Tag: ieee

Apr 09

TIFS Special Issue 2013 : IEEE TIFS Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

When N/A
Where N/A
Submission Deadline May 31, 2012
Notification Due Jan 15, 2013
Final Version Due Feb 20, 2013

TIFS Special Issue 2013 : IEEE TIFS Special Issue on Privacy and Trust Management in Cloud and Distributed Systems.

Mar 27

Anonymous Cowards, Deanonymized – Slashdot

“Arvind Narayana writes: What if authors can be identified based on nothing but a comparison of the content they publish to other web content they have previously authored? Naryanan has a new paper to be presented at the 33rd IEEE Symposium on Security & Privacy. Just as individual telegraphers could be identified by other telegraphers from their ‘fists,’ Naryanan posits that an author’s habitual choices of words, such as, for example, the frequency with which the author uses ‘since’ as opposed to ‘because,’ can be processed through an algorithm to identify the author’s writing. Fortunately, and for now, manually altering one’s writing style is effective as a countermeasure.”

Anonymous Cowards, Deanonymized – Slashdot.

Mar 23

The 2012 International Conference on Security and Management (SAM’12)

======================================================================
CALL  FOR  PAPERS

EXTENDED Paper Submission Deadline: March 27, 2012

SAM’12
The 2012 International Conference on
Security and Management

July 16-19, 2012, Las Vegas, USA
http://sam.udmercy.edu/sam12
======================================================================

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. The proceedings of the congress that SAM is part of,
enjoys a high number of citations; about 26,000 citations so far.

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
Security algorithms, mobile network security, security in CDN
(Contents Distribution Networks), Virtual Private Network (VPN),
tracing techniques in internet, active networks, security in Grid,
web monitoring, network security engineering, transport-level
security, wireless network security, IP security, electronic mail
security.
O  Cryptographic Technologies:
Security protocols, key management techniques, cryptographic
technologies, applications of block and stream ciphers, applications
of public key cryptology, message authentication and hash functions,
anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
Surveillance technologies, security policies, security for protocol
management, location management, QoS management, resource management,
channel management, mobility management, digital contents copyright
protection, system security management, network security management,
management in network equipment, Storage Area Networks (SAN)
management, information security management, government security
policy, web penetration testing, security operations,
vulnerabilities management.
O  Security Applications:
Security in e-Commerce and M-Commerce, secure OS, watermarking,
high-tech systems at airports, emerging technologies and
applications, Cloud computing security, database security, data
mining security, cyber security automation.
O  Biometrics and Forensics:
Novel biometric methods, forensics, biological security technologies,
face recognition systems, signature recognition systems, cyber
forensics, forensic analysis, biometric technologies for security,
feature extraction and matching algorithms.
O  Hardware Security:
Embedded systems security, cryptographic processors and co-processors,
security architectures, true and pseudorandom number generators,
side channel attacks, fault attacks, hardware tamper resistance,
smart card processors, secure storage devices.
O  Information Assurance:
Mission assurance, risk assessment and risk management, continuity
of operations and business impact analysis, cyber security compliance,
security auditing, security-savvy software development, disaster
recovery, business continuity analysis, access control, secure use
of software, secure performance.
O  Computer Security:
Firewall systems, hacking techniques and related issues, intrusion
detection system (IDS), honeypot, virus issues (detection,
prevention …), trusted computing, alert correlation, attack graphs,
incident responding, malware analysis, incident responding, malware
analysis, intrusion detection.
O  Security Education:
Computer security education, network security education, cyber
security education, cyber security body of knowledge, information
assurance education.

SUBMISSION OF PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam12
Submissions must be uploaded by March 27, 2012 and they must be in
either MS doc or pdf formats (about 7 pages including all figures,
tables, and references – single space, font size of 10 to 12). All
reasonable typesetting formats are acceptable (later, the authors of
accepted papers will be asked to follow a particular typesetting format
to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication
elsewhere. The first page of the paper should include: title of the
paper, name, affiliation, postal address, and email address for each
author. The first page should also identify the name of the Contact Author
and a maximum of 5 topical keywords that would best represent the content
of the paper. The name of the conference (ie, SAM) that the paper is
being submitted for consideration must be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final
Camera-Ready papers (if accepted) will be limited to 7 (two-column IEEE
style) pages.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee will be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees by using a double-blinded review
process. In addition, all papers whose authors include a member of the
conference program committee will be evaluated using the double-blinded
review process. (Essay/philosophical papers will not be refereed but may be
considered for discussion/panels).

Authors whose papers are accepted will be instructed to upload their papers
to a particular web site for publication – the uploaded papers to the
publication web site will only be checked for correct typesetting. At this
point, authors will be required to attest to the originality of their work
(ie, declaring that no part of the work is plagiarized and the paper does not
suffer from any acts of plagiarism.)

Proceedings of SAM will be published in printed conference books (ISBN)
and will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper (science citation databases such as: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (covers the core scientific
literature in Science; about 90% of inclusions are journals; only about 9%
are proceedings; worldcomp tracks are selected to be among the 9% – accessable
from INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN
International); and others. Though, there is no guarantee that the proceedings
will also be included in EI Compendex/Elsevier indexings, in the past, the
proceedings of SAM was included in these databases. Therefore, we will also
be sending the proceedings for indexing procedures to EI Compendex/Elsevier.
The printed proceedings/books will be available for distribution on site at
the conference.

In addition to the publication of the proceedings, selected authors will be
invited to submit extended versions of their papers for publication in a
number of research books contracted with various publishers – these books will
be composed after the conference. Also, many chairs of tracks will be forming
journal special issues to be published after the conference.

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except for the submission
is limited to 2 pages. On the first page, the author should state that “This
paper is being submitted as a poster”. Poster papers (if accepted) will be
published if and only the author of the accepted paper wishes to do so.

IMPORTANT DATES:

March 27, 2012:    Submission of full papers (about 7 pages)
April 26, 2012:    Notification of acceptance (+/- 2 days)
May 12, 2012:      Final papers + Copyright/Consent + Registration
July 16-19, 2012:  The 2012 International Conference on Security and
Management (SAM’12)

GENERAL INFORMATION:

SAM conference is being held jointly (same location and dates) with a
number of other research conferences, WORLDCOMP congress.
The congress is the largest annual gathering of researchers in computer
science, computer engineering and applied computing. We anticipate
to have 2,100 or more attendees from over 80 countries.
The congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), and many other distinguished speakers. To get a feeling
about the conferences’ atmosphere, see the 2011 delegates photos
available at: http://worldcomp.phanfare.com/5408606

An important mission of the congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines. 70148

MEASURABLE SCIENTIFIC IMPACT OF PROCEEDINGS:

The conference proceedings enjoy a high number of citations. As of
March 2012, papers published in each track of the proceedings have
received the following number of citations: 252 citations to BIOCOMP
papers; 116 to CDES papers; 65 to CGVR papers; 55 to CSC papers; 271 to
DMIN papers; 69 to EEE papers; 1,286 to ERSA papers; 504 to ESA papers;
176 to FCS papers; 9,408 to FECS papers; 157 to GCA papers; 75 to GEM
papers; 2,172 to ICAI papers; 1,529 to ICOMP papers; 1,247 to ICWN papers;
571 to IKE papers; 255 to IPCV papers; 137 to MSV papers; 5,239 to PDPTA
papers; 496 to SAM papers; 1,390 to SERP papers; and 177 to SWWS papers.
In total, over 25,600 citations have been made (so far) to papers
published in the proceedings of this federated joint conferences. Refer
to the URLs below to see the actual citation numbers (each is a link to
a live search and so it may take a few seconds for the data to pull up):

http://academic.research.microsoft.com/Conference/1816/biocomp-bioinformatics-&-computational-biology
http://academic.research.microsoft.com/Conference/1845/cdes-international-conference-on-computer-design/
http://academic.research.microsoft.com/Conference/1852/cgvr-international-conference-on-computer-graphics-and-virtual-reality/
http://academic.research.microsoft.com/Conference/1887/csc-international-conference-on-scientific-computing/
http://academic.research.microsoft.com/Conference/1920/dmin-int-conf-on-data-mining/
http://academic.research.microsoft.com/Conference/1891/csreaeee-international-conference-on-e-business-enterprise-information-systems-e-government/
http://academic.research.microsoft.com/Conference/679/ersa-engineering-of-reconfigurable-systems-and-algorithms/
http://academic.research.microsoft.com/Conference/681/esa-embedded-systems-and-applications/
http://academic.research.microsoft.com/Conference/1981/fcs-international-conference-on-foundations-of-computer-science/
http://academic.research.microsoft.com/Conference/1983/fecs-conference-on-frontiers-in-education/
http://academic.research.microsoft.com/Conference/1998/gca-international-conference-on-grid-computing-and-applications/
http://academic.research.microsoft.com/Conference/2467/gem-international-conference-on-genetic-and-evolutionary-methods/
http://academic.research.microsoft.com/Conference/7/ic-ai-international-conference-on-artificial-intelligence/
http://academic.research.microsoft.com/Conference/5/icomp-international-conference-on-internet-computing/
http://academic.research.microsoft.com/Conference/48/icwn-international-conference-on-wireless-networks/
http://academic.research.microsoft.com/Conference/65/ike-information-and-knowledge-engineering/
http://academic.research.microsoft.com/Conference/2114/ipcv-international-conference-on-image-processing-computer-vision-and-pattern-recognition/
http://academic.research.microsoft.com/Conference/2209/msv-int-conf-on-modeling-simulation-&-visualization-methods/
http://academic.research.microsoft.com/Conference/214/pdpta-parallel-and-distributed-processing-techniques-and-applications/
http://academic.research.microsoft.com/Conference/332/sam-security-and-management/
http://academic.research.microsoft.com/Conference/361/serp-software-engineering-research-and-practice/
http://academic.research.microsoft.com/Conference/2308/swws-conference-on-semantic-web-and-web-services/

USEFUL WEB LINKS:

1. Web site of SAM’12:
http://sam.udmercy.edu/sam12
2. The 2011 congress delegates photos are available at:
http://worldcomp.phanfare.com/5408606
3. This announcement contains updated and current information (correct
as of the date of this message). The information that appears in this
announcement supersedes earlier ones.

CONTACT:
Inquiries should be sent to: sc@world-comp.org

Mar 22

STPSA 2012 : The 7th IEEE International Workshop on Security, Trust, and Privacy for Software Applications

When Jul 16, 2012 – Jul 20, 2012
Where Izmir, Turkey
Submission Deadline Mar 30, 2012
Notification Due Apr 20, 2012
Final Version Due May 2, 2012

STPSA 2012 : The 7th IEEE International Workshop on Security, Trust, and Privacy for Software Applications.

Mar 22

PASSAT 2012 : 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust

When Sep 3, 2012 – Sep 6, 2012
Where Amsterdam, The Netherlands
Abstract Registration Due Apr 1, 2012
Submission Deadline May 11, 2012
Notification Due Jul 3, 2012
Final Version Due Jul 20, 2012

PASSAT 2012 : 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust.

Mar 21

IEEE CloudCom 2012 / Workshops: Call For Papers (Taipei, Taiwan, December 03-06, 2012)

IEEE CloudCom 2012 / Workshops: Call For Papers (Taipei, Taiwan, December 03-06, 2012)
The 4th IEEE International Conference on
Cloud Computing Technology and Science
(IEEE CloudCom 2012)

http://2012.cloudcom.org

Taipei, Taiwan, December 03-06, 2012

Sponsored by:
Institute of Electrical and Electronic Engineers (IEEE)
IEEE Computer Society
IEEE Technical Commitee on Scalable Computing

== IMPORTANT DATES ==

Abstract Submission (obligatory): July 13, 2012
Full Submission: July 27, 2012
Notification: Sep. 7, 2012
Camera-ready/Author registration: Sep. 28, 2012
Workshop Proposals: April 13, 2012
Poster and Demo: Sep. 10, 2012
Poster and Demo Notification: Sep. 20, 2012
== Topics ==

1. Architecture
*Cloud Infrastructure as a Service
*Cloud Platform as a Service
*Cloud federation and hybrid cloud infrastructure
*Programming models and systems/tools
*Green data center
*Networking technologies for data center
*Cloud system design with FPGA, GPU, APU
*Monitoring, management and maintenance
*Economic and business models
*Dynamic resource provisioning

2. MapReduce
*Performance characterization and optimization
*MapReduce on multi-core, GPU
*MapReduce on hybrid distributed environments
*MapReduce on opportunistic / heterogeneous computing systems
*Extension of the MapReduce programming model
*Debugging and simulation of MapReduce systems
*Data-intensive applications using MapReduce
*Optimized storage for MapReduce applications
*Fault-tolerance & Self-* capabilities

3. Security and Privacy
*Accountability
*Audit in clouds
*Authentication and authorization
*Cryptographic primitives
*Reliability and availability
*Trust and credential management
*Usability and security
*Security and privacy in clouds
*Legacy systems migration
*Cloud Integrity and Binding Issues
4. Services and Applications
*Cloud Service Composition
*Query and discovery models for cloud services
*Trust and Security in cloud services
*Change management in cloud services
*Organization models of cloud services
*Innovative cloud applications and experiences
*Business process and workflow management
*Service-Oriented Architecture in clouds

5. Virtualization
*Server, storage, network virtualization
*Resource monitoring
*Virtual desktop
*Resilience, fault tolerance
*Modeling and performance evaluation
*Security aspects
*Enabling disaster recovery, job migration
*Energy efficient issues

6. HPC on Cloud
*Load balancing for HPC clouds
*Middleware framework for HPC clouds
*Scalable scheduling for HPC clouds
*HPC as a Service
*Performance Modeling and Management
*Programming models for HPC clouds
*HPC cloud applications
*Optimal cloud deployment for HPC

== PAPER SUBMISSION ==

Papers need to be prepared according to the IEEE CS format, and submitted in PDF format via the EasyChair submission system:
https://www.easychair.org/account/signin.cgi?conf=ieeecloudcom2012

== PAPER PUBLICATION ==

Accepted conference papers will be published by IEEE CS Press (IEEE-DL & EI indexed).

== Journal Publication ==

Best Paper Awards will be presented to high quality papers.
Selected papers, after further extensions and revisions, will be published in special issues of prestigious journals

International Journal of Communication Systems (Wiley) (SCI, EI)
Journal of Systems Architecture (Elsevier) (SCI, EI)
Automated Software Engineering (Springer) (SCI, EI)
Journal of Internet Technology (SCIE, EI)

Mar 12

ANSEC 2012 – First International Workshop on Anonymity and Security Aspects of Embedded Systems

CALL FOR PAPERS

ANSEC 2012 – First International Workshop on Anonymity and Security
Aspects of Embedded Systems

Liverpool, UK, 25-27 June, 2012

Abstract:
Mobile and embedded devices are rapidly evolving powerful, ubiquitous
devices which are involved in security-critical operations like
authentication, payment, e-Banking and e-Government applications. In
addition, privacy and anonymity protection of devices and their users is
gaining more and more importance. This workshop focuses on the question
of how existing security mechanisms (e.g. TrustZone or Secure Elements,
etc.) can be efficiently utilized to provide a secure basis to support
current security de-pendent applications and privacy enhancing
technologies. How can the existing cryptographic primitives for PETs
efficiently and securely be realized on state-of-the -art embedded
systems? Which applications for privacy-enhancing technologies exist and
how can they be realized on devices that operate in  the Internet of
things (e.g. smart-phones, smart-cards, RFID tags etc.)? How can
privacy-enhancing protocols and existing embedded security mechanisms be
attacked and what has to be done in order to increase the efficiency of
the security mechanisms?

Scope and interest:
In ANSEC 2012 we consider different aspects of cyber physical systems
and their protection mechanisms. Of particular interest are security
aspects of embedded systems and their relation to privacy and anonymity
protection.

This includes (but is not limited to) the following topics:
• Embedded system security (operating system security, hardware
security, information control flow integrity, …)
• Hardware supported cryptography for embedded systems
• Hardware supported security mechanisms
• Cryptographic primitives for Privacy Enhancing Technologies
• Trusted Computing for Embedded Systems
• Privacy aspects of embedded systems (e.g. electronic identities)
• Secure execution environments on embedded devices
• Attacks and attack models on embedded systems and privacy enhancing
technologies
• Certification of Embedded system security features and privacy
enhancing technologies
• Embedded system security (smart phones, automotive systems, RFID tags
etc.)
• Anonymous authentication for embedded systems (protocols, mechanisms etc.)

Submission and Publication:
Authors are invited to submit manuscripts dealing with research and recent
developments in the topics related to the workshop. Accepted papers from
this workshop will be published by the IEEE Computer Society in IEEE
TrustCom-12
conference proceedings (indexed by EI Compendex and ISTP).
Papers must be written in English conforming to the IEEE conference
proceedings format (http://www.computer.org/portal/web/cscps/formatting)
and are limited to 6 pages (or 8 pages with the over length charge)
including figures and references.
Moreover, they must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references.
The papers must be submitted in pdf format using the EasyChair conference
management system. (http://www.easychair.org/conferences/?conf=ansec12)
Workshop Website:
http://www.iaik.tugraz.at/content/about_iaik/events/ansec12/

Workshop Chair:
Kurt Dietrich<Kurt.Dietrich@iaik.tugraz.at>

Program Committee:
– Johann Großschädl (Univ. Luxemburg)
– Hanns Brandl (Infineon Technologies)
– Jean-Jacques Quisquater (UCL)
– Stefan Mangard (Infineon Technologies)
– Vincent Rijmen (KU Lueven, TU Graz)
– Stefan Tillich (Univ. of Bristol)
– Liqun Chen (HP)
– Jiangtao Li (Intel)
– Bart Preneel (KU Lueven)
– Berndt Gammel (Infineon Technologies)
– Mario Lamberger (NXP)

IMPORTANT DATES:
Submission Deadline: 31 March, 2012
Authors Notification: 30 April, 2012
Final Manuscript Due: 15 May, 2012
Registration Due: 08 May, 2012

Organizer:
Kurt Dietrich<Kurt.Dietrich@iaik.tugraz.at>
Roderick Bloem<Roderick.Bloem@iaik.tugaz.at>

Contact:
Please send inquiries concerning ANSEC 2012 to:
Kurt.Dietrich@iaik.tugraz.at.

Mar 06

The 2012 International Conference on Security and Management (SAM’12)

CALL  FOR  PAPERS

SAM’12
The 2012 International Conference on
Security and Management

July 16-19, 2012, Las Vegas, USA

http://sam.udmercy.edu/sam12

IMPORTANT DATES:

March 12, 2012:    Submission of full papers (about 7 pages)
April 12, 2012:    Notification of acceptance (+/- two days)
April 26, 2012:    Final papers + Copyright/Consent + Registration
July 16-19, 2012:  The 2012 International Conference on Security
and Management (SAM’12)

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. The proceedings of the congress that SAM is part of, enjoys
a high number of citations; over 25,000 citations so far.

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
Security algorithms, mobile network security, security in CDN
(Contents Distribution Networks), Virtual Private Network (VPN),
tracing techniques in internet, active networks, security in Grid,
web monitoring, network security engineering, transport-level
security, wireless network security, IP security, electronic mail
security.
O  Cryptographic Technologies:
Security protocols, key management techniques, cryptographic
technologies, applications of block and stream ciphers, applications
of public key cryptology, message authentication and hash functions,
anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
Surveillance technologies, security policies, security for protocol
management, location management, QoS management, resource management,
channel management, mobility management, digital contents copyright
protection, system security management, network security management,
management in network equipment, Storage Area Networks (SAN)
management, information security management, government security
policy, web penetration testing, security operations,
vulnerabilities management.
O  Security Applications:
Security in e-Commerce and M-Commerce, secure OS, watermarking,
high-tech systems at airports, emerging technologies and
applications, Cloud computing security, database security, data
mining security, cyber security automation.
O  Biometrics and Forensics:
Novel biometric methods, forensics, biological security technologies,
face recognition systems, signature recognition systems, cyber
forensics, forensic analysis, biometric technologies for security,
feature extraction and matching algorithms.
O  Hardware Security:
Embedded systems security, cryptographic processors and co-processors,
security architectures, true and pseudorandom number generators,
side channel attacks, fault attacks, hardware tamper resistance,
smart card processors, secure storage devices.
O  Information Assurance:
Mission assurance, risk assessment and risk management, continuity
of operations and business impact analysis, cyber security compliance,
security auditing, security-savvy software development, disaster
recovery, business continuity analysis, access control, secure use
of software, secure performance.
O  Computer Security:
Firewall systems, hacking techniques and related issues, intrusion
detection system (IDS), honeypot, virus issues (detection,
prevention …), trusted computing, alert correlation, attack graphs,
incident responding, malware analysis, incident responding, malware
analysis, intrusion detection.
O  Security Education:
Computer security education, network security education, cyber
security education, cyber security body of knowledge, information
assurance education.

SUBMISSION OF PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam12
Submissions must be uploaded by March 12, 2012 and they must be in
either MS doc or pdf formats (about 7 pages including all figures,
tables, and references – single space, font size of 10 to 12). All
reasonable typesetting formats are acceptable (later, the authors of
accepted papers will be asked to follow a particular typesetting format
to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication
elsewhere. The first page of the paper should include: title of the
paper, name, affiliation, postal address, and email address for each
author. The first page should also identify the name of the Contact Author
and a maximum of 5 topical keywords that would best represent the content
of the paper. The name of the conference (ie, SAM) that the paper is
being submitted for consideration must be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final
Camera-Ready papers (if accepted) will be limited to 7 (two-column IEEE
style) pages.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee will be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees by using a double-blinded review
process. In addition, all papers whose authors include a member of the
conference program committee will be evaluated using the double-blinded
review process. (Essay/philosophical papers will not be refereed but may be
considered for discussion/panels).

Authors whose papers are accepted will be instructed to upload their papers
to a particular web site for publication – the uploaded papers to the
publication web site will only be checked for correct typesetting. At this
point, authors will be required to attest to the originality of their work
(ie, declaring that no part of the work is plagiarized and the paper does not
suffer from any acts of plagiarism.)

Proceedings of SAM will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper (science citation databases such as: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (covers the core
scientific literature in Science; about 90% of inclusions are journals;
only about 9% are proceedings; worldcomp tracks are selected to be among
the 9% – accessable from INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit,
Qwam, and STN International); and others. Though, there is no guarantee that
the proceedings will also be included in EI Compendex/Elsevier indexings,
in the past, the proceedings in which SAM was part of were included in
these databases. Therefore, we will also be sending the proceedings for
indexing procedures to EI Compendex/Elsevier. The printed proceedings/books
will be available for distribution on site at the conference.

In addition to the publication of the proceedings, selected authors will be
invited to submit extended versions of their papers for publication in a
number of research books contracted with various publishers – these books
will be composed after the conference. Also, many chairs of tracks will be
forming journal special issues to be published after the conference.

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except for the submission
is limited to 2 pages. On the first page, the author should state that “This
paper is being submitted as a poster”. Poster papers (if accepted) will be
published if and only the author of the accepted paper wishes to do so.
See: http://sam.udmercy.edu/sam12/call-for-posters.html

GENERAL INFORMATION:

The SAM conference is being held jointly (same location and dates) with a
number of other research conferences (WORLDCOMP). WORLDCOMP is the
largest annual gathering of researchers in computer science, computer
engineering and applied computing. We anticipate to have 2,100 or more
attendees from over 80 countries. WORLDCOMP 2012 will be composed of
research presentations, keynote lectures, invited presentations, tutorials,
panel discussions, and poster presentations. In recent past, keynote/
tutorial/panel speakers have included: Prof. David A. Patterson (pioneer,
architecture, U. of California, Berkeley), Dr. K. Eric Drexler (known as
Father of Nanotechnology), Prof. John H. Holland (known as Father of
Genetic Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of
Grid Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), and many other distinguished speakers. To get a feeling
about the conferences’ atmosphere, see the 2011 delegates photos
available at: http://worldcomp.phanfare.com/5408606

An important mission of WORLDCOMP is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.  70148

CO-SPONSORS:

Currently being prepared – The ACADEMIC co-sponsors of the last offering of
the congress (2011) included research labs and centers affiliated with (a
partial list): University of California, Berkeley; Harvard University;
Massachusetts Institute of Technology (MIT); University of Texas at
Austin; University of Southern California; Minnesota Supercomputing
Institute, University of Minnesota; Germany’s University of Siegen; UMIT,
Institute of Bioinformatics and Translational Research, Austria; University
of Iowa; Russian Academy of Sciences, Russia; University of Naples
Federico II, Italy; University of Naples Parthenope, Italy; Second
University of Naples, Italy; ICEL, Texas A&M University Com.; University
of North Dakota; and others. CORPORATE Co-Sponsors and Sponsors at-large
included (a partial list): Intel Corporation; Microsoft Research; Altera
Corporation; Pico Computing; SuperMicro Computer, Inc., USA; High
Performance Computing for Nanotechnology (HPCNano); International Society
of Intelligent Biological Medicine; World Academy of Biomedical Sciences
and Technologies; Int’l Council on Medical and Care Compunetics; UK
Department for Business, Enterprise and Regulatory Reform; Scientific
Technologies Corporation; and HoIP – Health without Boundaries; and others.

MEASURABLE SCIENTIFIC IMPACT OF WORLDCOMP:

The proceedings of WORLDCOMP enjoys a high number of citations (ICAI
is an important part of WORLDCOMP). As of February 28, 2012, papers published
in each track of the proceedings have received the following number of
citations: 252 citations to BIOCOMP papers; 116 to CDES papers; 65 to CGVR
papers; 55 to CSC papers; 271 to DMIN papers; 69 to EEE papers; 1289 to
ERSA papers; 504 to ESA papers; 176 to FCS papers; 9416 to FECS papers; 157
to GCA papers; 75 to GEM papers; 2277 to ICAI papers; 1539 to ICOMP papers;
1247 to ICWN papers; 571 to IKE papers; 255 to IPCV papers; 137 to MSV
papers; 5239 to PDPTA papers; 496 to SAM papers; 1390 to SERP papers; and
177 to SWWS papers. In total, over 25,000 citations have been made (so far)
to papers published in the proceedings of WORLDCOMP conferences.

USEFUL WEB LINKS:

1. Web site of SAM’12:
http://sam.udmercy.edu/sam12
2. The 2011 congress delegates photos are available at:
http://worldcomp.phanfare.com/5408606
3. This announcement contains updated and current information (correct
as of the date of this message). The information that appears in this
announcement supersedes earlier ones.

CONTACT:
Inquiries should be sent to: editor@world-comp.org

Feb 10

International Conference on Security and Management (SAM 2012)

                              SAM’12
The 2012 International Conference on
Security and Management

Date and Location: July 16-19, 2012, Las Vegas, USA

http://sam.udmercy.edu/sam12

IMPORTANT DATES:

March 12, 2012:    Submission of full papers (about 7 pages)
April 12, 2012:    Notification of acceptance (+/- two days)
April 26, 2012:    Final papers + Copyright/Consent + Registration
July 16-19, 2012:  The 2012 International Conference on Security
and Management (SAM’12)

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of
selected papers (about 40%) will appear in journals and edited research
books (publishers include: Springer, Elsevier, …).

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
Security algorithms, mobile network security, security in CDN
(Contents Distribution Networks), Virtual Private Network (VPN),
tracing techniques in internet, active networks, security in Grid,
web monitoring, network security engineering, transport-level
security, wireless network security, IP security, electronic mail
security.
O  Cryptographic Technologies:
Security protocols, key management techniques, cryptographic
technologies, applications of block and stream ciphers, applications
of public key cryptology, message authentication and hash functions,
anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
Surveillance technologies, security policies, security for protocol
management, location management, QoS management, resource management,
channel management, mobility management, digital contents copyright
protection, system security management, network security management,
management in network equipment, Storage Area Networks (SAN)
management, information security management, government security
policy, web penetration testing, security operations,
vulnerabilities management.
O  Security Applications:
Security in e-Commerce and M-Commerce, secure OS, watermarking,
high-tech systems at airports, emerging technologies and
applications, Cloud computing security, database security, data
mining security, cyber security automation.
O  Biometrics and Forensics:
Novel biometric methods, forensics, biological security technologies,
face recognition systems, signature recognition systems, cyber
forensics, forensic analysis, biometric technologies for security,
feature extraction and matching algorithms.
O  Hardware Security:
Embedded systems security, cryptographic processors and co-processors,
security architectures, true and pseudorandom number generators,
side channel attacks, fault attacks, hardware tamper resistance,
smart card processors, secure storage devices.
O  Information Assurance:
Mission assurance, risk assessment and risk management, continuity
of operations and business impact analysis, cyber security compliance,
security auditing, security-savvy software development, disaster
recovery, business continuity analysis, access control, secure use
of software, secure performance.
O  Computer Security:
Firewall systems, hacking techniques and related issues, intrusion
detection system (IDS), honeypot, virus issues (detection,
prevention …), trusted computing, alert correlation, attack graphs,
incident responding, malware analysis, incident responding, malware
analysis, intrusion detection.
O  Security Education:
Computer security education, network security education, cyber
security education, cyber security body of knowledge, information
assurance education.

CO-SPONSORS:

Currently being prepared – The ACADEMIC sponsors of the last offering of
SAM (2011) included research labs and centers affiliated with (a
partial list): University of California, Berkeley; Harvard University;
Massachusetts Institute of Technology (MIT); University of Texas at
Austin; University of Southern California; Minnesota Supercomputing
Institute, University of Minnesota; Germany’s University of Siegen; UMIT,
Institute of Bioinformatics and Translational Research, Austria; Georgia
Institute of Technology; University of Iowa; Russian Academy of Sciences,
Russia; University of Naples Federico II, Italy; University of Naples
Parthenope, Italy; Second University of Naples, Italy; ICEL, Texas A&M
University Com.; University of North Dakota; and others.
CORPORATE Co-Sponsors and Sponsors at-large included (a partial list):
Intel Corporation; Microsoft Research; Altera Corporation; Pico Computing;
SuperMicro Computer, Inc., USA; High Performance Computing for Nanotechnology
(HPCNano); International Society of Intelligent Biological Medicine; World
Academy of Biomedical Sciences and Technologies; Int’l Council on Medical
and Care Compunetics; UK Department for Business, Enterprise and Regulatory
Reform; Scientific Technologies Corporation; and HoIP – Health without
Boundaries; and others.

SUBMISSION OF PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site (EasyChair) at:
https://www.easychair.org/account/signin.cgi?conf=sam12

Submissions must be uploaded by March 12, 2012 and they must be in
either MS doc or pdf formats (about 7 pages including all figures,
tables, and references – single space, font size of 10 to 12). All
reasonable typesetting formats are acceptable (later, the authors of
accepted papers will be asked to follow a particular typesetting format
to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication
elsewhere. The first page of the paper should include: title of the
paper, name, affiliation, postal address, and email address for each
author. The first page should also identify the name of the Contact Author
and a maximum of 5 topical keywords that would best represent the content
of the paper. The name of the conference (ie, SAM) that the paper is
being submitted for consideration must be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final
Camera-Ready papers (if accepted) will be limited to 7 (two-column IEEE
style) pages.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee will be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees by using a double-blinded review
process. In addition, all papers whose authors include a member of the
conference program committee will be evaluated using the double-blinded
review process. (Essay/philosophical papers will not be refereed but may be
considered for discussion/panels). Proceedings of SAM will be published
in printed conference books (ISBN) and will also be made available online.
The proceedings will be indexed in science citation databases that track
citation frequency/data for each published paper (science citation databases
such as: Inspec / IET / The Institute for Engineering & Technology; The
French National Center for Scientific Research, CNRS, INIST databases, PASCAL
(covers the core scientific literature in Science; about 90% of inclusions
are journals; only about 9% are proceedings; worldcomp tracks are selected
to be among the 9% – accessable from INIST, Datastar, Dialog, EBSCO, OVID,
Questel.Orbit, Qwam, and STN International); and others. Though, there is
no guarantee that the proceedings will also be included in
EI Compendex/Elsevier indexings, in the past, SAM proceedings were included
in these databases. Therefore, we will also be sending the proceedings for
indexing procedures to EI Compendex/Elsevier. The printed proceedings/books
will be available for distribution on site at the conference.

In addition to the publication of the proceedings, selected authors will be
invited to submit extended versions of their papers for publication in a
number of research books contracted with various publishers (such as,
Springer, Elsevier, …) – these books will be composed after the conference.
Also, many chairs of tracks will be forming journal special issues to be
published after the conference.

MEMBERS OF PROGRAM AND ORGANIZING COMMITTEES:

Currently being finalized:
The members of the Steering Committee of The 2011 congress included:
Dr. Selim Aissi (Chief Strategist, Intel Corp., USA); Prof. Hamid Arabnia
(ISIBM elected Fellow & Professor, University of Georgia; Editor-in-Chief,
The Journal of Supercomputing / Springer; Board member, Journal of
Computational Science / Elsevier; Advisory Board, IEEE TC on Scalable
Computing); Prof. Ruzena Bajcsy (Member, National Academy of Engineering,
IEEE Fellow, ACM Fellow, Professor; University of California, Berkeley,
USA); Prof. Hyunseung Choo (ITRC Director of Ministry of Information &
Communication; Director, ITRC; Director, Korea Information Processing
Society; Assoc. Editor, ACM Transactions on Internet Technology; Professor,
Sungkyunkwan University, Korea); Prof. Winston Wai-Chi Fang (IEEE Fellow,
TSMC Distinguished Chair Professor, National ChiaoTung University, Hsinchu,
Taiwan; Director, System-on-Chip Research Center); Prof. Kun Chang Lee
(Professor of MIS and WCU Professor of Creativity Science, Sungkyunkwan
University, South Korea); Prof. Andy Marsh (Director of HoIP and Director
of HoIP Telecom, UK; Secretary-General WABT; Vice-President Int’l Council
for Engineering and Technology, University of Westminster, UK); Prof. Layne
T. Watson (IEEE Fellow, NIA Fellow, ISIBM Fellow, Fellow of The National
Institute of Aerospace, Professor, Virginia Polytechnic Institute & State
University, USA); Prof. Lotfi A. Zadeh (Member, National Academy of
Engineering; IEEE Fellow, ACM Fellow, AAAS Fellow, AAAI Fellow, IFSA Fellow;
Director, BISC; Professor, University of California, Berkeley, USA).
2012 Publicity Chair: Ashu M. G. Solo (Fellow of British Computer Society;
Principal/R&D Engineer and Mathematician, Maverick Technologies
America Inc.; Director/Interdisciplinary Researcher, Solo Research Lab,
Crocels, Swansea University; Principal/Intelligent Systems Instructor,
Trailblazer Intelligent Systems, Inc.)

The 2012 Program Committee for SAM is currently being compiled. Many
who have already joined the committees are renowned leaders, scholars,
researchers, scientists and practitioners of the highest ranks; many are
directors of research labs., members of National Academy of Engineering,
fellows of various societies, heads/chairs of departments, program
directors of research funding agencies, as well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the Program
Committee should email Prof. Kevin Daimi ( daimikj@udmercy.edu ) the
following information for consideration/evaluation: Name, affiliation
and position, complete mailing address, email address, a one-page
biography that includes research expertise and the name of the
conference(s) offering to help with. The list of Program Committee of
SAM 2011 appears at:
http://www.world-academy-of-science.org/worldcomp11/ws/conferences/sam11/committee

GENERAL INFORMATION:

The SAM 2012 conference is being held jointly (same location and dates)
with a number of other research conferences (WORLDCOMP). WORLDCOMP is the
largest annual gathering of researchers in computer science, computer
engineering and applied computing. We anticipate to have 2,100 or more
attendees from over 80 countries. WORLDCOMP 2012 will be composed of
research presentations, keynote lectures, invited presentations, tutorials,
panel discussions, and poster presentations. In recent past, keynote/
tutorial/panel speakers have included: Prof. David A. Patterson (pioneer,
architecture, U. of California, Berkeley), Dr. K. Eric Drexler (known as
Father of Nanotechnology), Prof. John H. Holland (known as Father of
Genetic Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of
Grid Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), and many other distinguished speakers. To get a feeling
about the conferences’ atmosphere, see the 2011 delegates photos
available at: http://worldcomp.phanfare.com/5408606

An important mission of WORLDCOMP is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines. 70148

MEASURABLE SCIENTIFIC IMPACT OF WORLDCOMP:

As of February 5, 2012, papers published in WORLDCOMP set of proceedings
have received 20,405 citations. In recent months (November 23, 2011 to
February 5, 2012; ie, in about 75 days), there had been 4,545 citations
to WORLDCOMP papers (about 1,800 citations per month). The above record
is significant (thanks to the authors). As the result of high impact
(based on citations) of WORLDCOMP papers, “Microsoft Academic Search”
has listed each individual track of the congress among its compiled list
of “Top Conferences”. The citation record of WORLDCOMP set of proceedings
is in fact higher than the citation data of many reputable journals in
computer science and computer engineering. Citation data was obtained
obtained from http://academic.research.microsoft.com/ )

USEFUL WEB LINKS:
1. Web site of SAM’12: http://www.world-academy-of-science.org/
The proceedings’ Table of Contents of last offering of SAM (2011) appears at:
http://world-comp.org/proc2011/sam/contents-vol-i.pdf
2. Detailed information about citations to worldcomp proceedings:
http://www.world-academy-of-science.org/worldcomp12/ws/news
3. This announcement contains updated and current information (correct
as of the date of this message). The information that appears in this
announcement supersedes earlier ones.

CONTACT:
General inquiries should be sent to: editor@world-comp.org

Feb 08

WSCS 2012 : Workshop on Semantic Computing and Security (IEEE)

When May 24, 2012 – May 24, 2012
Where San Francisco, CA USA
Submission Deadline Feb 18, 2012
Notification Due Mar 31, 2012
Final Version Due Apr 15, 2012

WSCS 2012 : Workshop on Semantic Computing and Security.