Italy)
Danny Weyns (Linnaeus University, Sweden)
Martin Wirsing (LMU, Germany)
Stephen Wolthusen (Royal Holloway, UK)

Nov 18

STOC 2013 – The 45tht ACM Symposium on Theory of Computing – conference.researchbib.com

Deadline: November 17, 2012 When: May 31, 2013 – June 02, 2013

via STOC 2013 – The 45tht ACM Symposium on Theory of Computing – conference.researchbib.com.

Nov 06

CF 2012 – 2012 ACM International Conference on Computing Frontiers – conference.researchbib.com

Deadline: January 09, 2012 When: May 15, 2012 – May 17, 2012

via CF 2012 – 2012 ACM International Conference on Computing Frontiers – conference.researchbib.com.

Oct 23

Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012

Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012

Website:

 

Deadline: Sep. 10, 2011 | Date: Feb. 07, 2012 – Feb 09, 2012

Venue/Country: San Antonio / U.S.A

Updated: 15:07:20 Oct. 19, 2011 GMT+9

Call For Papers – CFP

ACM SIGSAC announces the continuation of its recently launched annual ACM Conference on Data and Applications Security. The second conference will be held February 7-9 2012 in Hilton Palacio Del Rio, San Antonio, Texas. With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learnt to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference series provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

Data and the applications that manipulate data are the crucial assets in today's information age. With the increasing drive towards availability of data and services anytime anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and/or the mobile devices they carry with them and computing new information of value to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations and government agencies to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries and the dramatic failure of old-style approaches to information protection in government agencies in keeping information too secret to connect the dots. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain.

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the conference is to discuss novel exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics include (but not limited to):

http://www.codaspy.org/

Application layer security policies Secure information sharing

Authorization /Access Control for Applications Secure knowledge management

Authorization/Access Control for Databases Secure multiparty computations

Data dissemination controls Secure software development

Data forensics Securing data/apps on untrusted platforms

Enforcement layer security policies Securing the semantic web

Privacy preserving techniques Security and Privacy in GIS/Spatial Data

Private information retrieval Security and Privacy in Healthcare

Search on protected/encrypted data Security policies for databases

Secure auditing Social computing security and privacy

Secure collaboration Social networking security and privacy

Secure data provenance Trust metrics for application, data and user

Secure electronic commerce Web application security

via Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012.

Sep 30

ACM Conference on Computer and Communications Security

ACM CCS 2011.

Apr 30

ACM Conference on Computer and Communications Security

ACM CCS 2011.

Apr 23

ACM Computer and Communications Security Conference

Paper Submission Due: Friday, May 6

ACM CCS 2011