Tag: metrics

Nov 10

Workshop on Cryptographic Hardware and Embedded Systems CFP

 

+————————————————————————-

!                                                                        

!                                    CHES 2012 

!                             

!                       Workshop on Cryptographic Hardware

!                               and Embedded Systems   

!                    

!                                 Leuven, Belgium                           

!                               9-12 September 2011          

!                                                                        

+————————————————————————-+

 

Important Dates

===============

 

  Submission deadline:      March 5, 2012, 23:59 PST

  Acceptance notification:  May 14, 2012

  Final version due:        June 18, 2012

  Workshop presentations:   September 9-12, 2012

 

 

Background, aim and scope

=========================

 

     CHES covers new results on all aspects of the design and analysis of cryptographic hardware and software implementations. The workshop builds a bridge between the cryptographic research community and the cryptographic engineering community. With participants from industry, academia, and government organizations, the number of participants has grown to over 300 in recent years.

 

     In addition to a track of high-quality presentations, CHES 2012 will offer invited talks, tutorials, a poster session, and a rump session. CHES 2012 especially encourages submissions on the following two subjects: DESIGN METHODS TO BUILD SECURE AND EFFICIENT HARDWARE OR SOFTWARE and LEAKAGE RESILIENT CRYPTOGRAPHY INCLUDING NEW MODEL DEFINITIONS AND ANALYSIS AND THE DESIGN OF NEW CRYPTOSYSTEMS. All submitted papers will be reviewed by at least four Program Committee members.

    

     This year, authors will be invited to submit brief rebuttals of the reviews before the final acceptances are made.

 

 

TOPICS

======

 

The topics of CHES 2012 include but are not limited to:

 

 

Cryptographic implementations

 

– Hardware architectures for public-key, secret-key and hash algorithms

– Cryptographic processors and co-processors

– Hardware accelerators for security protocols (security processors, network processors, etc.)

– True and pseudorandom number generators

– Physical unclonable functions (PUFs)

– Efficient software implementations of cryptography

 

 

Attacks against implementations and countermeasures against these attacks

 

– Side channel attacks and countermeasures

– Fault attacks and countermeasures

– Hardware tampering and tamper-resistance

 

 

Tools and methodologies

 

– Computer aided cryptographic engineering

– Verification methods and tools for secure design

– Metrics for the security of embedded systems

– Secure programming techniques

– FPGA design security

– Formal methods for secure hardware

 

 

Interactions between cryptographic theory and implementation issues

 

– New and emerging cryptographic algorithms and protocols targeting embedded devices

– Special-purpose hardware for cryptanalysis   

– Leakage resilient cryptography

 

 

Applications

 

– Cryptography in wireless applications (mobile phone, WLANs, etc.)

– Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)

– Hardware IP protection and anti-counterfeiting

– Reconfigurable hardware for cryptography

– Smart card processors, systems and applications

– Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)

– Secure storage devices (memories, disks, etc.)

– Technologies and hardware for content protection

– Trusted computing platforms

 

 

Instructions for CHES Authors

=============================

 

Authors are invited to submit original papers via electronic submission. Details of the electronic submission procedure will be posted on the CHES webpage when the system is activated. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The paper should be at most 12 pages (excluding the bibliography and clearly marked appendices), and at most 18 pages in total, using at least 11-point font and reasonable margins. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submissions will be blind-refereed. Only original research contributions will be considered. Submissions which substantially duplicate work that any of the authors have published elsewhere, or have submitted in parallel to any other conferences or workshops that have proceedings will be instantly rejected. The IACR Policy on Irregular Submissions (http://www.iacr.org/irregular.html) will be strictly enforced.

 

 

Poster Session

==============

 

The CHES technical sessions will include a slot for a poster session, open to any submitter.

 

Arrangements for submitting posters will be announced later.

 

Tutorial Sessions

=================

 

The program chairs welcome suggestions for half-day tutorials at ches2012programchairs@iacr.org

 

 

Program Committee

=================

 

To be announced!

 

Organizational Committee

========================

 

All correspondence and/or questions should be directed to either of the Organizational Committee members:

 

Program co-Chairs:

 

  Emmanuel Prouff

  Oberthur Technologies (France)

  Email: ches2012programchairs@iacr.org

 

and

 

  Patrick Schaumont

  Virginia Tech (USA)

  Email: ches2012programchairs@iacr.org

 

General co-Chairs:

 

  Lejla Batina

  Radboud University Nijmegen (Netherlands) and K.U. Leuven (Belgium)

  Email: lejla@cs.ru.nl

 

and

 

  Ingrid Verbauwhede

  K.U. Leuven (Belgium)

  Email: Ingrid.Verbauwhede@esat.kuleuven.be

 

Workshop Proceedings

====================

 

The proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series in time for distribution at the workshop. Accepted papers should follow the LNCS default author instructions at URL http://www.springer.de/comp/lncs/authors.html (see file typeinst.pdf).  In order to be included in the proceedings, the authors of an accepted paper must guarantee to present their contribution at the workshop.

Oct 26

The Dark Side Of Biometrics: 9 Million Israelis’ Hacked Info Hits The Web | Fast Company

The Dark Side Of Biometrics: 9 Million Israelis’ Hacked Info Hits The Web | Fast Company.

Oct 23

ICCIT 2012 – Second International Conference on Communications and Information Technology ICCIT 2012

Deadline: January 16, 2012 When: June 26, 2012 – June 28, 2012

Where: Hammamet / Tunisia Tunisia

Updated: 15:03:00 Oct. 19, 2011 GMT+9

Call For Papers – CFP

Prospective authors are invited to submit an original full-length paper (10-point font) in IEEE format via the EDAS submissions system. Note that the maximum number of pages is 6; 5 pages plus 1 additional page allowed with a charge for the one additional page of USD100 if accepted. Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published.

IEEE specification based Latex and MS-Word templates for paper submission are available here.

The program committee may designate one accepted paper per track to the conference as ICCIT-2012 Best Papers. Every submission is automatically eligible for this award. Each author on each of the selected papers will receive a certificate to be awarded at the award dinner banquet.

The conference has four tracks. Topics of interest include, but are not limited to:

Wireless Communications and Signal Processing

Wireless Cross Layer Design

Multi-Antenna and MIMO Systems

Cognitive Radio and Dynamic Spectrum Access

Broadband Wireless/ OFDM System

Broadband Wireless Techno. (LTE, WiMAX ..)

Convergence of Wireless Systems

Cognitive Radio and Dynamic Spectrum Access

Modulation, Coding, and Diversity Techniques

PHY-Layer Security

Wireless Communications Testbed Development

Signal Processing Interfaces in Cognitive Radio

Speech, Image and Video Signal Processing

Multimedia Communication Technologies

Spectrum Shaping and Filters

Transmitter and Receiver Techniques

Adaptive Antennas and Beamforming

Blind Signal Processing for Communications

Channel Estimation, Modeling and Equalization

Information Technology and Cloud Computing

Hybrid Information Technology

High Performance Computing

Cloud and Cluster Computing

Ubiquitous Networks and Wireless Communications

Digital Convergence

Multimedia Convergence

Intelligent and Pervasive Applications

Security and Trust Computing

IT Management and Service

Bioinformatics and Bio-Inspired Computing

Knowledge System and Intelligent Agent

Game and Graphics

Human-centric Computing and Social Networks

Computer Vision and Image Processing

Remote Sensing and GIS

IT Applications in different Areas

Engineering Applications of IT

Communication Networks and Systems

Cellular Systems, 3G/4G and beyond

Wireless Ad hoc, Mesh and Sensor Networks

Reconfigurable Wireless Networks

Resource Management, Mobility Management, and Admission Control

Cross-Layer Design and Optimization

Performance Analysis and QoS Provisioning

Network Planning, Capacity Analysis, and Topology Control

Monitoring and Network Management Algorithms

Fault-Tolerance and Traffic Reliability Issues

Pricing and Billing Modeling and Solutions

Optical Networking

Network Reliability, Privacy & Security

Next Generation Internet

Internet Architecture and Design

Internet Signalling and Service Enabling Protocols

Digital Information Management

Data Mining, Web Mining

E-Learning, e-Commerce, e-Business and e-Gov.

Web Metrics and its applications

XML and other extensible languages

Semantic Web, Ontologies and Rules

Artificial Intelligence and Decision Support Systems

Knowledge Management

Peer to Peer Data Management

Interoperability, Mobile Data Management

Data Exchange issues and Supply Chain

Data Life Cycle in Products and Processes

Security and Access Control

Information Content Security

Distributed Information Systems

Information Visualization, Web Services

Multimedia and Interactive Multimedia

Video Search and Video Mining

Oct 23

Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012

Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012

Website:

 

Deadline: Sep. 10, 2011 | Date: Feb. 07, 2012 – Feb 09, 2012

Venue/Country: San Antonio / U.S.A

Updated: 15:07:20 Oct. 19, 2011 GMT+9

Call For Papers – CFP

ACM SIGSAC announces the continuation of its recently launched annual ACM Conference on Data and Applications Security. The second conference will be held February 7-9 2012 in Hilton Palacio Del Rio, San Antonio, Texas. With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learnt to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference series provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

Data and the applications that manipulate data are the crucial assets in today's information age. With the increasing drive towards availability of data and services anytime anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and/or the mobile devices they carry with them and computing new information of value to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations and government agencies to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries and the dramatic failure of old-style approaches to information protection in government agencies in keeping information too secret to connect the dots. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain.

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the conference is to discuss novel exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics include (but not limited to):

http://www.codaspy.org/

Application layer security policies Secure information sharing

Authorization /Access Control for Applications Secure knowledge management

Authorization/Access Control for Databases Secure multiparty computations

Data dissemination controls Secure software development

Data forensics Securing data/apps on untrusted platforms

Enforcement layer security policies Securing the semantic web

Privacy preserving techniques Security and Privacy in GIS/Spatial Data

Private information retrieval Security and Privacy in Healthcare

Search on protected/encrypted data Security policies for databases

Secure auditing Social computing security and privacy

Secure collaboration Social networking security and privacy

Secure data provenance Trust metrics for application, data and user

Secure electronic commerce Web application security

via Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012.

Oct 10

10th International Conference on Applied Cryptography and Network Security (ACNS 2012)

CALL FOR PAPERS
10th International Conference on Applied Cryptography and Network
Security (ACNS 2012)
Singapore — June 26-29, 2012

The 10th International Conference on Applied Cryptography and Network
Security (ACNS 2012) will be held in Singapore. The conference seeks
submissions from academia, industry, and government presenting novel
research on all aspects of applied cryptography as well as network
security and privacy. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged.
The conference has two tracks: a research track and an industry track.
Topics of interest include, but are not limited to:

– Access control
– Applied cryptography
– Automated  protocols analysis
– Biometric security and privacy
– Complex systems security
– Critical infrastructure protection
– Cryptographic primitives and protocols
– Data protection
– Database and system security
– Digital rights management
– Email and web security
– Identity management
– Intellectual property protection
– Internet fraud
– Intrusion detection and prevention
– Key management
– Malware
– Network security protocols
– Privacy, anonymity, and untraceability
– Privacy-enhancing technology
– Protection for the future Internet
– Secure mobile agents and mobile code
– Security in e-commerce
– Security in P2P systems
– Security in pervasive/ubiquitous computing
– Security and privacy in cloud and grid systems
– Security and privacy in distributed systems
– Security and privacy in smart grids
– Security and privacy in wireless networks
– Security and privacy metrics
– Trust management
– Usability and security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should
be at most 18 pages for research track and at most 8 pages for
industry track, including the bibliography and well-marked
appendices, and should follow the LNCS style. Submissions are
to be made to the submission web site at
http://www.easychair.org/account/signin.cgi?conf=acns2012.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 5, 2012
(11:59 p.m. Samoa time). Authors should indicate whether their
submission should be considered for the best student paper award;
any paper co-authored by at least a full time student is eligible.
Authors of accepted papers must guarantee that their papers will
be presented at the conference. Papers accepted for the research
track will be published in proceedings published by Springer's LNCS
and available at the conference. Extended versions of selected best
papers will be invited for a special issue on the Journal of
Computer Security.

IMPORTANT DATES
Paper submission due: February 5, 2012 (11:59 p.m. Samoa time)
Notification to authors: April 10, 2012
Camera ready due: April 24, 2012

GENERAL CHAIR
Jianying Zhou
I2R, Singapore

PROGRAM CHAIRS
Feng Bao
I2R, Singapore

Pierangela Samarati
Universita` degli Studi di Milano, Italy

ORGANIZING CHAIR
Shen-Tat Goh
I2R, Singapore

PUBLICITY CHAIRS
Xinyi Huang
I2R, Singapore

Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Michel Abdalla      (ENS, France)
Vijay Atluri        (Rutgers University, USA)
Lucas Ballard       (Google, USA)
Paulo Barreto       (University of Sao Paulo, Brazil)
Lujo Bauer          (Carnegie Mellon University, USA)
Marina Blanton      (University of Notre Dame, USA)
Carlo Blundo        (Universita' degli Studi di Salerno, Italy)
Levente Buttyan     (Budapest Uni of Technology and Economics, Hungary)
Roy Campbell        (University of Illinois at Urbana-Champaign, USA)
Liqun Chen          (HP Labs, UK)
Chen-Mou Cheng      (National Taiwan University, Taiwan)
Jung Hee Cheon      (Seoul National University, Korea)
Sherman Chow        (University of Waterloo, Canada)
Sabrina De Capitani di Vimercati (Universita' degli Studi di Milano, Italy)
Robert Deng         (Singapore Management University, Singapore)
Roberto Di Pietro   (Universita' di Roma Tre, Italy)
Xuhua Ding          (Singapore Management University, Singapore)
Kevin Du            (Syracuse University, USA)
Wu-Chang Feng       (Portland State University, USA)
Sara Foresti        (Universita' degli Studi di Milano, Italy)
Keith Frikken       (Miami University, USA)
Rosario Gennaro     (IBM Research, USA)
Dieter Gollmann     (Hamburg University of Technology, Germany)
Stefanos Gritzalis  (University of the Aegean, Greece)
Dawu Gu             (Shanghai Jiaotong University, China)
Guofei Gu           (Texas A&M University, USA)
Sushil Jajodia      (George Mason University, USA)
Stanislaw Jarecki   (University of California Irvine, USA)
Aaron Johnson       (Naval Research Laboratory, USA)
Angelos Keromytis   (Columbia University, USA)
Steve Kremer        (ENS Cachan, France)
Ralf Kuesters       (University of Trier, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Adam J. Lee         (University of Pittsburgh, USA)
Hui Li              (Xidian University, China)
Zhenkai Liang       (National University of Singapore, Singapore)
Benoit Libert       (Universite Catholique de Louvain, Belgium)
Peng Liu            (Penn State University, USA)
Michael Locasto     (University of Calgary, Canada)
Javier Lopez        (University of Malaga, Spain)
Mark Manulis        (TU Darmstadt, Germany)
Atsuko Miyaji       (JAIST, Japan)
Refik Molva         (EURECOM, France)
Yi Mu               (University of Wollongong, Australia)
Peng Ning           (North Carolina State University, USA)
Elisabeth Oswald    (University of Bristol, UK)
Vincent Rijmen      (Katholieke Universiteit Leuven, Belgium)
Matt Robshaw        (Orange Labs, France)
Radu Sion           (Stony Brook University, USA)
Neeraj Suri         (TU Darmstadt, Germany)
Willy Susilo        (University of Wollongong, Australia)
Tsuyoshi Takagi     (Kyushu University, Japan)
Vrizlynn Thing      (Institute for Infocomm Research, Singapore)
Jaideep Vaidya      (Rutgers University, USA)
Michael Waidner     (Fraunhofer, Germany)
Haining Wang        (College of William and Mary, USA)
Steve Weis          (AppDirect, USA)
Duncan Wong         (City University of Hong Kong, China)
Avishai Wool        (Tel Aviv University, Israel)
Shouhuai Xu         (University of Texas at San Antonio, USA)
Yanjiang Yang       (Institute for Infocomm Research, Singapore)
Danfeng Yao         (Virginia Tech, USA)
Moti Yung           (Google, USA)

This call for papers and additional information about the
conference can be found at http://icsd.i2r.a-star.edu.sg/acns2012

The history and statistics of ACNS can be found at ACNS Home
— http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

Sep 27

IEEE SYSTEMS JOURNAL Special Issue on Security and Privacy in Complex Systems

***Deadline approaching – October 1, 2011***


CALL FOR PAPERS


IEEE SYSTEMS JOURNAL
Special Issue on Security and Privacy in Complex Systems


Today's information society relies on a globally interconnected
infrastructure composed of diverse and widely distributed systems. It
is of utmost importance to ensure proper protection to such complex
systems, or systems-of-systems, to ensure security, privacy, and
availability of the infrastructure as well as of resources and
information it provides and manages. The problem is far from trivial,
due to the criticality and the social impact of the applications and
services relying on this global infrastructure, as well as the
complexity given by the co-existence and co-operation of, possibly
heterogeneous, component systems.
The goal of this special issue is to collect high-quality
contributions on security and privacy in complex systems and
systems-of-systems. We solicit submissions from academia, industry,
and government presenting novel and original research on all
theoretical and practical aspects of security and privacy in complex
systems. The focus of the special issue spans security and privacy
theory, technology, methodology, and applications in complex systems.
Submitted papers should therefore explicitly address issues in the
complex system scenario. Topics of interest include, but are not
limited, to the ones listed below provided that they are treated
with specific focus on the complex system scenario.

– access control
– anonymity
– applied cryptography
– authentication
– biometric security and privacy
– cyber warfare and security
– complex systems security
– computer forensics
– critical infrastructure protection
– data and application security
– data protection
– data/system integrity
– dependability, reliability, and availability
– formal methods for security and privacy
– human factors in security and privacy
– identity management
– insider threats
– intrusion detection and prevention
– knowledge extraction/representation for security
– legal and ethical issues
– middleware security
– network security
– operating systems security and privacy
– protection from cyberhacking
– security engineering
– secure environments and applications
– secure interoperability
– security and privacy metrics
– security and privacy policies
– security and privacy in cloud computing
– security and privacy in ad hoc networks
– security and privacy in e-services
– security and privacy in grid computing
– security and privacy in mobile systems
– security and privacy in monitoring systems
– security and privacy in industrial systems
– security and privacy in pervasive/ubiquitous computing
– security and privacy in sensor networks
– security and privacy in smart grid and distributed generation systems
– security and privacy in social applications and networks
– security and privacy in wireless sensor networks
– security architectures
– security management in complex scenarios
– social implications of security and privacy
– surveillance systems
– threats, vulnerabilities, and risk management
– transportation systems
– trust management
– usable security for complex systems
– verification and validation of complex systems
– web service security


Submitted papers must not be simultaneously submitted to a journal or a
conference with proceedings. Extended versions of prior work should provide
sufficient novel and original technical content; prior publications should
be explicitly referenced in the bibliography, and comparison and added
value with respect to prior publications should be discussed in the text.
All manuscripts for this special issue should be uploaded via the IEEE
Systems Journal Web site (http://www.systemsjournal.org), in the section
dedicated to the special issue, by the deadline of October 1, 2011, and
should follow formatting and submission instructions available at the
Web site. For any questions on the special issue, send email to
pierangela.samarati@unimi.it.


GUEST EDITORS
Sushil Jajodia
George Mason University, USA
jajodia@gmu.edu

Pierangela Samarati
Universita` degli Studi di Milano, Italy
pierangela.samarati@unimi.it


IMPORTANT DATES
Paper submission due: October 1, 2011
First notification to authors: January 15, 2012
Revised paper submission due: March 15, 2012
Second notification to authors: April 30, 2012
Publication date: 2012

Sep 01

IEEE Publication – Journal Special Issues

 

Deadline for Paper Submission: September 20, 2011
Notification of Acceptance: October 15, 2011
Camera ready submission and author registration: October 31, 2011
 
Publication: IEEE
 
Journal Special Issues:
————————————-
 
Authors of accepted papers presented at IAS 2011 will be invited to submit extended versions of their manuscripts for consideration in the following international journals:
Journal of Information Assurance and Security, USA
International Journal of Wireless and Mobile Computing (IJWMC),
Inderscience Publishers, Switzerland
International Journal of Computer Information Systems and Industrial
Management (IJCISIM), USA
 
 
**************************************************************************
 
7th International Conference on Information Assurance and Security (IAS'11)
Melaka, Malaysia
December 5-8, 2011
 
 
 
Technically Sponsored by:
————————————-
 
IEEE Systems, Man and Cybernetics Society (SMCS) – Spain Chapter
IEEE Systems, Man and Cybernetics Society (SMCS) – Czechoslovakia Chapter
 
 
Technically Supported by:
————————————-
IEEE Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Soft Computing Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Homeland Security
 
 
Publication: IEEE
————————-
 
 
Objective:
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information assurance and security to exchange ideas and to learn the latest development in this important field. The 4-day conference will feature prominent keynote speakers, workshop, tutorials, poster and paper presentation in parallel tracks. HIS 2011 invites novel contributions/papers of Information Assurance and Security from fundamental aspects to various practical applications.
 
Topics:
 
** Information Assurance, Security Mechanisms, Methodologies and Models **
 
Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptography
Cryptographic Protocols
Key Management and Recovery
 
 
** Secure System Architectures and Security Application **
 
Web Services Security
Grid Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards
 
 
** Image Engineering, Multimedia Signal Processing and Communication Security **
 
Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Biometrics
Information Fusion
Image Registration
Image Mosaic
Image Indexing and Retrieval
Image and Video Coding
Multiscale Geometric Analysis
Motion Detection and Tracing
Feature Extraction
3G Communication
Embedded System Design
 
 
Author Guidelines:
————————–
Submission of paper should be made through the submission link in IAS 2011 official website or the easychair conference system at: https://www.easychair.org/account/signin.cgi?conf=ias11
Please refer to the conference website for guidelines to prepare your manuscript. All accepted papers will be compiled in conference proceedings published by the IEEE. It is mandatory at least an author registers for every paper that is included in the conference proceedings. Proceedings will be made available during the conference.
 
 
 
IAS 2011 Organizing team:
———————————————
 
General Chairs
Ajith Abraham, MIR Labs, Europe
Daniel Zeng, University of Arizona, USA
Dharma Agrawal, University of Cincinatti, USA
 
 
Information Contact:
—————————-
Azah Kamilah Muda, UTeM, Malaysia

Jul 19

IEEE SYSTEMS JOURNAL Special Issue on Security and Privacy in Complex Systems

CALL FOR PAPERS


IEEE SYSTEMS JOURNAL
Special Issue on Security and Privacy in Complex Systems


Today's information society relies on a globally interconnected
infrastructure composed of diverse and widely distributed systems. It
is of utmost importance to ensure proper protection to such complex
systems, or systems-of-systems, to ensure security, privacy, and
availability of the infrastructure as well as of resources and
information it provides and manages. The problem is far from trivial,
due to the criticality and the social impact of the applications and
services relying on this global infrastructure, as well as the
complexity given by the co-existence and co-operation of, possibly
heterogeneous, component systems.
The goal of this special issue is to collect high-quality
contributions on security and privacy in complex systems and
systems-of-systems. We solicit submissions from academia, industry,
and government presenting novel and original research on all
theoretical and practical aspects of security and privacy in complex
systems. The focus of the special issue spans security and privacy
theory, technology, methodology, and applications in complex systems.
Submitted papers should therefore explicitly address issues in the
complex system scenario. Topics of interest include, but are not
limited, to the ones listed below provided that they are treated
with specific focus on the complex system scenario.

– access control
– anonymity
– applied cryptography
– authentication
– biometric security and privacy
– cyber warfare and security
– complex systems security
– computer forensics
– critical infrastructure protection
– data and application security
– data protection
– data/system integrity
– dependability, reliability, and availability
– formal methods for security and privacy
– human factors in security and privacy
– identity management
– insider threats
– intrusion detection and prevention
– knowledge extraction/representation for security
– legal and ethical issues
– middleware security
– network security
– operating systems security and privacy
– protection from cyberhacking
– security engineering
– secure environments and applications
– secure interoperability
– security and privacy metrics
– security and privacy policies
– security and privacy in cloud computing
– security and privacy in ad hoc networks
– security and privacy in e-services
– security and privacy in grid computing
– security and privacy in mobile systems
– security and privacy in monitoring systems
– security and privacy in industrial systems
– security and privacy in pervasive/ubiquitous computing
– security and privacy in sensor networks
– security and privacy in smart grid and distributed generation systems
– security and privacy in social applications and networks
– security and privacy in wireless sensor networks
– security architectures
– security management in complex scenarios
– social implications of security and privacy
– surveillance systems
– threats, vulnerabilities, and risk management
– transportation systems
– trust management
– usable security for complex systems
– verification and validation of complex systems
– web service security


Submitted papers must not be simultaneously submitted to a journal or a
conference with proceedings. Extended versions of prior work should provide
sufficient novel and original technical content; prior publications should
be explicitly referenced in the bibliography, and comparison and added
value with respect to prior publications should be discussed in the text.
All manuscripts for this special issue should be uploaded via the IEEE
Systems Journal Web site (http://www.systemsjournal.org), in the section
dedicated to the special issue, by the deadline of October 1, 2011, and
should follow formatting and submission instructions available at the
Web site. For any questions on the special issue, send email to
pierangela.samarati@unimi.it.


GUEST EDITORS
Sushil Jajodia
George Mason University, USA
jajodia@gmu.edu

Pierangela Samarati
Universita` degli Studi di Milano, Italy
pierangela.samarati@unimi.it


IMPORTANT DATES
Paper submission due: October 1, 2011
First notification to authors: January 15, 2012
Revised paper submission due: March 15, 2012
Second notification to authors: April 30, 2012
Publication date: 2012

Mar 25

International Conference on Information Society (i-Society 2011)

 

International Conference on Information Society

(i-Society 2011)

June 27-29, 2011, London, UK

http://www.i-society.eu

 

The International Conference on Information Society (i-Society 2011) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society 2011 is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.

The mission of i-Society 2011 conference is to provide opportunities for collaboration of professionals and researchers to share existing and generate new knowledge in the field of information society. The conference encapsulates the concept of interdisciplinary science that studies the societal and technological dimensions of knowledge evolution in digital society. The i-Society bridges the gap between academia and industry with regards to research collaboration and awareness of current development in secure information management in the digital society.

The topics in i-Society 2011 include but are not confined to the following areas:

New Enabling Technologies

  • Internet technologies
  • Wireless applications
  • Mobile Applications
  • Multimedia Applications
  • Protocols and Standards
  • Ubiquitous Computing
  • Virtual Reality
  • Human Computer Interaction
  • Geographic information systems
  • e-Manufacturing

Intelligent Data Management

  • Intelligent Agents
  • Intelligent Systems
  • Intelligent Organisations
  • Content Development
  • Data Mining
  • e-Publishing and Digital Libraries
  • Information Search and Retrieval
  • Knowledge Management
  • e-Intelligence
  • Knowledge networks

Secure Technologies

  • Internet security
  • Web services and performance
  • Secure transactions
  • Cryptography
  • Payment systems
  • Secure Protocols
  • e-Privacy
  • e-Trust
  • e-Risk
  • Cyber law
  • Forensics
  • Information assurance
  • Mobile social networks
  • Peer-to-peer social networks
  • Sensor networks and social sensing

e-Learning

  • Collaborative Learning
  • Curriculum Content Design and Development
  • Delivery Systems and Environments
  • Educational Systems Design
  • e-Learning Organisational Issues
  • Evaluation and Assessment
  • Virtual Learning Environments and Issues
  • Web-based Learning Communities
  • e-Learning Tools
  • e-Education

e-Health

  • Data Security Issues
  • e-Health Policy and Practice
  • e-Healthcare Strategies and Provision
  • Medical Research Ethics
  • Patient Privacy and Confidentiality
  • e-Medicine

e-Art

  • Legal Issues
  • Patents
  • Enabling technologies and tools

e-Science

  • Natural sciences in digital society
  • Biometrics
  • Bioinformatics
  • Collaborative research

Industrial Developments

  • Trends in learning
  • Applied research
  • Cutting-edge technologies

Application of Choatic Computing

  • Chaos-Based Data Security

e-Society

  • Global Trends
  • Social Inclusion
  • Intellectual Property Rights
  • Social Infonomics
  • Computer-Mediated Communication
  • Social and Organisational Aspects
  • Globalisation and developmental IT
  • Social Software

e-Governance

  • Democracy and the Citizen
  • e-Administration
  • Policy Issues
  • Virtual Communities

e-Business

  • Digital Economies
  • Knowledge economy
  • eProcurement
  • National and International Economies
  • e-Business Ontologies and Models
  • Digital Goods and Services
  • e-Commerce Application Fields
  • e-Commerce Economics
  • e-Commerce Services
  • Electronic Service Delivery
  • e-Marketing
  • Online Auctions and Technologies
  • Virtual Organisations
  • Teleworking
  • Applied e-Business
  • Electronic Data Interchange (EDI)

Research in Progress

  • Ongoing research from undergraduates, graduates/postgraduates and professionals
  • Projects
  • Collaborative Research