Tag: ieee

Aug 14

UDD 2012 : Special Session on Undesirable Data Detection

 

UDD 2012 : Special Session on Undesirable Data Detection

Link: http://www.mirlabs.net/ias12/ss1.html
When Nov 21, 2012 – Nov 23, 2012
Where São Carlos, Brazil
Submission Deadline Aug 15, 2012
Notification Due Sep 15, 2012
Final Version Due Sep 30, 2012
Categories    undesirable data detection   security

Call For Papers

Call for Papers of the Special Session on
Undesirable Data Detection — UDD 2012

Under the framework of the 8th International Conference on Information Assurance and Security (IAS 2012), 21-23 November 2012 in São Carlos, Brazil

Objectives
In recent years, research in the area of ICT security grows rapidly, mainly thanks to growing number of security threats arising internally or externally. Undesirable behavior comprising any intentionally or unintentionally misuse of resources in information systems produces growing quantity of new undesirable data every day. Undesirable Data Detection (http://www.mirlabs.net/ias12/ss1.html) Special Session aims at presenting novel approaches for evaluating or detecting potentially malicious activity threatening the security of ICT.
The special session seeks contributions about foundations of undesirable data detection as well as case studies, empirical, and other methodological works. It will provide an opportunity to disseminate latest results in this important field.
This section is focused on mining or detection of the undesirable data (such as spam emails and other unsolicited message in any communication system) and on its optimization for all possible aspects of security. Moreover, the session focuses on engines for Intrusion Detection Systems detection based on rules and on data elaboration, with special care of solution able to support data parallelization and GPU computing. Last but not least the special session aims at collecting case studies and real application of Undesirable data detection.

Specific topics of interest
The preferred topics for this special session are (but not limited to):
• Detection techniques and Methodologies
o Spam detection
o Intrusion detection
o Similarity detection
o Plagiarism detection
o Dangerous patterns in data streams
o Steganography detection
• Detection Techniques Application
o Scalable IDs architecture
o GPU and parallel Computing for Undesirable Data and Intrusion Detection
• Intrusion and Undesirable Data Detection Case Studies
o Detection in network systems
o Intrusion Detection in Cloud systems
o Industrial and real case studies

Submission
Special Session paper submission will be done through IAS 2012 submission system and been evaluated with the same standard as the regular conference paper. All accepted papers will be included in the IAS 2012 conference proceedings.
Papers must be submitted within the stipulated time and electronic submission in PDF is required. A full paper (6 pages, A4 size) for oral presentation should in the IEEE 8.5 two-column format. Papers should contain up to 5 keywords. Papers will be evaluated for originality, significance, clarity, and soundness, and will be reviewed by at least three independent reviewers.

Details are available at the conference website http://www.mirlabs.net/ias12/. Submit your paper at the submission site https://www.easychair.org/account/signin.cgi?conf=ias12.

Program Chair
Vaclav Snášel, Department of Computer Science, VSB – Technical University of Ostrava, vaclav.snasel@vsb.cz

Session Coordinators
Eliška Ochodková, eliska.ochodkova@vsb.cz
Pavel Krömer, pavel.kromer@vsb.cz

Program committee
Vaclav Snasel, VSB-Technical University of Ostrava, Czech Republic, vaclav.snasel@vsb.cz
Milos Kudelka, VSB-Technical University of Ostrava, Czech Republic, milos.kudelka@vsb.cz
Pavel Kromer, VSB-Technical University of Ostrava, Czech Republic, pavel.kromer@vsb.cz
Jan Platos, VSB-Technical University of Ostrava, Czech Republic, jan.platos@vsb.cz
Pavel Moravec, VSB-Technical University of Ostrava, Czech Republic, pavel.moravec@vsb.cz
Petr Gajdos, VSB-Technical University of Ostrava, Czech Republic, petr.gajdos@vsb.cz
Jan Martinovic, VSB-Technical University of Ostrava, Czech Republic, jan.martinovic@vsb.cz
Petr Musilek, University of Alberta, Canada, musilek@ece.ualberta.ca
Suhail S. Owais, AL-Balaqa University, Jordan, suhailowais@yahoo.com
Hideyasu Sasaki, University of Hong Kong, Hong Kong, hsasaki@uchicago.edu
Juan D. Velasquez, University of Chile, Santiago, Chile, juansensei@gmail.com
Miroslav Voznak, VSB-Technical University of Ostrava, Czech Republic, miroslav.voznak@vsb.cz

UDD 2012 : Special Session on Undesirable Data Detection.

Aug 14

ELS 2012 : The 7th Workshop on E-Learning Security

 

ELS 2012 : The 7th Workshop on E-Learning Security

Link: http://www.icitst.org/ELS-2012.pdf
When Dec 10, 2012 – Dec 12, 2012
Where London, UK
Submission Deadline Oct 1, 2012
Categories    e-learning    security

Call For Papers

The 7th Workshop on E-Learning Security (ELS-2012)
In Conjunction With
The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)
Technical Co-Sponsored by IEEE UK/RI Computer Chapter
December 10-12, 2012
London, UK
http://www.icitst.org/Workshops.html

—————-
Important Dates:
—————-
Submission Date: October 1, 2012
Notification Date: October 10, 2012
Camera Ready: October 30, 2012
Conference Dates: December 10-12, 2012

————————————————–
Topics of interest include but are not limited to:
————————————————–
*Security and Privacy in E-Learning
*Security Issues on E-Learning Assessments
*E-Learning Security Auditing
*Biometrics in E-Learning
*Secure E-Learning Development and Application
*Digital Rights Management (DRM) for E-Learning
*Emerging E-Learning Markets
*Collaborative Research
*Ongoing research from undergraduates, graduates/postgraduates and professionals
*Future Technologies

—————–
Paper submission:
—————–
Length of paper:
* Full-paper: 6 pages
* Extended Abstract: 2 pages
The style file and templates are available at Paper Submission.
Please submit your full paper(s) in PDF format via email to: els-2012@icitst.org

For further details, please visit http://www.icitst.org/ELS-2012.pdf

ELS 2012 : The 7th Workshop on E-Learning Security.

Jul 04

International Symposium on Engineering Secure Software and Systems (ESSoS)

Call For Papers

International Symposium on Engineering Secure Software and Systems (ESSoS)

http://distrinet.cs.kuleuven.be/events/essos/2013/

February 27 – March 1, 2013, Paris, France

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSE).

CONTEXT AND MOTIVATION

Trustworthy, secure software is a core ingredient of the modern world.
Hostile, networked environments, like the Internet, can allow
vulnerabilities in software to be exploited from anywhere.  To address this,
high-quality security building blocks (e.g., cryptographic components) are
necessary, but insufficient. Indeed, the construction of secure software is
challenging because of the complexity of modern applications, the growing
sophistication of security requirements, the multitude of available software
technologies and the progress of attack vectors.
Clearly, a strong need exists for engineering techniques that scale well and
that demonstrably improve the software’s security properties.

GOAL AND SETUP

The goal of this symposium, which will be the fifth in the series, is to
bring together researchers and practitioners to advance the states of the
art and practice in secure software engineering. Being one of the few
conference-level events dedicated to this topic, it explicitly aims to
bridge the software engineering and security engineering communities, and
promote cross-fertilization. The symposium will feature two days of
technical program, and is also open to proposals for both tutorials and
workshops. In addition to academic papers, the symposium encourages
submission of high-quality, informative experience papers about successes
and failures in security software engineering and the lessons learned.
Furthermore, the symposium also accepts short idea papers that crisply
describe a promising direction, approach, or insight.

TOPICS

The Symposium seeks submissions on subjects related to its goals. This
includes a diversity of topics including (but not limited to):

– scalable techniques for threat modeling and analysis of vulnerabilities
– specification and management of security requirements and policies
– security architecture and design for software and systems
– model checking for security
– specification formalisms for security artifacts
– verification techniques for security properties
– systematic support for security best practices
– security testing
– security assurance cases
– programming paradigms, models and DLS’s for security
– program rewriting techniques
– processes for the development of secure software and systems
– security-oriented software reconfiguration and evolution
– security measurement
– automated development
– trade-off between security and other non-functional requirements (in
particular
economic considerations)
– support for assurance, certification and accreditation
– empirical secure software engineering

SUBMISSION AND FORMAT

The proceedings of the symposium are published by Springer-Verlag (pending)
in the Lecture Notes in Computer Science Series
(http://www.springer.com/lncs).
Submissions should follow the formatting instructions of Springer LNCS.
Submitted papers must present original, non-published work of high quality.

For selected papers, there will be an invitation to submit extended versions
to a special issue in the International Journal of Information Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) – May describe
original technical research with a solid foundation, such as formal analysis
or experimental results, with acceptance determined mostly based on novelty
and validation. Or, may describe case studies applying existing techniques
or analysis methods in industrial settings, with acceptance determined
mostly by the general applicability of techniques and the completeness of
the technical presentation details.

Idea papers (max 8 pages with bibliography) – May crisply describe a novel
idea that is both feasible and interesting, where the idea may range from a
variant of an existing technique all the way to a vision for the future of
security technology.
Idea papers allow authors to introduce ideas to the field and get feedback,
while allowing for later publication of complete, fully-developed results.
Submissions will be judged primarily on novelty, excitement, and exposition,
but feasibility is required, and acceptance will be unlikely without some
basic, principled validation (e.g., extrapolation from limited experiments
or simple formal analysis). In the proceedings, idea papers will clearly
identified by means of the “Idea” tag in the title.

Proposals for both tutorials and workshops are welcome. Further guidelines
will appear on the website of the symposium.

IMPORTANT DATES

Paper submission:             September 30, 2012
Author notification:           November 22, 2012
Camera-ready:                  December 13, 2012

PROGRAM COMMITTEE

PC Co-Chairs

Jan Jürjens, TU Dortmund and Fraunhofer ISST
Ben Livshits, Microsoft Research

PC
Davide Balzarotti, EURECOM, France
Ruth Breu, University of Innsbruck, Austria
Cristian Cadar, Imperial College, UK
Julian Dolby, IBM Research, US
Matt Fredrikson, University of Wisconsin, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Thorsten Holz, U. Ruhr Bochum, Germany
Sergio Maffeis, Imperial College, UK
Heiko Mantel, TU Darmstadt, Germany
Anders Møller, Aarhus University, Denmark
Haris Mouratidis, University of East London, UK
Zachary Peterson, Naval Postgraduate School, US
Frank Piessens, KU Leuven, Belgium
Erik Poll, RU Nijmegen, NL
Alexander Pretschner, TU Munich, Germany
Wolfgang Reif, University of Augsburg, Germany
Jianying Zhou, Institute for Infocomm Research, Singapore
Mohammad Zulkernine, Queens University, Canada

Jul 03

SSRR 2012 : 10th IEEE International Symposium on Safety, Security, and Rescue Robotics

When Nov 5, 2012 – Nov 8, 2012
Where College Station, Texas, USA
Submission Deadline Aug 15, 2012
Notification Due Oct 1, 2012
Final Version Due Oct 22, 2012

SSRR 2012 : 10th IEEE International Symposium on Safety, Security, and Rescue Robotics.

Jun 24

4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012)

4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012)

Security and Privacy Track

http://2012.cloudcom.org

The Grand Hotel, Taipei, Taiwan, December 03-06, 2012

===================

Important Dates:

===================

Abstract Submission (obligatory): July 13, 2012

Full Submission: July 27, 2012

Notification: Sep. 7, 2012

Camera-ready & Author registration: Sep. 28, 2012

Poster and Demo: Sep. 10, 2012

Poster and Demo Notification: Sep. 20, 2012

==========

Topics:

==========

*Accountability

*Audit in clouds

*Authentication and authorization

*Cryptographic primitives

*Reliability and availability

*Trust and credential management

*Usability and security

*Security and privacy in clouds

*Legacy systems migration

*Cloud Integrity and Binding Issues

====================

Chairs

====================

Siani Pearson, HP Cloud & Security Research Lab, UK

Jianying Zhou, Inst. Info. Research, Singapore

=================

Program Committee

=================

Man Ho Au, University of Wollongong, Australia

Khin Mi Mi Aung, Data Storage Institute, Singapore

David Chadwick, University of Kent, UK

Andrew Charlesworth, Bristol University, UK

Sherman S. M. Chow, University of Waterloo, Canada

Cheng-Kang Chu, Institute for Infocomm Research, Singapore

Yuri Demchenko, University of Amsterdam, The Netherlands

Josep Ferrer-Gomila, UIB, Spain

Martin Gilje Jaatun, SINTEF, Norway

Sokratis Katsikas, University of Piraeus, Greece

Costas Lambrinoudakis, University of Piraeus, Greece

Fang-Yie Leu, Tunghai university, Taiwan

Hui Li, Xidian University, China

Yingjiu Li, Singapore Management University, Singapore

Chu-Hsing Lin, Tunghai university, Taiwan

Joseph Liu, Institute for Infocomm Research, Singapore

Javier Lopez, University of Malaga, Spain

Olivier Markowitch, Universite Libre de Bruzelles

Stephen Marsh, Communications Research Centre Canada

Al-Sakib Khan Pathan, IIUM, Malaysia

Christoph Reich, Hochschule Furtwangen University, Germany

Chunming Rong, University of Stavanger, Norway

Kouichi Sakurai, Kyushu University, Japan

Pierangela Samarati, Universita’ degli Studi di Milano, Italy

Qiang Tang, University of Twente, Netherlands

Lingyu Wang, Concordia University, Canada

Tzong-Chen Wu, NTUST, Taiwan

Li Xu, Fujian Normal University, China

George Yee, Carleton University & Office of the Privacy Commissioner of Canada, Canada

Tsz Hon Yuen, The University of Hong Kong, China

Yongbin Zhou, Institute of Information Engineering, China

Wolfgang Ziegler, Fraunhofer Institute, Germany

=================

Special Issues

=================

Best Paper Awards will be presented to high quality papers.

Selected papers, after further extensions and revisions, will be published in special issues of the following prestigious journals

Future Generation Computer Systems (Elsevier) (ISI Impact Factor = 2.365)

International Journal of Communication Systems (Wiley) (ISI Impact Factor = 0.229)

Journal of Systems Architecture (Elsevier) (ISI Impact Factor = 0.768)

Automated Software Engineering (Springer) (ISI Impact Factor = 0.806)

Journal of Internet Technology (ISI Impact Factor = 0.448)

Information System Frontier (Springer) (ISI Impact Factor = 1.596)

International Journal of Grid and High-Performance Computing (Scopus, EI)

===========================

Submission & Publication

===========================

Papers need to be prepared according to the IEEE CS format, and submitted in PDF format via the EasyChair system

https://www.easychair.org/account/signin.cgi?conf=ieeecloudcom2012

Accepted conference papers will be published by IEEE CS Press (IEEE-DL & EI indexed).

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/

May 15

NPSec 2012 : 7th Workshop on Secure Network Protocols

When Oct 30, 2012 – Oct 30, 2012
Where Austin, TX, USA
Submission Deadline Jul 2, 2012
Notification Due Aug 31, 2012
Final Version Due Sep 20, 2012

NPSec 2012 : 7th Workshop on Secure Network Protocols.

CALL FOR PAPERS
NPSec 2012
7th Workshop on Secure Network Protocols
Austin, TX, USA, October 30, 2012

In conjunction with ICNP 2012
(Austin, TX, USA, October 30 – November 2, 2012)

http://www.cse.msu.edu/~feichen/NPSec2012/

=== Scope ===

The 7th workshop on Secure Network Protocols (NPSec 2012) is a one-day
event held in conjunction with the 20th IEEE International Conference on
Network Protocols (ICNP 2012). NPSec 2012 focuses on two general areas.
The first focus is on the development and analysis of secure or hardened
protocols for the operation (establishment and maintenance) of network
infrastructure, including such targets as secure multidomain, ad hoc,
sensor or overlay networks, or other related target areas. This can
include new protocols, enhancements to existing protocols, protocol
analysis, and new attacks on existing protocols. The second focus is on
employing such secure network protocols to create or enhance network
applications. Examples include collaborative firewalls, incentive
strategies for multiparty networks, and deployment strategies to enable
secure applications.

NPSec 2012 particularly welcomes new ideas on security in the context of
future Internet design, such as architectural considerations for future
Internet security and new primitives for supporting secure network
protocol and application design.

Topics of interest include but are not limited to:

* Security in future Internet architectures (role of security in
future architectures, integrating security in future protocols and
applications)
* Secure and/or resilient network protocols (e.g., internetworking/routing,
MANETs, LANs and WLANs, mobile/cellular data networks, P2P and other
overlay networks, federated trust systems, sensor networks)
* Vulnerabilities of existing protocols and applications (both
theoretical and case studies), including attacks
* Key distribution/management
* Intrusion detection and response
* Incentive systems for P2P systems and MANET routing
* Secure protocol configuration and deployment
* Challenges and security protocols for social networks

The submission website is now available, and papers may be submitted at
http://www.easychair.org/conferences/?conf=npsec2012. Formatting and
submission instructions are available on the NPSec website, at
http://www.cse.msu.edu/~feichen/NPSec2012.

=== Important dates ===

* Submission Deadline: July 2, 2012 (11:59pm PDT)
* Notification of acceptance: August 31, 2012
* Camera ready version: September 20, 2012
* Workshop: October 30, 2012

=== Organizers ===

Technical Program Committee Chairs:
* Ivan Martinovic, University of Oxford, UK
* Alex Liu, Michigan State University, USA

Publicity Chair:
* Kevin Butler, University of Oregon, USA

Web Chair:
* Fei Chen, VMware Inc., USA

Proceedings/Submission Chair:
* Matthias Wilhelm, TU Kaiserslautern, DE

NPSec Steering Committee:
* Sonia Fahmy, Purdue University, USA (chair)
* George Kesidis, Penn State University, USA
* Cristina Nita-Rotaru, Purdue University, USA
* Gene Tsudik, UC Irvine, USA

May 14

International Symposium on Engineering Secure Software and Systems (ESSoS)

Call For Papers

International Symposium on Engineering Secure Software and Systems (ESSoS)

http://distrinet.cs.kuleuven.be/events/essos/2013/

February 27 – March 1, 2013, Paris, France

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSE).

CONTEXT AND MOTIVATION

Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere.  To address this, high-quality security
building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software’s security properties.

GOAL AND SETUP

The goal of this symposium, which will be the fifth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security  engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program, and is also open to proposals for both  tutorials and workshops. In addition to academic papers, the symposium  encourages submission of high-quality, informative experience papers about  successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe  a promising direction, approach, or insight.

TOPICS

The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):

– scalable techniques for threat modeling and analysis of vulnerabilities
– specification and management of security requirements and policies
– security architecture and design for software and systems
– model checking for security
– specification formalisms for security artifacts
– verification techniques for security properties
– systematic support for security best practices
– security testing
– security assurance cases
– programming paradigms, models and DLS’s for security
– program rewriting techniques
– processes for the development of secure software and systems
– security-oriented software reconfiguration and evolution
– security measurement
– automated development
– trade-off between security and other non-functional requirements (in particular economic considerations)
– support for assurance, certification and accreditation
– empirical secure software engineering

SUBMISSION AND FORMAT

The proceedings of the symposium are published by Springer-Verlag (pending) in  the Lecture Notes in Computer Science Series (http://www.springer.com/lncs).

Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality.

For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) – May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details.

Idea papers (max 8 pages with bibliography) – May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results.

 

Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the “Idea” tag in the title.

Proposals for both tutorials and workshops are welcome. Further guidelines will appear on the website of the symposium.

IMPORTANT DATES

Paper submission:             September 30, 2012
Author notification:           November 22, 2012
Camera-ready:                  December 13, 2012

PROGRAM COMMITTEE

PC Co-Chairs

Jan Jürjens, TU Dortmund and Fraunhofer ISST
Ben Livshits, Microsoft Research

PC
Davide Balzarotti, EURECOM, France
Ruth Breu, University of Innsbruck, Austria
Cristian Cadar, Imperial College, UK
Julian Dolby, IBM Research, US
Matt Fredrikson, University of Wisconsin, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Thorsten Holz, U. Ruhr Bochum, Germany
Sergio Maffeis, Imperial College, UK
Heiko Mantel, TU Darmstadt, Germany
Anders Møller, Aarhus University, Denmark
Haris Mouratidis, University of East London, UK
Zachary Peterson, Naval Postgraduate School, US
Frank Piessens, KU Leuven, Belgium
Erik Poll, RU Nijmegen, NL
Alexander Pretschner, TU Munich, Germany
Wolfgang Reif, University of Augsburg, Germany
Jianying Zhou, Institute for Infocomm Research, Singapore
Mohammad Zulkernine, Queens University, Canada

Apr 23

US and China Engaged in Secret Cyber War Games? – IEEE Spectrum

US and China Engaged in Secret Cyber War Games? – IEEE Spectrum.

Apr 11

IEEE Transactions on Information Forensics and Security Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

CALL FOR PAPERS

IEEE Transactions on Information Forensics and Security

Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

 

Guest Editors

Karl Aberer – École Polytechnique Fédérale de Lausanne, Switzerland (karl.aberer@epfl.ch)
Sen-ching Samson Cheung – University of Kentucky, USA (cheung@engr.uky.edu)
Jayant Haritsa – Indian Institute of Science, India (jharitsa@gmail.com)
Bill Horne – Hewlett-Packard Laboratories, USA (william.horne@hp.com)
Kai Hwang – University of Southern California, USA (kaihwang@usc.edu)
Yan (Lindsay) Sun – University of Rhode Island, USA (yansun@ele.uri.edu)

With the increasing drive towards availability of data and services anytime anywhere, privacy risks have significantly increased. Unauthorized disclosure, modification, usage, or uncontrolled access to privacy-sensitive data may result in high human and financial costs. In the distributed computing environments, trust plays a crucial role in mitigating the privacy risk by guaranteeing meaningful interactions, data sharing, and communications. Trust management is a key enabling technology for security and privacy enhancement. While privacy preservation and trust management are already challenging problems, it is imperative to explore how privacy-oriented and trust-oriented approaches can integrate to bring new solutions in safeguarding information sharing and protecting critical cyber infrastructure. Furthermore, there are questions about whether existing trust models and privacy preserving schemes are robust against attacks. This Call for Papers invites researchers to contribute original articles that cover a broad range of topics related to privacy preservation and trust management in cloud and distributed systems, with a focus on emerging networking contexts such as social media, cloud computing, and power grid systems.

 

Example topics include but are not limited to

  • Privacy Enhanced Technology: privacy preserving data mining, publishing, and disclosure; access control, anonymity, audit, and authentication; applied cryptography, cryptanalysis, and digital signatures in PET; abuse cases and threat modeling; theoretical models and formal methods; application of physical security for privacy enhancement.
  • Trust and Reputation Management: trust management architectures and trust models; quantitative metrics and computation; security of trust management protocols/systems; evaluation and test bed; trust related privacy enhancement solutions.
  • Privacy and Trust in Emerging Complex Systems including: social networking; cloud computing; power grid systems; sensor networks; Internet of Things; multimedia surveillance networks.
  • Other Related Topics such as trust and privacy policies; human factors and usability; censorship; economics of trust and privacy; behavior modeling.

Submission Procedure: Manuscripts are to be submitted according to the Information for Authors at http://www.signalprocessingsociety.org/publications/periodicals/forensics/forensics-authors-info/ using the IEEE online manuscript system, Manuscript Central. Papers must not have appeared or under review elsewhere.

 

Schedule

Submission deadline:                 May 31, 2012

First Review:                            September 12, 2012

Revisions Due:                          October 31, 2012

Final Decision:                           January 15, 2012

Final manuscript due:               February 20, 2013

Tentative publication date:      June 1, 2013