Tag: elsevier

Jan 20

Secrypt 2015

CALL FOR PAPERS

International Conference on Security and Cryptography
SECRYPT website: http://www.secrypt.icete.org/

July 20 – 22, 2015
Colmar, Alsace, France

Sponsored by: INSTICC
INSTICC is Member of: WfMC, OMG and FIPA
Logistics Partner: SCITEVENTS

IMPORTANT DATES:
Regular Paper Submission: March 3, 2015
Authors Notification (regular papers): Mayl 18, 2015
Final Regular Paper Submission and Registration: May 26, 2015

You are cordially invited to submit a paper to the SECRYPT 2015 Conference, to be held in Colmar, Alsace, France. The deadline for paper submission is scheduled for March 3, 2015.

SECRYPT is an annual international conference covering research in information and communication security. The 12th International Conference on Security and Cryptography (SECRYPT 2015) will be held in Colmar, France on 20-22 July 2015.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.

Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

SECRYPT is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 139 submissions, 21% of which were orally presented and 22% presented as posters.

We would like to highlight the presence of the following keynote speakers:
– Anthony C. Boucouvalas, University of Peloponnese, Greece
– Eleni Karatza, Aristotle University of Thessaloniki, Greece
– Andrew Moore, University of Cambridge, United Kingdom

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book (final approval pending).

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://www.secrypt.icete.org/BestPaperAward.aspx).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

SECRYPT is part of ICETE, the 12th International Joint Conference on e-Business and Telecommunications. Registration to SECRYPT allows free access to all other ICETE conferences.

ICETE 2015 will be held in conjunction with ICINCO 2015, ICSOFT 2015, SIMULTECH 2015 and DATA 2015. Registration to ICETE allows free access to the ICINCO, ICSOFT, SIMULTECH and DATA conferences as a non-speaker.

ICETE CONFERENCE CO-CHAIRS
Mohammad S. Obaidat, Monmouth University, United States
Pascal Lorenz, University of Haute Alsace, France

PROGRAM CHAIR:
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM COMMITTEE:
Please check the program committee members at http://www.secrypt.icete.org/ProgramCommittee.aspx

CONFERENCE TOPICS:

– Access Control
– Applied Cryptography
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behavior Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Software Development Methodologies
– Security and Privacy for Big Data
– Security and privacy in Complex Systems
– Security and Privacy in Crowdsourcing
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Mobile Systems
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Smart Grids
– Security and Privacy in Social Networks
– Security and Privacy in the Cloud
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security in Distributed Systems
– Security Information Systems Architecture
– Security Management
– Security Metrics and Measurement
– Security Protocols
– Security requirements
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security

Feb 16

The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing

CALL FOR PAPERS

Paper Submission Deadline: March 18, 2013

The 2013 World Congress in Computer Science,
Computer Engineering, and Applied Computing
July 22-25, 2013, Las Vegas, USA
WORLDCOMP’13

http://www.world-academy-of-science.org/

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of selected
papers (about 35%) will appear in journals and edited research books
(publishers include: Springer, Elsevier, BMC, and others). See the
following links for a small subset of the publications based on this
Congress:
http://www.biomedcentral.com/bmcmedgenomics/supplements/6/S1
http://www.springer.com/life+sciences/bioinformatics/book/978-1-4419-7045-9
http://www.springer.com/life+sciences/bioinformatics/book/978-1-4419-5912-6
http://www.biomedcentral.com/1471-2164/9/S1/I1
http://www.biomedcentral.com/1752-0509/5?issue=S3
http://pubmedcentralcanada.ca/pmcc/articles/PMC3287490/
http://pubmedcentralcanada.ca/pmcc/articles/PMC2709251/
http://pubmedcentralcanada.ca/pmcc/articles/PMC2999338/

In addition to the above, we have arranged two new book series; one with
Elsevier publishers (Transactions on Computer Science and Applied Computing)
and another with Springer publishers (Transactions of Computational Science
and Computational Intelligence). After the conference, a significant number
of authors of accepted papers of our congress, will be given the
opportunity to submit the extended version of their papers for publication
in these books. The web sites for the two book series will be made
available after the logistics are finalized between our committee and the
publishers (both book series projects have been approved.) We anticipate
having between 10 to 20 books a year in each of these book series projects.
Each book in each series will be subject to Elsevier and Springer science
indexing products (which includes: Scopus, Ei village, SCI, …).

The Congress is composed of a number of tracks (joint-conferences,
tutorials, sessions, workshops, poster and panel discussions); all will
be held simultaneously, same location and dates: July 22-25, 2013. For
the complete list of joint conferences, see below.

IMPORTANT DATES:

March 18, 2013: Submission of full papers (about 7 pages)
April 18, 2013: Notification of acceptance (+/- two days)
May 5, 2013: Final papers + Copyright + Registration
July 22-25, 2013: The 2013 World Congress in Computer Science,
Computer Engineering, and Applied Computing
(including all affiliated conferences).

CO-SPONSORS:

Currently being prepared – The Academic Sponsors of the last offering of
the congress (2012) included research labs and centers affiliated with:
Minnesota Supercomputing Institute, USA; Argonne National Laboratory,
Illinois, USA; George Mason University, Virginia, USA; Harvard University,
Cambridge, Massachusetts, USA; Center for Cyber Defense, NCAT, North
Carolina, USA; Center for Advanced Studies in Identity Sciences (CASIS:
NC A&T, Carnegie Mellon, Clemson, UNC Wilmington), USA; Massachusetts
Institute of Technology (MIT), Cambridge, Massachusetts, USA; Texas A&M
University, USA; UMIT, Institute of Bioinformatics and Translational
Research, Austria; University of Iowa, USA; Russian Academy of Sciences,
Moscow, Russia; NDSU-CIIT Green Computing and Communications Laboratory,
USA; Medical Image HPC and Informatics Lab, Iowa, USA; and others.
Sponsors At-Large included (corporate, associations, organizations):
Intel Corporation; Super Micro Computer, Inc., California, USA; Altera
Corporation; The International Council on Medical and Care Compunetics;
International Society of Intelligent Biological Medicine; US Chapter of
World Academy of Science; High Performance Computing for Nanotechnology;
Luna Innovations; World Academy of Biomedical Sciences and Technologies;
Manx Telecom; Computer Science Research, Education, and Applications
Press; HoIP Telecom; Hodges Health; Leading Knowledge; OMG; Science
Publications and others.

SUBMISSION OF REGULAR PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at: http://world-comp.org . Submissions must
be uploaded by March 18, 2013 and must be in either MS doc or pdf
formats (about 7 pages including all figures, tables, and references –
single space, font size of 10 to 12). All reasonable typesetting formats
are acceptable (later, the authors of accepted papers will be asked to
follow a particular typesetting format to prepare their final papers for
publication.) Papers must not have been previously published or currently
submitted for publication elsewhere. The first page of the paper should
include: title of the paper, name, affiliation, postal address, and email
address for each author. The first page should also identify the name of
the Contact Author and a maximum of 5 topical keywords that would best
represent the content of the paper. The name of the conference that the
paper is being submitted for consideration must also be stated on the
first page of the paper as well as a 100 to 150-word abstract. The length
of the final/Camera-Ready papers (if accepted) will be limited to 7
(two-column IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (accessable from INIST,
Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, & STN International);
P3P8PCTD70148 and others. Though, there is no guarantee that the
proceedings will also be included in SCI EI Compendex/Elsevier indexings;
in the past, the proceedings were included in these databases. Therefore,
we will also be sending the proceedings for indexing procedures to SCI EI
Compendex/ Elsevier. The printed proceedings/books will be available for
distribution on site at the conference.

In addition to the above, we have arranged two new book series; one with
Elsevier publishers (Transactions on Computer Science and Applied Computing)
and another with Springer publishers (Transactions of Computational Science
and Computational Intelligence). After the conference, a significant number
of authors of accepted papers of our congress, will be given the
opportunity to submit the extended version of their papers for publication
in these books. We anticipate having between 10 to 20 books a year in each
of these book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes: Scopus,
Ei village, SCI, …).

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the submission is limited to 2 pages. On the first page, the author
should state that “This paper is being submitted as a poster”. Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so.

LIST OF CONFERENCES (alphabetical order based on conference acronym)

o BIOCOMP’13:
The 14th International Conference on Bioinformatics & Computational
Biology
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/biocomp13

o CDES’13:
The 13th International Conference on Computer Design
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/cdes13

o CGVR’13:
The 17th International Conference on Computer Graphics & Virtual
Reality
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/cgvr13

o CSC’13:
The 10th International Conference on Scientific Computing
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/csc13

o DMIN’13:
The 9th International Conference on Data Mining
http://www.dmin-2013.com/

o EEE’13:
The 12th International Conference on e-Learning, e-Business,
Enterprise Information Systems, and e-Government
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/eee13

o ERSA’13:
The 13th International Conference on Engineering of Reconfigurable
Systems and Algorithms
http://ersaconf.org/ersa-news/

o ESA’13:
The 11th International Conference on Embedded Systems and
Applications
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/esa13

o FCS’13:
The 9th International Conference on Foundations of Computer Science
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/fcs13

o FECS’13:
The 9th International Conference on Frontiers in Education: Computer
Science and Computer Engineering
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/fecs13

o GCA’13:
The 9th International Conference on Grid & Cloud Computing and
Applications
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/gca13

o GEM’13:
The 10th International Conference on Genetic & Evolutionary Methods
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/gem13

o ICAI’13:
The 15th International Conference on Artificial Intelligence
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/icai13

o ICOMP’13:
The 14th International Conference on Internet Computing and Big Data
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/icomp13

o ICWN’13:
The 12th International Conference on Wireless Networks
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/icwn13

o IKE’13:
The 12th International Conference on Information & Knowledge Engineering
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/ike13

o IPCV’13:
The 17th International Conference on Image Processing, Computer Vision,
& Pattern Recognition
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/ipcv13

o MSV’13:
The 10th International Conference on Modeling, Simulation and
Visualization Methods
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/msv13

o PDPTA’13:
The 19th International Conference on Parallel and Distributed
Processing Techniques and Applications
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/pdpta13

o SAM’13:
The 12th International Conference on Security and Management
http://sam.udmercy.edu/sam13/

o SERP’13:
The 11th International Conference on Software Engineering Research
and Practice
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/serp13

o SWWS’13:
The 12th International Conference on Semantic Web and Web Services
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/swws13

July 22-25, 2013, Las Vegas, USA.

All conferences listed above will be held simultaneously; ie, same location
and dates.

MEMBERS OF PROGRAM AND ORGANIZING COMMITTEES:

Currently being finalized. The members of the Steering Committee of
The 2012 congress included: Dr. Selim Aissi, (formerly: Chief
Strategist – Security, Intel Corporation, USA) Senior Business Leader &
Chief Architect, Visa Corporation, USA; Prof. Babak Akhgar, PhD, FBCS,
CITP, Professor of Informatics, Sheffield Hallam University, Sheffield,
UK; Prof. Hamid R. Arabnia, Professor of Computer Science, Elected
Fellow of ISIBM, Editor-in-Chief of Journal of Supercomputing (Springer),
University of Georgia, USA; Prof. Kevin Daimi, Professor of Computer
Science, Director of Computer Science and Software Engineering Programs,
Department of Mathematics, Computer Science and Software Engineering,
University of Detroit Mercy, Detroit, Michigan, USA; Prof. Gerry Vernon
Dozier, Professor of Computer Science, Chair of Department of Computer
Science and Director of Center for Advanced Studies in Identity Sciences,
Center for Cyber Defense, North Carolina A&T State University, NC, USA;
Dr. Michael R. Grimaila, Associate Professor, Air Force Institute of
Technology, Systems Engineering, Fellow of ISSA, CISM, CISSP, IAM/IEM,
Editorial Board of ISSA Journal, Air Force Center of Cyberspace Research,
Advisor to the Prince of Wales Fellows & Prince Edward Fellows at MIT and
Harvard Universities and PC member of NATO Cooperative Cyber Defence
Centre of Excellence (CCD COE); Prof. Kun Chang Lee, Professor of MIS and
WCU Professor of Creativity Science, Business School and Department of
Interaction Science, Sungkyunkwan University, Seoul, South Korea; Prof.,
Dr., Dr.h. Victor Malyshkin, Head of Supercomputer Software Department
(SSD), Institute of Computational Mathematics and Mathematical Geophysics,
Russian Academy of Sciences, Russia; Prof. George Markowsky, Professor and
Chair of Computer Science, Associate Director of School of Computing and
Information Science, Chair of International Advisory Board of IEEE IDAACS
and Director 2013 Northeast Collegiate Cyber Defense Competition, Chair
Bangor Foreign Policy Forum, Cooperating Professor of Mathematics &
Statistics Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General of WABT, Vice-president of ICET, Visiting Professor,
University of Westminster, UK; Prof. James J. (Jong Hyuk) Park, Professor
of Computer Science and Engineering, Seoul National University of Science
and Technology (SeoulTech), Korea, President of KITCS, Presidentof FTRA,
Editor-in-Chiefs of HCIS, JoC and IJITCC Journals; Ashu M. G. Solo
(Publicity Chair), Fellow of British Computer Society, Principal R&D
Engineer, Maverick Technologies America; Prof. Sang C. Suh, Head and
Professor of Computer Science, Vice President, of Society for Design and
Process Science (SDPS), Director of Intelligent Cyberspace Engineering
Lab (ICEL), Texas A&M University, Com., Texas, USA; Prof. Layne T. Watson,
IEEE Fellow, NIA Fellow, ISIBM Fellow, Fellow of The National Institute
of Aerospace, Virginia Polytechnic Institute & State University, Virginia,
USA.

The 2013 Program Committee for individual conferences are currently being
compiled. Many who have already joined the committees are renowned leaders,
scholars, researchers, scientists and practitioners of the highest ranks;
many are directors of research labs., fellows of various societies, heads/
chairs of departments, program directors of research funding agencies, as
well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the Program
Committee should email editor@world-comp.org the following information
for consideration/evaluation: Name, affiliation and position, complete
mailing address, email address, a one-page biography that includes
research expertise & the name of the conference(s) offering to help with.

GENERAL INFORMATION:

The Congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and former director of Division of Information and Intelligent Systems,
National Science Foundation, USA), Dr. Flavio Villanustre (Vice-
President, HPCC Systems), and many other distinguished speakers. To
get a feeling about the conferences’ atmosphere, see the 2012
delegates photos available at:
http://infinitydempsey.smugmug.com/WorldComp

An important mission of The Congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.

MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:

As of December 2012, papers published in the conference proceedings that
are currently being held as part of WORLDCOMP, have received over 27,000
citations (includes about 2,000 self-citations). Citation data obtained
from http://academic.research.microsoft.com/ .

CONTACT:

Inquiries should be sent to: sc@world-comp.org

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Feb 05

Security and Privacy in Healthcare IT Special track in The 26th International Symposium on Computer-Based Medical System

Dear all, the paper submission deadline of CBMS 2013 was extended
along with its special tracks. Therefore the new deadline for paper
submission of SPH2013 (a special track of the CBMS 2013) was also
extended to February 21st.

Security and Privacy in Healthcare IT Special track in
The 26th International Symposium on Computer-Based Medical System;
June 20-22, Porto, Portugal.

Paper submission February 21, 2013 at:
https://www.easychair.org/conferences/?conf=cbms2013

Notification of acceptance March 31, 2013

Camera-ready and registration April 24, 2013

Special track website: http://www.dcc.fc.up.pt/sph.cbms2013/
Email: sph.cbms2013@dcc.fc.up.pt
http://cbms2013.med.up.pt/

Call for papers:

We are currently witnessing a rapidly moving transition trend towards
electronic healthcare information systems. They have already proved
to be essential tools in order to improve the management and quality
of healthcare services. More recently, these systems have also
started to promote great results on the improvement of patients’
health by enabling the creation of much more flexible, efficient and
interoperable means by which practitioners and even patients can have
access and manage healthcare data. However very complex technical
challenges resulting from strict but necessary highly regulated
environments, threats to patient safety, privacy, and security must
be tackled and solved before we can safely have valuable and
sensitive patients’ data being securely managed and used in much more
flexible and potentially useful ways. Towards this end it is thus
imperative to develop innovative methods and policies that ensure the
secure acquisition and management of healthcare data, at the same
time promoting its interoperability, its’ sharing, and its integrity
and confidentiality in highly effective and secure ways.

This special track focuses on original unpublished research on
innovative methods, policies and concerns that can constitute the
right building blocks for a new generation of electronic healthcare
information systems that are at the same time more efficient,
empowering and secure. So, it is expected novel articles about
privacy, security, accountability and auditing for the healthcare
sector. This special track also pretends to encourage the research
dissemination to the stakeholders involved in healthcare information
technologies, promoting the discussion on issues, challenges and
solutions that are currently being developed all around the world.

Topics of interest include, but are not limited to:

* Access control and consent management models;
* Authentication and identification concepts;
* Security and privacy concerns in healthcare;
* Biometrics in healthcare;
* Health data protection;
* Policy and Legal aspects of regulating privacy of health data;
* Healthcare in cloud computing;
* Mobile devices and their use in healthcare information systems;
* Patient empowerment;
* Personal health records;
* Usability and human factors;

The most relevant articles will be invited to submit an extended
version on the Journal of Health, Policy and Technology published by
Elsevier.

Each contribution must be prepared following the IEEE two-column
format, and should not exceed the length of six Letter-sized pages;
the authors may use LaTeX or Microsoft Word templates when preparing
their drafts. The papers should be submitted electronically before
the paper submission deadline using the EasyChair online submission
system. Papers must be submitted in PDF format, with fonts embedded.

All submissions will be peer-reviewed by at least two reviewers. The
SPH2013 program committee will be responsible for the final decision
about acceptance of articles submitted. All accepted papers will be
included in the conference proceedings, and will be published by the
IEEE. At least one author must pay the registration fee for each
accepted paper. Please refer to the IEEE IPR guidelines concerning
copyright. Authors of accepted papers must include a completed IEEE
Copyright Form with the submission of their final camera-ready paper.

– – – – – – – – — Track Chairs —

* Manuel Eduardo Correia,
Faculty of Sciences of University of Porto (FCUP)

* Luis Filipe Antunes,
Faculty of Sciences of University of Porto (FCUP)

* Ana Margarida Ferreira,
SnT research centre of University of Luxembourg

* Cátia Santos Pereira,
Faculty of Medicine of University of Porto (FMUP)

* Alexandre Barbosa Augusto,
Faculty of Sciences of University of Porto (FCUP)

– – – – – – – – — Program Committee —

Alexander Hörbst,
The Health & Life Sciences University,
Austria.

Andreas Pashalidis,
Katholieke Universiteit Leuven,
Belgium.

Carla Simone,
Fac. di scienze mat. fis. e naturali, University of
Milano-Bicocca,
Italy.

Carlos Ribeiro,
Instituto Superior Técnico, Universidade Técnica de Lisboa,
Portugal.

David Chadwick,
School of Computing, University of Kent,
United Kingdom.

Elske Ammenwerth,
University for Health Sciences, Medical Informatics and
Technology,
Austria.

Francesco Pinciroli,
Dipartimento di Bioingegneria, Politecnico di Milano,
Italy.

Frédéric Cuppens,
Dépt. Réseaux et Services Multimédias, l’ENST-Bretagne,
France.

Gabriele Lenzini,
SnT research centre of University of Luxembourg,
Luxembourg.

Gansen Zhao,
Sun Yat-sen University,
China.

Gianluigi Me,
Computer Engineering Faculty, Università di Roma,
Italy.

Guillermo Navarro-Arribas,
Universitat Autònoma de Barcelona,
Spain.

Henrique Santos,
Universidade do Minho,
Portugal.

Isaac Agudo,
Computer Science Department, University of Malaga,
Spain.

Jonathan Fistein,
Member of the British Computer Society,
United Kingdom.

John Mantas
University of Athens,
Greece

Kambiz Ghazinour,
University of Ottawa,
Canada.

Lenka Lhotská,
Faculty of Electrical Eng., Czech Technical University,
Czech Republic.

Maria João Campos,
SPMS,
Portugal

Maria Hägglund,
Karolinska Institutet Health Informatics Centre,
Sweden.

Miria Koshy,
Warwick Business School,
United Kingdom.

Olivier Markowitch,
Computer Sciences Department of the Université
Libre de Bruxelles,
Belgium.

Panagiotis Bamidis,
Medical School, Aristotle University of Thessaloniki,
Greece.

Peter Pharow,
Fraunhofer IDMT,
Germany.

Pierangela Samarati,
Dpt. of Computer Science, Università degli Studi di Milano,
Italy.

Sergi Robles,
Universitat Autònoma de Barcelona,
Spain.

Simão Melo de Sousa,
Dep. de Informática, Universidade da Beira Interior,
Portugal.

Steven Furnell,
Faculty of Science and Technology, Plymouth University,
United Kingdom.

Vivian Vimarlund,
Dept. of Computer and Inf. Science, Linköping University,
Sweden.

Jan 31

The 2013 International Conference on Security and Management – SAM’13

CALL FOR PAPERS

Paper Submission Deadline: March 18, 2013

The 2013 International Conference on Security and Management
SAM’13

July 22-25, 2013, Las Vegas, USA

http://sam.udmercy.edu/sam13/

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of selected
papers (about 35%) will appear in journals and edited research books
(publishers include: Springer, Elsevier, BMC, and others). SAM’13
is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions. The conference will be held
July 22-25, 2013, Las Vegas, USA.

SCOPE: Topics of interest include, but are not limited to, the following:

O Network Security
-Security Algorithms
-Mobile Network Security
-Security in CDN (Contents Distribution Networks)
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Active Networks
-Security in Grid
-Web Monitoring
-Network Security Engineering
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security

O Cryptographic Technologies
-Security Protocols
-Key Management Techniques
-Cryptographic Technologies
-Applications of Block and Stream Ciphers
-Applications of Public Key Cryptology
-Message Authentication and Hash Functions
-Anonymity
-Digital Signature Schemes
-Secret Sharing
-Cryptanalysis

O Security Management
-Surveillance Technologies
-Security Policies
-Security for Protocol Management
-Location Management
-QoS Management
-Resource Management
-Channel Management
-Mobility Management
-Digital Contents Copyright Protection
-System Security Management
-Network Security Management
-Management in Network Equipment
-Storage Area Networks (SAN) Management
-Information Security Management
-Government Security Policy
-Web Penetration Testing
-Security Operations
-Vulnerabilities Management

O Security Education
-Computer Security Education
-Network Security Education
-Cyber Security Education
-Cyber Security Body of Knowledge
-Information Assurance Education

O Information Assurance
-Mission Assurance
-Risk Assessment and Risk Management
-Continuity of Operations and Business Impact Analysis
-Cyber Security Compliance
-Security Auditing
-Security-Savvy Software Development
-Disaster Recovery
-Business Continuity Analysis
-Access Control
-Secure Use of Software
-Secure Performance

O Biometrics and Forensics
-Novel Biometric Methods
-Forensics
-Biological Security Technologies
-Face Recognition Systems
-Signature Recognition Systems
-Cyber Forensics
-Forensic Analysis
-Biometric Technologies for Security
-Feature Extraction and Matching Algorithms

O Hardware Security
-Embedded Systems Security
-Cryptographic Processors and Co-Processors
-Security Architectures
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Hardware Tamper Resistance
-Smart Card Processors
-Secure Storage Devices

O Security Applications
-Security in E-Commerce and M-Commerce
-Secure OS
-Watermarking
-High-Tech Systems at Airports
-Emerging Technologies and Applications
-Cloud Computing Security
-Database Security
-Data Mining Security
-Cyber Security Automation

O Computer Security
-Firewall Systems
-Hacking Techniques and Related Issues
-Intrusion Detection System (IDS)
-Honeypot
-Virus Issues (Detection, Prevention …)
-Trusted Computing
-Alert Correlation
-Attack Graphs
-Incident Responding
-Malware Analysis
-Incident Responding

IMPORTANT DATES:

January 31, 2013: Workshop / Session Proposals
March 18, 2013: Submission of full papers (about 7 pages)
April 18, 2013: Notification of acceptance (+/- two days)
May 5, 2013: Final papers + Copyright + Registration
July 22-25, 2013: The 2013 International Conference on Security
and Management (SAM’13)

CO-SPONSORS:

Currently being prepared – The Academic Sponsors of the last offering of
FECS (2012) included research labs and centers affiliated with:
Minnesota Supercomputing Institute, USA; Argonne National Laboratory,
Illinois, USA; George Mason University, Virginia, USA; Harvard University,
Cambridge, Massachusetts, USA; Center for Cyber Defense, NCAT, North
Carolina, USA; Center for Advanced Studies in Identity Sciences (CASIS:
NC A&T, Carnegie Mellon, Clemson, UNC Wilmington), USA; Massachusetts
Institute of Technology (MIT), Cambridge, Massachusetts, USA; Texas A&M
University, USA; UMIT, Institute of Bioinformatics and Translational
Research, Austria; University of Iowa, USA; Russian Academy of Sciences,
Moscow, Russia; NDSU-CIIT Green Computing and Communications Laboratory,
USA; Medical Image HPC and Informatics Lab, Iowa, USA; and others.
Sponsors At-Large included (corporate, associations, organizations):
Intel Corporation; Super Micro Computer, Inc., California, USA; Altera
Corporation; The International Council on Medical and Care Compunetics;
International Society of Intelligent Biological Medicine; US Chapter of
World Academy of Science; High Performance Computing for Nanotechnology;
Luna Innovations; World Academy of Biomedical Sciences and Technologies;
Manx Telecom; Computer Science Research, Education, and Applications
Press; HoIP Telecom; Hodges Health; Leading Knowledge; OMG; Science
Publications and others.

SUBMISSION OF REGULAR PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/account/signin.cgi?conf=sam13
( OR http://world-comp.org ).
Submissions must be uploaded by March 18, 2013 and must be in either
MS doc or pdf formats (about 7 pages including all figures, tables,
and references – single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final/
Camera-Ready papers (if accepted) will be limited to 7
(two-column IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees.
Papers whose authors include a member of the conference program
committee will be evaluated using the double-blinded review process.
(Essay/philosophical papers will not be refereed but may be considered
for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (accessable from
INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN
International); P3P8PCTD70148 and others. Though, there is no guarantee
that the proceedings will also be included in SCI EI Compendex/Elsevier
indexings; in the past, the proceedings were included in these databases.
Therefore, we will also be sending the proceedings for indexing
procedures to SCI EI Compendex/Elsevier. The printed proceedings/books
will be available for distribution on site at the conference.

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the submission is limited to 2 pages. On the first page, the author
should state that “This paper is being submitted as a poster”. Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. please email your poster papers to the
poster co-chairs: Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( moradian@kth.se ).

PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:

Each conference is composed of a number of tracks. A track can be a
session, a workshop, or a symposium. A session will have at least 6
papers; a workshop at least 12 papers; and a symposium at least 18
papers. Track chairs will be responsible for all aspects of their
tracks, including: soliciting papers, reviewing, selecting, …
The names of track chairs will appear as Associate Editors in the
conference proceedings and on the cover of the printed books (and
indexed in science databases as such).

Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, the name of the conference the track is submitted for
consideration (ie, SAM), and a short description on how the track
will be advertised (in most cases, track proposers solicit papers from
colleagues and researchers whose work is known to the track proposer).
E-mail your track proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Sergey Morozov
( morozose@udmercy.edu ). We would like to receive the track proposals
as soon as possible but by no later than January 31, 2013.

MEMBERS OF STEERING COMMITTEE:

Currently being finalized. The members of the Steering Committee of The
2012 Congress that FECS was (and will be) part of included: Dr. Selim
Aissi, (formerly: Chief Strategist – Security, Intel Corporation, USA)
Senior Business Leader & Chief Architect, Visa Corporation, USA; Prof.
Babak Akhgar, PhD, FBCS, CITP, Professor of Informatics, Sheffield
Hallam University, Sheffield, UK; Prof. Hamid R. Arabnia, Professor of
Computer Science, Elected Fellow of ISIBM, Editor-in-Chief of Journal
of Supercomputing (Springer), University of Georgia, USA; Prof. Kevin
Daimi, Professor of Computer Science, Director of Computer Science and
Software Engineering Programs, Department of Mathematics, Computer
Science and Software Engineering, University of Detroit Mercy, Detroit,
Michigan, USA; Prof. Gerry Vernon Dozier, Professor of Computer Science,
Chair of Department of Computer Science and Director of Center for
Advanced Studies in Identity Sciences, Center for Cyber Defense, North
Carolina A&T State University, North Carolina, USA; Dr. Michael R.
Grimaila, Associate Professor, Air Force Institute of Technology,
Systems Engineering, Fellow of ISSA, CISM, CISSP, IAM/IEM, Editorial
Board of ISSA Journal, Air Force Center of Cyberspace Research, Advisor
to the Prince of Wales Fellows & Prince Edward Fellows at MIT and
Harvard Universities and PC member of NATO Cooperative Cyber Defence
Centre of Excellence (CCD COE); Prof. Kun Chang Lee, Professor of MIS
and WCU Professor of Creativity Science, Business School and Department
of Interaction Science, Sungkyunkwan University, Seoul, South Korea;
Prof., Dr., Dr.h. Victor Malyshkin, Head of Supercomputer Software
Department (SSD), Institute of Computational Mathematics and
Mathematical Geophysics, Russian Academy of Sciences, Russia;
Prof. George Markowsky, Professor and Chair of Computer Science,
Associate Director of School of Computing and Information Science,
Chair of International Advisory Board of IEEE IDAACS and Director 2013
Northeast Collegiate Cyber Defense Competition, Chair Bangor Foreign
Policy Forum, Cooperating Professor of Mathematics & Statistics
Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General of WABT, Vice- president of ICET, Visiting Professor,
University of Westminster, UK; Prof. James J. (Jong Hyuk) Park,
Professor of Computer Science and Engineering, Seoul National
University of Science and Technology (SeoulTech), Korea, President of
KITCS, Presidentof FTRA, Editor-in-Chiefs of HCIS, JoC and IJITCC
Journals; Ashu M. G. Solo (Publicity Chair), Fellow of British
Computer Society, Principal R&D Engineer, Maverick Technologies
America; Prof. Sang C. Suh, Head and Professor of Computer Science,
Vice President, of Society for Design and Process Science (SDPS),
Director of Intelligent Cyberspace Engineering Lab (ICEL), Texas A&M
University, Com., Texas, USA; Prof. Layne T. Watson, IEEE Fellow,
NIA Fellow, ISIBM Fellow, Fellow of The National Institute of
Aerospace, Virginia Polytechnic Institute & State University,
Virginia, USA

The 2013 Program Committee for SAM conference is currently being
compiled. Many who have already joined the committees are renowned
leaders, scholars, researchers, scientists and practitioners of the
highest ranks; many are directors of research labs., fellows of
various societies, heads/chairs of departments, program directors of
research funding agencies, as well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the
Program Committee should email daimikj@udmercy.edu
the following information for consideration/evaluation: Name,
affiliation and position, complete mailing address, email address,
a one-page biography that includes research expertise, and details of
two recent papers on security.

GENERAL INFORMATION:

SAM is an international conference that serves researchers, scholars,
professionals, students, and academicians who are looking to both foster
working relationships and gain access to the latest research results.
It is being held jointly (same location and dates) with a number of
other research conferences; namely, The 2013 World Congress in Computer
Science, Computer Engineering, and Applied Computing (WORLDCOMP). The
Congress is the largest annual gathering of researchers in computer
science, computer engineering and applied computing. We anticipate to
have 2,100 or more attendees from over 85 countries.

The 2013 Congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and former director of Division of Information and Intelligent Systems,
National Science Foundation, USA), Dr. Flavio Villanustre (Vice-
President, HPCC Systems), and many other distinguished speakers. To
get a feeling about the Congress’s atmosphere, see the 2012 delegates
photos available at: http://infinitydempsey.smugmug.com/WorldComp

An important mission of the Congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The Congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The Congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the Congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.

MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:

As of December 2012, papers published in the Congress proceedings have
received over 27,000 citations (includes about 2,000 self-citations).
Citation data obtained from http://academic.research.microsoft.com/ .

CONTACT:

Inquiries should be sent to: daimikj@udmercy.edu

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Jan 30

10th International Conference on Security and Cryptography (SECRYPT 2013)

10th International Conference on Security and Cryptography (SECRYPT 2013)
Reykjavik, Iceland, July 29-31, 2013
http://secrypt.icete.org

In Cooperation with: ACM SIGSAC
Co-organized by: RU – Reykjavik University
Sponsored by: INSTICC
INSTICC is Member of: WfMC

************************************************************************

Dear ,

SECRYPT is an annual international conference covering research in information and communication security. The 10th International Conference on Security and Cryptography (SECRYPT 2013) will be held in Reykjavik, Iceland. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. The conference topics include, but are not limited to:

TOPICS OF INTEREST
. Access Control
. Applied Cryptography
. Biometrics Security and Privacy
. Critical Infrastructure Protection
. Data Integrity
. Data Protection
. Database Security and Privacy
. Digital Forensics
. Digital Rights Management
. Ethical and Legal Implications of Security and Privacy
. Formal Methods for Security
. Human Factors and Human Behavior Recognition Techniques
. Identification, Authentication and Non-repudiation
. Identity Management
. Information Hiding
. Information Systems Auditing
. Insider Threats and Countermeasures
. Intellectual Property Protection
. Intrusion Detection & Prevention
. Management of Computing Security
. Network Security
. Organizational Security Policies
. Peer-to-Peer Security
. Personal Data Protection for Information Systems
. Privacy
. Privacy Enhancing Technologies
. Reliability and Dependability
. Risk Assessment, etc

SECRYPT is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 170 submissions, 12% were accepted as full papers. Additionally, 14% were presented as short papers and 11% as posters.

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations).
Submissions are to be made through the submission web site at www.insticc.org/Primoris.

Two categories of papers can be submitted:
– Full Paper: A regular paper presents a work where the research is completed or almost finished.
– Position Paper: A position paper presents results that are preliminary or that simply require few pages to describe.
A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics.

We would like to highlight the presence of the following keynote speakers:
– Laurence T. Yang, St Francis Xavier University, Canada
– Pascal Lorenz, University of Haute Alsace, France

Submitted papers must be formatted according to the SECRYPT format (apart for blinding authors), which is described at www.secrypt.icete.org/GuidelinesTemplates.aspx.
Submitted papers will be subject to a double-blind review process.

All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (www.scitepress.org/DigitalLibrary). SCITEPRESS is member of CrossRef (www.crossref.org).
Authors of accepted papers must guarantee that their papers will be presented at the conference.

IMPORTANT DATES
Full Paper submission: February 28, 2013
Authors Notification: May 6, 2013
Camera Ready Submission and Authors Registration: May 20, 2013

ICETE CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
tba

This call for papers and additional information about the conference can be found at www.secrypt.icete.org

For any questions, please contact the program chair:
secrypt2013@unimi.it

Jan 10

3rd International Conference on Cloud Computing and Services Science

CALL FOR POSITION PAPERS

3rd International Conference on Cloud Computing and Services Science
CLOSER website: http://closer.scitevents.org

May 8 – 10, 2013
Aachen, Germany

Technically sponsored by: SINTEF and IFIP
Co-organized by: RWTH
Sponsored by: INSTICC
INSTICC is Member of: WfMC and OMG

IMPORTANT DATES:
Position Paper Submission: January 22, 2013
Authors Notification (position papers): February 26, 2013
Final Position Paper Submission and Registration: March 12, 2013

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

CLOSER 2013 welcomes the submission of position papers whose deadline is set for next January 22.

A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics.
The acceptance of a position paper is restricted to the categories of “short paper” or “poster”. Please check further details about position papers submission at the conference website (http://closer.scitevents.org/GuidelinesTemplates.aspx).

The conference will be technically sponsored by SINTEF and the International Federation for Information Processing (IFIP) and sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC).The conference is Co-organized by the RWTH Aachen University (RWTH). INSTICC is Member of the Workflow Management Coalition (WfMC) and Object Management Group (OMG).

CLOSER is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 145 submissions, 19% were accepted as full papers. Additionally, 30% were presented as short papers and 14% as posters.

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a SSRI Series book.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS  is a member of CrossRef (http://www.crossref.org/).

CLOSER 2013 will be held in conjunction with WEBIST (http://www.webist.org/), SMARTGREENS (www.smartgreens.org) and CSEDU (www.csedu.org) in Aachen, Germany. Registration to CLOSER will enable free attendance to any sessions of WEBIST, SMARTGREENS and CSEDU conferences as a non-speaker.

We would like to highlight the presence of the following keynote speakers:
– Gottfried Vossen, WWU Münster, Germany
– Ivona Brandic, Vienna UT, Austria
– Geoffrey Charles Fox, Indiana University, United States

We also would like to highlight the possibility to submit to the following Satellite Workshop and Special Sessions:
Workshop:
– Cloud Service Analytics Workshop – CSAW 2013 (http://closer.scitevents.org/CSAW.aspx)

Special Sessions:
– Special Session on Security Governance and SLAs in Cloud Computing – CloudSecGov 2013 (http://closer.scitevents.org/CloudSecGov.aspx)
– Cloud Interoperability – CI 2013 (http://closer.scitevents.org/CI.aspx)

Should you have any question please don’t hesitate contacting me.

Kind regards,
Carla Mota
CLOSER Secretariat

Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 184
Fax: +44 203 014 8638
Email: closer.secretariat@scitevents.org

Jan 05

Security and Privacy in Healthcare IT – 26th International Symposium on Computer-Based Medical System

Security and Privacy in Healthcare IT Special track in
The 26th International Symposium on Computer-Based Medical System;
June 20-22, Porto, Portugal.
Paper submission January 31, 2013
Notification of acceptance March 10, 2013
Camera-ready and registration April 10, 2013

http://www.dcc.fc.up.pt/sph.cbms2013/
sph.cbms2013@dcc.fc.up.pt

http://cbms2013.med.up.pt/
Call for papers:

We are currently witnessing a rapidly moving transition trend towards
electronic healthcare information systems. They have already proved
to be essential tools in order to improve the management and quality
of healthcare services. More recently, these systems have also
started to promote great results on the improvement of patients’
health by enabling the creation of much more flexible, efficient and
interoperable means by which practitioners and even patients can have
access and manage healthcare data. However very complex technical
challenges resulting from strict but necessary highly regulated
environments, threats to patient safety, privacy, and security must
be tackled and solved before we can safely have valuable and
sensitive patients’ data being securely managed and used in much more
flexible and potentially useful ways. Towards this end it is thus
imperative to develop innovative methods and policies that ensure the
secure acquisition and management of healthcare data, at the same
time promoting its interoperability, its’ sharing, and its integrity
and confidentiality in highly effective and secure ways.

This special track focuses on original unpublished research on
innovative methods, policies and concerns that can constitute the
right building blocks for a new generation of electronic healthcare
information systems that are at the same time more efficient,
empowering and secure. So, it is expected novel articles about
privacy, security, accountability and auditing for the healthcare
sector. This special track also pretends to encourage the research
dissemination to the stakeholders involved in healthcare information
technologies, promoting the discussion on issues, challenges and
solutions that are currently being developed all around the world.

Topics of interest include, but are not limited to:

* Access control and consent management models;
* Authentication and identification concepts;
* Security and privacy concerns in healthcare;
* Biometrics in healtcare;
* Health data protection;
* Policy and Legal aspects of regulating privacy of health data;
* Healthcare in cloud computing;
* Mobile devices and their use in healthcare information systems;
* Patient empowerment;
* Personal health records;
* Usability and human factors;

The most relevant articles will be invited to submit an extended
version on the Journal of Health, Policy and Technology published by
Elsevier.

Each contribution must be prepared following the IEEE two-column
format, and should not exceed the length of six Letter-sized pages;
the authors may use LaTeX or Microsoft Word templates when preparing
their drafts. The papers should be submitted electronically before
the paper submission deadline using the EasyChair online submission
system. Papers must be submitted in PDF format, with fonts embedded.

All submissions will be peer-reviewed by at least two reviewers. The
SPH2013 program committee will be responsible for the final decision
about acceptance of articles submitted. All accepted papers will be
included in the conference proceedings, and will be published by the
IEEE. At least one author must pay the registration fee for each
accepted paper. Please refer to the IEEE IPR guidelines concerning
copyright. Authors of accepted papers must include a completed IEEE
Copyright Form with the submission of their final camera-ready paper.

— Track Chairs —

* Manuel Eduardo Correia,
Faculty of Sciences of University of Porto (FCUP)

* Luis Filipe Antunes,
Faculty of Sciences of University of Porto (FCUP)

* Ana Margarida Ferreira,
SnT research centre of University of Luxembourg

* Cátia Santos Pereira,
Faculty of Medicine of University of Porto (FMUP)

* Alexandre Barbosa Augusto,
Faculty of Sciences of University of Porto (FCUP)
— Program Committee —

Alexander Hörbst,
The Health & Life Sciences University,
Austria.

Andreas Pashalidis,
Katholieke Universiteit Leuven,
Belgium.

Carla Simone,
Fac. di scienze mat. fis. e naturali, University of
Milano-Bicocca,
Italy.

Carlos Ribeiro,
Instituto Superior Técnico, Universidade Técnica de Lisboa,
Portugal.

David Chadwick,
School of Computing, University of Kent,
United Kingdom.

Elske Ammenwerth,
University for Health Sciences, Medical Informatics and
Technology,
Austria.

Francesco Pinciroli,
Dipartimento di Bioingegneria, Politecnico di Milano,
Italy.

Frédéric Cuppens,
Dépt. Réseaux et Services Multimédias, l’ENST-Bretagne,
France.

Gabriele Lenzini,
SnT research centre of University of Luxembourg,
Luxembourg.

Gansen Zhao,
Sun Yat-sen University,
China.

Gianluigi Me,
Computer Engineering Faculty, Università di Roma,
Italy.

Guillermo Navarro-Arribas,
Universitat Autònoma de Barcelona,
Spain.

Henrique Santos,
Universidade do Minho,
Portugal.

Isaac Agudo,
Computer Science Department, University of Malaga,
Spain.

Jonathan Fistein,
Member of the British Computer Society,
United Kingdom.

Kambiz Ghazinour,
University of Ottawa,
Canada.

Lenka Lhotská,
Faculty of Electrical Eng., Czech Technical University,
Czech Republic.

Maria João Campos,
SPMS,
Portugal

Maria Hägglund,
Karolinska Institutet Health Informatics Centre,
Sweden.

Miria Koshy,
Warwick Business School,
United Kingdom.

Olivier Markowitch,
Computer Sciences Department of the Université
Libre de Bruxelles,
Belgium.

Panagiotis Bamidis,
Medical School, Aristotle University of Thessaloniki,
Greece.

Peter Pharow,
Fraunhofer IDMT,
Germany.

Pierangela Samarati,
Dpt. of Computer Science, Università degli Studi di Milano,
Italy.

Sergi Robles,
Universitat Autònoma de Barcelona,
Spain.

Simão Melo de Sousa,
Dep. de Informática, Universidade da Beira Interior,
Portugal.

Steven Furnell,
Faculty of Science and Technology, Plymouth University,
United Kingdom.

Vivian Vimarlund,
Dept. of Computer and Inf. Science, Linköping University,
Sweden.

Aug 09

3rd International Conference on Cloud Computing and Services Science

CALL FOR PAPERS

3rd International Conference on Cloud Computing and Services Science
CLOSER website: http://closer.scitevents.org

May 8 – 10, 2013
Aachen, Germany

Co-organized by: RWTH
Sponsored by: INSTICC
INSTICC is Member of: WfMC and OMG
Technically sponsored by: SINTEF

IMPORTANT DATES:
Regular Paper Submission: November 15, 2012
Authors Notification (regular papers): January 17, 2013
Final Regular Paper Submission and Registration: February 7, 2013

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

We would like to draw your attention to the 3rd International Conference on Cloud Computing and Services Science (CLOSER 2013 – http://closer.scitevents.org) whose submission deadline is scheduled for November 15, 2012. We hope you can participate in this conference by submitting a paper reflecting your current research in any of the following areas:

– Cloud Computing Fundamentals
– Services Science Foundation for Cloud Computing
– Cloud Computing Platforms and Applications
– Cloud Computing Enabling Technology

The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), co-organized by the Aachen University (RWTH) and technically sponsored by SINTEF. INSTICC is Member of the Workflow Management Coalition (WfMC) and Object Management Group (OMG).

The 3rd International Conference on Cloud Computing and Services Science, CLOSER 2013, focuses on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current IT-driven collaborations. The conference is nevertheless not about the union of these two (already broad) fields, but about Cloud Computing where we are also interested in how Services Science can provide theory, methods and techniques to design, analyze, manage, market etc.

We would like to highlight the presence of the following keynote speakers:
– Gottfried Vossen, WWU Münster, Germany
– Ivona Brandic, Vienna UT, Austria

CLOSER is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 145 submissions, 19% were accepted as full papers. Additionally, 30% were presented as short papers and 14% as posters.

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. EHHC
A short list of presented papers will be selected for publication of extended and revised versions in a Special Issue of the Journal of Future Generation Computer Systems. Also a short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a SSRI Series book.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).

We also would like to highlight the possibility to submit to the following Special Session, whose deadline is scheduled for March 1, 2013:
– Special Session on Security Governance and SLAs in Cloud Computing (CloudSecGov)
http://closer.scitevents.org/CloudSecGov.aspx

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

CLOSER 2013 will be held in conjunction with WEBIST 2013 (International Conference on Web Information Systems and Technologies – www.webist.org/), CSEDU 2013 (International Conference on Computer Supported Education – http://www.csedu.org/) and SMARTGREENS 2013 (International Conference on Smart Grids and Green IT Systems – http://www.smartgreens.org/) in Aachen, Germany. Registration to CLOSER will enable free attendance to any sessions of WEBIST, CSEDU and SMARTGREENS conferences as a non-speaker.

Please check further details at the CLOSER conference website (http://closer.scitevents.org).
Should you have any question please don’t hesitate contacting me.

Kind regards,
Joao Teixeira
CLOSER Secretariat

Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 184
Fax: +44 203 014 8638
Email: closer.secretariat@scitevents.org

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

CONFERENCE CHAIR:
Matthias Jarke, RWTH Aachen, Germany

PROGRAM CO-CHAIRS:
Frederic Desprez, LIP / INRIA, France
Donald Ferguson, Dell, United States
Ethan Hadar, CA Technologies, Israel
Frank Leymann, University of Stuttgart, Germany

PROGRAM COMMITTEE:
Please check the program committee members at http://closer.scitevents.org/ProgramCommittee.aspx

CONFERENCE AREAS:

Area 1: Cloud Computing Fundamentals

– Cloud Computing Architecture
– Cloud Standards
– Cloud Application Portability
– Cloud Interoperability
– Cloud Delivery Models
– Cloud Deployment Models: Public/Private/Hybrid Cloud
– Cloud Risk, Challenges, and Governance
– Business Cloud vs. Software Cloud

Area 2: Services Science Foundation for Cloud Computing

– Semantic Web Technologies
– Web Services
– Service and Systems Design and QoS Network Security
– Service-Oriented Architecture
– Internet of Services
– Service Modeling and Specification
– Service Composition
– Service Discovery
– Service Monitoring and Control
– Business Services Realized by IT Services
– Service Innovation
– Service Operation
– Service Strategy
– Service Marketing and Management
– Information and Service Economy
– Human Beings in Service Systems
– Enterprise Architectures and Services

Area 3: Cloud Computing Platforms and Applications

– Vertical Specific Cloud Services
– Mobility
– Cloud Middleware Frameworks
– Cloud Application Architectures
– Cloud Application Scalability and Availability
– XaaS
– ITaaS
– COTS and Cloud
– Cloudsourcing
– Cloud Applications Performance and Monitoring
– Development Methods for Cloud Applications
– Economics (ROI, Costs, CAPEX/OPEX,.)
– Outsourced Production Environments
– Collective Intelligence/Crowd Computing
– Context-aware Computing and Peer to Peer Computing
– Big Data Cloud Services

Area 4: Cloud Computing Enabling Technology

– Troubleshooting and Best Practices
– Monitoring of Services, Quality of Service, Service Level Agreements
– Security and Cyber Security in the Cloud
– Performance Development and Management
– Cloud Ilities (Scalability, Availability,Reliability)
– Dynamic Capacity and Performance Management
– Cloud Optimization and Automation
– Virtualization Technologies
– Disaster Recovery
– Cloud Abstraction of Composite IT Systems
– Cloud IT Systems Reuse

 

Jun 24

4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012)

4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012)

Security and Privacy Track

http://2012.cloudcom.org

The Grand Hotel, Taipei, Taiwan, December 03-06, 2012

===================

Important Dates:

===================

Abstract Submission (obligatory): July 13, 2012

Full Submission: July 27, 2012

Notification: Sep. 7, 2012

Camera-ready & Author registration: Sep. 28, 2012

Poster and Demo: Sep. 10, 2012

Poster and Demo Notification: Sep. 20, 2012

==========

Topics:

==========

*Accountability

*Audit in clouds

*Authentication and authorization

*Cryptographic primitives

*Reliability and availability

*Trust and credential management

*Usability and security

*Security and privacy in clouds

*Legacy systems migration

*Cloud Integrity and Binding Issues

====================

Chairs

====================

Siani Pearson, HP Cloud & Security Research Lab, UK

Jianying Zhou, Inst. Info. Research, Singapore

=================

Program Committee

=================

Man Ho Au, University of Wollongong, Australia

Khin Mi Mi Aung, Data Storage Institute, Singapore

David Chadwick, University of Kent, UK

Andrew Charlesworth, Bristol University, UK

Sherman S. M. Chow, University of Waterloo, Canada

Cheng-Kang Chu, Institute for Infocomm Research, Singapore

Yuri Demchenko, University of Amsterdam, The Netherlands

Josep Ferrer-Gomila, UIB, Spain

Martin Gilje Jaatun, SINTEF, Norway

Sokratis Katsikas, University of Piraeus, Greece

Costas Lambrinoudakis, University of Piraeus, Greece

Fang-Yie Leu, Tunghai university, Taiwan

Hui Li, Xidian University, China

Yingjiu Li, Singapore Management University, Singapore

Chu-Hsing Lin, Tunghai university, Taiwan

Joseph Liu, Institute for Infocomm Research, Singapore

Javier Lopez, University of Malaga, Spain

Olivier Markowitch, Universite Libre de Bruzelles

Stephen Marsh, Communications Research Centre Canada

Al-Sakib Khan Pathan, IIUM, Malaysia

Christoph Reich, Hochschule Furtwangen University, Germany

Chunming Rong, University of Stavanger, Norway

Kouichi Sakurai, Kyushu University, Japan

Pierangela Samarati, Universita’ degli Studi di Milano, Italy

Qiang Tang, University of Twente, Netherlands

Lingyu Wang, Concordia University, Canada

Tzong-Chen Wu, NTUST, Taiwan

Li Xu, Fujian Normal University, China

George Yee, Carleton University & Office of the Privacy Commissioner of Canada, Canada

Tsz Hon Yuen, The University of Hong Kong, China

Yongbin Zhou, Institute of Information Engineering, China

Wolfgang Ziegler, Fraunhofer Institute, Germany

=================

Special Issues

=================

Best Paper Awards will be presented to high quality papers.

Selected papers, after further extensions and revisions, will be published in special issues of the following prestigious journals

Future Generation Computer Systems (Elsevier) (ISI Impact Factor = 2.365)

International Journal of Communication Systems (Wiley) (ISI Impact Factor = 0.229)

Journal of Systems Architecture (Elsevier) (ISI Impact Factor = 0.768)

Automated Software Engineering (Springer) (ISI Impact Factor = 0.806)

Journal of Internet Technology (ISI Impact Factor = 0.448)

Information System Frontier (Springer) (ISI Impact Factor = 1.596)

International Journal of Grid and High-Performance Computing (Scopus, EI)

===========================

Submission & Publication

===========================

Papers need to be prepared according to the IEEE CS format, and submitted in PDF format via the EasyChair system

https://www.easychair.org/account/signin.cgi?conf=ieeecloudcom2012

Accepted conference papers will be published by IEEE CS Press (IEEE-DL & EI indexed).

Mar 23

The 2012 International Conference on Security and Management (SAM’12)

======================================================================
CALL  FOR  PAPERS

EXTENDED Paper Submission Deadline: March 27, 2012

SAM’12
The 2012 International Conference on
Security and Management

July 16-19, 2012, Las Vegas, USA
http://sam.udmercy.edu/sam12
======================================================================

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. The proceedings of the congress that SAM is part of,
enjoys a high number of citations; about 26,000 citations so far.

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
Security algorithms, mobile network security, security in CDN
(Contents Distribution Networks), Virtual Private Network (VPN),
tracing techniques in internet, active networks, security in Grid,
web monitoring, network security engineering, transport-level
security, wireless network security, IP security, electronic mail
security.
O  Cryptographic Technologies:
Security protocols, key management techniques, cryptographic
technologies, applications of block and stream ciphers, applications
of public key cryptology, message authentication and hash functions,
anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
Surveillance technologies, security policies, security for protocol
management, location management, QoS management, resource management,
channel management, mobility management, digital contents copyright
protection, system security management, network security management,
management in network equipment, Storage Area Networks (SAN)
management, information security management, government security
policy, web penetration testing, security operations,
vulnerabilities management.
O  Security Applications:
Security in e-Commerce and M-Commerce, secure OS, watermarking,
high-tech systems at airports, emerging technologies and
applications, Cloud computing security, database security, data
mining security, cyber security automation.
O  Biometrics and Forensics:
Novel biometric methods, forensics, biological security technologies,
face recognition systems, signature recognition systems, cyber
forensics, forensic analysis, biometric technologies for security,
feature extraction and matching algorithms.
O  Hardware Security:
Embedded systems security, cryptographic processors and co-processors,
security architectures, true and pseudorandom number generators,
side channel attacks, fault attacks, hardware tamper resistance,
smart card processors, secure storage devices.
O  Information Assurance:
Mission assurance, risk assessment and risk management, continuity
of operations and business impact analysis, cyber security compliance,
security auditing, security-savvy software development, disaster
recovery, business continuity analysis, access control, secure use
of software, secure performance.
O  Computer Security:
Firewall systems, hacking techniques and related issues, intrusion
detection system (IDS), honeypot, virus issues (detection,
prevention …), trusted computing, alert correlation, attack graphs,
incident responding, malware analysis, incident responding, malware
analysis, intrusion detection.
O  Security Education:
Computer security education, network security education, cyber
security education, cyber security body of knowledge, information
assurance education.

SUBMISSION OF PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam12
Submissions must be uploaded by March 27, 2012 and they must be in
either MS doc or pdf formats (about 7 pages including all figures,
tables, and references – single space, font size of 10 to 12). All
reasonable typesetting formats are acceptable (later, the authors of
accepted papers will be asked to follow a particular typesetting format
to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication
elsewhere. The first page of the paper should include: title of the
paper, name, affiliation, postal address, and email address for each
author. The first page should also identify the name of the Contact Author
and a maximum of 5 topical keywords that would best represent the content
of the paper. The name of the conference (ie, SAM) that the paper is
being submitted for consideration must be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final
Camera-Ready papers (if accepted) will be limited to 7 (two-column IEEE
style) pages.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee will be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees by using a double-blinded review
process. In addition, all papers whose authors include a member of the
conference program committee will be evaluated using the double-blinded
review process. (Essay/philosophical papers will not be refereed but may be
considered for discussion/panels).

Authors whose papers are accepted will be instructed to upload their papers
to a particular web site for publication – the uploaded papers to the
publication web site will only be checked for correct typesetting. At this
point, authors will be required to attest to the originality of their work
(ie, declaring that no part of the work is plagiarized and the paper does not
suffer from any acts of plagiarism.)

Proceedings of SAM will be published in printed conference books (ISBN)
and will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper (science citation databases such as: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (covers the core scientific
literature in Science; about 90% of inclusions are journals; only about 9%
are proceedings; worldcomp tracks are selected to be among the 9% – accessable
from INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN
International); and others. Though, there is no guarantee that the proceedings
will also be included in EI Compendex/Elsevier indexings, in the past, the
proceedings of SAM was included in these databases. Therefore, we will also
be sending the proceedings for indexing procedures to EI Compendex/Elsevier.
The printed proceedings/books will be available for distribution on site at
the conference.

In addition to the publication of the proceedings, selected authors will be
invited to submit extended versions of their papers for publication in a
number of research books contracted with various publishers – these books will
be composed after the conference. Also, many chairs of tracks will be forming
journal special issues to be published after the conference.

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except for the submission
is limited to 2 pages. On the first page, the author should state that “This
paper is being submitted as a poster”. Poster papers (if accepted) will be
published if and only the author of the accepted paper wishes to do so.

IMPORTANT DATES:

March 27, 2012:    Submission of full papers (about 7 pages)
April 26, 2012:    Notification of acceptance (+/- 2 days)
May 12, 2012:      Final papers + Copyright/Consent + Registration
July 16-19, 2012:  The 2012 International Conference on Security and
Management (SAM’12)

GENERAL INFORMATION:

SAM conference is being held jointly (same location and dates) with a
number of other research conferences, WORLDCOMP congress.
The congress is the largest annual gathering of researchers in computer
science, computer engineering and applied computing. We anticipate
to have 2,100 or more attendees from over 80 countries.
The congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), and many other distinguished speakers. To get a feeling
about the conferences’ atmosphere, see the 2011 delegates photos
available at: http://worldcomp.phanfare.com/5408606

An important mission of the congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines. 70148

MEASURABLE SCIENTIFIC IMPACT OF PROCEEDINGS:

The conference proceedings enjoy a high number of citations. As of
March 2012, papers published in each track of the proceedings have
received the following number of citations: 252 citations to BIOCOMP
papers; 116 to CDES papers; 65 to CGVR papers; 55 to CSC papers; 271 to
DMIN papers; 69 to EEE papers; 1,286 to ERSA papers; 504 to ESA papers;
176 to FCS papers; 9,408 to FECS papers; 157 to GCA papers; 75 to GEM
papers; 2,172 to ICAI papers; 1,529 to ICOMP papers; 1,247 to ICWN papers;
571 to IKE papers; 255 to IPCV papers; 137 to MSV papers; 5,239 to PDPTA
papers; 496 to SAM papers; 1,390 to SERP papers; and 177 to SWWS papers.
In total, over 25,600 citations have been made (so far) to papers
published in the proceedings of this federated joint conferences. Refer
to the URLs below to see the actual citation numbers (each is a link to
a live search and so it may take a few seconds for the data to pull up):

http://academic.research.microsoft.com/Conference/1816/biocomp-bioinformatics-&-computational-biology
http://academic.research.microsoft.com/Conference/1845/cdes-international-conference-on-computer-design/
http://academic.research.microsoft.com/Conference/1852/cgvr-international-conference-on-computer-graphics-and-virtual-reality/
http://academic.research.microsoft.com/Conference/1887/csc-international-conference-on-scientific-computing/
http://academic.research.microsoft.com/Conference/1920/dmin-int-conf-on-data-mining/
http://academic.research.microsoft.com/Conference/1891/csreaeee-international-conference-on-e-business-enterprise-information-systems-e-government/
http://academic.research.microsoft.com/Conference/679/ersa-engineering-of-reconfigurable-systems-and-algorithms/
http://academic.research.microsoft.com/Conference/681/esa-embedded-systems-and-applications/
http://academic.research.microsoft.com/Conference/1981/fcs-international-conference-on-foundations-of-computer-science/
http://academic.research.microsoft.com/Conference/1983/fecs-conference-on-frontiers-in-education/
http://academic.research.microsoft.com/Conference/1998/gca-international-conference-on-grid-computing-and-applications/
http://academic.research.microsoft.com/Conference/2467/gem-international-conference-on-genetic-and-evolutionary-methods/
http://academic.research.microsoft.com/Conference/7/ic-ai-international-conference-on-artificial-intelligence/
http://academic.research.microsoft.com/Conference/5/icomp-international-conference-on-internet-computing/
http://academic.research.microsoft.com/Conference/48/icwn-international-conference-on-wireless-networks/
http://academic.research.microsoft.com/Conference/65/ike-information-and-knowledge-engineering/
http://academic.research.microsoft.com/Conference/2114/ipcv-international-conference-on-image-processing-computer-vision-and-pattern-recognition/
http://academic.research.microsoft.com/Conference/2209/msv-int-conf-on-modeling-simulation-&-visualization-methods/
http://academic.research.microsoft.com/Conference/214/pdpta-parallel-and-distributed-processing-techniques-and-applications/
http://academic.research.microsoft.com/Conference/332/sam-security-and-management/
http://academic.research.microsoft.com/Conference/361/serp-software-engineering-research-and-practice/
http://academic.research.microsoft.com/Conference/2308/swws-conference-on-semantic-web-and-web-services/

USEFUL WEB LINKS:

1. Web site of SAM’12:
http://sam.udmercy.edu/sam12
2. The 2011 congress delegates photos are available at:
http://worldcomp.phanfare.com/5408606
3. This announcement contains updated and current information (correct
as of the date of this message). The information that appears in this
announcement supersedes earlier ones.

CONTACT:
Inquiries should be sent to: sc@world-comp.org