Tag: confidentiality

Oct 30

It’s Not a Game – It’s a Violation of Human Dignity – F-Secure Weblog : News from the Lab

The California Highway Patrol officer accused of stealing nude photos from a DUI suspect’s phone told investigators that he and his fellow officers have been trading such images for years

via It’s Not a Game – It’s a Violation of Human Dignity – F-Secure Weblog : News from the Lab.

Oct 27

Revealed: ISPs Already Violating Net Neutrality To Block Encryption And Make Everyone Less Safe Online | Techdirt

Revealed: ISPs Already Violating Net Neutrality To Block Encryption And Make Everyone Less Safe Online | Techdirt.

Oct 27

Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian

Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian.

May 29

Sauvegardes incrémentales avec Duplicity vers un Qnap TS-219 PII sous Debian Wheezy | Le blog de Carl Chenet

Do you need to make backups of your system and store them on unreliable and unsecure (CIA{A} of security: confidentiality, integrity) location?

Under GNU/Linux, Duplicity allows for local and remote incremental, encrypted and signed backups sent to file systems (ftp, …).

Sauvegardes incrémentales avec Duplicity vers un Qnap TS-219 PII sous Debian Wheezy | Le blog de Carl Chenet.

Feb 05

Security and Privacy in Healthcare IT Special track in The 26th International Symposium on Computer-Based Medical System

Dear all, the paper submission deadline of CBMS 2013 was extended
along with its special tracks. Therefore the new deadline for paper
submission of SPH2013 (a special track of the CBMS 2013) was also
extended to February 21st.

Security and Privacy in Healthcare IT Special track in
The 26th International Symposium on Computer-Based Medical System;
June 20-22, Porto, Portugal.

Paper submission February 21, 2013 at:
https://www.easychair.org/conferences/?conf=cbms2013

Notification of acceptance March 31, 2013

Camera-ready and registration April 24, 2013

Special track website: http://www.dcc.fc.up.pt/sph.cbms2013/
Email: sph.cbms2013@dcc.fc.up.pt
http://cbms2013.med.up.pt/

Call for papers:

We are currently witnessing a rapidly moving transition trend towards
electronic healthcare information systems. They have already proved
to be essential tools in order to improve the management and quality
of healthcare services. More recently, these systems have also
started to promote great results on the improvement of patients’
health by enabling the creation of much more flexible, efficient and
interoperable means by which practitioners and even patients can have
access and manage healthcare data. However very complex technical
challenges resulting from strict but necessary highly regulated
environments, threats to patient safety, privacy, and security must
be tackled and solved before we can safely have valuable and
sensitive patients’ data being securely managed and used in much more
flexible and potentially useful ways. Towards this end it is thus
imperative to develop innovative methods and policies that ensure the
secure acquisition and management of healthcare data, at the same
time promoting its interoperability, its’ sharing, and its integrity
and confidentiality in highly effective and secure ways.

This special track focuses on original unpublished research on
innovative methods, policies and concerns that can constitute the
right building blocks for a new generation of electronic healthcare
information systems that are at the same time more efficient,
empowering and secure. So, it is expected novel articles about
privacy, security, accountability and auditing for the healthcare
sector. This special track also pretends to encourage the research
dissemination to the stakeholders involved in healthcare information
technologies, promoting the discussion on issues, challenges and
solutions that are currently being developed all around the world.

Topics of interest include, but are not limited to:

* Access control and consent management models;
* Authentication and identification concepts;
* Security and privacy concerns in healthcare;
* Biometrics in healthcare;
* Health data protection;
* Policy and Legal aspects of regulating privacy of health data;
* Healthcare in cloud computing;
* Mobile devices and their use in healthcare information systems;
* Patient empowerment;
* Personal health records;
* Usability and human factors;

The most relevant articles will be invited to submit an extended
version on the Journal of Health, Policy and Technology published by
Elsevier.

Each contribution must be prepared following the IEEE two-column
format, and should not exceed the length of six Letter-sized pages;
the authors may use LaTeX or Microsoft Word templates when preparing
their drafts. The papers should be submitted electronically before
the paper submission deadline using the EasyChair online submission
system. Papers must be submitted in PDF format, with fonts embedded.

All submissions will be peer-reviewed by at least two reviewers. The
SPH2013 program committee will be responsible for the final decision
about acceptance of articles submitted. All accepted papers will be
included in the conference proceedings, and will be published by the
IEEE. At least one author must pay the registration fee for each
accepted paper. Please refer to the IEEE IPR guidelines concerning
copyright. Authors of accepted papers must include a completed IEEE
Copyright Form with the submission of their final camera-ready paper.

– – – – – – – – — Track Chairs —

* Manuel Eduardo Correia,
Faculty of Sciences of University of Porto (FCUP)

* Luis Filipe Antunes,
Faculty of Sciences of University of Porto (FCUP)

* Ana Margarida Ferreira,
SnT research centre of University of Luxembourg

* Cátia Santos Pereira,
Faculty of Medicine of University of Porto (FMUP)

* Alexandre Barbosa Augusto,
Faculty of Sciences of University of Porto (FCUP)

– – – – – – – – — Program Committee —

Alexander Hörbst,
The Health & Life Sciences University,
Austria.

Andreas Pashalidis,
Katholieke Universiteit Leuven,
Belgium.

Carla Simone,
Fac. di scienze mat. fis. e naturali, University of
Milano-Bicocca,
Italy.

Carlos Ribeiro,
Instituto Superior Técnico, Universidade Técnica de Lisboa,
Portugal.

David Chadwick,
School of Computing, University of Kent,
United Kingdom.

Elske Ammenwerth,
University for Health Sciences, Medical Informatics and
Technology,
Austria.

Francesco Pinciroli,
Dipartimento di Bioingegneria, Politecnico di Milano,
Italy.

Frédéric Cuppens,
Dépt. Réseaux et Services Multimédias, l’ENST-Bretagne,
France.

Gabriele Lenzini,
SnT research centre of University of Luxembourg,
Luxembourg.

Gansen Zhao,
Sun Yat-sen University,
China.

Gianluigi Me,
Computer Engineering Faculty, Università di Roma,
Italy.

Guillermo Navarro-Arribas,
Universitat Autònoma de Barcelona,
Spain.

Henrique Santos,
Universidade do Minho,
Portugal.

Isaac Agudo,
Computer Science Department, University of Malaga,
Spain.

Jonathan Fistein,
Member of the British Computer Society,
United Kingdom.

John Mantas
University of Athens,
Greece

Kambiz Ghazinour,
University of Ottawa,
Canada.

Lenka Lhotská,
Faculty of Electrical Eng., Czech Technical University,
Czech Republic.

Maria João Campos,
SPMS,
Portugal

Maria Hägglund,
Karolinska Institutet Health Informatics Centre,
Sweden.

Miria Koshy,
Warwick Business School,
United Kingdom.

Olivier Markowitch,
Computer Sciences Department of the Université
Libre de Bruxelles,
Belgium.

Panagiotis Bamidis,
Medical School, Aristotle University of Thessaloniki,
Greece.

Peter Pharow,
Fraunhofer IDMT,
Germany.

Pierangela Samarati,
Dpt. of Computer Science, Università degli Studi di Milano,
Italy.

Sergi Robles,
Universitat Autònoma de Barcelona,
Spain.

Simão Melo de Sousa,
Dep. de Informática, Universidade da Beira Interior,
Portugal.

Steven Furnell,
Faculty of Science and Technology, Plymouth University,
United Kingdom.

Vivian Vimarlund,
Dept. of Computer and Inf. Science, Linköping University,
Sweden.

Jan 05

Security and Privacy in Healthcare IT – 26th International Symposium on Computer-Based Medical System

Security and Privacy in Healthcare IT Special track in
The 26th International Symposium on Computer-Based Medical System;
June 20-22, Porto, Portugal.
Paper submission January 31, 2013
Notification of acceptance March 10, 2013
Camera-ready and registration April 10, 2013

http://www.dcc.fc.up.pt/sph.cbms2013/
sph.cbms2013@dcc.fc.up.pt

http://cbms2013.med.up.pt/
Call for papers:

We are currently witnessing a rapidly moving transition trend towards
electronic healthcare information systems. They have already proved
to be essential tools in order to improve the management and quality
of healthcare services. More recently, these systems have also
started to promote great results on the improvement of patients’
health by enabling the creation of much more flexible, efficient and
interoperable means by which practitioners and even patients can have
access and manage healthcare data. However very complex technical
challenges resulting from strict but necessary highly regulated
environments, threats to patient safety, privacy, and security must
be tackled and solved before we can safely have valuable and
sensitive patients’ data being securely managed and used in much more
flexible and potentially useful ways. Towards this end it is thus
imperative to develop innovative methods and policies that ensure the
secure acquisition and management of healthcare data, at the same
time promoting its interoperability, its’ sharing, and its integrity
and confidentiality in highly effective and secure ways.

This special track focuses on original unpublished research on
innovative methods, policies and concerns that can constitute the
right building blocks for a new generation of electronic healthcare
information systems that are at the same time more efficient,
empowering and secure. So, it is expected novel articles about
privacy, security, accountability and auditing for the healthcare
sector. This special track also pretends to encourage the research
dissemination to the stakeholders involved in healthcare information
technologies, promoting the discussion on issues, challenges and
solutions that are currently being developed all around the world.

Topics of interest include, but are not limited to:

* Access control and consent management models;
* Authentication and identification concepts;
* Security and privacy concerns in healthcare;
* Biometrics in healtcare;
* Health data protection;
* Policy and Legal aspects of regulating privacy of health data;
* Healthcare in cloud computing;
* Mobile devices and their use in healthcare information systems;
* Patient empowerment;
* Personal health records;
* Usability and human factors;

The most relevant articles will be invited to submit an extended
version on the Journal of Health, Policy and Technology published by
Elsevier.

Each contribution must be prepared following the IEEE two-column
format, and should not exceed the length of six Letter-sized pages;
the authors may use LaTeX or Microsoft Word templates when preparing
their drafts. The papers should be submitted electronically before
the paper submission deadline using the EasyChair online submission
system. Papers must be submitted in PDF format, with fonts embedded.

All submissions will be peer-reviewed by at least two reviewers. The
SPH2013 program committee will be responsible for the final decision
about acceptance of articles submitted. All accepted papers will be
included in the conference proceedings, and will be published by the
IEEE. At least one author must pay the registration fee for each
accepted paper. Please refer to the IEEE IPR guidelines concerning
copyright. Authors of accepted papers must include a completed IEEE
Copyright Form with the submission of their final camera-ready paper.

— Track Chairs —

* Manuel Eduardo Correia,
Faculty of Sciences of University of Porto (FCUP)

* Luis Filipe Antunes,
Faculty of Sciences of University of Porto (FCUP)

* Ana Margarida Ferreira,
SnT research centre of University of Luxembourg

* Cátia Santos Pereira,
Faculty of Medicine of University of Porto (FMUP)

* Alexandre Barbosa Augusto,
Faculty of Sciences of University of Porto (FCUP)
— Program Committee —

Alexander Hörbst,
The Health & Life Sciences University,
Austria.

Andreas Pashalidis,
Katholieke Universiteit Leuven,
Belgium.

Carla Simone,
Fac. di scienze mat. fis. e naturali, University of
Milano-Bicocca,
Italy.

Carlos Ribeiro,
Instituto Superior Técnico, Universidade Técnica de Lisboa,
Portugal.

David Chadwick,
School of Computing, University of Kent,
United Kingdom.

Elske Ammenwerth,
University for Health Sciences, Medical Informatics and
Technology,
Austria.

Francesco Pinciroli,
Dipartimento di Bioingegneria, Politecnico di Milano,
Italy.

Frédéric Cuppens,
Dépt. Réseaux et Services Multimédias, l’ENST-Bretagne,
France.

Gabriele Lenzini,
SnT research centre of University of Luxembourg,
Luxembourg.

Gansen Zhao,
Sun Yat-sen University,
China.

Gianluigi Me,
Computer Engineering Faculty, Università di Roma,
Italy.

Guillermo Navarro-Arribas,
Universitat Autònoma de Barcelona,
Spain.

Henrique Santos,
Universidade do Minho,
Portugal.

Isaac Agudo,
Computer Science Department, University of Malaga,
Spain.

Jonathan Fistein,
Member of the British Computer Society,
United Kingdom.

Kambiz Ghazinour,
University of Ottawa,
Canada.

Lenka Lhotská,
Faculty of Electrical Eng., Czech Technical University,
Czech Republic.

Maria João Campos,
SPMS,
Portugal

Maria Hägglund,
Karolinska Institutet Health Informatics Centre,
Sweden.

Miria Koshy,
Warwick Business School,
United Kingdom.

Olivier Markowitch,
Computer Sciences Department of the Université
Libre de Bruxelles,
Belgium.

Panagiotis Bamidis,
Medical School, Aristotle University of Thessaloniki,
Greece.

Peter Pharow,
Fraunhofer IDMT,
Germany.

Pierangela Samarati,
Dpt. of Computer Science, Università degli Studi di Milano,
Italy.

Sergi Robles,
Universitat Autònoma de Barcelona,
Spain.

Simão Melo de Sousa,
Dep. de Informática, Universidade da Beira Interior,
Portugal.

Steven Furnell,
Faculty of Science and Technology, Plymouth University,
United Kingdom.

Vivian Vimarlund,
Dept. of Computer and Inf. Science, Linköping University,
Sweden.

Aug 14

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration

 

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration

Link: http://www.igi-global.com/publish/call-for-papers/call-details/763
When N/A
Where N/A
Submission Deadline Aug 31, 2012
Notification Due Oct 15, 2012
Final Version Due Nov 30, 2012
Categories    system administration   security   legal issues

Call For Papers

Introduction
A large quantity of digital information is being created every moment by individual and corporate consumers of IT. This information is increasingly being recognized as a key economic resource and as one of the firm’s most important assets, just as much as capital infrastructure and people. Managing the digital information at the right time and place is essential for the survival of a company.

However, the complexity of information management is huge, particularly in large organizations. The data explosion continues to drive the demand for increased storage capacity and a parallel need to secure that information. Companies are facing increased security threats from both within the organization and externally. A company’s data is one of its most valuable assets an organization needs to implement a thorough security plan, taking all aspects of securing the data into account. Currently, all organizations have a system administrator, which is part of the organization’s policy. The administrator’s role is mainly developed in the dark to avoid data leaks, safeguard the integrity of databases, etc.; but when there is a failure, a breach of competition rules, a violation of confidentiality, the responsibility relies in the administrator.

Objective of the Book
The mission of the book is to discuss the main issues, challenges, opportunities and solutions related to the role and responsibility of the system’s administrator. Therefore, we intend to discuss the mission and challenges of a system’s administration in the 21st century, the importance of proper information security policy, the drivers and barriers to address a completely safe and reliable ICT system, and the organizational and legal implications of system administration. Furthermore, we expect to present some practical solutions that would make it possible to implement a reliable system administration policy.

Target Audience
This book is expected to be a support to disciplines (post-graduate studies) of Management, Enterprise Information Systems, Information Systems Management and Management Information Systems in general. It intends, also, to serve as guidance for top managers and information technologies (IT) professionals (system developers and IT specialists).

Recommended topics include, but are not limited to, the following:
Role and responsibilities of the system’s administrator
Importance of a proper information security policy
Drivers and barriers to address a completely safe and reliable ICT system
Critical success factors for its adoption by SME
Network security policies and best practices
Threats and countermeasures for information system security
Legal and regulatory frameworks
Organizational and legal implications
Compared studies of regulations
Surveys and case studies

Submission Procedure
Researchers and practitioners are invited to submit on or before August 30, 2012, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by October 15, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by November 30, 2012. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2013.

Important Dates
August 30, 2012: 1st Proposal Submission Deadline
October 15, 2012: Notification of Acceptance
November 30, 2012:Full Chapter Submission
January 30, 2013: Review Results Returned
March 30, 2013: Final Chapter Submission
May 15, 2013: Final Deadline

Inquiries and submissions can be forwarded electronically (Word document):

Prof. Dr. Fernando Almeida
ISPGaya, School of Technology and Science
Av. dos Descobrimentos, 333 • 4400-103 Santa Marinha – Vila Nova de Gaia
Tel.: +351 223 745 730/1 • Fax: +351 220 134 479
E-mail: portelalmd@gmail.com

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration.

Mar 28

Sixth International Conference “Mathematical Methods, Models, and Architectures for Computer Networks Security”

Sixth International Conference
“Mathematical Methods, Models, and Architectures
for Computer Networks Security”
(MMM-ACNS-2012) and
Second International Workshop
“Scientific Analysis and Policy Support for Cyber Security”
(SA&PS4CS-2012)

October 17-20, 2012, St. Petersburg, Russia

http://comsec.spb.ru/mmm-acns12/
http://www.comsec.spb.ru/saps4cs12/

Main sponsors
1. Office of Naval Research Global, USA
2. European Office of Aerospace Research and Development USAF, USA
3. Russian Foundation for Basic Research

Organizers
* St. Petersburg Institute for Informatics and Automation of the Russian
Academy of Sciences (SPIIRAS)
* Binghamton University (State University of New York)

Title and scope

The previous International Conferences “Mathematical Methods, Models
and Architectures for Computer Networks Security” (MMM-ACNS-2001
(http://space.iias.spb.su/mmm-acns01/), MMM-ACNS-2003
(http://space.iias.spb.su/mmm-acns03/), MMM-ACNS-2005
(http://space.iias.spb.su/mmm-acns05/), MMM-ACNS-2007
(http://www.comsec.spb.ru/mmm-acns07/ and MMM-ACNS-2010
(http://www.comsec.spb.ru/mmm-acns10/)) organized by St. Petersburg
Institute for Informatics and Automation, Binghamton University (SUNY)
and supported by the European Office of Aerospace Research and
Development USAF, Office of Naval Research Global, and Russian
Foundation for Basic Research were successful. These conferences
demonstrated the high interest of the international scientific community
to the theoretical and practical aspects of the computer network and
information security.
The goals of MMM-ACNS-2012 Conference
(http://www.comsec.spb.ru/mmm-acns12/) is to bring together leading
researchers from academia and governmental organizations as well as
practitioners to advance the states of the art and practice in the area
of computer networks and information security with a focus on novel
theoretical aspects of computer network security, facilitate personal
interactions and discussions on various aspects of information
technologies in conjunction with computer network and information
security problems arising in large-scale computer networks.

The MMM-ACNS-2012 Conference will be carried out together with the
Second International Workshop “Scientific Analysis and Policy Support
for Cyber Security” (SA&PS4CS-2012)
(http://www.comsec.spb.ru/saps4cs12/) dedicated to the methods of
scientific analysis and policy support for response to cyber intrusions
and attacks.

Topics of interest

Papers offering novel research contributions to the theoretical
aspects of the computer network and information security are solicited
for submission.
Papers may present theory, technique, and applications on topics
including but not restricted to:
* Adaptive security
* Anti-malware techniques: detection, analysis, prevention
* Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques
* Applied cryptography
* Authentication, authorization and access control
* Cloud Security
* Computer and network forensics
* Covert channels
* Critical infrastructure protection
* Data and application security
* Data mining, machine learning, and bio-inspired approaches for security
* Deception systems and honeypots
* Denial-of-service attacks and countermeasures
* Digital Rights Management
* eCommerce, eBusiness and eGovernment security
* Embedded system security
* Formal analysis of security properties
* Information warfare
* Internet and web security
* Intrusion prevention, detection, and response
* Language-based security
* Network survivability
* New ideas and paradigms for security
* Operating system security
* Reliability and dependability
* Risks metrics, risk analysis and risk management
* Security and privacy in pervasive and ubiquitous computing
* Security event and information management
* Security for large-scale systems and critical infrastructures
* Security in social networks
* Security of emerging technologies: sensor, wireless/mobile,
peer-to-peer and overlay networks
* Security of autonomous agents and multi-agent systems
* Security modeling and simulation
* Security policies
* Security protocols
* Security verification
* Security visualization
* Self-protecting and healing
* Smartphone security
* Software protection
* Trusted computing
* Trust and reputation management
* Vulnerability assessment

The main topics of the SA&PS4CS-2012 are detection, discrimination,
and attribution of various activities of malefactors and response to
cyber intrusions and attacks including national level information
operations as well as identifying emergent cyber technologies supporting
social and political activity management and trans-national distributed
computing management.

Objective of the MMM-ACNS-2012 Conference

The main objectives of the MMM-ACNS-2012 Conference are to discuss
state-of-the-art in mathematical methods and models for computer
networks and information security to promote a better understanding of
recent achievements and trends in the computer network security, as well
as making use of recent achievements in the area of advanced information
technologies for computer network and information assurance.
Security assurance of resident information and computer networks’
software is one of the important problems of the modern computer science
and information technology. The problem importance is confirmed by ever
increasing multiplicity and diversity of threads and vulnerabilities of
computer networks, permanently increasing significance and value of
information itself, and by potentially devastating consequences of
successful attacks on integrity, resource availability and information
confidentiality. Unauthorized access to computer network facilities and
network resources, especially in global networks participating in
real-time control operations, may be truly disastrous.
There are several reasons for the complexity of the problem under
study. The growing size of the network, its interconnectivity, large
number of users, increasing number of vulnerable targets within the
network (communication protocols, operating systems, servers,
applications, etc.), and the appearance of effective and previously
unknown types of attacks are among them.
An additional objective of the conference is to bring together
researchers and developers from academia, industry and governmental
organizations to exchange ideas in a broad range of topics among
researchers, security system developers and users from research and
commercial perspective.
Since the scope of the conference covers areas presenting specific
interest for basic and applied research organizations, information about
the conference will be distributed among the corresponding organizations
in Russia and worldwide. So far preliminary agreement to participate in
the conference is received from leading Russian Institutions doing basic
and applied research in Computer Science, Telecommunication and Computer
Security and from companies developing relevant industrial applications.

Objective of the SA&PS4CS-2012 Workshop

The Workshop is dedicated to the methods of scientific analysis and
policy support for response to cyber intrusions and attacks. The main
topics of the Workshop are detection, discrimination, and attribution of
various activities of malefactors and response to cyber intrusions and
attacks including national level information operations as well as
identifying emergent cyber technologies supporting social and political
activity management and trans-national distributed computing management.
The Workshop aims to bring together researchers and practitioners
involved in multiple disciplines concerning scientific analysis and
policy support for cyber security to exchange ideas and to learn the
latest developments in this important field.
This Workshop could promote internationally shared understanding of
the technically supportable indications and warnings for various types
of intrusions and attacks, from the isolated to the highly coordinated,
and from the forensic to strategic.
The Workshop is planned on the last day of MMM-ACNS-2012.

Submitting a paper

The MMM-ACNS-2012 welcomes original papers from academic, government,
and industry contributors on mathematical approaches and models,
state-of-the-art techniques, and novel applications in the above
proposed areas. All submissions will be subjected to a thorough review
by at least three reviewers.
Draft versions of original full papers up to 14 A4 pages (but not
less than 6 pages) in English prepared according to the instructions
provided by Springer (http://www.springer.com/comp/lncs/Authors.html),
including abstract (up to 300 words) and keywords (5 to 8), should be
submitted by
May 27, 2012
or sooner through the upload facilities at the MMM-ACNS-2012 web site
http://www.comsec.spb.ru/mmm-acns12/ .
Only electronic submissions in PDF format will be considered.
Authors must also indicate the conference track to which the paper is
submitted.
The Program Committee will make the final selection based on peer
reviewers’ evaluation.
The primary focus is on high-quality original unpublished research,
case studies and implementation experiences.
Notification of acceptance/rejection will be disseminated by June 29,
2012.
Camera-ready versions of accepted papers (see below) are due July 11,
2012.

The speakers of the SA&PS4CS-2012 Workshop will be personally
invited. We intend to invite for participation in the session a number
of worldwide recognized specialists in cyber security from the USA,
Europe, China, Russia and other countries.

Proceedings

Program Committee plans to publish the MMM-ACNS-2012 Proceedings in
Springer series “Lecture Notes in Computer Science” (LNCS). The final
decision will be made by Springer after finalizing the reviewing
process. Instructions for authors will be provided at the MMM-ACNS-2012
web site (http://www.comsec.spb.ru/mmm-acns12/).
Camera ready paper submission can be uploaded through the
MMM-ACNS-2012 web site at http://www.comsec.spb.ru/mmm-acns12/.

The Proceeding of the SA&PS4CS-2012 Workshop also will be prepared.

Conference Languages

The working language of MMM-ACNS-2012 is English.

The working languages of SA&PS4CS-2012 Workshop are English and
Russian. Presentations will be simultaneously translated.

Location of the Conference and Workshop

According to the preliminary agreement, the MMM-ACNS-2012 conference
and the SA&PS4CS-2012 Workshop will take place in the historical
building “Palace of Grand Prince Vladimir Romanov,” now “House of
Scientists,” located in the heart of St. Petersburg, address: 26,
Dvortsovaya emb., St.Petersburg, 191186, Russia.
This venue allows the conference organizers to arrange for the
conference itself, as well as for the associated events (informal
discussions, reception, breaks, etc.).

Contact us

Program Committee Co-Chairman
Prof. Igor Kotenko
Head of Laboratory of Computer Security Problems
St. Petersburg Institute for Informatics and Automation
of the Russian Academy of Sciences
39, 14th Liniya, St. Petersburg, 199178, Russia
Telephone: +7-(812)-328-2642
Fax: +7-(812)-328-4450
E-mail:  mmmacns[AT]comsec[DOT]spb[DOT]ru

Local contact person
Irina Podnozova
Phone: 7-(812)-328-4446   Fax:  +7(812)-328-06-85
E-mail: ipp[AT]mail[DOT]iias[DOT]spb[DOT]su

Jan 18

Cybersecurity help exists, if you know where to look – Techworld.com

Cybersecurity help exists, if you know where to lookThere are many international groups offer guidelines and technical security techniques for maintaining the confidentiality of data

via Cybersecurity help exists, if you know where to look – Techworld.com.

Mar 25

International Conference on Information Society (i-Society 2011)

 

International Conference on Information Society

(i-Society 2011)

June 27-29, 2011, London, UK

http://www.i-society.eu

 

The International Conference on Information Society (i-Society 2011) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society 2011 is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.

The mission of i-Society 2011 conference is to provide opportunities for collaboration of professionals and researchers to share existing and generate new knowledge in the field of information society. The conference encapsulates the concept of interdisciplinary science that studies the societal and technological dimensions of knowledge evolution in digital society. The i-Society bridges the gap between academia and industry with regards to research collaboration and awareness of current development in secure information management in the digital society.

The topics in i-Society 2011 include but are not confined to the following areas:

New Enabling Technologies

  • Internet technologies
  • Wireless applications
  • Mobile Applications
  • Multimedia Applications
  • Protocols and Standards
  • Ubiquitous Computing
  • Virtual Reality
  • Human Computer Interaction
  • Geographic information systems
  • e-Manufacturing

Intelligent Data Management

  • Intelligent Agents
  • Intelligent Systems
  • Intelligent Organisations
  • Content Development
  • Data Mining
  • e-Publishing and Digital Libraries
  • Information Search and Retrieval
  • Knowledge Management
  • e-Intelligence
  • Knowledge networks

Secure Technologies

  • Internet security
  • Web services and performance
  • Secure transactions
  • Cryptography
  • Payment systems
  • Secure Protocols
  • e-Privacy
  • e-Trust
  • e-Risk
  • Cyber law
  • Forensics
  • Information assurance
  • Mobile social networks
  • Peer-to-peer social networks
  • Sensor networks and social sensing

e-Learning

  • Collaborative Learning
  • Curriculum Content Design and Development
  • Delivery Systems and Environments
  • Educational Systems Design
  • e-Learning Organisational Issues
  • Evaluation and Assessment
  • Virtual Learning Environments and Issues
  • Web-based Learning Communities
  • e-Learning Tools
  • e-Education

e-Health

  • Data Security Issues
  • e-Health Policy and Practice
  • e-Healthcare Strategies and Provision
  • Medical Research Ethics
  • Patient Privacy and Confidentiality
  • e-Medicine

e-Art

  • Legal Issues
  • Patents
  • Enabling technologies and tools

e-Science

  • Natural sciences in digital society
  • Biometrics
  • Bioinformatics
  • Collaborative research

Industrial Developments

  • Trends in learning
  • Applied research
  • Cutting-edge technologies

Application of Choatic Computing

  • Chaos-Based Data Security

e-Society

  • Global Trends
  • Social Inclusion
  • Intellectual Property Rights
  • Social Infonomics
  • Computer-Mediated Communication
  • Social and Organisational Aspects
  • Globalisation and developmental IT
  • Social Software

e-Governance

  • Democracy and the Citizen
  • e-Administration
  • Policy Issues
  • Virtual Communities

e-Business

  • Digital Economies
  • Knowledge economy
  • eProcurement
  • National and International Economies
  • e-Business Ontologies and Models
  • Digital Goods and Services
  • e-Commerce Application Fields
  • e-Commerce Economics
  • e-Commerce Services
  • Electronic Service Delivery
  • e-Marketing
  • Online Auctions and Technologies
  • Virtual Organisations
  • Teleworking
  • Applied e-Business
  • Electronic Data Interchange (EDI)

Research in Progress

  • Ongoing research from undergraduates, graduates/postgraduates and professionals
  • Projects
  • Collaborative Research