Tag Archive: pervasive

May 27

[PhD Public defense] A Machine Learning Approach for Automatic and Generic Side-Channel Attacks

Public defense of the PhD thesis of Liran Lerman entitled “A Machine Learning Approach for Automatic and Generic Side-Channel Attacks” and supervised by Prof. Gianluca Bontempi and Prof. Olivier Markowitch.
The defense (in french) will take place at the Université libre de Bruxelles (in the La Plaine, N-O building, 5th floor, Salle Solvay) on Wednesday, June 10, at 16:30.

Abstract: The pervasive presence of interconnected devices has lead to a massive interest in security features provided among others by cryptography. For decades, designers estimated the security level of a cryptographic algorithm independently of its implementation in a cryptographic device. However, since the publication on implementation attacks in 1996, the physical attacks have become an active research area by analysing physical leakages measured on the target cryptographic device. In this work, we focus on profiled attacks that were introduced as the most efficient class of strategies in order to evaluate the physical leakages of cryptographic devices. The traditional profiled attacks apply parametric methods in which a priori information on the physical properties is assumed. Machine learning represents an active research area that allows producing automatic and generic models requiring no a priori information on the underlying phenomenon. The purpose of this presentation is to shed new light on the capabilities of learning models for physical analysis.

Jan 20

Secrypt 2015

CALL FOR PAPERS

International Conference on Security and Cryptography
SECRYPT website: http://www.secrypt.icete.org/

July 20 – 22, 2015
Colmar, Alsace, France

Sponsored by: INSTICC
INSTICC is Member of: WfMC, OMG and FIPA
Logistics Partner: SCITEVENTS

IMPORTANT DATES:
Regular Paper Submission: March 3, 2015
Authors Notification (regular papers): Mayl 18, 2015
Final Regular Paper Submission and Registration: May 26, 2015

You are cordially invited to submit a paper to the SECRYPT 2015 Conference, to be held in Colmar, Alsace, France. The deadline for paper submission is scheduled for March 3, 2015.

SECRYPT is an annual international conference covering research in information and communication security. The 12th International Conference on Security and Cryptography (SECRYPT 2015) will be held in Colmar, France on 20-22 July 2015.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.

Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

SECRYPT is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 139 submissions, 21% of which were orally presented and 22% presented as posters.

We would like to highlight the presence of the following keynote speakers:
– Anthony C. Boucouvalas, University of Peloponnese, Greece
– Eleni Karatza, Aristotle University of Thessaloniki, Greece
– Andrew Moore, University of Cambridge, United Kingdom

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book (final approval pending).

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://www.secrypt.icete.org/BestPaperAward.aspx).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

SECRYPT is part of ICETE, the 12th International Joint Conference on e-Business and Telecommunications. Registration to SECRYPT allows free access to all other ICETE conferences.

ICETE 2015 will be held in conjunction with ICINCO 2015, ICSOFT 2015, SIMULTECH 2015 and DATA 2015. Registration to ICETE allows free access to the ICINCO, ICSOFT, SIMULTECH and DATA conferences as a non-speaker.

ICETE CONFERENCE CO-CHAIRS
Mohammad S. Obaidat, Monmouth University, United States
Pascal Lorenz, University of Haute Alsace, France

PROGRAM CHAIR:
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM COMMITTEE:
Please check the program committee members at http://www.secrypt.icete.org/ProgramCommittee.aspx

CONFERENCE TOPICS:

– Access Control
– Applied Cryptography
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behavior Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Software Development Methodologies
– Security and Privacy for Big Data
– Security and privacy in Complex Systems
– Security and Privacy in Crowdsourcing
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Mobile Systems
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Smart Grids
– Security and Privacy in Social Networks
– Security and Privacy in the Cloud
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security in Distributed Systems
– Security Information Systems Architecture
– Security Management
– Security Metrics and Measurement
– Security Protocols
– Security requirements
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security

Jan 22

11th International Conference on Applied Cryptography and Network Security (ACNS 2013)

11th International Conference on
Applied Cryptography and Network Security (ACNS 2013)
Banff, Alberta, Canada
June 25 – 28, 2013
http://acns2013.cpsc.ucalgary.ca

Paper submission due: February 1, 2013
**********************************************************************

The 11th International Conference on Applied Cryptography and Network
Security (ACNS 2013) will be held in Banff, Alberta, Canada. The
conference seeks submissions from academia, industry, and government
presenting novel research on all aspects of applied cryptography as
well as network security and privacy. Submissions in emerging areas of
security including cloud security, secure infrastructure for big data
are highly encouraged. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged. The
conference has two tracks: a research track and an industry track.
The industrial track will consist of presentations and tutorial
sessions, without formal proceedings. Submissions for either track
may focus on new visions, industrial challenges, case studies or
experimental reports related to implementation or deployment of
real-world systems or policies. Tutorials can cover current techniques
or best practices in applying cryptography to computer and information
systems. Topics of interest include, but are not limited to:

– Access control
– Applied cryptography
– Automated  protocols analysis
– Biometric security and privacy
– Complex systems security
– Critical infrastructure protection
– Cryptographic primitives and protocols
– Data protection
– Database and system security
– Digital rights management
– Email and web security
– Identity management
– Intellectual property protection
– Internet fraud
– Intrusion detection and prevention
– Key management
– Malware
– Network security protocols
– Privacy, anonymity, and untraceability
– Privacy-enhancing technology
– Protection for the future Internet
– Secure mobile agents and mobile code
– Security and privacy in cloud and grid systems
– Security and privacy in smart grids
– Security and privacy in wireless networks
– Security and privacy metrics
– Security in distributed systems
– Security in e-commerce
– Security in P2P systems
– Security in pervasive/ubiquitous computing
– Trust management
– Usability and security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that
have already been published, or are simultaneously submitted to
a journal or a conference with proceedings. All submissions should
be appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should be
at most 18 pages for research track and at most 8 pages for industry
track, including the bibliography and well-marked appendices, and
should follow Springer’s LNCS style. Submissions are to be made
through the submission web page at http://acns2013.cpsc.ucalgary.ca/.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 1, 2013 (11:59
Pacific Time). Authors should indicate whether their submission
should be considered for the best student paper award; any paper
co-authored by at least a full time student is eligible for this
award. At least one author of a accepted paper must attend the
conference. Papers accepted for the research track will be
published in proceedings published by Springer’s LNCS and
available at the conference. Extended versions of selected best
papers will be invited for a special issue in the Journal of
Computer Security.

IMPORTANT DATES
Submissions Due:     February 1, 2013
Author Notification: April 10, 2013
Camera Ready Due:    April 24, 2013

PROGRAM CHAIRS
Rei Safavi-Naini     (University of Calgary, Canada)
Michael E. Locasto   (University of Calgary, Canada)

GENERAL CHAIRS
Michael Jacobson     (University of Calgary, Canada)
Payman Mohassel      (University of Calgary, Canada)

PUBLICITY CHAIR
Mahabir Jhanwar      (University of Calgary, Canada)

PROGRAM COMMITTEE
Bill Aiello         (University of British Columbia, Canada)
Giuseppe Ateniese    (Sapienza-U. of Rome, Italy & Johns Hopkins U., USA)
Kevin R. B. Butler   (University of Oregon, USA)
Srdjan Capkun        (ETH Zurich, Switzerland)
Alvaro A. Cárdenas   (University of Texas at Dallas, USA)
Chen-Mou Cheng       (National Taiwan University, Taiwan)
Sherman S. M. Chow   (Chinese University of Hong Kong, Hong Kong)
Ed Dawson            (Queensland University of Technology, Australia)
Roberto Di Pietro    (Università Roma Tre, Italy)
José M. Fernandez    (École Polytechnique de Montréal, Canada)
Sara Foresti         (Università degli Studi di Milano, Italy)
Guang Gong           (University of Waterloo, Canada)
Stefanos Gritzalis   (University of the Aegean, Greece)
Guofei Gu            (Texas A&M University, USA)
Angelos D. Keromytis (Columbia University, USA)
Evangelos Kranakis   (Carleton University, Canada)
Ralf Kusters         (Universität Trier, Germany)
Xuejia Lai           (Shanghai Jiao Tong University, China)
Cédric Lauradoux     (INRIA, France)
Ninghui Li           (Purdue University, USA)
Yingjiu Li           (Singapore Management University, Singapore)
Mark Manulis         (University of Surrey, UK)
Kaisa Nyberg         (Aalto University, Finland)
Massimiliano Pala    (Penango/OpenCA, USA)
Bart Preneel         (KU Leuven, Belgium)
Christian Rechberger (DTU, Denmark)
Ahmad-Reza Sadeghi   (Technische Universitãt Darmstadt, Germany)
Pierangela Samarati  (Università degli Studi di Milano, Italy)
Radu Sion            (Stony Brook University, USA)
Anil Somayaji        (Carleton University, Canada)
Abhinav Srivastava   (AT&T Research, USA)
Jessica Staddon      (Google, USA)
Willy Susilo         (University of Wollongong, Australia)
Gene Tsudik          (UC Irvine, USA)
Duncan S. Wong       (City University of Hong Kong, Hong Kong)
Jianying Zhou        (I2R, Singapore)

This call for papers and additional information about the
conference can be found at http://acns2013.cpsc.ucalgary.ca

The history and statistics of ACNS can be found at ACNS Home
— http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

ACNS forum at LinkedIn —
http://www.linkedin.com/groups/ACNS-Applied-Cryptography-Network-Security-4290836

**********************************************************************

Sep 11

SMPE 2013 : The 6th International Symposium on Security and Multimodality in Pervasive Environments

When Mar 25, 2013 – Mar 28, 2013
Where Barcelona, Spain
Submission Deadline Oct 15, 2012

SMPE 2013 : The 6th International Symposium on Security and Multimodality in Pervasive Environments.

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/

Jun 05

7th International Conference on Risks and Security of Internet and Systems

7th International Conference on Risks and Security of Internet and Systems

Cork, Ireland, October 10-12, 2012

The International Conference on Risks and Security of Internet and Systems 2012 is the seventh in a series dedicated to security challenges related to Internet applications, networks and systems. In recent years, the Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing security and privacy risks, due to the development increasingly sophisticated online attacks, the growth of Cybercrime, etc. Contemporary attackers are motivated and are increasingly experienced. To compound matters, sophisticated tools that facilitate attacks are readily available. Moreover, the increasing complexity and the vulnerabilities in newer technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges.

via CRiSIS 2012.

May 31

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

May 29

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

Apr 18

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions should be at most 16
pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at (to be announced). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of May 25, 2012 ({11:59 p.m. American Samoa time}).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: May 25, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias    Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: tm2012@unimi.it

Mar 28

Sixth International Conference “Mathematical Methods, Models, and Architectures for Computer Networks Security”

Sixth International Conference
“Mathematical Methods, Models, and Architectures
for Computer Networks Security”
(MMM-ACNS-2012) and
Second International Workshop
“Scientific Analysis and Policy Support for Cyber Security”
(SA&PS4CS-2012)

October 17-20, 2012, St. Petersburg, Russia

http://comsec.spb.ru/mmm-acns12/
http://www.comsec.spb.ru/saps4cs12/

Main sponsors
1. Office of Naval Research Global, USA
2. European Office of Aerospace Research and Development USAF, USA
3. Russian Foundation for Basic Research

Organizers
* St. Petersburg Institute for Informatics and Automation of the Russian
Academy of Sciences (SPIIRAS)
* Binghamton University (State University of New York)

Title and scope

The previous International Conferences “Mathematical Methods, Models
and Architectures for Computer Networks Security” (MMM-ACNS-2001
(http://space.iias.spb.su/mmm-acns01/), MMM-ACNS-2003
(http://space.iias.spb.su/mmm-acns03/), MMM-ACNS-2005
(http://space.iias.spb.su/mmm-acns05/), MMM-ACNS-2007
(http://www.comsec.spb.ru/mmm-acns07/ and MMM-ACNS-2010
(http://www.comsec.spb.ru/mmm-acns10/)) organized by St. Petersburg
Institute for Informatics and Automation, Binghamton University (SUNY)
and supported by the European Office of Aerospace Research and
Development USAF, Office of Naval Research Global, and Russian
Foundation for Basic Research were successful. These conferences
demonstrated the high interest of the international scientific community
to the theoretical and practical aspects of the computer network and
information security.
The goals of MMM-ACNS-2012 Conference
(http://www.comsec.spb.ru/mmm-acns12/) is to bring together leading
researchers from academia and governmental organizations as well as
practitioners to advance the states of the art and practice in the area
of computer networks and information security with a focus on novel
theoretical aspects of computer network security, facilitate personal
interactions and discussions on various aspects of information
technologies in conjunction with computer network and information
security problems arising in large-scale computer networks.

The MMM-ACNS-2012 Conference will be carried out together with the
Second International Workshop “Scientific Analysis and Policy Support
for Cyber Security” (SA&PS4CS-2012)
(http://www.comsec.spb.ru/saps4cs12/) dedicated to the methods of
scientific analysis and policy support for response to cyber intrusions
and attacks.

Topics of interest

Papers offering novel research contributions to the theoretical
aspects of the computer network and information security are solicited
for submission.
Papers may present theory, technique, and applications on topics
including but not restricted to:
* Adaptive security
* Anti-malware techniques: detection, analysis, prevention
* Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques
* Applied cryptography
* Authentication, authorization and access control
* Cloud Security
* Computer and network forensics
* Covert channels
* Critical infrastructure protection
* Data and application security
* Data mining, machine learning, and bio-inspired approaches for security
* Deception systems and honeypots
* Denial-of-service attacks and countermeasures
* Digital Rights Management
* eCommerce, eBusiness and eGovernment security
* Embedded system security
* Formal analysis of security properties
* Information warfare
* Internet and web security
* Intrusion prevention, detection, and response
* Language-based security
* Network survivability
* New ideas and paradigms for security
* Operating system security
* Reliability and dependability
* Risks metrics, risk analysis and risk management
* Security and privacy in pervasive and ubiquitous computing
* Security event and information management
* Security for large-scale systems and critical infrastructures
* Security in social networks
* Security of emerging technologies: sensor, wireless/mobile,
peer-to-peer and overlay networks
* Security of autonomous agents and multi-agent systems
* Security modeling and simulation
* Security policies
* Security protocols
* Security verification
* Security visualization
* Self-protecting and healing
* Smartphone security
* Software protection
* Trusted computing
* Trust and reputation management
* Vulnerability assessment

The main topics of the SA&PS4CS-2012 are detection, discrimination,
and attribution of various activities of malefactors and response to
cyber intrusions and attacks including national level information
operations as well as identifying emergent cyber technologies supporting
social and political activity management and trans-national distributed
computing management.

Objective of the MMM-ACNS-2012 Conference

The main objectives of the MMM-ACNS-2012 Conference are to discuss
state-of-the-art in mathematical methods and models for computer
networks and information security to promote a better understanding of
recent achievements and trends in the computer network security, as well
as making use of recent achievements in the area of advanced information
technologies for computer network and information assurance.
Security assurance of resident information and computer networks’
software is one of the important problems of the modern computer science
and information technology. The problem importance is confirmed by ever
increasing multiplicity and diversity of threads and vulnerabilities of
computer networks, permanently increasing significance and value of
information itself, and by potentially devastating consequences of
successful attacks on integrity, resource availability and information
confidentiality. Unauthorized access to computer network facilities and
network resources, especially in global networks participating in
real-time control operations, may be truly disastrous.
There are several reasons for the complexity of the problem under
study. The growing size of the network, its interconnectivity, large
number of users, increasing number of vulnerable targets within the
network (communication protocols, operating systems, servers,
applications, etc.), and the appearance of effective and previously
unknown types of attacks are among them.
An additional objective of the conference is to bring together
researchers and developers from academia, industry and governmental
organizations to exchange ideas in a broad range of topics among
researchers, security system developers and users from research and
commercial perspective.
Since the scope of the conference covers areas presenting specific
interest for basic and applied research organizations, information about
the conference will be distributed among the corresponding organizations
in Russia and worldwide. So far preliminary agreement to participate in
the conference is received from leading Russian Institutions doing basic
and applied research in Computer Science, Telecommunication and Computer
Security and from companies developing relevant industrial applications.

Objective of the SA&PS4CS-2012 Workshop

The Workshop is dedicated to the methods of scientific analysis and
policy support for response to cyber intrusions and attacks. The main
topics of the Workshop are detection, discrimination, and attribution of
various activities of malefactors and response to cyber intrusions and
attacks including national level information operations as well as
identifying emergent cyber technologies supporting social and political
activity management and trans-national distributed computing management.
The Workshop aims to bring together researchers and practitioners
involved in multiple disciplines concerning scientific analysis and
policy support for cyber security to exchange ideas and to learn the
latest developments in this important field.
This Workshop could promote internationally shared understanding of
the technically supportable indications and warnings for various types
of intrusions and attacks, from the isolated to the highly coordinated,
and from the forensic to strategic.
The Workshop is planned on the last day of MMM-ACNS-2012.

Submitting a paper

The MMM-ACNS-2012 welcomes original papers from academic, government,
and industry contributors on mathematical approaches and models,
state-of-the-art techniques, and novel applications in the above
proposed areas. All submissions will be subjected to a thorough review
by at least three reviewers.
Draft versions of original full papers up to 14 A4 pages (but not
less than 6 pages) in English prepared according to the instructions
provided by Springer (http://www.springer.com/comp/lncs/Authors.html),
including abstract (up to 300 words) and keywords (5 to 8), should be
submitted by
May 27, 2012
or sooner through the upload facilities at the MMM-ACNS-2012 web site
http://www.comsec.spb.ru/mmm-acns12/ .
Only electronic submissions in PDF format will be considered.
Authors must also indicate the conference track to which the paper is
submitted.
The Program Committee will make the final selection based on peer
reviewers’ evaluation.
The primary focus is on high-quality original unpublished research,
case studies and implementation experiences.
Notification of acceptance/rejection will be disseminated by June 29,
2012.
Camera-ready versions of accepted papers (see below) are due July 11,
2012.

The speakers of the SA&PS4CS-2012 Workshop will be personally
invited. We intend to invite for participation in the session a number
of worldwide recognized specialists in cyber security from the USA,
Europe, China, Russia and other countries.

Proceedings

Program Committee plans to publish the MMM-ACNS-2012 Proceedings in
Springer series “Lecture Notes in Computer Science” (LNCS). The final
decision will be made by Springer after finalizing the reviewing
process. Instructions for authors will be provided at the MMM-ACNS-2012
web site (http://www.comsec.spb.ru/mmm-acns12/).
Camera ready paper submission can be uploaded through the
MMM-ACNS-2012 web site at http://www.comsec.spb.ru/mmm-acns12/.

The Proceeding of the SA&PS4CS-2012 Workshop also will be prepared.

Conference Languages

The working language of MMM-ACNS-2012 is English.

The working languages of SA&PS4CS-2012 Workshop are English and
Russian. Presentations will be simultaneously translated.

Location of the Conference and Workshop

According to the preliminary agreement, the MMM-ACNS-2012 conference
and the SA&PS4CS-2012 Workshop will take place in the historical
building “Palace of Grand Prince Vladimir Romanov,” now “House of
Scientists,” located in the heart of St. Petersburg, address: 26,
Dvortsovaya emb., St.Petersburg, 191186, Russia.
This venue allows the conference organizers to arrange for the
conference itself, as well as for the associated events (informal
discussions, reception, breaks, etc.).

Contact us

Program Committee Co-Chairman
Prof. Igor Kotenko
Head of Laboratory of Computer Security Problems
St. Petersburg Institute for Informatics and Automation
of the Russian Academy of Sciences
39, 14th Liniya, St. Petersburg, 199178, Russia
Telephone: +7-(812)-328-2642
Fax: +7-(812)-328-4450
E-mail:  mmmacns[AT]comsec[DOT]spb[DOT]ru

Local contact person
Irina Podnozova
Phone: 7-(812)-328-4446   Fax:  +7(812)-328-06-85
E-mail: ipp[AT]mail[DOT]iias[DOT]spb[DOT]su

Older posts «