Tag Archive: architectures

Jan 31

The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

============== UBICOMM 2013 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

UBICOMM 2013, The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

September 29 – October 3, 2013 – Porto, Portugal

General page: http://www.iaria.org/conferences2013/UBICOMM13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPUBICOMM13.html

– regular papers

– short papers (work in progress)

– posters

Submission page: http://www.iaria.org/conferences2013/SubmitUBICOMM13.html

Submission deadline: March 30, 2013

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org

Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

UBICOMM 2013 Topics (topics and submission details: see CfP on the site)

Fundamentals

Semantics of ubiquity; Ubiquitous knowledge; Knowledge discovery mechanisms; Profiling ubiquitous environments; Ubiquitous technologies for education, learning, and training

Mobility

Ubiquitous computing; Wearable computing; Mobile computing; Nomadic computing; Mobile commerce; Mobile learning

Information Ubiquity

Ubiquitous information appliances; Information retrieval and filtering; Context awareness; Control of ubiquitous data; Data management and processing; Data replication, migration and dissemination; Ubiquitous computing and Internet of Things

Ubiquitous Multimedia Systems and Processing

Multimedia content recognition, indexing and search; Mobile graphics, games and entertainment; Ubiquitous multimedia applications and systems; Streaming mobile multimedia; Mobile media management; Multimedia ubiquitous platforms; Multimedia Indexing and Compression; Image and Signal Processing; Virtual reality in ubiquitous systems

Wireless Technologies

Bluetooth; 802.11.x; 802.15.x; ZigBee; WiMax

Web Services

Web 2.0; Semantic web; Web services; Ontology; Web Services evolution; Web Services applications

Ubiquitous networks

Ubiquitous networks; Network management; Network performance evaluation; Networks and technology convergence; Internet access in ubiquitous systems; Ubiquitous mesh, ad hoc and sensor networks; RFID; Reconfigurability and personalization of ubiquitous networks

Ubiquitous devices and operative systems

Design of devices for ubiquitous systems; Mobile devices; Wearable devices; Embedded systems; Operative systems for ubiquitous devices; Real-time operating systems and scheduling

Ubiquitous mobile services and protocols

Frameworks, architectures, and languages for ubiquitous services; Queries, transactions and workflows in mobile and ubiquitous Networks; Algorithms for ubiquitous systems; SLA/QoS in ubiquitous services; Ontology based services; Location-based services; Protocols and interaction mechanisms for ubiquitous services; Mobile services and service convergence; Service discovery mechanisms; Tracking in ubiquitous environments; Measurement, control, and management of ubiquitous services; Design and development of ubiquitous services; Wireless/mobile service delivery

Ubiquitous software and security

Ambient components; Agent technologies; Software for spontaneous interoperation; Dependability guarantees; Security; Key Management and Authentication; Trust; Privacy; Fault-tolerance; Multimedia Information Security

Collaborative ubiquitous systems

Cooperative networks for ubiquitous systems; Cooperative applications for ubiquitous networks; Handheld and wearable systems for interaction in collaborative groups and communities; Ad hoc collaboration in ubiquitous computing environments; Awareness of collaboration and of work environment; Inherently mobile collaborative work

Users, applications, and business models

Mobile user interfaces; Ubiquitous user-generated content (weblogs, wikis, etc.); Mobile and ubiquitous computing support for collaborative learning; User modeling and personalization; Context- and location-aware applications; Toolkits, testbeds, development environments; Tools and techniques for designing, implementing, & evaluating ubiquitous systems; Constructing, deploying and prototyping of ubiquitous applications; Evaluation of user models for ubiquitous environments; On-line analytical techniques; Human-computer interaction in ubiquitous computing environments; Ubiquitous e-Development (business, science, health, etc.); Case Studies; Emerging industrial/business/scientific ubiquitous scenarios; Ambient intelligence; Social issues and implications of ubiquitous system

Committee: http://www.iaria.org/conferences2013/ComUBICOMM13.html

Jan 31

The 2013 International Conference on Security and Management – SAM’13

CALL FOR PAPERS

Paper Submission Deadline: March 18, 2013

The 2013 International Conference on Security and Management
SAM’13

July 22-25, 2013, Las Vegas, USA

http://sam.udmercy.edu/sam13/

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of selected
papers (about 35%) will appear in journals and edited research books
(publishers include: Springer, Elsevier, BMC, and others). SAM’13
is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions. The conference will be held
July 22-25, 2013, Las Vegas, USA.

SCOPE: Topics of interest include, but are not limited to, the following:

O Network Security
-Security Algorithms
-Mobile Network Security
-Security in CDN (Contents Distribution Networks)
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Active Networks
-Security in Grid
-Web Monitoring
-Network Security Engineering
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security

O Cryptographic Technologies
-Security Protocols
-Key Management Techniques
-Cryptographic Technologies
-Applications of Block and Stream Ciphers
-Applications of Public Key Cryptology
-Message Authentication and Hash Functions
-Anonymity
-Digital Signature Schemes
-Secret Sharing
-Cryptanalysis

O Security Management
-Surveillance Technologies
-Security Policies
-Security for Protocol Management
-Location Management
-QoS Management
-Resource Management
-Channel Management
-Mobility Management
-Digital Contents Copyright Protection
-System Security Management
-Network Security Management
-Management in Network Equipment
-Storage Area Networks (SAN) Management
-Information Security Management
-Government Security Policy
-Web Penetration Testing
-Security Operations
-Vulnerabilities Management

O Security Education
-Computer Security Education
-Network Security Education
-Cyber Security Education
-Cyber Security Body of Knowledge
-Information Assurance Education

O Information Assurance
-Mission Assurance
-Risk Assessment and Risk Management
-Continuity of Operations and Business Impact Analysis
-Cyber Security Compliance
-Security Auditing
-Security-Savvy Software Development
-Disaster Recovery
-Business Continuity Analysis
-Access Control
-Secure Use of Software
-Secure Performance

O Biometrics and Forensics
-Novel Biometric Methods
-Forensics
-Biological Security Technologies
-Face Recognition Systems
-Signature Recognition Systems
-Cyber Forensics
-Forensic Analysis
-Biometric Technologies for Security
-Feature Extraction and Matching Algorithms

O Hardware Security
-Embedded Systems Security
-Cryptographic Processors and Co-Processors
-Security Architectures
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Hardware Tamper Resistance
-Smart Card Processors
-Secure Storage Devices

O Security Applications
-Security in E-Commerce and M-Commerce
-Secure OS
-Watermarking
-High-Tech Systems at Airports
-Emerging Technologies and Applications
-Cloud Computing Security
-Database Security
-Data Mining Security
-Cyber Security Automation

O Computer Security
-Firewall Systems
-Hacking Techniques and Related Issues
-Intrusion Detection System (IDS)
-Honeypot
-Virus Issues (Detection, Prevention …)
-Trusted Computing
-Alert Correlation
-Attack Graphs
-Incident Responding
-Malware Analysis
-Incident Responding

IMPORTANT DATES:

January 31, 2013: Workshop / Session Proposals
March 18, 2013: Submission of full papers (about 7 pages)
April 18, 2013: Notification of acceptance (+/- two days)
May 5, 2013: Final papers + Copyright + Registration
July 22-25, 2013: The 2013 International Conference on Security
and Management (SAM’13)

CO-SPONSORS:

Currently being prepared – The Academic Sponsors of the last offering of
FECS (2012) included research labs and centers affiliated with:
Minnesota Supercomputing Institute, USA; Argonne National Laboratory,
Illinois, USA; George Mason University, Virginia, USA; Harvard University,
Cambridge, Massachusetts, USA; Center for Cyber Defense, NCAT, North
Carolina, USA; Center for Advanced Studies in Identity Sciences (CASIS:
NC A&T, Carnegie Mellon, Clemson, UNC Wilmington), USA; Massachusetts
Institute of Technology (MIT), Cambridge, Massachusetts, USA; Texas A&M
University, USA; UMIT, Institute of Bioinformatics and Translational
Research, Austria; University of Iowa, USA; Russian Academy of Sciences,
Moscow, Russia; NDSU-CIIT Green Computing and Communications Laboratory,
USA; Medical Image HPC and Informatics Lab, Iowa, USA; and others.
Sponsors At-Large included (corporate, associations, organizations):
Intel Corporation; Super Micro Computer, Inc., California, USA; Altera
Corporation; The International Council on Medical and Care Compunetics;
International Society of Intelligent Biological Medicine; US Chapter of
World Academy of Science; High Performance Computing for Nanotechnology;
Luna Innovations; World Academy of Biomedical Sciences and Technologies;
Manx Telecom; Computer Science Research, Education, and Applications
Press; HoIP Telecom; Hodges Health; Leading Knowledge; OMG; Science
Publications and others.

SUBMISSION OF REGULAR PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/account/signin.cgi?conf=sam13
( OR http://world-comp.org ).
Submissions must be uploaded by March 18, 2013 and must be in either
MS doc or pdf formats (about 7 pages including all figures, tables,
and references – single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final/
Camera-Ready papers (if accepted) will be limited to 7
(two-column IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees.
Papers whose authors include a member of the conference program
committee will be evaluated using the double-blinded review process.
(Essay/philosophical papers will not be refereed but may be considered
for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (accessable from
INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN
International); P3P8PCTD70148 and others. Though, there is no guarantee
that the proceedings will also be included in SCI EI Compendex/Elsevier
indexings; in the past, the proceedings were included in these databases.
Therefore, we will also be sending the proceedings for indexing
procedures to SCI EI Compendex/Elsevier. The printed proceedings/books
will be available for distribution on site at the conference.

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the submission is limited to 2 pages. On the first page, the author
should state that “This paper is being submitted as a poster”. Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. please email your poster papers to the
poster co-chairs: Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( moradian@kth.se ).

PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:

Each conference is composed of a number of tracks. A track can be a
session, a workshop, or a symposium. A session will have at least 6
papers; a workshop at least 12 papers; and a symposium at least 18
papers. Track chairs will be responsible for all aspects of their
tracks, including: soliciting papers, reviewing, selecting, …
The names of track chairs will appear as Associate Editors in the
conference proceedings and on the cover of the printed books (and
indexed in science databases as such).

Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, the name of the conference the track is submitted for
consideration (ie, SAM), and a short description on how the track
will be advertised (in most cases, track proposers solicit papers from
colleagues and researchers whose work is known to the track proposer).
E-mail your track proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Sergey Morozov
( morozose@udmercy.edu ). We would like to receive the track proposals
as soon as possible but by no later than January 31, 2013.

MEMBERS OF STEERING COMMITTEE:

Currently being finalized. The members of the Steering Committee of The
2012 Congress that FECS was (and will be) part of included: Dr. Selim
Aissi, (formerly: Chief Strategist – Security, Intel Corporation, USA)
Senior Business Leader & Chief Architect, Visa Corporation, USA; Prof.
Babak Akhgar, PhD, FBCS, CITP, Professor of Informatics, Sheffield
Hallam University, Sheffield, UK; Prof. Hamid R. Arabnia, Professor of
Computer Science, Elected Fellow of ISIBM, Editor-in-Chief of Journal
of Supercomputing (Springer), University of Georgia, USA; Prof. Kevin
Daimi, Professor of Computer Science, Director of Computer Science and
Software Engineering Programs, Department of Mathematics, Computer
Science and Software Engineering, University of Detroit Mercy, Detroit,
Michigan, USA; Prof. Gerry Vernon Dozier, Professor of Computer Science,
Chair of Department of Computer Science and Director of Center for
Advanced Studies in Identity Sciences, Center for Cyber Defense, North
Carolina A&T State University, North Carolina, USA; Dr. Michael R.
Grimaila, Associate Professor, Air Force Institute of Technology,
Systems Engineering, Fellow of ISSA, CISM, CISSP, IAM/IEM, Editorial
Board of ISSA Journal, Air Force Center of Cyberspace Research, Advisor
to the Prince of Wales Fellows & Prince Edward Fellows at MIT and
Harvard Universities and PC member of NATO Cooperative Cyber Defence
Centre of Excellence (CCD COE); Prof. Kun Chang Lee, Professor of MIS
and WCU Professor of Creativity Science, Business School and Department
of Interaction Science, Sungkyunkwan University, Seoul, South Korea;
Prof., Dr., Dr.h. Victor Malyshkin, Head of Supercomputer Software
Department (SSD), Institute of Computational Mathematics and
Mathematical Geophysics, Russian Academy of Sciences, Russia;
Prof. George Markowsky, Professor and Chair of Computer Science,
Associate Director of School of Computing and Information Science,
Chair of International Advisory Board of IEEE IDAACS and Director 2013
Northeast Collegiate Cyber Defense Competition, Chair Bangor Foreign
Policy Forum, Cooperating Professor of Mathematics & Statistics
Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General of WABT, Vice- president of ICET, Visiting Professor,
University of Westminster, UK; Prof. James J. (Jong Hyuk) Park,
Professor of Computer Science and Engineering, Seoul National
University of Science and Technology (SeoulTech), Korea, President of
KITCS, Presidentof FTRA, Editor-in-Chiefs of HCIS, JoC and IJITCC
Journals; Ashu M. G. Solo (Publicity Chair), Fellow of British
Computer Society, Principal R&D Engineer, Maverick Technologies
America; Prof. Sang C. Suh, Head and Professor of Computer Science,
Vice President, of Society for Design and Process Science (SDPS),
Director of Intelligent Cyberspace Engineering Lab (ICEL), Texas A&M
University, Com., Texas, USA; Prof. Layne T. Watson, IEEE Fellow,
NIA Fellow, ISIBM Fellow, Fellow of The National Institute of
Aerospace, Virginia Polytechnic Institute & State University,
Virginia, USA

The 2013 Program Committee for SAM conference is currently being
compiled. Many who have already joined the committees are renowned
leaders, scholars, researchers, scientists and practitioners of the
highest ranks; many are directors of research labs., fellows of
various societies, heads/chairs of departments, program directors of
research funding agencies, as well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the
Program Committee should email daimikj@udmercy.edu
the following information for consideration/evaluation: Name,
affiliation and position, complete mailing address, email address,
a one-page biography that includes research expertise, and details of
two recent papers on security.

GENERAL INFORMATION:

SAM is an international conference that serves researchers, scholars,
professionals, students, and academicians who are looking to both foster
working relationships and gain access to the latest research results.
It is being held jointly (same location and dates) with a number of
other research conferences; namely, The 2013 World Congress in Computer
Science, Computer Engineering, and Applied Computing (WORLDCOMP). The
Congress is the largest annual gathering of researchers in computer
science, computer engineering and applied computing. We anticipate to
have 2,100 or more attendees from over 85 countries.

The 2013 Congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and former director of Division of Information and Intelligent Systems,
National Science Foundation, USA), Dr. Flavio Villanustre (Vice-
President, HPCC Systems), and many other distinguished speakers. To
get a feeling about the Congress’s atmosphere, see the 2012 delegates
photos available at: http://infinitydempsey.smugmug.com/WorldComp

An important mission of the Congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The Congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The Congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the Congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.

MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:

As of December 2012, papers published in the Congress proceedings have
received over 27,000 citations (includes about 2,000 self-citations).
Citation data obtained from http://academic.research.microsoft.com/ .

CONTACT:

Inquiries should be sent to: daimikj@udmercy.edu

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Aug 09

3rd International Conference on Cloud Computing and Services Science

CALL FOR PAPERS

3rd International Conference on Cloud Computing and Services Science
CLOSER website: http://closer.scitevents.org

May 8 – 10, 2013
Aachen, Germany

Co-organized by: RWTH
Sponsored by: INSTICC
INSTICC is Member of: WfMC and OMG
Technically sponsored by: SINTEF

IMPORTANT DATES:
Regular Paper Submission: November 15, 2012
Authors Notification (regular papers): January 17, 2013
Final Regular Paper Submission and Registration: February 7, 2013

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

We would like to draw your attention to the 3rd International Conference on Cloud Computing and Services Science (CLOSER 2013 – http://closer.scitevents.org) whose submission deadline is scheduled for November 15, 2012. We hope you can participate in this conference by submitting a paper reflecting your current research in any of the following areas:

– Cloud Computing Fundamentals
– Services Science Foundation for Cloud Computing
– Cloud Computing Platforms and Applications
– Cloud Computing Enabling Technology

The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), co-organized by the Aachen University (RWTH) and technically sponsored by SINTEF. INSTICC is Member of the Workflow Management Coalition (WfMC) and Object Management Group (OMG).

The 3rd International Conference on Cloud Computing and Services Science, CLOSER 2013, focuses on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current IT-driven collaborations. The conference is nevertheless not about the union of these two (already broad) fields, but about Cloud Computing where we are also interested in how Services Science can provide theory, methods and techniques to design, analyze, manage, market etc.

We would like to highlight the presence of the following keynote speakers:
– Gottfried Vossen, WWU Münster, Germany
– Ivona Brandic, Vienna UT, Austria

CLOSER is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 145 submissions, 19% were accepted as full papers. Additionally, 30% were presented as short papers and 14% as posters.

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. EHHC
A short list of presented papers will be selected for publication of extended and revised versions in a Special Issue of the Journal of Future Generation Computer Systems. Also a short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a SSRI Series book.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).

We also would like to highlight the possibility to submit to the following Special Session, whose deadline is scheduled for March 1, 2013:
– Special Session on Security Governance and SLAs in Cloud Computing (CloudSecGov)
http://closer.scitevents.org/CloudSecGov.aspx

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

CLOSER 2013 will be held in conjunction with WEBIST 2013 (International Conference on Web Information Systems and Technologies – www.webist.org/), CSEDU 2013 (International Conference on Computer Supported Education – http://www.csedu.org/) and SMARTGREENS 2013 (International Conference on Smart Grids and Green IT Systems – http://www.smartgreens.org/) in Aachen, Germany. Registration to CLOSER will enable free attendance to any sessions of WEBIST, CSEDU and SMARTGREENS conferences as a non-speaker.

Please check further details at the CLOSER conference website (http://closer.scitevents.org).
Should you have any question please don’t hesitate contacting me.

Kind regards,
Joao Teixeira
CLOSER Secretariat

Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 184
Fax: +44 203 014 8638
Email: closer.secretariat@scitevents.org

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

CONFERENCE CHAIR:
Matthias Jarke, RWTH Aachen, Germany

PROGRAM CO-CHAIRS:
Frederic Desprez, LIP / INRIA, France
Donald Ferguson, Dell, United States
Ethan Hadar, CA Technologies, Israel
Frank Leymann, University of Stuttgart, Germany

PROGRAM COMMITTEE:
Please check the program committee members at http://closer.scitevents.org/ProgramCommittee.aspx

CONFERENCE AREAS:

Area 1: Cloud Computing Fundamentals

– Cloud Computing Architecture
– Cloud Standards
– Cloud Application Portability
– Cloud Interoperability
– Cloud Delivery Models
– Cloud Deployment Models: Public/Private/Hybrid Cloud
– Cloud Risk, Challenges, and Governance
– Business Cloud vs. Software Cloud

Area 2: Services Science Foundation for Cloud Computing

– Semantic Web Technologies
– Web Services
– Service and Systems Design and QoS Network Security
– Service-Oriented Architecture
– Internet of Services
– Service Modeling and Specification
– Service Composition
– Service Discovery
– Service Monitoring and Control
– Business Services Realized by IT Services
– Service Innovation
– Service Operation
– Service Strategy
– Service Marketing and Management
– Information and Service Economy
– Human Beings in Service Systems
– Enterprise Architectures and Services

Area 3: Cloud Computing Platforms and Applications

– Vertical Specific Cloud Services
– Mobility
– Cloud Middleware Frameworks
– Cloud Application Architectures
– Cloud Application Scalability and Availability
– XaaS
– ITaaS
– COTS and Cloud
– Cloudsourcing
– Cloud Applications Performance and Monitoring
– Development Methods for Cloud Applications
– Economics (ROI, Costs, CAPEX/OPEX,.)
– Outsourced Production Environments
– Collective Intelligence/Crowd Computing
– Context-aware Computing and Peer to Peer Computing
– Big Data Cloud Services

Area 4: Cloud Computing Enabling Technology

– Troubleshooting and Best Practices
– Monitoring of Services, Quality of Service, Service Level Agreements
– Security and Cyber Security in the Cloud
– Performance Development and Management
– Cloud Ilities (Scalability, Availability,Reliability)
– Dynamic Capacity and Performance Management
– Cloud Optimization and Automation
– Virtualization Technologies
– Disaster Recovery
– Cloud Abstraction of Composite IT Systems
– Cloud IT Systems Reuse

 

Aug 09

Eleventh Smart Card Research and Advanced Application Conference – Cardis 2012

CARDIS 2012 – Call for Papers
—————————–
Eleventh Smart Card Research and Advanced Application Conference

Since 1994, CARDIS is the foremost international conference dedicated
to smart card research and applications. Smart cards and secure
elements are the basis for many secure systems and play a decisive
role in ID management. Established computer science areas like
hardware design, operating systems, system modeling, cryptography,
verification and networking got adapted to this fast growing
technology and investigate emerging issues resulting from it. Unlike
events devoted to commercial and application aspects of smart cards,
CARDIS conferences gather researchers and technologists who focus on
all aspects of the design, development, deployment, validation and
application of smart cards and secure elements in secure platforms or
systems.

The eleventh Smart Card Research and Advanced Application IFIP
Conference, organized by the Institute for Applied Information
Processing and Communications (IAIK), Graz University of Technology,
will be held in the Weitzer Hotel, Graz, Austria.
The program committee is seeking original papers on all aspects of
smart cards and secure elements. Submissions across a broad range of
the development phases are encouraged, from exploratory research and
proof-of-concept studies to practical applications and deployment of
smart cards and related technologies. Topics of interest include, but
are not limited to:
– Software for secure embedded systems (operating systems, virtual
machines, … )
– Hardware architectures for secure embedded systems
– Security of RFID systems and sensor nodes
– Security of mobile devices and applications
– Efficient and secure implementations of cryptographic algorithms
– Cryptographic protocols for embedded systems
– Physical attacks and countermeasures
– Secure applications for embedded systems
– Embedded systems networking
– Person representation in embedded systems
– Formal modeling and formal proofs
– Validation and certification of embedded systems and applications
– Identity, privacy and trust issues

Authors are invited to submit papers (PDF or PS format) with novel
contributions electronically using the submission form available on
the following web site:
http://www.easychair.org/conferences/?conf=cardis2012.
Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English and should be at
most 15 pages in total. Papers not meeting these guidelines risk
rejection without consideration. All submissions will be
blind-refereed.

Submission implies the willingness of at least one of the authors to
register and present the paper. The proceedings will be published in
the Springer Lecture Notes in Computer Science (LNCS) series. Accepted
papers should follow the LNCS default author instructions at
http://www.springer.de/comp/lncs/authors.html.

Important dates
—————

Submission of papers: August 20th, 2012, 23:59 GMT+02
Notification of acceptance: October 15, 2012
Camera-ready version of papers for pre-proceedings: November 7, 2012
Workshop date: November 28–30, 2012
Final version of papers: December 17, 2012

Program Committee
—————–
N. Asokan,  Nokia Research Center, Finland
Gildas Avoine,  UCL, Belgium
Chetali Boutheina,  Trusted Labs, France
Josep Domingo Ferrer,  Rovari i Virgili University, Catalonia
Hermann Drexler,  Giesecke & Devrient, Germany
Martin Feldhofer,  NXP, Austria
Berndt Gammel,  Infineon, Germany
Tim Güneysu,  Ruhr-University Bochum, Germany
Helena Handschuh,  Cryptography Research Inc., USA and KU Leuven, Belgium
Michael Hutter,  TU Graz, Austria
Marc Joye,  Technicolor, France
Ioannis Krontiris,  Göthe Universität Frankfurt, Germany
Jean-Louis Lanet,  University of Limoges, France
Konstantinos Markantonakis,  Royal Holloway, UK
Andrew Martin,  University of Oxford, UK
David Naccache,  ENS, France
Elisabeth Oswald,  University of Bristol, UK
Catuscia Palamidessi,  INRIA, France
Eric Peeters,  Texas Instruments, USA
Erik Poll,  RU Nijmegen, Netherlands
Bart Preneel,  KU Leuven, Belgium
Emmanuel Prouff,  ANSSI, France
Matthieu Rivain,  CryptoExperts, France
Pankaj Rohatgi,  Cryptography Research, USA
Ahmad-Reza Sadeghi,  TU Darmstadt, Germany
Jean-Pierre Seifert,  TU Berlin, Germany
Sergei Skorobogatov,  Cambridge University, UK
François-Xavier Standaert,  UCL, Belgium
Frederic Stumpf,  Fraunhofer AISEC, Germany
Marc Witteman,  Riscure, Netherlands

Organizational Committee
————————
Stefan Mangard
(Program Chair)
Infineon Technologies, Germany
Email: Stefan.Mangard AT infineon.com

Jörn-Marc Schmidt
(General Chair)
Graz University of Technology, Austria
Email: joern-marc.schmidt AT iaik.tugraz.at

Jean-Jacques Quisquater
(Publicity Chair)
Université catholique de Louvain, Belgium
Email: jjq AT uclouvain.be

Jul 02

CANS 2012 – The 11th International Conference on Cryptology and Network Security

CANS 2012 – The 11th International Conference on Cryptology and Network Security
Darmstadt, Germany, December 12-14, 2012
http://cans2012.cased.de

CALL FOR PAPERS

The International Conference on Cryptology and Network Security (CANS) is a
recognized annual conference, focusing on all aspects of cryptology and
network security, attracting cutting-edge results from world-renowned
scientists in the area.

Original research papers on all technical aspects of cryptology and network
security are solicited for submission to CANS 2012. Papers suggesting novel
paradigms, original directions, or non-traditional perspectives are
especially welcome.

Topics of Interest
====================

– Access Control
– Anonymity
– Authentication, Identification
– Biometrics
– Block and Stream Ciphers
– Cloud Security
– Cryptographic Algorithms, Protocols
– Denial of Service
– Embedded Platform Security
– Hash Functions
– (Future) Internet Security
– Key Management
– Network Security
– Peer-to-Peer Security
– Identity and Trust Management
– Public-key Cryptography
– Secure Hardware
– Security Modeling and Architectures
– Spyware Analysis and Detection
– Wireless and Mobile Security

Important Dates
=================
Submission deadline: July 15, 2012, 11:00 UTC
Notification of acceptance: September 8, 2012
Camera-ready deadline: September 15, 2012
Conference:  December 12-14, 2012

Committees
===========

General chair:
– Mark Manulis, University of Surrey, UK

Program chairs:
– Josef Pieprzyk, Macquarie University, Australia
– Ahmad-Reza Sadeghi, Technische Universität Darmstadt / Fraunhofer SIT,
Germany

Program committee:
– Michel Abdalla, ENS, France
– Gildas Avoine, Université catholique de Louvain, Belgium
– Feng Bao, Institute for Infocomm Research, Singapore
– Sébastien Canard, Orange Labs, France
– Sherman Chow, University of Waterloo, Canada
– Nicolas Courtois, University College London, UK
– Emiliano De Cristofaro, PARC Research, USA
– Reza Curtmola, New Jersey Institute of Technology, USA
– George Danezis, Microsoft Research Cambridge, United Kingdom
– Roberto Di Pietro, Università di Roma Tre, Italy
– Juan Garay, AT&T Labs Research, USA
– Philip Hawkes, Qualcomm, Australia
– Amir Herzberg, Bar-Ilan University, Israel
– Nick Hopper, University of Minnesota, USA
– Stanislaw Jarecki, University of California, Irvine, USA
– Xuxian Jiang, North Carolina State University, USA
– Seny Kamara, Microsoft Research, USA
– Angelos Keromytis, Columbia University, USA
– Svein Johan Knapskog, NTNU – Trondheim, Norway
– Benoit Libert, Université Catholique de Louvain, Belgium
– Atsuko Miyaji, JAIST, Japan
– Refik Molva, Eurecom, France
– Fabian Monrose, University of North Carolina, USA
– David Naccache, Ecole Normale Supérieure, France
– Michael Nährig, Eindhoven University of Technology, Netherlands
– Eiji Okamoto, University of Tsubuka, Japan
– Claudio Orlandi, Bar-Ilan University, Israel
– Jacques Patarin, Universite de Versailles, France
– Raphael C.-W. Phan, Loughborough University, UK
– Bart Preneel, Katholieke Universiteit Leuven, Belgium
– Vincent Rijmen, TU Graz, Austria
– Matt Robshaw, Orange Labs, France
– Rei Safavi-Naini, University of Calgary, Canada
– Thomas Schneider, TU Darmstadt, Germany
– Elaine Shi (Rungting), UC Berkeley, USA
– Francois-Xavier Standaert, University catholique de Louvain, Belgium
– Douglas Stebila, Queensland University of Technology, Australia
– Ron Steinfeld, Macquarie University, Australia
– Willy Susilo, University of Wollongong, Australia
– Markus Ullmann, Federal Office for Information Security (BSI), Germany
– Ersin Uzun, PARC Research, USA
– Frederik Vercauteren, Katholieke Universiteit Leuven, Belgium
– Huaxiong Wang, Nanyang Technological University, Singapore
– Michael J. Wiener, Irdeto, Canada
– Xinwen Zhang, Huawei Research Center, USA

Local arrangements committee:
– Stanislav Bulygin, Technische Universität Darmstadt, Germany

Steering committee:
– Yvo Desmedt (Chair), University College London, UK
– Matt Franklin, University of California, Davis, USA
– Juan A. Garay, AT&T Labs – Research, USA
– Yi Mu, University of Wollongong, Australia
– David Pointcheval, CNRS and ENS Paris, France
– Huaxiong Wang, Nanyang Technological University, Singapore

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/

May 31

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

May 29

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

May 15

PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks

When Nov 1, 2012 – Nov 3, 2012
Where Xiangtan, China
Submission Deadline Jun 25, 2012

The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to:

Security and privacy in Big Data management
Application of modern cryptography in cloud and social networks
Emerging threats in cloud-based services
Multi-tenancy related security/privacy issues
Secure virtualisation mechanisms
Vulnerabilities in cloud infrastructure
Vulnerabilities in MapReduce
Security modelling and threats in cloud computing
Security/privacy in hybrid cloud
Auditing in cloud computing
Access control in cloud computing
Secure Job deployment and scheduling
Secure resource allocation and indexing
User authentication in cloud services
Practical privacy and integrity mechanisms for data outsourcing
Foundations of cloud-centric threat models
Information hiding
Trust and policy management in cloud
Secure identity management mechanisms
Security/privacy/trust issues in SaaS/PaaS/IaaS
Business and security risk models
Cost and usability models related security issues in clouds
Security for emerging cloud programming models
Remote data integrity protection
Securing distributed data storage in the cloud
Data-centric security and data classification
Security and privacy in mobile cloud
Intrusion detection/prevention
Malware propagation in social networks
Information leakage via social networks
Social currency mechanisms – potential and risks
Privacy management in social networks – access controls, permissions
Identity theft in social networks
Collaborative detection of distributed network attacks
Peer-to-peer based security mechanisms
Trust and reputation in social networks
Socially inspired network security architectures
Socially aware network security protocols
Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.)
Configuring security protocol parameters based on social information
Privacy-preserving methods for data access and data mining
Domain Security
Privacy Requirements Engineering
Private Information Retrieval
Privacy and Security in Personal Health Records
Online Social Footprints
Secure Multi-party Computation
Privacy Mechanisms in Services
Pseudonymity and Anonymity Modelling
Software Security Engineering
Integrity Verification
Trust Development in Collaboration Teams
Usable Privacy Design
Privacy Aware Access Control Model
Multi-Faceted Privacy Preservation
Access Control and RBAC Policies

via PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks.

May 15

NPSec 2012 : 7th Workshop on Secure Network Protocols

When Oct 30, 2012 – Oct 30, 2012
Where Austin, TX, USA
Submission Deadline Jul 2, 2012
Notification Due Aug 31, 2012
Final Version Due Sep 20, 2012

NPSec 2012 : 7th Workshop on Secure Network Protocols.

CALL FOR PAPERS
NPSec 2012
7th Workshop on Secure Network Protocols
Austin, TX, USA, October 30, 2012

In conjunction with ICNP 2012
(Austin, TX, USA, October 30 – November 2, 2012)

http://www.cse.msu.edu/~feichen/NPSec2012/

=== Scope ===

The 7th workshop on Secure Network Protocols (NPSec 2012) is a one-day
event held in conjunction with the 20th IEEE International Conference on
Network Protocols (ICNP 2012). NPSec 2012 focuses on two general areas.
The first focus is on the development and analysis of secure or hardened
protocols for the operation (establishment and maintenance) of network
infrastructure, including such targets as secure multidomain, ad hoc,
sensor or overlay networks, or other related target areas. This can
include new protocols, enhancements to existing protocols, protocol
analysis, and new attacks on existing protocols. The second focus is on
employing such secure network protocols to create or enhance network
applications. Examples include collaborative firewalls, incentive
strategies for multiparty networks, and deployment strategies to enable
secure applications.

NPSec 2012 particularly welcomes new ideas on security in the context of
future Internet design, such as architectural considerations for future
Internet security and new primitives for supporting secure network
protocol and application design.

Topics of interest include but are not limited to:

* Security in future Internet architectures (role of security in
future architectures, integrating security in future protocols and
applications)
* Secure and/or resilient network protocols (e.g., internetworking/routing,
MANETs, LANs and WLANs, mobile/cellular data networks, P2P and other
overlay networks, federated trust systems, sensor networks)
* Vulnerabilities of existing protocols and applications (both
theoretical and case studies), including attacks
* Key distribution/management
* Intrusion detection and response
* Incentive systems for P2P systems and MANET routing
* Secure protocol configuration and deployment
* Challenges and security protocols for social networks

The submission website is now available, and papers may be submitted at
http://www.easychair.org/conferences/?conf=npsec2012. Formatting and
submission instructions are available on the NPSec website, at
http://www.cse.msu.edu/~feichen/NPSec2012.

=== Important dates ===

* Submission Deadline: July 2, 2012 (11:59pm PDT)
* Notification of acceptance: August 31, 2012
* Camera ready version: September 20, 2012
* Workshop: October 30, 2012

=== Organizers ===

Technical Program Committee Chairs:
* Ivan Martinovic, University of Oxford, UK
* Alex Liu, Michigan State University, USA

Publicity Chair:
* Kevin Butler, University of Oregon, USA

Web Chair:
* Fei Chen, VMware Inc., USA

Proceedings/Submission Chair:
* Matthias Wilhelm, TU Kaiserslautern, DE

NPSec Steering Committee:
* Sonia Fahmy, Purdue University, USA (chair)
* George Kesidis, Penn State University, USA
* Cristina Nita-Rotaru, Purdue University, USA
* Gene Tsudik, UC Irvine, USA

Older posts «