Tag: social network

Feb 08

CFP WISSE’12 CAiSE’12

**** CALL FOR PAPERS ****

 

Second International Workshop on Information Systems Security Engineering –  WISSE’12

http://gsya.esi.uclm.es/WISSE2012/

in conjunction with the

24th International Conference on Advanced Information Systems Engineering (CAiSE’12)

Gdańsk, Poland, 25 – 29 June 2012

http://www.caise2012.univ.gda.pl/

Important Dates

Paper Submission:  February 27, 2012 (extended)

Authors Notification: March 17, 2012 (extended)

Camera Ready Submission Deadline: March 23, 2012 (extended)

 

Purpose

Information systems security problems are currently a widespread and growing concern that covers most of the areas of society, such as business, domestic, financial, government, healthcare, and so on. The scientific community has realized the importance of aligning information systems engineering and security engineering in order to develop more secure information systems. Nevertheless, there is lack of an appropriate event that will promote information systems security within the context of information systems engineering. The proposed workshop fulfils this gap. This is the second version of the workshop, with the first one being introduced in CAiSE’11 with great success.

The workshop aims to provide a forum for researchers and practitioners to present, discuss and debate on one hand the latest research work on methods, models, practices and tools for secure information systems engineering, and on the other hand relevant industrial applications, recurring challenges, problems and industrial led solutions at the area of secure information systems engineering.

 

Topics of interest:

Topics of interest include, but are not limited to:

–          Security and privacy requirements models and engineering

–          Security and privacy analysis methods and models

–          Security and privacy design methods and models

–          Security and privacy testing methods and models

–          Security and privacy modelling Support Tools

–          Integrating functional, security and privacy requirements

–          Threat-driven and Model-driven security

–          Secure IS interoperability modelling

–          Security and process modelling

–          Modelling Security and Trust

–          Managing Secure Software development

–          Security in Agile Software Development Methods

–          Methodologies and models for evaluating IS security and privacy aspects

–          Formal methods for modelling security

–          Models and approaches for the verification of security and privacy properties

–          Approaches for managing security changes in IS

–          Component-based, Aspect-oriented, Agent-based, Pattern-based Information system Security methods

–          Methods, models and tools for workflow and Business Process Security

–          Case studies in modelling secure IS

–          Security Architectures and Patterns for Information Systems

–          Semantic Web Technologies applied to Security

–          Ontologies for IS security

–          Security Engineering for specific Information Systems (e-Services, databases, mobile, internet, social networks, …)

–          Security Engineering for SOA Systems

–          Methods for security reengineering

–          Software Security Knowledge

–          Enterprise Software Security

 

Paper Submission

Prospective authors are invited to submit papers in any of the topics of the workshop. The results described must be unpublished and must not be under review elsewhere. Only papers in English will be accepted, and the length of the paper should not exceed 14 pages (including all text, figures, references and appendices.). Three to five keywords characterising the paper should be indicated at the end of the abstract.

Manuscripts must comply with the Springer NLBIP formatting rules. Prepare your manuscript as a PDF file and submit it to the workshop organizers via EasyChair system (https://www.easychair.org/conferences/?conf=wisse12).

Submissions not conforming to the LNCS format, exceeding 14 pages, or being obviously out of the scope of the workshop, will be rejected without review.

Best workshop papers will be published in a special issue of the International Journal of Information System Modeling an Design.

Registration

For each accepted submission, at least one author is expected to register for the workshop and attend the workshop in order to present the paper. Registration is through the CAiSE’12 web site.

 

Workshop Structure

The workshop will combine paper presentations, a keynote, and a panel. Moreover, accepted papers apart from presentation time, will be assigned with one or two discussants with responsibility to initiate the discussion on the paper. We are confident that such structure will support a workshop environment that will be based on discussion, debate and will therefore provide an important contribution to the relevant research community.

 

List of PC members

Alban Gabillon. Université de Polynésie Française.

Antonio Maña. University of Malaga. Spain

Benoit Baudry. IRISA Rennes. France

Brajendra Panda. University of Arkansas. USA

Carlos Blanco. University of Cantabria. Spain

Christos Kalloniatis, University of the Aegean, Greece

Csilla Farkas. University of South Carolina. USA

Cuppens Nora. LUSSI/SERES Telecom-Bretagne. France

Daniel Mellado. Spanish Tax Agency. Spain

Eduardo Fernández-Medina. University of Castilla-La Mancha. Spain

Eduardo B. Fernández. Florida Atlantic University. USA

Ernesto Damiani. Università degli Studi di Milano. Italy

Frédéric Cuppens. Telecom Bretagne. France

Günther Pernul. University of Regensburg. Germany

Guttorm Sindre, NTNU, Norway

Indrakshi Ray. Colorado State University. USA

Isabelle Comyn-Wattiau. CNAM. Paris, France

Jacky Akoka. CEDRIC-CNAM. France

Jaejoon Lee. Lancaster University. UK

Jan Jürjens, Technical University of Dortmund, Germany

Javier López. University of Málaga. Spain

Kouichi Sakurai. Kyushu University. Japan

Luis Enrique Sánchez. University of Castilla-La Mancha. Spain

Marc Frappier. University of Sherbrooke. Québec

Matt Bishop. University of California. USA

Paolo Giorgini. University of Trento. Italy

Régine Laleau. LACL, Université Paris-Est Créteil. France

Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy

Shareeful Islam, University of East London, UK.

Steven Furnell. Plymouth University. UK

Yves Ledru. LIG, University of Grenoble. France

 

Workshop organization

 

General Chair:

Dr Haralambos Mouratidis

University of East London. UK

H.Mouratidis@uel.ac.uk

 

Programme Chairs:

Dr. David G. Rosado

University of Castilla-La Mancha. Spain

David.GRosado@uclm.es

 

Dr Nadira Lammari

CEDRIC-CNAM. France

lammari@cnam.fr

 

Steering Committee Chair

Dr Nadira Lammari

CEDRIC-CNAM. France

lammari@cnam.fr

 

Steering Committee

Dr Nora Cuppens

LUSSI/SERES Telecom-Bretagne. France

nora.cuppens@telecom-bretagne.eu

 

Dr. Jan Jürjens

Technical University of Dortmund. Germany

jan.jurjens@cs.tu-dortmund.de

 

Dr Haralambos Mouratidis

University of East London. London

H.Mouratidis@uel.ac.uk

 

Dr. David G. Rosado

University of Castilla-La Mancha. Spain

David.GRosado@uclm.es

 

Dr. Luis Enrique Sánchez

University of Castilla-La Mancha. Spain

LuisE.Sanchez@uclm.es

 

Publicity chairs:

Dr Shareeful Islam

University of East London. London

S.Islam@uel.ac.uk

 

Dr Carlos Blanco

University of Cantabria. Spain

carlos.blanco@unican.es

 

Dr Jérémy Milhau

LACL, Université Paris-Est Créteil. France

jeremilhau@gmail.com

 

 

 

 

 

Feb 01

9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
 Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
 Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others) 

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted: 

– Full Paper: A full paper presents a work where the research is
 completed or almost finished.  Authors of regular submitted papers
 will indicate at the time of submission whether they would like
 their paper to also be considered for publication as a position
 paper.
– Position Paper: A position paper presents results that are
 preliminary or that simply require few pages to describe. A position
 paper may be a short report and discussion of ideas, facts,
 situations, methods, procedures, or results of scientific research
 (bibliographic, experimental, theoretical, or other) focused on one
 of the conference topics. The acceptance of a position paper is
 restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission), 
which is described at http://secrypt.icete.org/paper_formats.asp.  
Submission page limit is 10 pages for full paper and 6 pages for position papers. 
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.


IMPORTANT DATES
Full Paper submission: March 5, 2012
Authors Notification (full papers): May 4, 2012 
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore


PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and 
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by 
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Jan 24

EU will reveal a data protection overhaul this week – The Inquirer

THE EUROPEAN UNION EU will reveal an overhaul of its data protection policies this week with a focus on advertising and social networking web sites.

via EU will reveal a data protection overhaul this week – The Inquirer.

Jan 12

SMART 2012, The First International Conference on Smart Systems, Devices and Technologies

CALL FOR PAPERS, TUTORIALS, PANELS

SMART 2012, The First International Conference on Smart Systems, Devices and Technologies

May 27 – June 1, 2012 – Stuttgart, Germany


General page: http://www.iaria.org/conferences2012/SMART12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPSMART12.html

– regular papers

– short papers (work in progress)

– posters

Submission page: http://www.iaria.org/conferences2012/SubmitSMART12.html


Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org


Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org


Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

SMART 2012 Topics (topics and submission details: see CfP on the site)


Future cities

Digital cities

Senseable city networks

Smart houses

Dynamic urban communications

Knowledge on urban economy

Public display and search

Indoor communications

SHUI (Smart Home User Interfaces)

Smart mobility

Pervasive urban applications

Ubiquitous computing in digital cities

Mobile crowdsourcing applications

Rural communications

Ambient assisted living

Smart multimedia services

Smart antennas

Smart urban electric cars

Smart atmospheric and population migration measurements

Smart energy and optimal consumption

Smartphones

Smart spaces

Ecological cities

Interactions between smart cities

Health informatics in smart cities

Mobility monitoring and control in smart environments

Navigating in smart environments

Smart information processing

Smart analytics

Internet of things in smart environments

Social networking in smart environments

Use Cases for Smart Homes/Cities

Sociocultural challenges in smart environments

Costs associated with smart cities


Committee: http://www.iaria.org/conferences2012/ComSMART12.html

Jan 10

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2012  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Jan 05

IFIP SEC 2012 – Deadline extended to January 17, 2012


* Deadline extended to January 17, 2012 (22:00 UTC) *

**********************************************************************
27th IFIP International Information Security and Privacy Conference 
(SEC 2012)
Creta Maris Hotel, Heraklion, Crete, Greece – June 4-6, 2012
http://www.sec2012.org
**********************************************************************

CONFERENCE TOPICS
Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the 27th IFIP International 
Information Security and Privacy Conference. The focus is on original,
high quality, unpublished research and implementation experiences.
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. We encourage submissions of papers 
discussing industrial research and development. Papers should focus 
on topics which include, but are not limited to, the following:

– Access Control
– Accountability
– Anonymity
– Applied Cryptography
– Attacks & Malicious Code
– Authentication & Delegation
– Awareness & Education
– Data Integrity 
– Database Security
– Identity Management
– Information Security Culture
– Formal Security Verification
– Mobile Code Security
– Policies & Standards
– Privacy Attitudes & Practices
– Risk Analysis & Management
– Security Architectures
– Security Economics
– Security in Location Services
– Security in Social Networks
– Security Models
– Social Engineering & other Human-related Risks
– System Security
– Usable Security
– Trust Models & Management
– Trust Theories
– Trustworthy User Devices

After the conference, extended versions of selected papers will 
be considered for publication in a major security-focused journal. 
Those papers will undergo at least another review round.


INSTRUCTIONS FOR PAPER SUBMISSION
The proceedings will be published by Springer in the IFIP Advances 
in ICT Series. All submissions should follow the proper template 
from the time they are submitted. They should be not more than 
12 pages (using 11-point font), including bibliography and 
appendices. PC members are not required to read the appendices, 
so the paper should be intelligible without them. 
All submissions must be written in English.

Authors must submit their papers by the deadline indicated below, 
using the conference web site (www.sec2012.org) and following the 
requirements stated therein.

All accepted papers must be presented at the conference. Their 
authors must be prepared to sign a copyright transfer statement. 
At least one author of each accepted paper must register to the 
conference by the early date indicated by the organizers, and 
present the paper.


IMPORTANT DATES
Submission of papers: January 17, 2012 (22:00 UTC) *extended*
Notification to authors: March 1, 2012
Camera-ready version: March 10, 2012


CONFERENCE GENERAL CHAIR
S. Katsikas, University of Piraeus (GR)

PROGRAM COMMITTEE CHAIRS
D. Gritzalis, AUEB (GR)
S. Furnell, Plymouth University (UK)

PROGRAM COMMITTEE
V. Atluri, Rutgers University (US)
J. Biskup, University of Dortmund (DE)
J. Camenisch, IBM Research (CH)
S. De Capitani di Vimercati, U. degli Studi di Milano (IT)
N. Clarke, Plymouth University (UK)
J. Crume, IBM (US)
F. Cuppens, TELECOM Bretagne (FR)
N. Cuppens, UEB (FR)
B. de Decker, K.U. Leuven (BE)
G. Dhillon, Virginia C/wealth University (US)
T. Dimitrakos, BT (UK)
R. Dodge, US Military Academy (US)
S. Fischer-Huebner, Karlstadt University (SE)
D. Gollmann, Hamburg Univ. of Technology (DE)
J.-H. Hoepman, TNO & Radboud U. Nijmegen (NL)
T. Holz, Ruhr-University Bochum (DE)
S. Ioannidis, FORTH (GR)
B. Jacobs, Radboud Univ. Nijmegen (NL)
S. Jajodia, George Mason University (US)
L. Janczewski, Univ. of Auckland (NZ)
T. Karygiannis, NIST (US)
V. Katos, University of Thrace (GR)
P. Katsaros, University of Thessaloniki (GR)
S. Katzenbeisser, T.U. Darmstadt (DE)
D. Kesdogan, University of Siegen (DE)
C. Lambrinoudakis, Univ. of Piraeus (GR)
C. Landwehr, Univ. of Maryland (US)
R. E. Leenes, Tilburg University (NL)
J. Lopez, University of Malaga (ES)
E. Markatos, FORTH and Univ. of Crete (GR)
S. Marsh, Communications Research Center (CA)
I. Mavridis, University of Macedonia (GR)
N. Miloslavskaya, National Nuclear Research University (RU)
Y. Murayama, Iwate Prefectural University (JP)
E. Okamoto, Univ. of Tsukuba (JP)
M. Olivier, University of Pretoria (SA)
O. Ouzounis, ENISA (EU)
J. I. Pagter, Alexandra Instituttet, (DK)
M. Papadaki, Plymouth University (UK)
M. Pattinson, University of Adelaide (AU)
P. Peleties, USB Bank (CY)
H. Pohl, UAS Bonn-Rhein-Sieg (DE)
S. Qing, Chinese Academy of Sciences (CN)
M. Rajarajan, City University (UK)
K. Rannenberg, Goethe Univ. Frankfurt (DE)
C. Rieder, HSW Luzern (CH)
P. Samarati, Univ. degli Studi di Milano (IT)
R. Sasaki, Tokyo Denki University (JP)
I. Schaumuller-Bichl, UAS Hagenberg (AT)
A. K. Seip, Finanstilsynet (NO)
R. von Solms, NMMU (SA)
T. Tryfonas, University of Bristol (UK)
C. Valli, Edith Cowan University (AU)
J. Vyskoc, VaF (SK)
J. Ward, Hewlett Packard (UK)
T. Welzer, Univ. of Maribor (SI)
D. Westhoff, HAW Hamburg (DE)
L. Yngstrom, Univ. of Stockholm (SE)
M. Yung, Google (US)

ORGANIZING COMMITTEE CHAIRS
M. Theoharidou, AUEB (GR)
N. Kyrloglou, ACCI (GR)

PUBLICITY CHAIR
S. Foresti, Universita' degli Studi di Milano (IT)



This call for papers and additional information about the conference 
can be found at http://www.sec2012.org
For information regarding the conference you may contact: info@sec2012.org

Nov 30

International Conference on Security and Cryptography – SECRYPT 2012

CALL FOR PAPERS

International Conference on Security and Cryptography – SECRYPT 2012

Website: http://www.secrypt.icete.org/
July 24 – 27, 2012
Rome, Italy

In cooperation with IEICE (The Institute of Electronics, Information and Communication Engineers)
and SWIM (Special Interest Group on Software Interprise Modeling)

Sponsored by INSTICC
INSTICC is member of WfMC (Workflow Management Coalition)


Important Deadlines: 
Regular Paper submission: March 5, 2012
Authors Notification (regular papers): April 24, 2012
Final Regular Paper Submission and Registration: May 7, 2012

###############################################################


Dear ,

We would like to draw your attention to the International Conference on Security and Cryptography (SECRYPT-2012), which has currently an open call for papers. 

Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.

SECRYPT 2012 is part of the International Joint Conference on e-Business and Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

These six concurrent conferences are held in parallel and registration to one warrants delegates to attend all six.

ICETE is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 409 submissions, 12% were accepted as full papers, 16% were presented as short papers and 13% as posters.

The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. DEZO
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. 
Additionally, a short list of papers presented at the conference, will also be selected for publication in the Journal of Information Processing Systems (JIPS).
Furthermore, a short list of papers presented at the conference, will be selected for publication in a special issue of JNW – Journal of Networks

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.


CONFERENCE TOPICS
   * Access Control
   * Applied Cryptography
   * Biometrics Security and Privacy
   * Critical Infrastructure Protection
   * Data Integrity
   * Data Protection
   * Database Security and Privacy
   * Digital Forensics
   * Digital Rights Management
   * Ethical and Legal Implications of Security and Privacy
   * Human Factors and Human Behaviour Recognition Techniques
   * Identification, Authentication and Non-repudiation
   * Identity Management
   * Information Hiding
   * Information Systems Auditing
   * Insider Threats and Countermeasures
   * Intellectual Property Protection
   * Intrusion Detection & Prevention
   * Management of Computing Security
   * Network Security
   * Organizational Security Policies
   * Peer-to-Peer Security
   * Personal Data Protection for Information Systems
   * Privacy
   * Reliability and Dependability
   * Risk Assessment
   * Secure Cloud Computing
   * Secure Software Development Methodologies
   * Security and Privacy in Mobile Systems
   * Security and privacy in Complex Systems
   * Security and Privacy in IT Outsourcing
   * Security and Privacy in Location-based Services
   * Security and Privacy in Pervasive/Ubiquitous Computing
   * Security and Privacy in Social Networks
   * Security and Privacy in Web Services
   * Security and Privacy Policies
   * Security Area Control
   * Security Deployment
   * Security Engineering
   * Security for Grid Computing
   * Security in Distributed Systems
   * Security Information Systems Architecture and Design and Security Patterns
   * Security Management
   * Security Metrics and Measurement
   * Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
   * Security Verification and Validation
   * Sensor and Mobile Ad Hoc Network Security
   * Service and Systems Design and QoS Network Security
   * Software Security
   * Trust management and Reputation Systems
   * Ubiquitous Computing Security
   * Wireless Network Security (WiFi, WiMAX, WiMedia and others)


CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore 


Please check further details at the conference web site (http://www.secrypt.icete.org). 

Should you have any question or suggestion please don't hesitate to contact me.


Kind regards,
Monica Saramago
SECRYPT Secretariat

Av. D. Manuel I, 27A 2.esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
Email: secrypt.secretariat@insticc.org
Web: http://www.secrypt.icete.org

Nov 24

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

*****************
CALL FOR PAPERS
*****************

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2011  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Oct 23

ICCIT 2012 – Second International Conference on Communications and Information Technology ICCIT 2012

Deadline: January 16, 2012 When: June 26, 2012 – June 28, 2012

Where: Hammamet / Tunisia Tunisia

Updated: 15:03:00 Oct. 19, 2011 GMT+9

Call For Papers – CFP

Prospective authors are invited to submit an original full-length paper (10-point font) in IEEE format via the EDAS submissions system. Note that the maximum number of pages is 6; 5 pages plus 1 additional page allowed with a charge for the one additional page of USD100 if accepted. Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published.

IEEE specification based Latex and MS-Word templates for paper submission are available here.

The program committee may designate one accepted paper per track to the conference as ICCIT-2012 Best Papers. Every submission is automatically eligible for this award. Each author on each of the selected papers will receive a certificate to be awarded at the award dinner banquet.

The conference has four tracks. Topics of interest include, but are not limited to:

Wireless Communications and Signal Processing

Wireless Cross Layer Design

Multi-Antenna and MIMO Systems

Cognitive Radio and Dynamic Spectrum Access

Broadband Wireless/ OFDM System

Broadband Wireless Techno. (LTE, WiMAX ..)

Convergence of Wireless Systems

Cognitive Radio and Dynamic Spectrum Access

Modulation, Coding, and Diversity Techniques

PHY-Layer Security

Wireless Communications Testbed Development

Signal Processing Interfaces in Cognitive Radio

Speech, Image and Video Signal Processing

Multimedia Communication Technologies

Spectrum Shaping and Filters

Transmitter and Receiver Techniques

Adaptive Antennas and Beamforming

Blind Signal Processing for Communications

Channel Estimation, Modeling and Equalization

Information Technology and Cloud Computing

Hybrid Information Technology

High Performance Computing

Cloud and Cluster Computing

Ubiquitous Networks and Wireless Communications

Digital Convergence

Multimedia Convergence

Intelligent and Pervasive Applications

Security and Trust Computing

IT Management and Service

Bioinformatics and Bio-Inspired Computing

Knowledge System and Intelligent Agent

Game and Graphics

Human-centric Computing and Social Networks

Computer Vision and Image Processing

Remote Sensing and GIS

IT Applications in different Areas

Engineering Applications of IT

Communication Networks and Systems

Cellular Systems, 3G/4G and beyond

Wireless Ad hoc, Mesh and Sensor Networks

Reconfigurable Wireless Networks

Resource Management, Mobility Management, and Admission Control

Cross-Layer Design and Optimization

Performance Analysis and QoS Provisioning

Network Planning, Capacity Analysis, and Topology Control

Monitoring and Network Management Algorithms

Fault-Tolerance and Traffic Reliability Issues

Pricing and Billing Modeling and Solutions

Optical Networking

Network Reliability, Privacy & Security

Next Generation Internet

Internet Architecture and Design

Internet Signalling and Service Enabling Protocols

Digital Information Management

Data Mining, Web Mining

E-Learning, e-Commerce, e-Business and e-Gov.

Web Metrics and its applications

XML and other extensible languages

Semantic Web, Ontologies and Rules

Artificial Intelligence and Decision Support Systems

Knowledge Management

Peer to Peer Data Management

Interoperability, Mobile Data Management

Data Exchange issues and Supply Chain

Data Life Cycle in Products and Processes

Security and Access Control

Information Content Security

Distributed Information Systems

Information Visualization, Web Services

Multimedia and Interactive Multimedia

Video Search and Video Mining

Oct 23

Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012

Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012

Website:

 

Deadline: Sep. 10, 2011 | Date: Feb. 07, 2012 – Feb 09, 2012

Venue/Country: San Antonio / U.S.A

Updated: 15:07:20 Oct. 19, 2011 GMT+9

Call For Papers – CFP

ACM SIGSAC announces the continuation of its recently launched annual ACM Conference on Data and Applications Security. The second conference will be held February 7-9 2012 in Hilton Palacio Del Rio, San Antonio, Texas. With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learnt to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference series provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

Data and the applications that manipulate data are the crucial assets in today's information age. With the increasing drive towards availability of data and services anytime anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and/or the mobile devices they carry with them and computing new information of value to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations and government agencies to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries and the dramatic failure of old-style approaches to information protection in government agencies in keeping information too secret to connect the dots. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain.

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the conference is to discuss novel exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics include (but not limited to):

http://www.codaspy.org/

Application layer security policies Secure information sharing

Authorization /Access Control for Applications Secure knowledge management

Authorization/Access Control for Databases Secure multiparty computations

Data dissemination controls Secure software development

Data forensics Securing data/apps on untrusted platforms

Enforcement layer security policies Securing the semantic web

Privacy preserving techniques Security and Privacy in GIS/Spatial Data

Private information retrieval Security and Privacy in Healthcare

Search on protected/encrypted data Security policies for databases

Secure auditing Social computing security and privacy

Secure collaboration Social networking security and privacy

Secure data provenance Trust metrics for application, data and user

Secure electronic commerce Web application security

via Second ACM Conference on Data and Application Security and Privacy ACM CODASPY 2012.