Tag: call for papers

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/

Jun 11

CALL FOR PAPERS: 2012 International Conference on Management of e-Commerce and e-Government

CALL FOR PAPERS
2012 International Conference on Management of e-Commerce and e-Government
Beijing, P. R. China, October 20-21, 2012
http://www.icmecg2012.org/

2012 International Conference on Management of e-Commerce and e-Government (ICMeCG 2012) provides a high quality platform for researchers, practitioners, and policy makers from all over the world to present their research results and development activities in e-Commerce and e-Government.It aims to bring together academics and practitioners to explore new frontiers of these areas – with emphasis on cross-disciplinary research, innovative initiatives, solutions and approaches to making the Internet a productive and efficient alternative for the new e-Society.
We welcome paper submissions from different aspects of business and from different disciplines. Conference proceedings will be listed in the Index to EI (Engineering index).
Conference Topics:
There are eight major tracks in this conference. Topics listed below are suggested but not limited to.
-Theory and Developments of E-commerce
-Information Security and Risk Management
-Web 2.0 and Social Media
-M-Commerce and Ubiquitous Computing
-Enterprise Information Systems
-Knowledge Management and Business Intelligence
-e-Government and e-governance
-Operations and Services Management
Important Dates
Submission deadline: June 24, 2012
Acceptance announcement: July 15, 2012
Conference date: October 20-21, 2012
Paper submission
Please submit your papers to ICMeCG 2012 in
https://www.easychair.org/conferences/?conf=icmecg2012
Submitted manuscripts in English will be limited to 6 pages.
The manuscripts must be formatted using the Conference Proceedings template. Formatting instructions can be found on the conference website.
Contact Us at:
MS Zhou (Conference Coordinator)
Tel:86-10-6228-8896
E-mail: icmecg2012@gmail.com for authors outside China,
icmecg2012@126.com for authors in China
Address: School of Information, Central University of Finance
and Economics, 39 South College Road, Haidian District,Beijing, P.R.China 100081

May 31

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

May 31

9th European PKI Workshop: Research and Applications (EuroPKI 2012)

CALL FOR PAPERS
9th European PKI Workshop: Research and Applications (EuroPKI 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

The 9th European PKI Workshop: Research and Applications (EuroPKI
2012) will be held in Pisa, Italy.  The workshop seeks submissions
from academia, industry, and government presenting novel research on
all aspects of Public Key Services, Applications, and
Infrastructures. Topics of interest include, but are not limited to:

– Anonymity
– Architecture and modeling
– Attribute-based access control
– Authentication
– Authorization and delegation
– Certificates management
– Cross certification
– Directories
– eCommerce/eGovernment
– Fault-tolerance and reliability
– Federations
– Group signatures
– ID-based schemes
– Identity management
– Implementations
– Interoperability
– Key management
– Legal issues
– Long-time archiving
– Mobile PKI
– Multi-signatures
– PKI in the Cloud
– Policies and regulations
– Privacy
– Privilege management
– Protocols
– Repositories
– Risk attacks
– Scalability and performance
– Security of PKI systems
– Standards
– Timestamping
– Trust management
– Trusted computing
– Ubiquitous scenarios
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that have
been published or that have been simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author names
or affiliations, or obvious citations). Submissions should be at most
16 pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at easychair.org. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop. As for all previous EuroPKI events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

ESORICS GENERAL CHAIR
Fabio Martinelli
CNR, Italy

PROGRAM CHAIRS
Sabrina De Capitani di Vimercati
Universita’ degli Studi di Milano, Italy

Chris Mitchell
Royal Holloway, University of London, UK

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Lejla Batina, Radboud University Nijmegen, The Netherlands
David Chadwick, University of Kent, UK
Sherman S. M. Chow, University of Waterloo, Canada
Paolo D’Arco, University of Salerno, Italy
Bao Feng, Institute for Infocomm Research, Singapore
Eduardo Fernandez-Medina, Universidad de Castilla la Mancha, Spain
Simone Fischer-Huebner, Karlstad University, Sweden
Sara Foresti, Universita’ degli Studi di Milano, Italy
Steven Furnell, Plymouth University, UK
Peter Gutmann, University of Auckland, New Zealand
Ravi Jhawar, Universita’ degli Studi di Milano, Italy
Sokratis Katsikas, University of Piraeus, Greece
Dogan Kesdogan, University of Siegen, Germany
Elisavet Konstantinou, University of the Aegean, Greece
Costas Lambrinoudakis, University of Piraeus, Greece
Herbert Leitold, A-SIT, Austria
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Catherine Meadows, NRL, USA
Stig Mjolsnes, NTNU, Norway
Yi Mu, University of Wollongong, Australia
Svetla Nikova, Katholieke Universiteit Leuven, Belgium
Rolf Oppliger, eSECURITY Technologies, Switzerland
Massimiliano Pala, Polytechnic Institute, USA
Stefano Paraboschi, Universita’ degli Studi di Bergamo, Italy
Andreas Pashalidis, K.U.Leuven, Belgium
Olivier Pereira, Universite Catholique de Louvain, Belgium
Gunther Pernul, Universitat Regensburg, Germany
Sasa Radomirovic, University of Luxembourg,  Luxembourg
Pierangela Samarati, Universita’ degli Studi di Milano, Italy
Sean Smith, Dartmouth College, USA

CONFERENCE WEB PAGE: http://europki2012.dti.unimi.it
PC CHAIRS EMAIL: europki2012@unimi.it

May 31

CFP: Social and Mobile Media for Governance « Digital Government & Society

The International Conference on e-Democracy and Open Government-Asia 2012 (CeDEM-Asia-2012) is a forum that aims to bring together academics, researchers, policy-makers, industry professionals, and civil society activists to discuss the role of social and mobile media in the future of governance in Asia and elsewhere. CeDEM-Asia-2012 will be held on November 14-15 in Singapore.

Call for Papers

New means of interacting with government and political institutions are causing significant shifts in political and social life. The emerging social and mobile media practices, including content generation, collaboration, and network organization, are changing our understanding of governance and politics. While the changes are already widely debated in mature, developed democracies, there is an even greater need to address them in the context of rapidly developing Asian societies. Following five successful conferences at the Danube University of Krems, CeDEM is looking to open a new forum in Asia for the exchange of ideas, networking, and collaboration on the topics of e-democracy and open government. This year, CeDEM is pleased to be working with the Asian Media Information and Communication Centre (AMIC) as its conference organizer and the Wee Kim Wee School of Communication and Information at Nanyang Technological University, Singapore as its main partner. CeDEM-Asia-2012 seeks to critically analyze present and future developments in field, with a special focus on the following themes:

  • Social media to engage citizens, smart & mobile democracy, sustainability of e-participation
  • Mobilization via social media, networks vs. traditional party-structure, online campaigning
  • Communication technologies and their use for governmental transformation
  • Open data initiatives, transparency, participation and collaboration in government
  • Cultures of governance, access and openness, crowdsourcing for government
  • Information provision, mobile devices, service delivery via new communication channels
  • Online communities, innovation, bottom-up vs. top-down
  • Network effects, power laws, long tail, social web

Conference Chairs

  • Nojin Kwak (University of Michigan, USA)
  • Peter Parycek (Danube University Krems, Austria)
  • Marko M. Skoric (Nanyang Technological University, Singapore)

Submission Guidelines

The submission portal will be open mid June 2012.

  • Research papers, case studies and policy papers should be 12 pages maximum and will be double-blind peer-reviewed.
  • Reflection papers should 6 pages maximum and will be selected by the chairs.
  • Workshop proposals should be no more than 2 pages and will be selected by the chairs.

Publications

The conference proceedings will be published (ISBN) and made available online under the Creative Commons License. A selection of best research papers and case studies of CeDEM-Asia-2012 will be published with the open access eJournal of eDemocracy and Open Government .

Important Dates

  • Submission deadline for full papers and workshop proposals: 15 July 2012
  • Notification of acceptance: 24 September 2012
  • Camera-ready paper submission: 15 October 2012
  • Conference dates & location: 14-15 November 2012, Singapore”

CFP: Social and Mobile Media for Governance « Digital Government & Society.

May 29

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

May 15

NPSec 2012 : 7th Workshop on Secure Network Protocols

When Oct 30, 2012 – Oct 30, 2012
Where Austin, TX, USA
Submission Deadline Jul 2, 2012
Notification Due Aug 31, 2012
Final Version Due Sep 20, 2012

NPSec 2012 : 7th Workshop on Secure Network Protocols.

CALL FOR PAPERS
NPSec 2012
7th Workshop on Secure Network Protocols
Austin, TX, USA, October 30, 2012

In conjunction with ICNP 2012
(Austin, TX, USA, October 30 – November 2, 2012)

http://www.cse.msu.edu/~feichen/NPSec2012/

=== Scope ===

The 7th workshop on Secure Network Protocols (NPSec 2012) is a one-day
event held in conjunction with the 20th IEEE International Conference on
Network Protocols (ICNP 2012). NPSec 2012 focuses on two general areas.
The first focus is on the development and analysis of secure or hardened
protocols for the operation (establishment and maintenance) of network
infrastructure, including such targets as secure multidomain, ad hoc,
sensor or overlay networks, or other related target areas. This can
include new protocols, enhancements to existing protocols, protocol
analysis, and new attacks on existing protocols. The second focus is on
employing such secure network protocols to create or enhance network
applications. Examples include collaborative firewalls, incentive
strategies for multiparty networks, and deployment strategies to enable
secure applications.

NPSec 2012 particularly welcomes new ideas on security in the context of
future Internet design, such as architectural considerations for future
Internet security and new primitives for supporting secure network
protocol and application design.

Topics of interest include but are not limited to:

* Security in future Internet architectures (role of security in
future architectures, integrating security in future protocols and
applications)
* Secure and/or resilient network protocols (e.g., internetworking/routing,
MANETs, LANs and WLANs, mobile/cellular data networks, P2P and other
overlay networks, federated trust systems, sensor networks)
* Vulnerabilities of existing protocols and applications (both
theoretical and case studies), including attacks
* Key distribution/management
* Intrusion detection and response
* Incentive systems for P2P systems and MANET routing
* Secure protocol configuration and deployment
* Challenges and security protocols for social networks

The submission website is now available, and papers may be submitted at
http://www.easychair.org/conferences/?conf=npsec2012. Formatting and
submission instructions are available on the NPSec website, at
http://www.cse.msu.edu/~feichen/NPSec2012.

=== Important dates ===

* Submission Deadline: July 2, 2012 (11:59pm PDT)
* Notification of acceptance: August 31, 2012
* Camera ready version: September 20, 2012
* Workshop: October 30, 2012

=== Organizers ===

Technical Program Committee Chairs:
* Ivan Martinovic, University of Oxford, UK
* Alex Liu, Michigan State University, USA

Publicity Chair:
* Kevin Butler, University of Oregon, USA

Web Chair:
* Fei Chen, VMware Inc., USA

Proceedings/Submission Chair:
* Matthias Wilhelm, TU Kaiserslautern, DE

NPSec Steering Committee:
* Sonia Fahmy, Purdue University, USA (chair)
* George Kesidis, Penn State University, USA
* Cristina Nita-Rotaru, Purdue University, USA
* Gene Tsudik, UC Irvine, USA

May 14

International Symposium on Engineering Secure Software and Systems (ESSoS)

Call For Papers

International Symposium on Engineering Secure Software and Systems (ESSoS)

http://distrinet.cs.kuleuven.be/events/essos/2013/

February 27 – March 1, 2013, Paris, France

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSE).

CONTEXT AND MOTIVATION

Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere.  To address this, high-quality security
building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software’s security properties.

GOAL AND SETUP

The goal of this symposium, which will be the fifth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security  engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program, and is also open to proposals for both  tutorials and workshops. In addition to academic papers, the symposium  encourages submission of high-quality, informative experience papers about  successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe  a promising direction, approach, or insight.

TOPICS

The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):

– scalable techniques for threat modeling and analysis of vulnerabilities
– specification and management of security requirements and policies
– security architecture and design for software and systems
– model checking for security
– specification formalisms for security artifacts
– verification techniques for security properties
– systematic support for security best practices
– security testing
– security assurance cases
– programming paradigms, models and DLS’s for security
– program rewriting techniques
– processes for the development of secure software and systems
– security-oriented software reconfiguration and evolution
– security measurement
– automated development
– trade-off between security and other non-functional requirements (in particular economic considerations)
– support for assurance, certification and accreditation
– empirical secure software engineering

SUBMISSION AND FORMAT

The proceedings of the symposium are published by Springer-Verlag (pending) in  the Lecture Notes in Computer Science Series (http://www.springer.com/lncs).

Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality.

For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) – May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details.

Idea papers (max 8 pages with bibliography) – May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results.

 

Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the “Idea” tag in the title.

Proposals for both tutorials and workshops are welcome. Further guidelines will appear on the website of the symposium.

IMPORTANT DATES

Paper submission:             September 30, 2012
Author notification:           November 22, 2012
Camera-ready:                  December 13, 2012

PROGRAM COMMITTEE

PC Co-Chairs

Jan Jürjens, TU Dortmund and Fraunhofer ISST
Ben Livshits, Microsoft Research

PC
Davide Balzarotti, EURECOM, France
Ruth Breu, University of Innsbruck, Austria
Cristian Cadar, Imperial College, UK
Julian Dolby, IBM Research, US
Matt Fredrikson, University of Wisconsin, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Thorsten Holz, U. Ruhr Bochum, Germany
Sergio Maffeis, Imperial College, UK
Heiko Mantel, TU Darmstadt, Germany
Anders Møller, Aarhus University, Denmark
Haris Mouratidis, University of East London, UK
Zachary Peterson, Naval Postgraduate School, US
Frank Piessens, KU Leuven, Belgium
Erik Poll, RU Nijmegen, NL
Alexander Pretschner, TU Munich, Germany
Wolfgang Reif, University of Augsburg, Germany
Jianying Zhou, Institute for Infocomm Research, Singapore
Mohammad Zulkernine, Queens University, Canada

May 14

Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012)

FDTC 2012: Call for Papers
==========================
www.fdtc-workshop.eu

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file
(http://conferenze.dei.polimi.it/FDTC12/cfp.pdf).

Motivation & Scope
==================

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and
countermeasures.

Important dates
===============

Extended submission deadline: May 18, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission
================

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:

http://fdtc.ws.dei.polimi.it

Submissions should conform to the instructions below.

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable
margins.

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee
=================

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu
========================================================

Steering committee
==================

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org

Apr 27

The 15th Information Security Conference – ISC’12

ISC’12 – Information Security Conference.

Call for Papers

The 15th Information Security Conference (ISC 2012)

Passau, Sept 19-21, 2012

 

http://web.sec.uni-passau.de/isc2012/

 

Paper Submission deadline: 26th of April 7th of May.

 

General Chair: Joachim Posegga

Program co-Chairs: Felix Freiling, Dieter Gollmann

 

The conference seeks submissions from academia, industry and government that present novel research on all theoretical and practical aspects of Information Security. Topics of interest are listed on http://web.sec.uni-passau.de/isc2012/topics.html

 

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions are limited to 16 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. All submissions should be appropriately anonymized (i.e., should not contain author names or affiliations, or obvious citations). Accepted papers will be published by Springer in the Lecture

Notes in Computer Science series.

 

Submissions must be made at http://www.easychair.org/conferences/?conf=isc20120. Please check the full CfP http://web.sec.uni-passau.de/isc2012/ISC2012_call_for_papers.pdf for guidelines, submissions not meeting these guidelines risk rejection without review. At least one author of each accepted paper is required to register with the conference and present the paper. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series.

 

Program Committee:

Magnus Almgren          Joonsang Baek           Alex Biryukov           Sonja Buchegger

Liqun Chen              Xiaofeng Chen           Chen-Mou Cheng          Sherman S. M. Chow

Jorge Cuellar           Vanesa Daza             Claudia Diaz            Roberto Di Pietro

Josep Domingo-Ferrer    Bao Feng                Eduardo B. Fernandez    Josep Ferrer

Sara Foresti            Stefanos Gritzalis      Thorsten Holz           Martin Johns

Angelos Keromytis       Igor Kotenko            Xuejia Lai              Zhenkai Liang

Peng Liu                Javier Lopez            Masahiro Mambo          Mark Manulis

Atsuko Miyaji           Jose Morales            Raphael C.-W. Phan      Frank Piessens

Christian W. Probst     Vincent Rijmen          Matt Robshaw            Kouichi Sakurai

Pierangela Samarati     Jörg Schwenk            Jan Seedorf             Miguel Soriano

Rainer Steinwandt       Willy Susilo            Tsuyoshi Takagi         Lingyu Wang

Susanne Wetzel          Duncan Wong             S.M. Yiu                Jianying Zhou

Alf Zugenmaier          Jeff Yan                Tuomas Aura

 

Publicity Chairs:       Isaac Agudo             Cheng-Kang Chu

 

Important Dates:

Paper Submission deadline:   26th of April 7th of May.

Notification of acceptance: 15th of June.

Proceedings version deadline: 6th of July.

ISC2012 conference:          19th of September – 21st of September.

 

Local Organizing Committee: Eric Rothstein, Marita Güngerich

 

Contact:  

Email : itsec-office AT uni-passau.de    

Phone: +49 851 509 3211