Tag: security

Apr 28

International Workshop on Information Security Applications

WISA.

Apr 23

ACM Computer and Communications Security Conference

Paper Submission Due: Friday, May 6

ACM CCS 2011

Apr 22

Privacy, Security & Your Dropbox

Privacy, Security & Your Dropbox.

Apr 12

The 14th Information Security Conference (ISC 2011)

 

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security.
 

Apr 11

Journal: Communications and Network

Communications and Network is an international, peer-reviewedopen access, online journal, publishing original research, reports, reviews and commentaries on all areas about Communications and Network. And it has been indexed by several world class databases, such as The Library of Congress, Gale, EBSCO, Proquest, IndexCopernicus, CrossRef, Google Scholar and CSP, etc. For more information, please visit journal homepage: www.scirp.org/journal/cn.

Communications and Network is published by Scientific Research Publishing (SRP:www.scirp.org) which was established in 2007 and currently has more than 100 journals. SRP specializes in the rapid publication of quality peer-reviewed journals across the broad spectrum of science, technology, life science and medicine.

Aims & Scope

  • Algorithms and Programs
  • Cognitive Radio
  • Complexity
  • Cooperative Communications
  • Error Correcting Codes
  • Green Technology
  • High Performance Computing, Grid Computing, Cloud Computing
  • Internet/Intranet Services
  • Mobile and Portable Communications Systems
  • Mobility Networks and Protocols
  • Multi Antenna/User Systems
  • Network Protocol, QoS and Congestion Control
  • Optical Communications
  • Self-Stabilization, Autonomic Computing
  • Source Coding/Data Compression
  • Synchronization
  • Traffic Diagnosis
  • Wired and Wireless Integration
  • Applications and Value-Added Services
  • Communication Protocols
  • Computer and Network Security
  • Data and Information Security
  • Fading/Equalization
  • Hardware and Software System Architecture
  • Internet/Intranet Protocols
  • Location Based Services
  • Mobile Computing Systems
  • Modulation/Signal Design
  • Multimedia Services in Wireless Networks
  • Operations and Management
  • Overlay and Peer-to-Peer Networks
  • Simulation/Analytical Evaluation of Communication Systems
  • Switching and Routing
  • Shared and Transactional Memory, Synchronization Protocols, Concurrent Programming
  • Transmission and Access Systems
  • Wireless Network Design and Performance Evaluation

Editorial Board

Editor in Chief  
Prof.Hamed Al-Raweshidy Brunel University, UK
Editorial Board  
Prof.Photios Anninos Democritus University of Thrace, Greece
Dr.Bharat Bhargava Purdue University, USA
Prof.Ruay-Shiung Chang National Dong Hwa University, Taiwan (China)
Dr.Ai Chen Chinese Academy Of Sciences, China
Dr.Xiaochun Cheng Middlesex University, UK
Dr.Yoon-Ho Choi Samsung Electronics Co. Ltd., Korea (South)
Dr.Nagy Ibrahim Elakalashy Minoufiya University, Egypt
Dr.Abdullah Eroglu Indiana University-Purdue University Fort Wayne, USA
Dr.Xiaopeng Fan Harbin Institute of Technology (HIT), China
Dr.Cunqing Hua Zhejiang University, China
Dr.Wiani Jaikla Suan Sunandha Rajabhat University, Thailand
Dr.Shanshan Jiang Broadcom Corporation, USA
Dr.Xiaohong Jiang Tohoku University, Japan
Dr.Rami Langar University of Pierre and Marie Curie, France
Dr.Yu Liu HK Applied Sci. & Tech. Research Institute (ASTRI), Hong Kong (China)
Prof.Hussein Mouftah University of Ottawa, Canada
Prof.Jean-Frederic Myoupo University of Picardie-Jules Verne, France
Dr.Lu Peng Louisiana State University, USA
Dr.Xiaojun Wang Dublin City University, Ireland
Dr.Jonathan Wellons Vanderbilt University, USA
Dr.Yong Xiang Deakin University, Australia
Dr.Hsiang-Fu Yu National Taipei University of Education, Taiwan (China)
Prof.Francesco Zirilli Sapienza Universita di Roma, Italy

Benefit of Open Access

For Authors: Gain increased visibility and ultimately a citation advantage.
For Readers: Keep abreast of the professional advancement free of charge.
For Institutions: Minimize the scientific investment on knowledge access
For Academia: Share the knowledge faster and on a larger scale;
Accelerate the development of a given field.
For Society: Minimize the cost and time of information exchange;
Speed up the process of converting scientific results to productive force;
Enable the public to benefit more rapidly from the advance of science and technology;
Narrow the gap between the developed and developing countries.

Mar 25

Best Ph.D. Thesis on Security and Trust Management

 

ERCIM STM WG 2011 Award for the

Best Ph.D. Thesis on Security and Trust Management

 

The European Research Consortium in Informatics and Mathematics (ERCIM – www.ercim.org) has a technical WG on Security and Trust Management (STM – www.iit.cnr.it/STM-WG) for performing a series of activities, as research projects, workshop/conference organization, dissemination of knowledge, for increasing the European research and development capabilities on security, trust and privacy.

 

One of the main goals of the WG is to promote the scientific growth of young researchers interested in the field of security and trust management. Thus, ERCIM STM WG established an award for the best Ph.D. thesis in this area in order to increase the visibility of the young researchers inside the ERCIM scientific community as well as in the larger European one.

 

The topics of interest include, but are not limited to:

·      rigorous semantics and computational models for security and trust;

·      security and trust management architectures, mechanisms and policies;

·      networked systems security;

·      privacy and anonymity;

·      identity management;

·      ICT for securing digital as well as physical assets;

·      cryptography.

 

Applications for the 2011 Award are open to all Ph.D. holders that defended their thesis during 2010 in any European University. Applications consisting of the Ph.D. Thesis (in PDF format), a short summary of the Thesis (mandatory in English) and at least two letters of support (one from a researcher of an ERCIM STM WG Institution) should be sent by May 8th 2011 to the WG Chair, Javier Lopez <jlm@lcc.uma.es>.

 

Theses will be evaluated by a Committee appointed from the European research community. The theses will be judged on the basis of scientific quality, originality, clarity of presentation, as well as potential impact of the results. The Committee members for the competition are:

 

·      Joris Claessens, Microsoft, Germany

·      Jorge Cuellar, Siemens, Germany

·      Javier Lopez, Univ. of Malaga, Spain

·      Fabio Martinelli, CNR, Italy

·      Vashek Matyas, Masaryk Univ., Czech Republic

·      Bart Preneel, KUL, Belgium

·      Alexander Pretschner, KIT, Germany

·      Ketil Stoelen, SINTEF, Norway

·      Edgar Weippl, SBA, Austria

 

The ceremony for the Award will be held during the 7th International Workshop on Security and Trust Management (STM 2011), 27-28 June 2011, in Copenhagen (Denmark).


Mar 25

International Conference on Information Society (i-Society 2011)

 

International Conference on Information Society

(i-Society 2011)

June 27-29, 2011, London, UK

http://www.i-society.eu

 

The International Conference on Information Society (i-Society 2011) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society 2011 is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.

The mission of i-Society 2011 conference is to provide opportunities for collaboration of professionals and researchers to share existing and generate new knowledge in the field of information society. The conference encapsulates the concept of interdisciplinary science that studies the societal and technological dimensions of knowledge evolution in digital society. The i-Society bridges the gap between academia and industry with regards to research collaboration and awareness of current development in secure information management in the digital society.

The topics in i-Society 2011 include but are not confined to the following areas:

New Enabling Technologies

  • Internet technologies
  • Wireless applications
  • Mobile Applications
  • Multimedia Applications
  • Protocols and Standards
  • Ubiquitous Computing
  • Virtual Reality
  • Human Computer Interaction
  • Geographic information systems
  • e-Manufacturing

Intelligent Data Management

  • Intelligent Agents
  • Intelligent Systems
  • Intelligent Organisations
  • Content Development
  • Data Mining
  • e-Publishing and Digital Libraries
  • Information Search and Retrieval
  • Knowledge Management
  • e-Intelligence
  • Knowledge networks

Secure Technologies

  • Internet security
  • Web services and performance
  • Secure transactions
  • Cryptography
  • Payment systems
  • Secure Protocols
  • e-Privacy
  • e-Trust
  • e-Risk
  • Cyber law
  • Forensics
  • Information assurance
  • Mobile social networks
  • Peer-to-peer social networks
  • Sensor networks and social sensing

e-Learning

  • Collaborative Learning
  • Curriculum Content Design and Development
  • Delivery Systems and Environments
  • Educational Systems Design
  • e-Learning Organisational Issues
  • Evaluation and Assessment
  • Virtual Learning Environments and Issues
  • Web-based Learning Communities
  • e-Learning Tools
  • e-Education

e-Health

  • Data Security Issues
  • e-Health Policy and Practice
  • e-Healthcare Strategies and Provision
  • Medical Research Ethics
  • Patient Privacy and Confidentiality
  • e-Medicine

e-Art

  • Legal Issues
  • Patents
  • Enabling technologies and tools

e-Science

  • Natural sciences in digital society
  • Biometrics
  • Bioinformatics
  • Collaborative research

Industrial Developments

  • Trends in learning
  • Applied research
  • Cutting-edge technologies

Application of Choatic Computing

  • Chaos-Based Data Security

e-Society

  • Global Trends
  • Social Inclusion
  • Intellectual Property Rights
  • Social Infonomics
  • Computer-Mediated Communication
  • Social and Organisational Aspects
  • Globalisation and developmental IT
  • Social Software

e-Governance

  • Democracy and the Citizen
  • e-Administration
  • Policy Issues
  • Virtual Communities

e-Business

  • Digital Economies
  • Knowledge economy
  • eProcurement
  • National and International Economies
  • e-Business Ontologies and Models
  • Digital Goods and Services
  • e-Commerce Application Fields
  • e-Commerce Economics
  • e-Commerce Services
  • Electronic Service Delivery
  • e-Marketing
  • Online Auctions and Technologies
  • Virtual Organisations
  • Teleworking
  • Applied e-Business
  • Electronic Data Interchange (EDI)

Research in Progress

  • Ongoing research from undergraduates, graduates/postgraduates and professionals
  • Projects
  • Collaborative Research

Mar 23

John Mitchell: Web Security and Untrusted JavaScript

16 mars John Mitchell (Stanford)
Web Security and Untrusted JavaScript
 
download the biography

download the abstract

download the slides

via Cours et séminaires – Informatique et sciences numériques – Martin Abadi – Collège de France.

Mar 16

DISI 2010 : eCommerce and Internet Security: the last 15 years and the next 15 years « ivoting

DISI 2010 : eCommerce and Internet Security: the last 15 years and the next 15 years « ivoting.