Tag: https

Feb 08

CFP WISSE’12 CAiSE’12

**** CALL FOR PAPERS ****

 

Second International Workshop on Information Systems Security Engineering –  WISSE’12

http://gsya.esi.uclm.es/WISSE2012/

in conjunction with the

24th International Conference on Advanced Information Systems Engineering (CAiSE’12)

Gdańsk, Poland, 25 – 29 June 2012

http://www.caise2012.univ.gda.pl/

Important Dates

Paper Submission:  February 27, 2012 (extended)

Authors Notification: March 17, 2012 (extended)

Camera Ready Submission Deadline: March 23, 2012 (extended)

 

Purpose

Information systems security problems are currently a widespread and growing concern that covers most of the areas of society, such as business, domestic, financial, government, healthcare, and so on. The scientific community has realized the importance of aligning information systems engineering and security engineering in order to develop more secure information systems. Nevertheless, there is lack of an appropriate event that will promote information systems security within the context of information systems engineering. The proposed workshop fulfils this gap. This is the second version of the workshop, with the first one being introduced in CAiSE’11 with great success.

The workshop aims to provide a forum for researchers and practitioners to present, discuss and debate on one hand the latest research work on methods, models, practices and tools for secure information systems engineering, and on the other hand relevant industrial applications, recurring challenges, problems and industrial led solutions at the area of secure information systems engineering.

 

Topics of interest:

Topics of interest include, but are not limited to:

–          Security and privacy requirements models and engineering

–          Security and privacy analysis methods and models

–          Security and privacy design methods and models

–          Security and privacy testing methods and models

–          Security and privacy modelling Support Tools

–          Integrating functional, security and privacy requirements

–          Threat-driven and Model-driven security

–          Secure IS interoperability modelling

–          Security and process modelling

–          Modelling Security and Trust

–          Managing Secure Software development

–          Security in Agile Software Development Methods

–          Methodologies and models for evaluating IS security and privacy aspects

–          Formal methods for modelling security

–          Models and approaches for the verification of security and privacy properties

–          Approaches for managing security changes in IS

–          Component-based, Aspect-oriented, Agent-based, Pattern-based Information system Security methods

–          Methods, models and tools for workflow and Business Process Security

–          Case studies in modelling secure IS

–          Security Architectures and Patterns for Information Systems

–          Semantic Web Technologies applied to Security

–          Ontologies for IS security

–          Security Engineering for specific Information Systems (e-Services, databases, mobile, internet, social networks, …)

–          Security Engineering for SOA Systems

–          Methods for security reengineering

–          Software Security Knowledge

–          Enterprise Software Security

 

Paper Submission

Prospective authors are invited to submit papers in any of the topics of the workshop. The results described must be unpublished and must not be under review elsewhere. Only papers in English will be accepted, and the length of the paper should not exceed 14 pages (including all text, figures, references and appendices.). Three to five keywords characterising the paper should be indicated at the end of the abstract.

Manuscripts must comply with the Springer NLBIP formatting rules. Prepare your manuscript as a PDF file and submit it to the workshop organizers via EasyChair system (https://www.easychair.org/conferences/?conf=wisse12).

Submissions not conforming to the LNCS format, exceeding 14 pages, or being obviously out of the scope of the workshop, will be rejected without review.

Best workshop papers will be published in a special issue of the International Journal of Information System Modeling an Design.

Registration

For each accepted submission, at least one author is expected to register for the workshop and attend the workshop in order to present the paper. Registration is through the CAiSE’12 web site.

 

Workshop Structure

The workshop will combine paper presentations, a keynote, and a panel. Moreover, accepted papers apart from presentation time, will be assigned with one or two discussants with responsibility to initiate the discussion on the paper. We are confident that such structure will support a workshop environment that will be based on discussion, debate and will therefore provide an important contribution to the relevant research community.

 

List of PC members

Alban Gabillon. Université de Polynésie Française.

Antonio Maña. University of Malaga. Spain

Benoit Baudry. IRISA Rennes. France

Brajendra Panda. University of Arkansas. USA

Carlos Blanco. University of Cantabria. Spain

Christos Kalloniatis, University of the Aegean, Greece

Csilla Farkas. University of South Carolina. USA

Cuppens Nora. LUSSI/SERES Telecom-Bretagne. France

Daniel Mellado. Spanish Tax Agency. Spain

Eduardo Fernández-Medina. University of Castilla-La Mancha. Spain

Eduardo B. Fernández. Florida Atlantic University. USA

Ernesto Damiani. Università degli Studi di Milano. Italy

Frédéric Cuppens. Telecom Bretagne. France

Günther Pernul. University of Regensburg. Germany

Guttorm Sindre, NTNU, Norway

Indrakshi Ray. Colorado State University. USA

Isabelle Comyn-Wattiau. CNAM. Paris, France

Jacky Akoka. CEDRIC-CNAM. France

Jaejoon Lee. Lancaster University. UK

Jan Jürjens, Technical University of Dortmund, Germany

Javier López. University of Málaga. Spain

Kouichi Sakurai. Kyushu University. Japan

Luis Enrique Sánchez. University of Castilla-La Mancha. Spain

Marc Frappier. University of Sherbrooke. Québec

Matt Bishop. University of California. USA

Paolo Giorgini. University of Trento. Italy

Régine Laleau. LACL, Université Paris-Est Créteil. France

Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy

Shareeful Islam, University of East London, UK.

Steven Furnell. Plymouth University. UK

Yves Ledru. LIG, University of Grenoble. France

 

Workshop organization

 

General Chair:

Dr Haralambos Mouratidis

University of East London. UK

H.Mouratidis@uel.ac.uk

 

Programme Chairs:

Dr. David G. Rosado

University of Castilla-La Mancha. Spain

David.GRosado@uclm.es

 

Dr Nadira Lammari

CEDRIC-CNAM. France

lammari@cnam.fr

 

Steering Committee Chair

Dr Nadira Lammari

CEDRIC-CNAM. France

lammari@cnam.fr

 

Steering Committee

Dr Nora Cuppens

LUSSI/SERES Telecom-Bretagne. France

nora.cuppens@telecom-bretagne.eu

 

Dr. Jan Jürjens

Technical University of Dortmund. Germany

jan.jurjens@cs.tu-dortmund.de

 

Dr Haralambos Mouratidis

University of East London. London

H.Mouratidis@uel.ac.uk

 

Dr. David G. Rosado

University of Castilla-La Mancha. Spain

David.GRosado@uclm.es

 

Dr. Luis Enrique Sánchez

University of Castilla-La Mancha. Spain

LuisE.Sanchez@uclm.es

 

Publicity chairs:

Dr Shareeful Islam

University of East London. London

S.Islam@uel.ac.uk

 

Dr Carlos Blanco

University of Cantabria. Spain

carlos.blanco@unican.es

 

Dr Jérémy Milhau

LACL, Université Paris-Est Créteil. France

jeremilhau@gmail.com

 

 

 

 

 

Feb 07

Feedburner and HTTPS: bad marriage

To link our website and twitter account together, we decided recently to give a try to feedburner.com. The later would read the RSS feed of our website and publish the news on Twitter.
Since originaly we chose to give access to our website in https and redirect all the http trafic to https, the feed we indicated to feedburner was the following, available in HTTPS. This feed is valid. However, feedburner.com did not accept such a feed as was suggested by some comments by users found on the net. Therefore we stopped the automatic redirection http->https.

Jan 08

Online registration for Eurocrypt 2012

Online registration for Eurocrypt 2012 is now available at

 https://secure.iacr.org/conferences/ec2012/register/

The late registration deadline is midnight, Thursday, March 15th, 2012
(Mountain Standard Time).

After registering do not forget to book your accomodation
at Robinson College, book a guided tour of Cambridge (including
a tea in one of the old colleges), and the excursion to 
Bletchley Park. These can all be booked at 

 http://shop.bris.ac.uk/browse/department.asp?compid=1&modid=1&deptid=175

Dec 16

Africacrypt 2012

Africacrypt 2012 will be held on 2012 July 10-12 in Ifrane, Morocco.
Original papers on all technical aspects of cryptology are solicited
for submission. The conference is organized by the Moroccan Association
for Cryptography (AMC) and Al Akhawain University in Ifrane (AUI) in
cooperation with IACR.

Papers must be submitted electronically through
https://africacrypt2012.epfl.ch/iChair
More instructions are available in the call for papers.

Conference web site: http://www.aui.ma/africacrypt2012

Important dates:
Submission: Jan. 5, 2012, 1pm UTC
Notification: Apr. 2, 2012
Final version: Apr. 22, 2012
Conference: July 10-12, 2012

Nov 01

The Trash Attack An Attack on Verifiable Voting Systems and a Simple Mitigation

https://research.microsoft.com/pubs/155590/The%20Trash%20Attack.pdf 

(via J. Dossogne)

Oct 26

How secure is HTTPS today? How often is it attacked? | Electronic Frontier Foundation

How secure is HTTPS today? How often is it attacked? | Electronic Frontier Foundation.

Sep 01

IEEE Publication – Journal Special Issues

 

Deadline for Paper Submission: September 20, 2011
Notification of Acceptance: October 15, 2011
Camera ready submission and author registration: October 31, 2011
 
Publication: IEEE
 
Journal Special Issues:
————————————-
 
Authors of accepted papers presented at IAS 2011 will be invited to submit extended versions of their manuscripts for consideration in the following international journals:
Journal of Information Assurance and Security, USA
International Journal of Wireless and Mobile Computing (IJWMC),
Inderscience Publishers, Switzerland
International Journal of Computer Information Systems and Industrial
Management (IJCISIM), USA
 
 
**************************************************************************
 
7th International Conference on Information Assurance and Security (IAS'11)
Melaka, Malaysia
December 5-8, 2011
 
 
 
Technically Sponsored by:
————————————-
 
IEEE Systems, Man and Cybernetics Society (SMCS) – Spain Chapter
IEEE Systems, Man and Cybernetics Society (SMCS) – Czechoslovakia Chapter
 
 
Technically Supported by:
————————————-
IEEE Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Soft Computing Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Homeland Security
 
 
Publication: IEEE
————————-
 
 
Objective:
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information assurance and security to exchange ideas and to learn the latest development in this important field. The 4-day conference will feature prominent keynote speakers, workshop, tutorials, poster and paper presentation in parallel tracks. HIS 2011 invites novel contributions/papers of Information Assurance and Security from fundamental aspects to various practical applications.
 
Topics:
 
** Information Assurance, Security Mechanisms, Methodologies and Models **
 
Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptography
Cryptographic Protocols
Key Management and Recovery
 
 
** Secure System Architectures and Security Application **
 
Web Services Security
Grid Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards
 
 
** Image Engineering, Multimedia Signal Processing and Communication Security **
 
Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Biometrics
Information Fusion
Image Registration
Image Mosaic
Image Indexing and Retrieval
Image and Video Coding
Multiscale Geometric Analysis
Motion Detection and Tracing
Feature Extraction
3G Communication
Embedded System Design
 
 
Author Guidelines:
————————–
Submission of paper should be made through the submission link in IAS 2011 official website or the easychair conference system at: https://www.easychair.org/account/signin.cgi?conf=ias11
Please refer to the conference website for guidelines to prepare your manuscript. All accepted papers will be compiled in conference proceedings published by the IEEE. It is mandatory at least an author registers for every paper that is included in the conference proceedings. Proceedings will be made available during the conference.
 
 
 
IAS 2011 Organizing team:
———————————————
 
General Chairs
Ajith Abraham, MIR Labs, Europe
Daniel Zeng, University of Arizona, USA
Dharma Agrawal, University of Cincinatti, USA
 
 
Information Contact:
—————————-
Azah Kamilah Muda, UTeM, Malaysia

Aug 03

Frank Miller: Inventor of the One-Time Pad

Frank Miller: Inventor of the One-Time Pad

Steven M. Bellovin

https://mice.cs.columbia.edu/getTechreport.php?techreportID=1460