Tag: model

May 15

PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks

When Nov 1, 2012 – Nov 3, 2012
Where Xiangtan, China
Submission Deadline Jun 25, 2012

The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to:

Security and privacy in Big Data management
Application of modern cryptography in cloud and social networks
Emerging threats in cloud-based services
Multi-tenancy related security/privacy issues
Secure virtualisation mechanisms
Vulnerabilities in cloud infrastructure
Vulnerabilities in MapReduce
Security modelling and threats in cloud computing
Security/privacy in hybrid cloud
Auditing in cloud computing
Access control in cloud computing
Secure Job deployment and scheduling
Secure resource allocation and indexing
User authentication in cloud services
Practical privacy and integrity mechanisms for data outsourcing
Foundations of cloud-centric threat models
Information hiding
Trust and policy management in cloud
Secure identity management mechanisms
Security/privacy/trust issues in SaaS/PaaS/IaaS
Business and security risk models
Cost and usability models related security issues in clouds
Security for emerging cloud programming models
Remote data integrity protection
Securing distributed data storage in the cloud
Data-centric security and data classification
Security and privacy in mobile cloud
Intrusion detection/prevention
Malware propagation in social networks
Information leakage via social networks
Social currency mechanisms – potential and risks
Privacy management in social networks – access controls, permissions
Identity theft in social networks
Collaborative detection of distributed network attacks
Peer-to-peer based security mechanisms
Trust and reputation in social networks
Socially inspired network security architectures
Socially aware network security protocols
Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.)
Configuring security protocol parameters based on social information
Privacy-preserving methods for data access and data mining
Domain Security
Privacy Requirements Engineering
Private Information Retrieval
Privacy and Security in Personal Health Records
Online Social Footprints
Secure Multi-party Computation
Privacy Mechanisms in Services
Pseudonymity and Anonymity Modelling
Software Security Engineering
Integrity Verification
Trust Development in Collaboration Teams
Usable Privacy Design
Privacy Aware Access Control Model
Multi-Faceted Privacy Preservation
Access Control and RBAC Policies

via PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks.

May 14

International Symposium on Engineering Secure Software and Systems (ESSoS)

Call For Papers

International Symposium on Engineering Secure Software and Systems (ESSoS)

http://distrinet.cs.kuleuven.be/events/essos/2013/

February 27 – March 1, 2013, Paris, France

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSE).

CONTEXT AND MOTIVATION

Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere.  To address this, high-quality security
building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software’s security properties.

GOAL AND SETUP

The goal of this symposium, which will be the fifth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security  engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program, and is also open to proposals for both  tutorials and workshops. In addition to academic papers, the symposium  encourages submission of high-quality, informative experience papers about  successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe  a promising direction, approach, or insight.

TOPICS

The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):

– scalable techniques for threat modeling and analysis of vulnerabilities
– specification and management of security requirements and policies
– security architecture and design for software and systems
– model checking for security
– specification formalisms for security artifacts
– verification techniques for security properties
– systematic support for security best practices
– security testing
– security assurance cases
– programming paradigms, models and DLS’s for security
– program rewriting techniques
– processes for the development of secure software and systems
– security-oriented software reconfiguration and evolution
– security measurement
– automated development
– trade-off between security and other non-functional requirements (in particular economic considerations)
– support for assurance, certification and accreditation
– empirical secure software engineering

SUBMISSION AND FORMAT

The proceedings of the symposium are published by Springer-Verlag (pending) in  the Lecture Notes in Computer Science Series (http://www.springer.com/lncs).

Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality.

For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) – May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details.

Idea papers (max 8 pages with bibliography) – May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results.

 

Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the “Idea” tag in the title.

Proposals for both tutorials and workshops are welcome. Further guidelines will appear on the website of the symposium.

IMPORTANT DATES

Paper submission:             September 30, 2012
Author notification:           November 22, 2012
Camera-ready:                  December 13, 2012

PROGRAM COMMITTEE

PC Co-Chairs

Jan Jürjens, TU Dortmund and Fraunhofer ISST
Ben Livshits, Microsoft Research

PC
Davide Balzarotti, EURECOM, France
Ruth Breu, University of Innsbruck, Austria
Cristian Cadar, Imperial College, UK
Julian Dolby, IBM Research, US
Matt Fredrikson, University of Wisconsin, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Thorsten Holz, U. Ruhr Bochum, Germany
Sergio Maffeis, Imperial College, UK
Heiko Mantel, TU Darmstadt, Germany
Anders Møller, Aarhus University, Denmark
Haris Mouratidis, University of East London, UK
Zachary Peterson, Naval Postgraduate School, US
Frank Piessens, KU Leuven, Belgium
Erik Poll, RU Nijmegen, NL
Alexander Pretschner, TU Munich, Germany
Wolfgang Reif, University of Augsburg, Germany
Jianying Zhou, Institute for Infocomm Research, Singapore
Mohammad Zulkernine, Queens University, Canada

May 14

Journal of Information Security

You are cordially invited to submit a manuscript to the Journal of Information Security (JIS, ISSN:2153-1242), published by Scientific Research Publishing (SCIRP).It is an international peer-reviewed open access journal devoted to publication of original contributions in relevant areas of information security.

 

Being an open access journal we offer the following advantages:

  • Researchers around the world have full access to all the published articles
  • Widest dissemination of your published work ensuring greater visibility
  • Free downloads of the published articles without any subscription fee

 

The journal of JIS has a distinguished editorial board ensuring that it maintains high scientific standards with a broad international coverage. To view a list of the journal’s editors please visitwww.scirp.org/journal/jis.

Aims & Scope of the journal include:

  • Access Control
  • Anti-Virus and Anti-Worms
  • Authentication and Authorization
  • Biometric Security
  • Cryptography
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Electronic Commerce Security
  • Fraud Control
  • Grid Security
  • Information Hiding and Watermarking
  • Information Privacy
  • Information Security Engineering
  • Intellectual Property Protection
  • Intrusion Detection
  • Key Management and Key Recovery
  • Language-based Security
  • Network Security
  • Operating System Security
  • Risk Evaluation and Security Certification
  • Security for Mobile Computing
  • Security Models
  • Security Protocols
  • Security and Privacy for Social Computing
  • Security Evaluation
  • Signature and Key Agreement Protocol
  • Software Security
  • System Security
  • Trusted Computing and Trustworthy Computing Technology

Please read over the journal’s Author Guidelines for more information on the journal’s policies and the submission process. Once a manuscript has been accepted for publication, it will undergo language copyediting, typesetting, and reference validation in order to ensure the highest quality of publication quality.

Please do not hesitate to contact me if you have any questions about the journal.

Best regards,

Prof. Gyungho Lee
Editor in Chief
eic.jis@scirp.org

JIS Editorial Office
Scientific Research Publishing

May 14

Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012)

FDTC 2012: Call for Papers
==========================
www.fdtc-workshop.eu

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file
(http://conferenze.dei.polimi.it/FDTC12/cfp.pdf).

Motivation & Scope
==================

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and
countermeasures.

Important dates
===============

Extended submission deadline: May 18, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission
================

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:

http://fdtc.ws.dei.polimi.it

Submissions should conform to the instructions below.

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable
margins.

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee
=================

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu
========================================================

Steering committee
==================

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org

Apr 24

MMM-ACNS 2012 : 6th International Conference “Mathematical Methods, Models, and Architectures for Computer Network Security”

When Oct 17, 2012 – Oct 20, 2012
Where St. Petersburg, Russia
Submission Deadline May 27, 2012
Notification Due Jun 29, 2012
Final Version Due Jul 11, 2012

MMM-ACNS 2012 : 6th International Conference “Mathematical Methods, Models, and Architectures for Computer Network Security”.

Apr 24

9th European PKI Workshop: Research and Applications (EuroPKI 2012)

CALL FOR PAPERS
9th European PKI Workshop: Research and Applications (EuroPKI 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

The 9th European PKI Workshop: Research and Applications (EuroPKI
2012) will be held in Pisa, Italy.  The workshop seeks submissions
from academia, industry, and government presenting novel research on
all aspects of Public Key Services, Applications, and
Infrastructures. Topics of interest include, but are not limited to:

– Anonymity
– Architecture and modeling
– Attribute-based access control
– Authentication
– Authorization and delegation
– Certificates management
– Cross certification
– Directories
– eCommerce/eGovernment
– Fault-tolerance and reliability
– Federations
– Group signatures
– ID-based schemes
– Identity management
– Implementations
– Interoperability
– Key management
– Legal issues
– Long-time archiving
– Mobile PKI
– Multi-signatures
– PKI in the Cloud
– Policies and regulations
– Privacy
– Privilege management
– Protocols
– Repositories
– Risk attacks
– Scalability and performance
– Security of PKI systems
– Standards
– Timestamping
– Trust management
– Trusted computing
– Ubiquitous scenarios
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that have
been published or that have been simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author names
or affiliations, or obvious citations). Submissions should be at most
16 pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at easychair.org. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of May 25, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop. As for all previous EuroPKI events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: May 25, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

ESORICS GENERAL CHAIR
Fabio Martinelli
CNR, Italy

PROGRAM CHAIRS
Sabrina De Capitani di Vimercati
Universita’ degli Studi di Milano, Italy

Chris Mitchell
Royal Holloway, University of London, UK

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Lejla Batina, Radboud University Nijmegen, The Netherlands
David Chadwick, University of Kent, UK
Sherman S. M. Chow, University of Waterloo, Canada
Paolo D’Arco, University of Salerno, Italy
Bao Feng, Institute for Infocomm Research, Singapore
Eduardo Fernandez-Medina, Universidad de Castilla la Mancha, Spain
Simone Fischer-Huebner, Karlstad University, Sweden
Sara Foresti, Universita’ degli Studi di Milano, Italy
Steven Furnell, Plymouth University, UK
Peter Gutmann, University of Auckland, New Zealand
Ravi Jhawar, Universita’ degli Studi di Milano, Italy
Sokratis Katsikas, University of Piraeus, Greece
Dogan Kesdogan, University of Siegen, Germany
Elisavet Konstantinou, University of the Aegean, Greece
Costas Lambrinoudakis, University of Piraeus, Greece
Herbert Leitold, A-SIT, Austria
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Catherine Meadows, NRL, USA
Stig Mjolsnes, NTNU, Norway
Yi Mu, University of Wollongong, Australia
Svetla Nikova, Katholieke Universiteit Leuven, Belgium
Rolf Oppliger, eSECURITY Technologies, Switzerland
Massimiliano Pala, Polytechnic Institute, USA
Stefano Paraboschi, Universita’ degli Studi di Bergamo, Italy
Andreas Pashalidis, K.U.Leuven, Belgium
Olivier Pereira, Universite Catholique de Louvain, Belgium
Gunther Pernul, Universitat Regensburg, Germany
Sasa Radomirovic, University of Luxembourg,  Luxembourg
Pierangela Samarati, Universita’ degli Studi di Milano, Italy
Sean Smith, Dartmouth College, USA

CONFERENCE WEB PAGE: http://europki2012.dti.unimi.it
PC CHAIRS EMAIL: europki2012@unimi.it

Apr 22

9th Workshop on Fault Diagnosis and Tolerance in Cryptography

FDTC 2012: Call for Papers
==========================
www.fdtc-workshop.eu

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file
(http://conferenze.dei.polimi.it/FDTC12/cfp.pdf).

Motivation & Scope
==================

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and
countermeasures.

Important dates
===============

Paper submission deadline:    May 10, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission
================

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:

http://fdtc.ws.dei.polimi.it

Submissions should conform to the instructions below.

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable
margins.

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee
=================

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu
========================================================

Steering committee
==================

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org

Apr 21

PROOFS : Security Proofs for Embedded Systems

                 PROOFS : Security Proofs for Embedded Systems
http://www.proofs-workshop.org
2nd Call for Papers

Goal of the Workshop

The goal of the PROOFS workshop is to promote methodologies that increase the confidence level in the security of embedded systems, especially those that contain cryptographic mechanisms.
Embedded system security currently consists mainly in security by obscurity solutions. This has obvious drawbacks:

  • it requires costly black-box evaluation,
  • there is no certainty about the correctness of the security, etc.

Formal methods allow to increase the trust level of digital systems. They are very appealing, for the following reasons:

  • they are mature in theory, and there are tried and tested methods and tools,
  • they have been applied on software for a long time, mainly for safety and conformance tests.

Some important security features (random number generation, physically unclonable functions, etc. ) rely on analog devices. Their correct functioning can be ascertained by techniques such as physical modeling and unitary experimental testing.
An important objective for the PROOFS workshop is to bridge the gap between both topics, and therefore to pave the way to « security by clarity » for embedded systems.

Venue: PROOFS will take place at Leuven, Belgium, on September 13rd, 2012.

The workshop will feature two/three invited talks and contributed talks.
The agenda is:

  • Submission deadline   : Sunday May 20th (used to be Sunday May 6th)
  • Authors notification  : Sunday July 1st
  • Final version due     : Sunday July 15th
  • PROOFS workshop venue : Thursday September 13rd

Programme Committee

  • Alessandro Barenghi, Politecnico di Milano, Italy.
  • Gilles Barthe, Fundación IMDEA Software, Spain.
  • Loïc Correnson, CEA LIST, France.
  • Emmanuelle Encrenaz, LIP6, France.
  • Naofumi Homma, Tohoku U., Japan.
  • Éliane Jaulmes, ANSSI, France.
  • Gerwin Klein, NICTA, Australia.
  • Debdeep Mukhopadhyay, IIT Kharagpur, India.
  • Svetla Nikova, K.U.Leuven, Belgium.
  • Renaud Pacalet, TELECOM-ParisTech, France.
  • Bruno Robisson, ENSMSE, France.
  • Timothy Sherwood, UCSB, USA.
  • Graham Steel, LSV, France.

Steering committee

  • Sylvain Guilley, TELECOM-ParisTech, France.
  • Çetin Kaya Koç, UCSB, USA.
  • David Naccache, ENS, France.
  • Akashi Satoh, AIST, Japan.
  • Werner Schindler, BSI, Germany.

Apr 19

MDsec 2012 : International Workshop on Model-Driven Security

When Oct 1, 2012 – Oct 1, 2012
Where Innsbruck
Abstract Registration Due Jul 19, 2012
Submission Deadline Jul 26, 2012
Notification Due Aug 30, 2012
Final Version Due Sep 17, 2012

MDsec 2012 : International Workshop on Model-Driven Security.

Apr 18

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions should be at most 16
pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at (to be announced). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of May 25, 2012 ({11:59 p.m. American Samoa time}).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: May 25, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias    Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: tm2012@unimi.it