|
Past Conferences and Journal Special Issues
Last Modified:12/21/09
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
INTRUST 2009
The International Conference on Trusted Systems,
Beijing, P. R. China, December 17-19, 2009.
[posted here 4/27/09]
INTRUST 2009 is the first International Conference on the theory,
technologies and applications of trusted systems. It is devoted to all aspects of
trusted computing systems, including trusted modules, platforms, networks,
services and applications, from their fundamental features and functionalities to
design principles, architecture and implementation technologies. The goal of the
conference is to bring academic and industrial researchers, designers, and
implementers together with end-users of trusted systems, in order to foster the
exchange of ideas in this challenging and fruitful area.
INTRUST 2009 solicits original papers on any aspect of the theory, advanced development
and applications of trusted computing, trustworthy systems and general trust
issues in modern computing systems. The conference will have an academic track
and an industrial track. This call for papers is for contributions to both of
the tracks. Submissions to the academic track should emphasize theoretical and
practical research contributions to general trusted system technologies, while
submissions to the industrial track may focus on experiences on the
implementation and deployment of real-world systems.
Topics of relevance include but are not limited to:
- Fundamental features and functionalities of trusted systems
- Primitives and mechanisms for building a chain of trust
- Design principles and architectures of trusted modules and platforms
- Implementation technologies for trusted modules and platforms
- Cryptographic aspects of trusted systems, including cryptographic
algorithms and protocols, and their implementation and application in
trusted systems
- Scalable safe network operation in trusted systems
- Mobile trusted systems, such as trusted mobile platforms, sensor networks,
mobile (ad hoc) networks, peer-to-peer networks, Bluetooth, etc.
- Storage aspects for trusted systems
- Applications of trusted systems, e.g. trusted email, web services
and various e-commerce services
- Trusted intellectual property protection: metering, watermarking
and digital rights management
- Software protection for trusted systems
- Authentication and access control for trusted systems
- Key, identity and certificate management for trusted systems
- Privacy aspects for trusted systems
- Attestation aspects for trusted systems, such as measurement
and verification of the behavior of trusted systems
- Standards organizations and their contributions to trusted systems,
such as TCG, ISO/IEC, IEEE 802.11, etc.
- Emerging technologies for trusted systems, such as RFID, memory spots, etc.
- Trust metrics and robust trust inference in distributed systems
- Usability and reliability aspects for trusted systems
- Trust modeling, economic analysis and protocol design for
rational and malicious adversaries
- Virtualisation for trusted systems
- Limitations of trusted systems
- Security analysis of trusted systems, including formal
method proofs, provable security and automated analysis
- Security policies for, and management of, trusted systems
- Intrusion resilience and revocation aspects for trusted systems
- Scalability aspects of trusted systems
- Compatibility aspects of trusted systems
- Experiences in building real-world trusted systems
- Socio-economic aspects of trusted systems
For more information, please see
http://www.tcgchina.org.
ICISS 2009
5th International Conference on Information Systems Security,
Kolkata, India, December 14-18, 2009.
[posted here 4/27/09]
The conference series ICISS (International Conference on Information Systems Security),
held annually, provides a forum for disseminating the latest research results in
information and systems security. The ICISS 2009 encourages submissions addressing
theoretical and practical problems in information and systems security and related areas.
We especially like to encourage papers in domains that have not been represented much
in the past at the conference, such as database security/privacy, usability aspects of
security, operating systems security, and sensor networks security. Papers that
introduce and address unique security challenges or present thought-provoking
ideas are also welcome.
For more information, please see
http://www.eecs.umich.edu/iciss09/.
Inscrypt 2009
5th China International Conference on Information Security and Cryptology,
Beijing China, December 12 - 15, 2009.
[posted here 6/8/09]
Inscrypt 2009 seeks high-quality research contributions in the form of
well developed papers. Topics of interest encompass research advances in ALL
areas of cryptology, information security and their applications, include:
- Access Control
- Authentication and Authorization
- Biometric Security
- Distributed System Security
- Database Security
- Electronic Commerce Security
- Intrusion Detection
- Information Hiding and Watermarking
- Key Management and Key Recovery
- Network Security
- Security Protocols and Their Analysis
- Security Modeling and Architectures
- Provable Security
- Secure Multiparty Computation
- Foundations of Cryptography
- Secret Key and Public Key Cryptosystems
- Implementation of Cryptosystems
- Hash Functions and MACs
- Block Cipher Modes of Operation
- Intellectual Property Protection
- Mobile System Security
- Operating System Security
- Risk Evaluation and Security Certification
- Prevention and Detection of Malicious Codes
For more information, please see
http://www.inscrypt.cn/.
SCC 2009
Workshop on Security in Cloud Computing,
Chengdu, Sichuan, China, December 12 – 14, 2009.
[posted here 7/27/09]
Cloud Computing has attracted attention from both industry and academics
since 2007. As the extension of Grid Computing and Distributed Computing,
Cloud Computing aims to provide users more flexible services in a transparent manner –
all services are allocated in a “cloud” that actually is a collect of devices and
resources connected through the Internet. Before it is accepted widely, one of
the most impending tasks is the security, privacy and reliabilities provided
by the services in the cloud. SCC’09 will bring researchers and experts together
to present and discuss the latest developments and technical solutions
covering various aspects of security issues in Cloud Computing.
The topics include but not limited to:
- Emerging threats to cloud-based services
- Security model for new services
- Cloud-aware web service security
- Information hiding in Cloud Computing
- Securing distributed data storage in cloud
- Privacy and security in Cloud Computing
- Forensics
- Robust network architecture
- Cloud Infrastructure Security
- Intrusion detection/prevention
- Denial-of-Service (DoS) attacks and defense
- Robust job scheduling
- Secure resource allocation and indexing
- Secure payment for cloud-aware services
- User authentication in cloud-aware services
- Security for emerging cloud programming models
For more information, please see
http://bingweb.binghamton.edu/~ychen/SCC09.htm.
UbiSafe 2009
2nd IEEE International Symposium on Ubisafe Computing,
Chengdu, China, December 12-14, 2009.
[posted here 2/2/09]
The UbiSafe-09 Symposium provides a forum for engineers and scientists in academia,
industry, and government to address all safety related profound challenges including
technical, social, legal and ethical issues, and to present and discuss their ideas,
theories, technologies, systems, tools, applications, work in progress and
experience on all aspects of UbiSafe computing.
UbiSafe emphasizes the SAFE aspects for ubiquitous, pervasive, AmI, mobile,
universal, embedded, wearable, augmented, invisible, hidden, context-aware,
sentient, proactive, autonomic, or whatever it is called, computing. UbiSafe
computing is focused on theories and technologies for ubiquitous artifacts to
function safely for different purposes; for ubiquitous systems to work safely
in various situations; and for ubiquitous environments to behave safely with
all people. A series of challenges exist to let people benefit from ubiquitous
services, and simultaneously guarantee their safety in making ubiquitous safe
artifacts, systems, and environments.
For more information, please see
http://cs.okstate.edu/ubisafe09/.
CANS 2009
8th International Conference on Cryptography and Network Security,
Kanazawa, Ishikawa, Japan, December 12-14, 2009.
[posted here 2/2/09]
The main goal of this conference is to promote research on all
aspects of network security, as well as to build a bridge between
research on cryptography and on network security. We therefore
welcome scientific and academic papers with this focus. Areas of interest
for CANS 2009 include, but are not limited to:
- Ad Hoc and Sensor Network Security
- Access Control for Networks
- Anonymity and Pseudonymity
- Authentication Services
- Cryptographic Protocols and Schemes
- Denial of Service Protection
- Digital Rights Management
- Fast Cryptographic Algorithms
- Identity and Trust Management
- Information Hiding and Watermarking
- Internet and Router Security
- Intrusion Detection and Prevention
- Mobile and Wireless Network Security
- Multicast Security
- Phishing and Online Fraud Prevention
- Peer-to-Peer Network Security
- PKI
- Security Modeling and Architectures
- Secure Protocols (SSH, SSL, ...) and Applications
- Spam Protection
- Spyware Analysis and Detection
- Virtual Private Networks
For more information, please see
http://www.rcis.aist.go.jp/cans2009/.
ACSA 2009
2009 FTRG International Workshop on Advances in Cryptography, Security
and Applications for Future Computing,
Jeju, Korea, December 11-12, 2009.
[posted here 6/29/09]
ACSA-09 focuses on advances in Cryptography, Security and Applications for Future Computing.
It is intended to foster state-of-the-art research in the area of cryptography, security and
its applications for Future Computer Science (FCS). The FCS represents an interdisciplinary
field with roots in mathematics and engineering with applications in future computing
environments including ubiquitous, pervasive, grid, and P2P computing. It aims to solve
the various problems of advanced computing and communication services using mathematics
and computer science in future computing environments. The reliable security solutions
that rely on in depth cryptography are required as a countermeasure, such as data confidentiality,
data integrity, authentication, non-repudiation, and access control services. Original contributions,
not currently under review to another journal or conference, are solicited
in relevant areas including, but not limited to, the following:
- Mathematical and Algorithmic Foundations of Applied Cryptography for FCS
- Authentication and Non-repudiation for FCS
- Design and Analysis of Cryptographic Algorithms and Protocols for FCS
- Pairing Based Cryptography for FCS
- Provable Security for Cryptographic Primitives Suitable for FCS
- Information Security with Mathematical Emphasis for FCS
- Identity and Trust Management for FCS
- Database and System Security for FCS
- Intrusion Detection, Tolerance and Prevention for FCS
- Access control and DRM for FCS
- Information assurance for FCS
- New Security Issues for FCS
For more information, please see
http://www.ftrg.org/acsa2009/.
MPIS 2009
2nd International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems,
Jeju, Korea, December 10-12, 2009.
[posted here 6/29/09]
This workshop on Multimedia, Information Privacy and Intelligent Computing Systems
is intended to foster the dissemination of state-of-the-art research in the area
of multimedia and intelligent computing including multimedia signal processing,
information security, soft computing such as neural network, fuzzy theory and genetic
algorithm, and novel applications of intelligent computing in multimedia. As a follow-up
to the workshop, we plan to publish high quality papers, covering the various theories
and practical applications related to multimedia and intelligent computing.
We invite new and original submissions addressing theoretical and practical topics in
information technology and intelligent computing fields.
For more information, please see
http://www.ftrg.org/MPIS2009/.
F2GC 2009
2nd International Workshop on Forensics for Future Generation
Communication environments,
Jeju, Korea, December 10-12, 2009.
[posted here 6/29/09]
Future Generation Communication environments (FGC) are advanced
communication and networking environments where all applications
and services are focused on users. In addition, the FGC has emerged
rapidly an exciting new paradigm to provide reliable and comfortable
life services. Furthermore, the benefits of FGC will only be realized if
security issues can be appropriately addressed. Specially, forensics for
FGC is very important in the security fields.
This workshop is intended to foster state-of-the-art research forensics
in the area of FGC including information and communication technologies,
law, social sciences and business administration.
Topics of interest include but are not limited to following:
- Digital forensics tools in FGC
- Digital Evidence Management in FGC
- Digital Evidence Analytics in FGC
- Digital Forensics Surveillance Technology and Procedures in FGC
- Digital evidence visualisation and communication for FGC
- Digital evidence storage and preservation in FGC
- Incident response and investigation in FGC
- Forensic procedures in FGC
- Portable electronic device forensics for FGC
- Network forensics in FGC
- Data hiding and recovery in FGC
- Network traffic analysis, traceback and attribution in FGC
- Legal, ethical and policy issues related to digital forensics in FGC
- Integrity of digital evidence and live investigations
- Multimedia analysis in FGC
- Trends and Challenges for FGC
- Evidence Protection in FGC
- Forensics case studies in FGC
For more information, please see
http://www.ftrg.org/F2GC2009/.
ReConFig 2009
International Conference on ReConFigurable Computing and FPGAs,
Special Track on Reconfigurable Computing for Security and Cryptography,
Cancun, Mexico, December 9-11, 2009.
[posted here 6/8/09]
Reconfigurable hardware offers unique opportunities for the design and
implementation of secure applications in embedded and high-end computing
platforms. High performance, carefully-controlled execution, and physical
isolation are just a few of the advantages that hardware brings over software.
At the same time, new challenges appear, such as the protection of intellectual
property in a reconfigurable fabric, and the protection of soft-hardware
against malicious tampering. This special track seeks the latest innovations
in reconfigurable computing for security and cryptography.
Topics of interest include the following:
- Hardware Implementation of Novel Cryptographic Algorithms and Protocols
- Reconfigurable Cryptographic Primitives
- Special-Purpose Hardware for Cryptanalysis
- Hardware Support for Trustworthy Software Execution
- True and Pseudo Random Generators
- Circuit Identification and Physical Unclonable Functions
- Efficient Methods for Protection of Hardware IPs
- FPGA Design Security
- Fault Attacks and Side-channel Attacks
- Hardware Tamper Resistance and Tamper Evidence
- Hardware Trojan Detection and Resistance
- Design Flows for Hardware-based Secure Systems
- Performance Evaluation of Secure Reconfigurable Hardware
For more information, please see
http://www.reconfig.org.
ICPADS 2009
15th IEEE International Conference on Parallel and Distributed Systems,
Shenzhen, China, December 8-11, 2009.
[posted here 5/4/09]
Following the previous successful events, ICPADS 2009 will be held in Shenzhen,
China. The conference provides an international forum for scientists, engineers, and
users to exchange and share their experiences, new ideas, and latest research results
on all aspects of parallel and distributed systems.
Topics of particular interest include, but are not limited to:
- High Performance Computational Biology and Bioinformatics
- Parallel and Distributed Applications and Algorithms
- High Performance Computational Biology and Bioinformatics
- Multi-core and Multithreaded Architectures
- Power-aware Computing
- Distributed and Parallel Operating Systems
- Resource Management and Scheduling
- Peer-to-Peer Computing
- Cluster and Grid Computing
- Web-based Computing and Service-Oriented Architecture
- Communication and Networking Systems
- Wireless and Mobile Computing
- Ad Hoc and Sensor Networks
- Security and Privacy
- Dependable and Trustworthy Computing and Systems
- Real-Time and Multimedia Systems
- Performance Modeling and Evaluation
For more information, please see
http://www.comp.polyu.edu.hk/conference/icpads09/.
ACSAC 2009
25th Annual Computer Security Applications Conference,
Honolulu, Hawaii, USA, December 7-11, 2009.
[posted here 2/16/09]
We solicit papers offering novel contributions in computer and application
security. Papers should present techniques or applications with practical
experience. Papers are encouraged on technologies and methods that have been
demonstrated to improve information systems security and that address lessons
from actual application. We are especially interested in papers that address
the application of security technology, the implementation of systems, and
lessons learned. Suggested topics:
- access control
- applied cryptography
- audit and audit reduction
- biometrics
- certification and accreditation
- cybersecurity
- database security
- denial of service protection
- distributed systems security
- electronic commerce security
- enterprise security management
- forensics
- identification & authentication
- identify management
- incident response planning
- information survivability
- insider threat protection
- integrity
- intellectual property rights
- intrusion detection
- mobile and wireless security
- multimedia security
- operating systems security
- peer-to-peer security
- privacy and data protection
- product evaluation/compliance
- risk/vulnerability assessment
- securing cloud infrastructures
- security engineering and management
- security in IT outsourcing
- service oriented architectures
- software assurance
- trust management
- virtualization security
- VOIP security
- Web 2.0/3.0 security
For more information, please see
http://www.acsac.org.
ASIACRYPT 2009
15th Annual International Conference on the Theory and Application of
Cryptology and Information Security,
Tokyo, Japan, December 6-10, 2009.
[posted here 4/27/09]
Original research papers on all technical aspects of cryptology are solicited
for submission to ASIACRYPT 2009, the annual International Conference on Theory
and Application of Cryptology and Information Security.
The conference is sponsored by the International Association for Cryptologic
Research (IACR) in cooperation with Technical Group on
Information Security (ISEC) of the Institute of Electronics, Information
and Communication Engineers (IEICE).
For more information, please see
http://asiacrypt2009.cipher.risk.tsukuba.ac.jp.
WIFS 2009
1st IEEE International Workshop on Information Forensics and Security,
London, UK, December 6-9, 2009.
[posted here 1/19/09]
The IEEE International Workshop on Information Forensics and Security (WIFS) is
the first workshop to be organized by the IEEE’s Information Forensics and Security Technical Committee.
Our aspiration is to create a venue for knowledge exchange that encompasses a broad range
of disciplines and facilitates the exchange of ideas between various disparate communities
that constitute information security. By so doing, we hope that researchers will identify
new opportunities for collaboration across disciplines and gain new perspectives.
Appropriate topics of interest include, but are not limited to:
- Biometrics: emerging modalities, recognition techniques, multimodal
decision, attacks and countermeasures
- Computer security: intrusion detection, vulnerability analysis,
system security
- Cryptography for multimedia content: perceptual hash function, multimedia
encryption, signal processing in the encrypted domain, traitor tracing codes,
key distribution
- Data hiding: watermarking, steganography and steganalysis, legacy system enhancement
- Digital Rights Management (DRM): DRM primitives (secure clocks, proximity detection,
etc), DRM architectures, DRM interoperability
- Forensic analysis: device identification, data recovery,
validation of forensic evidence
- Network security: privacy protection, network tomography and surveillance,
system recovery from security/privacy failure
- Non technical aspects of security: legal, ethical, social
and economical issues
- (Video) surveillance: arrays of sensors design and analysis, content tracking,
events recognition, large crowd behaviour analysis
- Secure Applications: e-voting, e-commerce
For more information, please see
http://www.wifs09.org.
MidSec 2009
2nd Workshop on Middleware Security,
Held in conjunction with the 10th ACM/IFIP/USENIX International
Middleware Conference (MIDDLEWARE 2009),
Urbana Champaign, Illinois, USA, November 30, 2009.
[posted here 6/15/09]
Modern applications are predominantly built around the distributed programming
paradigm. Client-server applications, grids, peer-to-peer networks and event-based
systems are examples of architectures that are used by a large share of the
present software base. These paradigms expose applications to numerous,
ever-growing security threats. However, many areas of security are still only
partially addressed w.r.t. middleware. Examples are identity management,
privacy and anonymity, accountability, application protection, and so on.
While more conventional research results in the above-mentioned areas of
middleware security are appreciated, this year the MidSec workshop will
particularly welcome papers in the area of security measures for lightweight
composition. Papers are sought after from two complementary angles: middleware
platforms and software architectures. Mashup editors provide an easy-to-use
facility that brings the power of software composition at the fingertips of
any Internet-connected user. The mashup model is catching the enterprise
world as well; it all started with situational applications and it is
currently spreading further. Ready or not, here it comes. We are about to
face times where application composition will be less and less rigid and hence
will more and more resemble organized chaos. Enforcing sound security principles
in such a muddled environment is an interesting research challenge for both the
middleware and the software architecture communities. On one hand, software
architectures modeling techniques must provide suitable abstractions to represent
and address the above (and many other) security concerns. On the other hand,
middleware platforms should support such abstractions in a natural, usable way.
The topics of interest for papers include, but are not limited to:
- Middleware security and privacy
- Security and privacy in agent-based platforms
- Context-sensitive security middleware
- Security and privacy in aspect-based middleware
- Security and privacy in service-oriented architectures
- Middleware-level security monitoring and measurement
- Middleware-driven lightweight secure composition
- Architecture-driven lightweight secure composition
- Security and privacy in enterprise mashups
- Usability and security in lightweight composition
For more information, please see
http://www.cs.kuleuven.be/conference/MidSec2009/.
IWNS 2009
International Workshop on Network Steganography,
Held in conjunction with the International Conference on Multimedia Information
Networking and Security (MINES 2009),
Wuhan, Hubei, China, November 18-20, 2009.
[posted here 4/27/09]
Network steganography is part of information hiding focused on modern
networks and is a method of hiding secret data in users' normal data transmissions,
ideally, so it cannot be detected by third parties. Steganographic techniques
arise and evolve with the development of network protocols and mechanisms,
and are expected to used in secret communication or information sharing.
Now, it becomes a hot topic due to the wide spread of information networks,
e.g., multimedia service networks and social networks. The workshop is dedicated
to capture such areas of research as steganography, steganalysis, and digital
forensics in the meaning of network covert channels, investigate the potential
applications, and discuss the future research topics. Research themes of
workshop will include:
- Steganography and steganalysis
- Covert/subliminal channels
- Novel applications of information hiding in networks
- Political and business issues in network steganography
- Information hiding in multimedia services
- Digital forensics
- Network communication modelling from the viewpoint of
steganography and steganalysis
- New methods for eliminating network steganography
For more information, please see
http://stegano.net/workshop.
SECMCS 2009
Workshop on Secure Multimedia Communication and Services,
Held in conjunction with the 2009 International Conference on Multimedia Information
Networking and Security (MINES 2009),
Wuhan, China, November 18–20, 2009.
[posted here 5/4/09]
This workshop covers various aspects of secure multimedia communication in
emerging services. The services may work in the following environment:
Internet, mobile TV, IPTV, IMS, VoIP, P2P, sensor network, network convergence, etc.
The paper may focus on architecture construction, algorithm designing or hardware
implementation. Both review paper and technical paper are expected. The topics
include but are not limited to:
- Lightweight multimedia encryption
- Secure multimedia adaptation
- Multimedia content authentication
- Sensitive content detection/filtering based on multimedia analysis
- Security threats or model for multimedia services
- Conditional Access and Digital Rights Management
- Key management/distribution in multimedia services
- Secure payment for multimedia services
- Secure user interface in multimedia services
- Secure telecom/broadcast convergence
- Secure mobile/Internet convergence
- Security in 3G/4G multimedia communication networks
- Security and privacy in multimedia sensor networks
- Security protocols or standards for multimedia communication
- Secure devices (set-top box, Smart Cards, SIM card, MID, etc.)
- Intrusion detection/prevention in multimedia systems
- Denial-of-Service (DoS) attacks in multimedia applications
For more information, please see
http://liss.whu.edu.cn/mines2009/SECMCS.htm.
CCSW 2009
ACM Cloud Computing Security Workshop,
Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009),
Chicago, IL, USA, November 13, 2009.
[posted here 4/27/09]
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale
computing and cloud-like infrastructures are here to stay. How exactly they will look like
tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with
them new untested deployment and associated adversarial models and vulnerabilities.
It is essential that our community becomes involved at this early stage. The CCSW workshop
aims to bring together researchers and practitioners in all security aspects of
cloud-centric and outsourced computing, including:
- secure cloud resource virtualization mechanisms
- secure data management outsourcing
- practical privacy and integrity mechanisms for outsourcing
- foundations of cloud-centric threat models
- secure computation outsourcing
- remote attestation mechanisms in clouds
- sandboxing and VM-based enforcements
- trust and policy management in clouds
- secure identity management mechanisms
- new cloud-aware web service security paradigms and mechanisms
- cloud-centric regulatory compliance issues and mechanisms
- business and security risk models and clouds
- cost and usability models and their interaction with security in clouds
- scalability of security in global-size clouds
- trusted computing technology and clouds
- binary analysis of software for remote attestation and cloud protection
- network security (DOS, IDS etc.) mechanisms for cloud contexts
- security for emerging cloud programming models
- energy/cost/efficiency of security in clouds
For more information, please see
http://crypto.cs.stonybrook.edu/ccsw09.
SPIMACS 2009
ACM Workshop on Security and Privacy in Medical and Home-Care Systems,
Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009),
Chicago, IL, USA, November 13, 2009.
[posted here 4/27/09]
The goal of the proposed workshop is to bring together a range of computer
and social scientists to develop a more complete understanding of the
interaction of individuals and computer security technologies as they
are associated with critical care, continuing care and monitoring of
the frail. The goals include but go beyond traditional vulnerability
and usability critiques to include evaluations of use of security
technologies in homes and in health care. The Health Information
Technology for Economic Clinical Health Act, signed on 2/17/09,
brings this issue strongly to the fore. SPIMACS (pronounced spy-max)
seeks to bring together the people and expertise that will be required to
address the challenges of securing the intimate digital spaces of the most vulnerable.
Therefore the scope of this workshop includes but is not uniquely limited to:
- usable security
- usable privacy technologies, particularly for the physically or cognitively impaired
- home-based wireless network security
- security in specialized application for the home, e.g. medical or
physical security monitoring
- authentication in the home environment
- security and anonymization of home-centric data on the network
- usable security for unique populations, e.g. elders, children, or the ill
- privacy and security evaluation mechanisms for home environments
- security in home-based sensor networks
- medical and spatial privacy
- privacy-aware medical devices
- privacy-enhanced medical search
- analyses of in-home and medical systems
- attacks on medical devices
- threat analyses or attacks on medical or home data
- novel applications of cryptography to medical or intimate data
For more information, please see
http://www.infosecon.net/SPIMACS/cfp.php.
SWS 2009
ACM Workshop on Secure Web Services,
Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009),
Chicago, IL, USA, November 13, 2009.
[posted here 4/27/09]
Basic security protocols for Web Services, such as XML Security,
the WS-* series of proposals, SAML, and XACML are the basic set of building
blocks enabling Web Services and the nodes of GRID architectures to interoperate
securely. While these building blocks are now firmly in place, a number of
challenges are still to be met for Web services and GRID nodes to be fully
secured and trusted, providing for secure communications between cross-platform
and cross-language Web services. Also, the current trend toward representing
Web services orchestration and choreography via advanced business process
metadata is fostering a further evolution of current security models and
languages, whose key issues include setting and managing security policies,
inter-organizational (trusted partner) security issues and the implementation
of high level business policies in a Web services environment.
The SWS workshop explores these challenges, ranging from the advancement and
best practices of building block technologies such as XML and Web services
security protocols to higher level issues such as advanced metadata,
general security policies, trust establishment, risk management, and service assurance.
The workshop provides a forum for presenting research results, practical
experiences, and innovative ideas in web services security. Topics of interest include,
but are not limited to, the following:
- Web services and GRID computing security
- Authentication and authorization
- Frameworks for managing, establishing and assessing
inter-organizational trust relationships
- Web services exploitation of Trusted Computing
- Semantics-aware Web service security and Semantic Web
Secure orchestration of Web services
- Privacy and digital identities support
For more information, please see
http://sesar.dti.unimi.it/SWS09/.
STC 2009
4th Annual Workshop on Scalable Trusted Computing,
Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009),
Chicago, IL, USA, November 13, 2009.
[posted here 5/4/09]
The workshop focuses on fundamental technologies of trusted computing
(in a broad sense, with or without TPMs) and its applications in large-scale systems --
those involving large number of users and parties with varying degrees of trust.
The workshop is intended to serve as a forum for researchers as well as practitioners
to disseminate and discuss recent advances and emerging issues.
Topics of interest include, but not limited to:
- Enabling scalable trusted computing
- Applications of trusted computing
- Pushing the limits
For more information, please see
http://projects.cerias.purdue.edu/stc2009/call.html.
TrustCol 2009
4th International Workshop on Trusted Collaboration,
Crystal City, Washington DC. November 11, 2009.
[posted here 7/20/09]
The ongoing, rapid developments in information systems technologies and
networking have enabled significant opportunities for streamlining
decision making processes and maximizing productivity through
distributed collaborations that facilitate unprecedented levels of sharing
of information and computational resources. Emerging collaborative
environments need to provide efficient support for seamless integration
of heterogeneous technologies such as mobile devices and infrastructures,
web services, grid computing systems, online social networks, various
operating environments, and diverse COTS products. Such heterogeneity
introduces, however, significant security and privacy challenges for
distributed collaborative applications. Balancing the competing goals of
collaboration and security is difficult because interaction in collaborative
systems is targeted towards making people, information, and resources
available to all who need it whereas information security seeks to ensure
the availability, confidentiality, and integrity of these elements while
providing it only to those with proper trustworthiness. The key goal of
this workshop is to foster active interactions among diverse researchers
and practitioners, and generate added momentum towards research in
finding viable solutions to the security and privacy challenges faced
by the current and future collaborative systems and infrastructures.
We solicit unpublished research papers that address theoretical issues
and practical implementations/experiences related to security and privacy
solutions for collaborative systems. Topics of interest include,
but are not limited to:
- Secure dynamic coalition environments
- Secure distributed multimedia collaboration
- Privacy control in collaborative environments
- Secure workflows for collaborative computing
- Policy-based management of collaborative workspace
- Secure middleware for large scale collaborative infrastructures
- Security and privacy issues in mobile collaborative applications
- Security frameworks and architectures for trusted collaboration
- Secure interoperation in multidomain collaborative environments
- Identity management for large scale collaborative infrastructures
- Semantic web technologies for secure collaborative infrastructure
- Trust models, trust negotiation/management for collaborative systems
- Access control models and mechanisms for collaboration environments
- Protection models and mechanisms for peer-to-peer collaborative
environments
- Delegation, accountability, and information flow control in collaborative
applications
- Intrusion detection, recovery and survivability of collaborative
systems/infrastructures
- Security of web services and grid technologies for supporting multidomain
collaborative applications
For more information, please see
http://scl.cs.nmt.edu/trustcol09.
EC2ND 2009
5th European Conference on Computer Network Defence (EC2ND)
Politecnico di Milano, Milano, Italy, November 9-10, 2009.
[posted here 6/8/09]
The theme of the conference is the protection of computer
networks. The conference will draw participants from academia and
industry in Europe and beyond to discuss hot topics in applied network
and systems security. EC2ND invites submissions presenting novel ideas at an early stage
with the intention to act as a discussion forum and feedback channel
for promising, innovative security research. While our goal is to
solicit ideas that are not completely worked out, and might have
challenging and interesting open questions, we expect submissions to
be supported by some evidence of feasibility or preliminary
quantitative results. Topics include but are not limited to:
- Intrusion Detection
- Denial-of-Service
- Privacy Protection
- Security Policy
- Peer-to-Peer and Grid Security
- Network Monitoring
- Web Security
- Vulnerability Management and Tracking
- Network Forensics
- Wireless and Mobile Security
- Cryptography
- Network Discovery and Mapping
- Incident Response and Management
- Malicious Software
- Web Services Security
- Legal and Ethical Issues
For more information, please see
http://2009.ec2nd.org/.
SafeConfig 2009
Workshop on Assurable & Usable Security Configuration,
Held on conjunction with the ACM CCS 2009,
Chicago, USA, November 9, 2009.
(Submissions due 5 August 2009) [posted here 7/20/09]
A typical enterprise network might have hundreds of security devices such as
firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC
servers and crypto systems. These must be logically integrated into a security
architecture satisfying security goals at and across multiple networks. Logical
integration is accomplished by consistently setting thousands of configuration
variables and rules on the devices. The configuration must be constantly adapted
to optimize protection and block prospective attacks. The configuration must be
tuned to balance security with usability. These challenges are compounded by
the deployment of mobile devices and ad hoc networks. The resulting
security configuration complexity places a heavy burden on both regular
users and experienced administrators and dramatically reduces overall
network assurability and usability. For example, a December 2008 report from
Center for Strategic and International Studies "Securing Cyberspace for the
44th Presidency" states that "inappropriate or incorrect security
configurations ? were responsible for 80% of Air Force vulnerabilities"
and a May 2008 report from Juniper Networks "What is Behind Network Downtime?"
states that "human factors ? [are] responsible for 50 to 80 percent of
network device outages". This workshop is an open call for submission workshop
will consist of presentations and panel discussions on the following topics:
- Integrating network and host configuration
- Automated forensics and mitigation
- Metrics for measuring assurability and usability: Usable security often
involves trade offs between security or privacy and usability/utility
- Abstract models and languages for configuration specification
- Configuration refinement and enforcement
- Configuration of MANETS and coalition networks
- Formal semantics of security policies /map policies to configuration
- Configuration testing, debugging and evaluation
- Reasoning about uncertainly in configuration management
- Representation of belief, trust, and risk in security policies
- Configuration/misconfiguration visualization
- Configuration reasoning and conflict analysis
- Risk adaptive configuration systems
- Context-aware security configuration for pervasive and mobile computing
- Configuration accountability
- Automated signature and patch management
- Automated alarm management
- Protecting the privacy and integrity of security configuration
- Optimizing security, flexibility and performance
- Measurable metric of flexibility and usability
- Design for flexibility and manageability - clean slate approach
- Configuration management vs. least-privilege
For more information, please see
http://www.arc.cs.depaul.edu/~ehab/ccs/safeconfig09/.
SafeConfig 2009
Workshop on Assurable & Usable Security Configuration,
Collocated with the ACM CCS 2009,
Chicago, USA, November 9, 2009.
[posted here 6/29/09]
A typical enterprise network might have hundreds of security devices
such as firewalls, IPSec gateways, IDS/IPS, authentication servers,
authorization/RBAC servers and crypto systems. These must be logically
integrated into a security architecture satisfying security goals at
and across multiple networks. Logical integration is accomplished by
consistently setting thousands of configuration variables and rules on
the devices. The configuration must be constantly adapted to optimize
protection and block prospective attacks. The configuration must be
tuned to balance security with usability. These challenges are
compounded by the deployment of mobile devices and ad hoc
networks. The resulting security configuration complexity places a
heavy burden on both regular users and experienced administrators and
dramatically reduces overall network assurability and usability. For
example, a December 2008 report from Center for Strategic and
International Studies ?Securing Cyberspace for the 44th Presidency?
states that ?inappropriate or incorrect security configurations ? were
responsible for 80% of Air Force vulnerabilities? and a May 2008
report from Juniper Networks ?What is Behind Network Downtime?? states
that ?human factors ? [are] responsible for 50 to 80 percent of
network device outages?. This workshop will bring together academic as
well as industry researchers to exchange experiences, discuss
challenges and propose solutions for offering assurable and usable
security. This workshop will consist of presentations and panel
discussions on the following topics:
- Integrating network and host configuration
- Automated forensics and mitigation
- Usability issues in security management
- Metrics for measuring assurability and usability:
Usable security often involves trade offs between security or
privacy and usability/utility
- Abstract models and languages for configuration specification
- Configuration refinement and enforcement
- Configuration of MANETS and coalition networks
- Formal semantics of security policies
- Configuration testing, debugging and evaluation
- Reasoning about uncertainly in configuration management
- Representation of belief, trust, and risk in security policies
- Configuration/misconfiguration visualization
- Configuration reasoning and conflict analysis
- Risk adaptive configuration systems
- Context-aware security configuration for pervasive and mobile computing
- Configuration accountability
- Automated signature and patch management
- Automated alarm management
- Protecting the privacy and integrity of security configuration
- Optimizing security, flexibility and performance
- Measurable metric of flexibility and usability
- Design for flexibility and manageability ? clean slate approach
- Configuration management vs. least-privilege
For more information, please see
http://www.arc.cs.depaul.edu/~ehab/ccs/safeconfig09/.
CCS 2009
16th ACM Conference on Computer and Communications Security,
Chicago, IL, USA, November 9-13, 2009.
[posted here 1/26/09]
The annual ACM Computer and Communications Security Conference is a leading
international forum for information security researchers, practitioners,
developers, and users to explore cutting-edge ideas and results, and to
exchange techniques, tools, and experiences. The conference seeks submissions
from academia, government, and industry presenting novel research on all
practical and theoretical aspects of computer and communications security,
as well as case studies and implementation experiences. Papers should have
relevance to the construction, evaluation, application, or operation of secure
systems. Theoretical papers must make a convincing argument for the practical
significance of the results. All topic areas related to computer and
communications security are of interest and in scope.
For more information, please see
http://sigsac.org/ccs/CCS2009/index.shtml.
FAST 2009
6th International Workshop on Formal Aspects in Security and Trust,
Eindhoven, the Netherlands, November 5-6, 2009.
[posted here 7/13/09]
The FAST2009 workshop aims at continuing the successful efforts of the previous
workshops, fostering the cooperation among researchers in the areas of security and
trust. As computing and network infrastructures become increasingly pervasive, and as
they carry increasing economic activity, society needs well matched security and
trust mechanisms. These interactions increasingly span several enterprises and
involve loosely structured communities of individuals. Participants in these
activities must control interactions with their partners based on trust policies
and business logic. Trust-based decisions effectively determine the security goals
for shared information and for access to sensitive or valuable resources. FAST
focuses on the formal models of security and trust that are needed to state goals
and policies for these interactions. We also seek new and innovative techniques
for establishing consequences of these formal models. Implementation approaches
for such techniques are also welcome.
For more information, please see
http://www.iit.cnr.it/FAST2009/.
IS 2009
4th International Symposium on Information Security,
Vilamoura, Algarve-Portugal, November 1-6, 2009.
[posted here 3/16/09]
The goal of this symposium is to bring together researchers from the academia
and practitioners from the industry in order to address information security
issues. The symposium will provide a forum where researchers shall be able to
present recent research results and describe emerging technologies and new
research problems and directions related to them. The symposium seeks
contributions presenting novel research in all aspects of information
security. Topics of interest may include one or more of the following
(but are not limited to) themes:
- Access Control and Authentication
- Accounting and Audit
- Biometrics for Security
- Buffer Overflows
- Computer Forensics
- Cryptographic Algorithms and Protocols
- Databases and Data Warehouses Security
- Honey Nets
- Identity and Trust Management
- Intrusion Detection and Prevention
- Information Filtering and Content Management
- Information Hiding and Watermarking
- Mobile Code Security
- Multimedia Security
- Network Security
- Privacy and Confidentiality
- Public-Key Infrastructure
- Privilege Management Infrastructure
- Risk Assessment
- Security Issues in E-Activities
- Security and Privacy Economics
- Security in RFID Systems
- Security and Trustiness in P2P Systems and Grid Computing
- Security in Web Services
- Smart Card Technology
- Software Security
- Usability of Security Systems and Services
- Vulnerability Assessment
For more information, please see
http://www.onthemove-conferences.org/index.php?option=com_content&view=article&id=65&Itemid=140.
LISA 2009
23rd USENIX Large Installation System Administration Conference,
Baltimore, MD, USA, November 1–6, 2009.
[posted here 12/15/08]
Effective administration of a large site requires a good understanding of
modern tools and techniques, together with their underlying principles—but the
human factors involved in managing and applying these technologies in a production
environment are equally important. Bringing together theory and practice is an
important goal of the LISA conference, and practicing system administrators as well as
academic researchers all have valuable contributions to make.
Topics of interest include, but are not limited to the following:
- Authentication and authorization: "Single sign-on" technologies, identity management
- Autonomic computing: Self-repairing systems, zero administration systems, fail-safe design
- Configuration management: Specification languages, configuration deployment
- Data center design: Modern methods, upgrading old centers
- Data management: DBMS management systems, deployment architectures and methods,
real world performance
- Email: Mail infrastructures, spam prevention
- Grid computing: Management of grid fabrics and infrastructure
- Hardware: Multicore processor ramifications
- Mobile computing: Supporting and managing laptops and remote communications
- Multiple platforms: Integrating and supporting multiple platforms
(e.g., Linux, Windows, Macintosh)
- Networking: New technologies, network management
- Security: Malware and virus prevention, security technologies and procedures,
response to cyber attacks targeting individuals
- Standards: Enabling interoperability of local and remote services and applications
- Storage: New storage technologies, remote filesystems, backups, scaling
- Web 2.0 technologies: Using, supporting, and managing wikis, blogs, and other Web 2.0 applications
- Virtualization: Managing and configuring virtualized resources
For more information, please see
http://usenix.org/events/lisa09/.
IWSEC 2009
4th International Workshop on Security,
Toyama, Japan, October 28-30, 2009.
[posted here 1/12/09]
The aim of IWSEC2009 is to contribute to research and development of
various security topics: theory and applications of traditional and
up-to-date security issues. Topics include but are not limited to:
- Network and Distributed Systems Security
- Security Issues in Ubiquitous/Pervasive Computing
- Authorization and Access Control
- Software and System Security
- Usable Security
- Privacy Enhancing Technology
- Digital Identity Management
- Digital Forensics
- Biometrics
- Cryptography
- Information Hiding
- Quantum Security
- Secure and Efficient Implementation
- Other Scientific Approaches for Security
For more information, please see
http://www.iwsec.org.
CryptoWorkshop-QuantumComm 2009
Workshop on Quantum and Classical Information Security,
Held in conjunction with the International Conference on Quantum Communication
and Quantum Networking (QuantumComm 2009),
Vico Equense, Sorrento peninsula, Naples, Italy, October 26, 2009 .
[posted here 6/15/09]
The research communities of quantum information security and of classical
information security tend to be composed of people that do not share the same
scientific backgrounds and work in parallel, with different perspectives, on topics
that are on the opposite highly similar. The variety of these topics: secret key agreement,
public-key and secret-key encryption schemes, secure multi-party computation,
information-theoretic cryptographic schemes, complexity reductions and provable
security, composability of cryptographic primitives, cryptanalysis, cryptographic
side-channels, security evaluation and certification of cryptographic implementations,
network security, deployment and management of security infrastructures, etc..., has become
extremely large as quantum cryptography has progressively widened it scope. However, some
exagerate claims of "unconditionnal quantum supporters", not well informed about
cryptography, has lead to misunderstandings and in particular to the false belief that
quantum cryptography could replace classical cryptography, while in fact the scientific
results indicate that cryptography in a quantum world would still be largely classical.
The purpose of this workshop is to bring together researchers with different backgrounds
who however work on converging problems in classical or quantum information security
in order to foster discussions and exchanges among these communities. We believe that
promising advances both in fundamental cryptographic research and in practical network
security can result from a closer cooperation of classical and quantum information
security communities.
For more information, please see
http://www.quantumcomm.org/workshop.shtml.
eCrime 2009
4th Annual APWG eCrime Researchers Summit,
Tacoma, WA, USA, October 20-21, 2009.
[posted here 5/4/09]
Original papers on all aspects of electronic crime are solicited for
submission to eCrime '09. Topics of relevance include but
are not limited to:
- Phishing, rogue-AV, pharming, click-fraud, crimeware, extortion and emerging attacks
- Technical, legal, political, social and psychological aspects of fraud and fraud prevention
- Malware, botnets, ecriminal/phishing gangs and collaboration, or money laundering
- Techniques to assess the risks and yields of attacks and the success rates of countermeasures
- Delivery techniques, including spam, voice mail and rank manipulation; and countermeasures
- Spoofing of different types, and applications to fraud
- Techniques to avoid detection, tracking and takedown; and ways to block such techniques
- Honeypot design, data mining, and forensic aspects of fraud prevention
- Design and evaluation of user interfaces in the context of fraud and network security
- Best practices related to digital forensics tools and techniques, investigative procedures,
and evidence acquisition, handling and preservation
For more information, please see
http://www.ecrimeresearch.org/2009/cfp.html.
DMM 2009
1st International Workshop on Denial of service Modelling and Mitigation,
Held in conjunction with 3rd International Conference on Network & System Security (NSS 2009),
Gold Coast, Australia, October 19-21, 2009.
[posted here 3/2/09]
Denial of service attacks represent an increasing threat to the security of networks
and systems critical to commercial, industrial and government enterprises.
Addressing the denial-of-service problem is proving to be an ongoing challenge
and further advances are needed in: the design and analysis of denial of service
resistant protocols and architectures; effective tools and techniques for
detecting and responding to attacks; forensic attribution of attacks; and
the application of trust and reputation schemes in formulating attack responses.
This workshop actively solicits recent advances from industrial, academic and
government researchers and engineers in the areas of:
- Denial of service attacks and countermeasures
- Detection and mitigation of high-rate flooding attacks
- Design and analysis of denial of service resistant architectures
- Design and analysis of denial of service resistant protocols
- Distributed trust and reputation systems
- Intrusion detection and response systems
- Intelligent defence systems
- Network and computer forensics
- Emerging vulnerabilities
- Security in Web services and service-oriented architectures
- Simulation and analysis of attacks
- Honeypots
- Reverse engineering of malware
- Disruption of botnet command and control
- Wireless network denial of service attacks and defences
- Next generation threats and responses
- Legal and policy responses to denial of service
- Threat intelligence
For more information, please see
http://conf.isi.qut.edu.au/dmm2009.
NSS 2009
3rd International Conference on Network & System Security,
Gold Coast, Australia, October 19-21, 2009.
[posted here 1/19/09]
While the attack systems have become more easy-to-use, sophisticated, and
powerful, interest has greatly increased in the field of building more
effective, intelligent, adaptive, active and high performance defense systems
which are distributed and networked. We will focus our program on issues
related to Network and System Security, such as authentication, access control,
availability, integrity, privacy, confidentiality, dependability and
sustainability of computer networks and systems. The aim of this conference
is to provide a leading edge forum to foster interaction between researchers
and developers with the network and system security communities, and to give
attendees an opportunity to interact with experts in academia, industry
and governments. Topics of interest include, but not limited to:
- Active Defense Systems
- Adaptive Defense Systems
- Benchmark, Analysis and Evaluation of Security Systems
- Distributed Access Control and Trust Management
- Distributed Attack Systems and Mechanisms
- Distributed Intrusion Detection/Prevention Systems
- Denial-of-Service Attacks and Countermeasures
- High Performance Security Systems
- Identity Management and Authentication
- Implementation, Deployment and Management of Security Systems
- Intelligent Defense Systems
- Internet and Network Forensics
- Large-scale Attacks and Defense
- RFID Security and Privacy
- Security Architectures in Distributed Network Systems
- Security for Critical Infrastructures
- Security for P2P systems and Grid Systems
- Security in E-Commerce
- Security and Privacy in Wireless Networks
- Secure Mobile Agents and Mobile Code
- Security Protocols
- Security Simulation and Tools
- Security Theory and Tools
- Standards and Assurance Methods
- Trusted Computing
- Viruses, Worms, and Other Malicious Code
- World Wide Web Security
For more information, please see
http://nss2007.cqu.edu.au/FCWViewer/view.do?page=8494.
NordSec 2009
14th Nordic Conference on Secure IT Systems,
Oslo, Norway, October 14-16, 2009.
[posted here 3/23/09]
NordSec brings together computer security researchers and practitioners from around
the world, in particular from the Nordic countries and Northern Europe. The conference
focuses on applied IT security and is intended to encourage interaction between academic
and industrial research. NordSec 2009 welcomes contributions from researchers and
practitioners over the theme "Identity and Privacy in the Internet Age" as well as
over a broad range of topics in IT security, including, but not limited to, the following areas:
- Applied Cryptography
- Commercial Security Practices
- Communication and Network Security
- Computer Crime and Info Warfare
- Hardware and Smart Card Applications
- Internet and Web Security
- Intrusion Detection
- Language-based Security Techniques
- New Ideas and Paradigms in Security
- Operating System Security
- PKI Systems and Key Escrow
- Privacy and Anonymity
- Security Education and Training
- Security Evaluations and Assurance
- Security Management and Audit
- Security Models
- Security Protocols
- Social-Engineering and Phishing
- Software Security
- Trust and Reputation Management
For more information, please see
http://nordsec2009.unik.no/.
MetriSec 2009
5th International Workshop on Security Measurements and Metrics,
Held in conjunction with the International Symposium on
Empirical Software Engineering and Measurement (ESEM 2009),
Lake Buena Vista, Florida, USA, October 14, 2009.
[posted here 3/9/09]
Quantitative assessment is a major stumbling blocks for software and
system security. Although some security metrics exist, they are rarely adequate.
The engineering importance of metrics is intuitive: you cannot consistently
improve what you cannot measure. Economics is an additional drive for security
metrics: customers should be enabled to quantify which of two IT products is
more appropriate. The goals of this workshop are to showcase and foster research
into security measurements and metrics and to keep building the community of
individuals interested in this area. MetriSec continues the tradition started
by the Quality of Protection (QoP) workshop series. This year, the new
co-location with ESEM is an opportunity for the security metrics folks to meet
the metrics community at large. The organizers solicit original submissions
from industry and academic experts on the development and application of
repeatable, meaningful measurements in the fields of software and system security.
The topics of interest include, but are not limited to:
- Security metrics
- Security measurement and monitoring
- Development of predictive models
- Experimental validation of models
- Formal theories of security metrics
- Security quality assurance
- Empirical assessment of security architectures and solutions
- Mining data from attack and vulnerability repositories, CVE, CVSS
- Static analysis metrics
- Simulation and statistical analysis
- Stochastic modeling
- Security risk analysis
- Industrial experience
For more information, please see
http://www.cs.kuleuven.be/conference/MetriSec2009/.
TSP 2009
IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications,
Held in conjunction with the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2009),
Macau SAR, China, October 12-14, 2009.
[posted here 5/11/09]
TSP 2009 aims at bringing together researchers and practitioners in the world working
on trust, security, privacy, and related issues such as technical, social and cultural
implications for pervasive devices, services, networks, applications and systems,
and providing a forum for them to present and discuss emerging ideas and trends
in this highly challenging research area. Topics of interest include,
but are not limited to:
- Trust, Security and Privacy (TSP) metrics and architectures for pervasive computing
- Trust management in pervasive environment
- Risk management in pervasive environment
- Security and privacy protection in pervasive environment
- Security and privacy in mobile and wireless communications
- Security and privacy for databases in pervasive environment
- Safety and user experiences in pervasive environment
- TSP-aware social and cultural implications in pervasive environment
- Cryptographic devices for pervasive computing
- Biometric authentication for pervasive devices
- Security for embedded software and systems
- TSP-aware middleware design for pervasive services
- TSP-aware case studies on pervasive applications/systems
- Key management in pervasive applications/systems
- Authentication in pervasive applications/systems
- Audit and accountability in pervasive applications/systems
- Access control in pervasive applications/systems
- Anonymity in pervasive applications/systems
- Reliability and fault tolerance in pervasive applications/systems
- Miscellaneous issues in pervasive devices, services, applications, and systems
For more information, please see
http://trust.csu.edu.cn/conference/tsp2009/.
SecPri-WiMob 2009
International Workshop on Security and Privacy in
Wireless and Mobile Computing, Networking and Communications,
Held in the 5th IEEE International Conference on Wireless and
Mobile Computing, Networking and Communications (WiMob 2009),
Marrakech, Morocco, October 12, 2009.
[posted here 3/16/09]
The objectives of the SecPri_WiMob 2009 Workshop are to bring together
researchers from research communities in Wireless and Mobile Computing,
Networking and Communications, Security and Privacy, with the goal of
fostering interaction. Topics of interest may include one or more of
the following (but are not limited to) themes:
- Cryptographic Protocols for Mobile and Wireless Networks
- Key Management in Mobile and Wireless Computing
- Reasoning about Security and Privacy
- Privacy and Anonymity in Mobile and Wireless Computing
- Public Key Infrastructure in Mobile and Wireless Environments
- Economics of Security and Privacy in Wireless and Mobile environments
- Security Architectures and Protocols in Wireless LANs
- Security Architectures and Protocols in B3G/4G Mobile Networks
- Security and Privacy features into Mobile and Wearable devices
- Location Privacy
- Ad hoc Networks Security
- Sensor Networks Security
- Wireless Ad Hoc Networks Security
- Role of Sensors to Enable Security
- Security and Privacy in Pervasive Computing
- Trust Establishment, Negotiation, and Management
- Secure PHY/MAC/routing protocols
- Security under Resource Constraints (bandwidth,
computation constraints, energy)
For more information, please see
http://www.icsd.aegean.gr/SecPri_WiMob_2009/.
VizSec 2009
Workshop on Visualization for Cyber Security,
Atlantic City, NJ, USA, October 11, 2009.
[posted here 3/2/09]
The 6th International Workshop on Visualization for Cyber Security is a
forum that brings together researchers and practitioners in information
visualization and security to address the specific needs of the cyber
security community through new and insightful visualization techniques.
Co-located this year with IEEE InfoVis/Vis/VAST, VizSec will continue to
provide opportunities for the two communities to collaborate and share insights
into providing solutions for security needs through visualization approaches.
This year our focus is on advancing Visualization for Cyber Security as a
scientific discipline. While art, engineering, and intuitions regarding the
human element will always remain important if we are to obtain useful cyber
security visualizations, advances in the scientific practice of research are
needed. The scientific aspects of visualization for cyber security draw both
on empirical observation (similar to many natural and social sciences) and
formal science (such as the formal derivations in mathematics). Barriers confronting
current researchers include concerns about available data, lack of a common
agreement about what constitutes sound experimental design, the difficulties of
measuring the relative effectiveness of security visualizations in practice,
and the lack of a common understanding of user requirements. While many
researchers are making progress in these and other critical areas, much
work yet remains. Papers offering novel contributions in security
visualization are solicited. Papers may present technique, applications,
practical experience, theory, or experiments and evaluations. Papers are
encouraged on technologies and methods that have been demonstrated to be
useful for improving information systems security and that address
lessons from actual application. We encourage papers that report results
on visualization techniques and systems in solving all aspects of cyber
security problems, including how visualization applies to:
- Different aspects of security: software, networks and log files
(e.g., Internet routing, packet traces and network flows, intrusion
detection alerts, attack graphs, application security, etc.)
- Application of visualization techniques in formalizing, defining and analyzing security policies
- Forensic analysis, correlating events, cyber-defense task analysis
- Computer network defense training and offensive information operations
- Building rules, feature selection, and detecting anomalous activity
- Software, software security, and viruses
- Deployment and field testing of VizSec systems
- Evaluation and user testing of VizSec systems
- User and design requirements for VizSec systems
- Lessons learned from development and deployment of VizSec systems
- “Field Research” Best Practices
- Interaction with domain experts – best practices, lessons learned
- Differentiating the needs of different domains and time frames
- Best practices for obtaining and sharing potentially sensitive data for
purposes of visualization and assessment, including how to approach personal
privacy, regulatory, and organizational issues
- Metrics and measurements (e.g., criteria for the relative effectiveness of cyber visualizations)
- Handling large datasets, scalability issues, and providing real time or near-real time visualizations
For more information, please see
http://vizsec.org/vizsec2009/.
SIN 2009
2nd ACM International Conference on Security of Information and Networks,
Eastern Mediterranean University, Gazimagusa, TRNC, North Cyprus, October 6-10, 2009.
[posted here 1/12/09]
The 2nd International Conference on Security of Information and
Networks (SIN 2009) provides an international forum for
presentation of research and applications of security in information
and networks. SIN 2009 conference features contributed as well as
invited papers, special sessions, workshops, and tutorials on
theory and practice. Its drive is to convene a high quality,
well-attended, and up-to-date conference on scientific and
technical issues of security in information, networks, and systems.
The main theme of SIN 2009 is Intelligent Systems for Information Assurance,
Security, and Public Policy in the Age of e-Euphoria.
For more information, please see
http://www.sinconf.org/cfp/cfp.htm.
WSNS 2009
5th IEEE International Workshop on Wireless and Sensor Networks Security,
Held in conjunction with the 6th IEEE International Conference on
Mobile Ad-hoc and Sensor Systems (MASS 2009),
Macau SAR, China, October 5-8, 2009.
[posted here 3/23/09]
Wireless networks have experienced an explosive growth during the past few
years. Nowadays, there is a large variety of networks spanning from the
well-known cellular networks to non-infrastructure wireless networks such
as mobile ad hoc networks and sensor networks. The security issue is a
central concern for achieving secured communication in these networks. This
one day workshop aims to bring together researchers and practitioners from
wireless and sensor networking, security, privacy, cryptography, and distributed
computing communities, with the goals of promoting discussions and
collaborations. We are interested in novel research on all aspects of
security and privacy in wireless and sensor networks and their cost-effective
solutions. Topics of interest include, but are not limited to:
- Attacks and Countermeasures
- Authentication and Access Control
- Computer-Aided Tool for Security
- Cross-layer Design for Security
- Cryptographic Protocol
- Denial of Service (DoS)
- Key Management
- Information Hiding
- Intrusion Detection and Response
- Malicious Behavior Detection and Analysis
- Privacy and Anonymity
- Secure Localization and Synchronization
- Security and Performance tradeoff
- Security Policy and Enforcement Issues
- Security Protocols Analysis, Design, and Proof
- Secure Routing/MAC
- Surveillance and Monitoring
- Trust Establishment and Management
For more information, please see
http://www.cs.wcupa.edu/~zjiang/wsns09.htm.
ICDF2C 2009
International Conference on Digital Forensics & Cyber Crime,
Albany, NY, USA, September 30 - October 2, 2009.
[posted here 3/16/09]
The Internet has made it easier to perpetrate traditional crimes by providing
criminals an alternate avenue for launching attacks with relative anonymity.
The increased complexity of the communication and networking infrastructure
is making investigation of the crimes difficult. Clues of illegal activities
are often buried in large volumes of data that needs to be sifted through
in order to detect crimes and collect evidence. The field of digital
forensics is becoming very important for law enforcement, network security,
and information assurance. This is a multidisciplinary area that encompasses
multiple fields, including: law, computer science, finance, networking,
data mining, and criminal justice. The applications of this technology are
far reaching including: law enforcement, disaster recovery, accounting frauds,
homeland security, and information warfare. This conference brings together
practitioners and researchers from diverse fields providing opportunities for
business and intellectual engagement among attendees.
Suggested topics for submission of papers are (but not limited to):
- Computer Forensics Electronic Money Laundering
- Forensic Accounting Watermarking & Intellectual Property Theft
- Incident Response & Evidence Handling Network Data Analysis
- Data Analytics, Mining & Visualization Identity Theft & Online Fraud
- Mobile Device Forensics Digital Forensics and the Law
- Data Log Analysis (Computer, Network, Devices, etc) Forensics Training & Education
- Natural Language Processing Cyber Crime Investigations
- Continuous Assurance Internet Crime Against Children Investigation
- Data Recovery & Business Continuity Standardization & Accreditation
- Multimedia Forensics Digital Signatures and Certificates
For more information, please see
http://www.d-forensics.org/.
SRDS 2009
28th International Symposium on Reliable Distributed Systems,
Niagara Falls, New York, USA, September 27-30, 2009.
[posted here 3/16/08]
For 28 years, the Symposium on Reliable Distributed Systems has been a
traditional forum for researchers and practitioners who are interested
in distributed systems design and development, particularly with properties
such as reliability, availability, safety, security, and real time.
We welcome original research papers as well as papers that deal with design,
development and experimental results of operational systems.
We are also soliciting papers for an experience track that presents
on-going industrial projects, prototype systems and exploratory or
emerging applications. The major areas of interest include, but are not
limited to, dependability, security and/or real-time aspects within the
following topics:
- Security and privacy issues in wireless ad hoc and sensor networks
- Dependability in autonomic, pervasive and ubiquitous computing
- Security and high-confidence systems
- Resilient ad hoc and sensor networks
- Internet dependability and Quality of Service
- Safety-critical systems and critical infrastructures
- Dependability of high-speed networks and protocols
- Fault-tolerance in embedded systems, mobile systems and multimedia systems
- Dependable wireless networks and peer-to-peer networks
- Intrusion-tolerant, survivable, and self-stabilizing systems
- Dependability in Grid-, Cluster-, and Cloud-Computing
- Measurement, monitoring and prediction in distributed systems
- Analytical or experimental evaluations of dependable distributed systems
- Formal methods and foundations for dependable distributed computing
- Performance and dependability assessing techniques, tools and results
For more information, please see
http://www.cse.buffalo.edu/srds2009/.
STM 2009
5th International Workshop on Security and Trust Management,
Held in conjunction with ESORICS 2009,
Saint Malo, France, September 24-25, 2009.
[posted here 5/4/09]
STM (Security and Trust Management) is a established working group of ERCIM
(European Research Consortium in Informatics and Mathematics).
Topics of interest include, but are not limited to:
- access control
- cryptography
- data protection
- digital right management
- economics of security and privacy
- key management
- ICT for securing digital as well as physical assets
- identity management
- networked systems security
- privacy and anonymity
- reputation systems and architectures
- security and trust management architectures
- semantics and computational models for security and trust
- trust assessment and negotiation
- trust in mobile code
- trust in pervasive environments
- trust models
- trust management policies
- trusted platforms and trustworthy systems
- trustworthy user devices
For more information, please see
http://stm09.dti.unimi.it.
SETOP 2009
International Workshop on Autonomous and Spontaneous Security,
Held in conjunction with ESORICS 2009,
Saint Malo, Britany, France, September 24-25, 2009.
[posted here 4/27/09]
With the need for evolution, if not revolution, of current network architectures
and the Internet, autonomous and spontaneous management will be a key feature of
future networks and information systems. In this context, security is an essential
property. It must be thought at the early stage of conception of these systems and
designed to be also autonomous and spontaneous. Future networks and systems must be
able to automatically configure themselves with respect to their security policies.
The security policy specification must be dynamic and adapt itself to the changing
environment. Those networks and systems should interoperate securely when their
respective security policies are heterogeneous and possibly conflicting.
They must be able to autonomously evaluate the impact of an intrusion in order
to spontaneously select the appropriate and relevant response when a given intrusion
is detected. Autonomous and spontaneous security is a major requirement of future
networks and systems. Of course, it is crucial to address this issue in different
wireless and mobile technologies available today such as RFID, Wifi, Wimax, 3G, etc.
Other technologies such as ad hoc and sensor networks, which introduce new type of
services, also share similar requirements for an autonomous and spontaneous
management of security. The SETOP Workshop seeks submissions that present research
results on all aspects related to spontaneous and autonomous security. Submissions
by PhD students are encouraged. Topics of interest include, but are not limited to
the following:
- Security policy deployment
- Self evaluation of risk and impact
- Distributed intrusion detection
- Autonomous and spontaneous response
- Trust establishment
- Security in ad hoc networks
- Security in sensor/RFID networks
- Security of Next Generation Networks
- Security of Service Oriented Architecture
- Security of opportunistic networks
- Privacy in self-organized networks
- Secure localization
- Context aware and ubiquitous computing
- Secure inter-operability and negotiation
- Self-organization in secure routing
- Identity management
For more information, please see
http://conferences.telecom-bretagne.eu/setop-2009.
DPM 2009
4th International Workshop on Data Privacy Management,
Held in conjunction with the ESORICS 2009,
Saint Malo, Britany, France, September 24, 2009.
[posted here 4/27/09]
DPM 2009 Workshop aims at discussing and exchanging ideas related to
privacy data management. We invite papers from researchers and practitioners working
in privacy, security, trustworthy data systems and related areas to submit their
original papers in this workshop. The main topics, but not limited to, include:
- Privacy Information Administration
- Privacy Policy-based Infrastructures and Architectures
- Privacy-oriented Access Control Language
- Privacy in Trust Management
- Privacy Data Integration
- Privacy Risk Assessment and Assurance
- Privacy Services
- Privacy Policy Analysis
- Query Execution over Privacy Sensitive Data
- Privacy Preserving Data Mining
- Hippocratic and Water-marking Databases
- Privacy for Integrity-based Computing
- Privacy Monitoring and Auditing
- Privacy in Social Networks
- Privacy in Ambient Intelligence (AmI) Applications
- Conciliation of Individual Privacy and Corporate/National Security
- Privacy in computer networks
- Privacy and RFIDs
- Privacy in Sensor Networks
For more information, please see
http://dpm09.dyndns.org/.
CISIS 2009
2nd International Workshop on Computational Intelligence for
Security in Information Systems,
Burgos, Spain, September 23-26, 2009.
[posted here 4/6/09]
CISIS aims to offer a meeting opportunity for academic and industry-related
researchers belonging to the various, vast communities of Computational
Intelligence, Information Security, Data Mining, and Biometry. The need
for intelligent, flexible behavior by large, complex systems, especially
in mission-critical domains, is intended to be the catalyst and the
aggregation stimulus for the overall event. CISIS´09 provides an
interesting opportunity to present and discuss the latest theoretical
advances and real-world applications in this multidisciplinary research field.
Topics are encouraged, but not limited to:
- Intelligent Data Mining for Network Security
- Learning Methods for Text Mining in Intelligence and Security
- Soft-Computing Methods in Critical Infrastructure Protection
- Intelligent Secure Methods in Railway Operation
- Computational Intelligence in Biometrics for Security
For more information, please see
http://gicap.ubu.es/cisis2009/.
RAID 2009
12th International Symposium on Recent Advances in Intrusion Detection,
Saint Malo, Brittany, France, September 23-25, 2009.
[posted here 3/30/09]
This symposium, the 12th in an annual series, brings together leading
researchers and practitioners from academia, government, and industry
to discuss issues and technologies related to intrusion detection and
defense. The Recent Advances in Intrusion Detection (RAID) International
Symposium series furthers advances in intrusion defense by promoting
the exchange of ideas in a broad range of topics. As in previous years,
all topics related to intrusion detection, prevention and defense systems
and technologies are within scope, including but not limited to the following:
- Network and host intrusion detection and prevention
- Anomaly and specification-based approaches
- IDS cooperation and event correlation
- Malware prevention, detection, analysis and containment
- Web application security
- Insider attack detection
- Intrusion response, tolerance, and self protection
- Operational experience and limitations of current approaches
- Intrusion detection assessment and benchmarking
- Attacks against IDS including DoS, evasion, and IDS discovery
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis, risk assessment, and forensics
- Adversarial machine learning for security
- Visualization techniques
- Special environments, including mobile and sensor networks
- High-performance intrusion detection
- Legal, social, and privacy issues
- Network exfiltration detection
- Botnet analysis, detection, and mitigation
For more information, please see
http://www.rennes.supelec.fr/RAID2009/.
ESORICS 2009
14th European Symposium on Research in Computer Security,
Saint Malo, France, September 21-25, 2009.
[posted here 1/19/09]
Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Fourteenth European Symposium on
Research in Computer Security (ESORICS 2009). The Symposium has established
itself as one of the premiere, international gatherings on Information Assurance.
Papers may present theory, technique, applications, or practical experience on
topics including, but not limited to:
- access control
- anonymity
- authentication
- authorization and delegation
- cryptographic protocols
- data integrity
- dependability
- information flow control
- smartcards
- systems security
- digital right management
- accountability
- applied cryptography
- covert channels
- cybercrime
- denial of service attacks
- formal methods in security
- inference control
- information warfare
- steganography
- transaction management
- data and application security
- intellectual property protection
- intrusion tolerance
- peer-to-peer security
- language-based security
- network security
- non-interference
- privacy-enhancing technology
- pseudonymity
- subliminal channels
- trustworthy user devices
- identity management
- security as quality of service
- secure electronic commerce
- security administration
- security evaluation
- security management
- security models
- security requirements engineering
- security verification
- survivability
- information dissemination control
- trust models and trust management policies
For more information, please see
http://www.esorics.org.
SECURECOMM 2009
5th International ICST Conference on Security and Privacy for
Communication Networks,
Athens, Greece, September 14-18, 2009.
[posted here 1/12/09]
Securecomm seeks high-quality research contributions in the form of well
developed papers. Topics of interest encompass research advances in ALL
areas of secure communications and networking. However, topics in other areas
(e.g., formal methods, database security, secure software, foundations of cryptography)
will be considered only if a clear connection to private or secure communications/networking
is demonstrated. The aim of Securecomm is to bring together security and privacy
experts in academia, industry and government as well as practitioners, standards
developers and policy makers, in order to engage in a discussion about common goals
and explore important research directions in the field.
TOPICS of interest include, but are not limited to, the following:
- Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Malware and botnets
- Communication Privacy and Anonymity
- Distributed denial of service
- Public Key Infrastructures, key management, credentials
- Web security
- Secure Routing, Naming/Addressing, Network Management
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Privacy for emerging technologies: VoIP, peer-to-peer and
overlay network systems, Web 2.0
For more information, please see
http://www.securecomm.org.
SEWCN 2009
1st ICST International Workshop on Security in Emerging Wireless Communication
and Networking Systems,
Held in conjunction with SecureComm 2009,
Athens, Greece, September 14, 2009.
[posted here 6/29/09]
Innovative wireless communication and networking systems have been proposed and
studied in recent years, including cognitive radio networks, multi-channel
multi-radio networks, cyber-physical systems, vehicle ad hoc networks, and
others. The goal of this workshop is to develop and employ secure architectures
and protocols to enhance these emerging wireless systems. As these wireless systems
have new features and serve new applications, they are raising new security concerns
that existing security technologies may not be sufficient to tackle. Hence, these
wireless systems require re-examination of current security techniques and creation
of new security schemes. The design of these wireless systems also needs security as
an integral part to prevent misuse of them and assure their functionality. This workshop
particularly invites new ideas on security in the context of these emerging wireless
communication and networking systems, including identifying new threats and new
primitives for supporting secure system design.
Topics on security in emerging wireless systems include, but are not limited to
the following:
- Vulnerabilities and threats
- Cross-layer design for security
- Security of cognitive radio
- Security of channel management
- Resilient control over network
- Secure neighbor and location discovery
- Key management
- Intrusion detection and response
- User and data privacy
- Anti-jamming communication
- Denial of service
For more information, please see
http://sewcn.org.
ARO-DF 2009
ARO Workshop on Digital Forensics,
Washington DC., USA, September 10-11, 2009.
[posted here 5/25/09]
The possibility of becoming a victim of cyber crime is the number one
fear of billions of people online. In the years of fighting against
cyber-crimes and cyber-enabled crimes, we have seen that digital evidence
may often be available for a very short period of time and/or involve huge
volumes of data that are found locally on a single digital device or spread
globally across dispersed public and proprietary platforms. The field of
Digital Forensics faces many challenges and difficult problems. The goal
of this workshop is to identify important and hard digital forensic challenges
and problems, and to stimulate community efforts on the development of
scientific foundation for digital forensics and new theories and practical
techniques towards addressing these problems. We invite one-page short statement
of ideas addressing the problems and topics of interest for the workshop.
The workshop discussions will be initiated by presentations from invited
speakers, each representing a different perspective related to digital
forensics and views from law enforcement, military, industry, and academia.
These presentations will be used to form the basis of the workshop
discussions to follow. The remainder of the workshop will be devoted
to group discussions led by group coordinators on a selected list of
important topics in digital forensics. Topics of relevance include,
but are not limited to:
- Scientific Foundation and Models, and the Law
- Digital Evidence Discovery, Collection, Recovery, and Storage
- Digital Evidence Analysis
- Network Forensics
- Digital Forensics Tool Validation
- Anti-forensics Techniques
For more information, please see
http://www.engineering.iastate.edu/~guan/ARO-DF/index.html.
EuroPKI 2009
6th European Workshop on Public Key Services, Applications and Infrastructures,
Pisa, Tuscany, Italy, September 9-11, 2009.
[posted here 3/30/09]
EuroPKI aims at covering all research aspects of
Public Key Services, Applications and Infrastructures. In particular, we want
to encourage also submissions dealing with any innovative applications of public
key cryptography. Submitted papers may present theory, applications or practical
experiences on topics including, but not limited to:
- Anonymity and privacy
- Architecture and Modeling
- Authentication
- Authorization and Delegation
- Case Studies
- Certificates Status
- Certification Policy and Practices
- Credentials
- Cross Certification
- Directories
- eCommerce/eGovernment
- Evaluation
- Fault-Tolerance and reliability
- Federations
- Group signatures
- ID-based schemes
- Identity Management and eID
- Implementations
- Interoperability
- Key Management
- Legal issues
- Long-time archiving
- Mobile PKI
- Multi-signatures
- Policies & Regulations
- Privacy
- Privilege Management
- Protocols
- Repositories
- Risk/attacks
- Standards
- Timestamping
- Trust management
- Trusted Computing
- Ubiquitous scenarios
- Usage Control
- Web services security
For more information, please see
http://www.iit.cnr.it/EUROPKI09.
NSPW 2009
New Security Paradigms Workshop,
The Queen's College, University of Oxford, UK, September 8-11, 2009.
[posted here 1/19/09]
The New Security Paradigms Workshop (NSPW) is seeking papers that address the
current limitations of information security. Today's security risks are diverse
and plentiful--botnets, database breaches, phishing attacks, distributed
denial-of-service attacks--and yet present tools for combatting them are
insufficient. To address these limitations, NSPW welcomes unconventional,
promising approaches to important security problems and innovative critiques
of current security practice. We are particularly interested in perspectives
from outside computer security, both from other areas of computer science
(such as operating systems, human-computer interaction, databases, programming
languages, algorithms) and other sciences that study adversarial relationships
such as biology and economics. We discourage papers that offer incremental
improvements to security and mature work that is appropriate for standard
information security venues. By encouraging researchers to think ``outside the box''
and giving them an opportunity to communicate with open-minded peers, NSPW seeks to
foster paradigm shifts in the field of information security.
For more information, please see
http://www.nspw.org/current/cfp.shtml.
ISC 2009
12th Information Security Conference,
Pisa, Italy, September 7-9, 2009.
[posted here 3/2/09]
ISC is an annual international conference covering research in and
applications of information security. The twelfth Information
Security Conference (ISC 2009) will be held in Pisa, Italy. The
conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
information security. Topics of interest include, but are not limited
to:
- access control
- accountability
- anonymity and pseudonymity
- applied cryptography
- authentication
- biometrics
- computer forensics
- cryptographic protocols
- database security
- data protection
- data/system integrity
- digital right management
- economics of security and privacy
- electronic frauds
- formal methods in security
- identity management
- information dissemination control
- information hiding and watermarking
- intrusion detection
- network security
- peer-to-peer security
- privacy
- security and privacy in pervasive/ubiquitous computing
- security in information flow
- security in IT outsourcing
- security for mobile code
- security of grid computing
- security of eCommerce, eBusiness and eGovernment
- security in location services
- security modeling and architectures
- security models for ambient intelligence environments
- security in social networks
- trust models and trust management policies
For more information, please see
http://isc09.dti.unimi.it/.
CHES 2009
Workshop on Cryptographic Hardware and Embedded Systems,
Lausanne, Switzerland, September 6-9, 2009.
[posted here 4/6/09]
CHES 2009 will include a Hot Topic Session focused on the emerging
research area of "Hardware Trojans and Trusted ICs".
A confluence of several trends makes this a timely and important topic.
The economic challenges and cost structure of today's semiconductor
industry are driving towards increased consolidation of fabrication
capabilities and disaggregation of IC and system design houses from
foundries. Globalization of both design and fabrication implies that the
overall design and manufacturing chain for most ICs often spans across
several legislative domains. From the security perspective, this gives
rise to new challenges. Most systems rely on correctly designed and
fabricated chips (i.e., hardware is not malicious), and consequently most
security mechanisms break down when the threat comes from "within the IC".
For example, Hardware Trojans could be inserted into ICs prior to
manufacturing in order to leak sensitive information or interfere with
correct operation (e.g., a "kill switch") once the IC is deployed in an
end system. Therefore, it is increasingly becoming necessary to ensure the
trustworthiness of ICs even when parts of the design and fabrication
process are inherently untrusted.
The CHES 2009 committee invites submissions for the Hot Topic session that
address any relevant topic, including but not limited to the following:
- Trust / security models for IC design & fabrication
- New challenges & attacks
- Hardware Trojan detection techniques
- Trusted re-use models for IP components
For more information, please see
http://www.chesworkshop.org.
WISTP 2009
Workshop on Information Security Theory and Practices
(Smart Devices, Pervasive Systems, and Ubiquitous Networks),
Bruxelles, Belgium, September 2-4, 2009.
[posted here 3/9/09]
With the rapid technological development of information technologies
and with the transition from the common to the next generation networks,
computer systems and especially embedded systems are becoming more mobile
and ubiquitous, increasingly interfacing with the physical world.
Ensuring the security of these complex and yet, resource constraint systems
has emerged as one of the most pressing challenges.
Protecting the privacy of the user immersed in such systems is a similarly
pressing concern. The aim of this third workshop is to bring together
researchers and practitioners in related areas and to encourage interchange
and cooperation between the research community and the industrial/consumer
community. The workshop will consist of technical paper presentations, one special
session for student papers and several invited talks.
For more information, please see
http://www.wistp.org/.
DaSECo 2009
1st International Workshop on Defence against Spam in Electronic Communication,
Held in conjunction with the 20th International Conference on Database and
Expert Systems Applications (DEXA 2009),
Linz, Austria, August 31 - September 4, 2009.
[posted here 3/2/09]
The workshop on Defence against Spam in Electronic Communication
invites the submission of papers. Researchers and practitioners are encouraged to
submit papers on all aspects of misuse and protection concerning electronic
communication including email, instant messaging, text messaging, and voice
over internet protocol. Topics of interest include novel applications of electronic
messaging, abatement of abuses of electronic messaging, spam, spit (spam over
internet telephony), spim (spam over instant messenger), spom (spam over mobile phone),
phishing, identify theft via messaging, viruses, and spyware.
For more information, please see
http://www.dexa.org/files/CfP_DaSECo_15.Jan_.pdf.
InSPEC 2009
2nd International Workshop on Security and Privacy in Enterprise Computing,
Held in conjunction with the 13th IEEE International Enterprise Distributed
Object Computing Conference (EDOC 2009),
Auckland, New Zealand, August 31 - September 4, 2009.
[posted here 3/16/09]
In recent years several technologies have emerged for enterprise
computing. Workflows are now widely adopted by industry and distributed
workflows have been a topic of research for many years. Today, services
are becoming the new building blocks of enterprise systems and
service-oriented architectures are combining them in a flexible and
novel way. In addition, with wide adoption of e-commerce, business
analytics that exploits multiple, heterogeneous data sources have become
an important field. Ubiquitous computing technologies, such as RFID or
sensor networks change the way business systems interact with their
physical environment, such as goods in a supply chain or machines on the
shop floor. All these technological trends are accompanied also by new
business trends due to globalization that involve innovative forms of
collaborations such as virtual organizations. Further, the increased
speed of business requires IT systems to become more flexible and highly
dynamic. All of these trends bring with them new challenges to the security and
privacy of enterprise computing. New concepts for solving these
challenges require the combination of many disciplines from computer
science and information systems, such as cryptography, networking,
distributed systems, process modeling and design, access control,
privacy etc. The goal of this workshop is to provide a forum for
exchange of novel research in these areas among the experts from
academia and industry. Completed work as well as research in progress is
welcome, as we want to foster the exchange of novel ideas and approaches.
For more information, please see
http://sesar.dti.unimi.it/InSPEC2009/.
TrustBus 2009
6th International Conference on Trust, Privacy, and Security in Digital Business,
Held in conjunction with the 20th International Conference on Database
and Expert Systems Applications (DEXA 2009),
Linz, Austria, August 31 – September 4, 2009.
[posted here 12/22/08]
TrustBus’09 will bring together researchers from different disciplines, developers,
and users all interested in the critical success factors of digital business systems.
We are interested in papers, work-in-progress reports, and industrial experiences
describing advances in all areas of digital business applications related to trust
and privacy, including, but not limited to:
- Anonymity and pseudonymity in business transactions
- Business architectures and underlying infrastructures
- Common practice, legal and regulatory issues
- Cryptographic protocols
- Delivery technologies and scheduling protocols
- Design of businesses models with security requirements
- Economics of Information Systems Security
- Electronic cash, wallets and pay-per-view systems
- Enterprise management and consumer protection
- Identity and Trust Management
- Intellectual property and digital rights management
- Intrusion detection and information filtering
- Languages for description of services and contracts
- Management of privacy & confidentiality
- Models for access control and authentication
- Multimedia web services
- New cryptographic building-blocks for e-business applications
- Online transaction processing
- PKI & PMI
- Public administration, governmental services
- P2P transactions and scenarios
- Real-time Internet E-Services
- Reliability and security of content and data
- Reliable auction, e-procurement and negotiation technology
- Reputation in services provision
- Secure process integration and management
- Security and Privacy models for Pervasive Information Systems
- Security Policies
- Shopping, trading, and contract management tools
- Smartcard technology
- Transactional Models
- Trust and privacy issues in mobile commerce environments
- Usability of security technologies and services
Additional topics of interest include (but are not limited to):
Critical Infrastructure Protection, Cyber Terrorism, Information Warfare, Database Forensics,
Electronic Commerce Security, and Security in Digital Health Care.
For more information, please see
http://www.icsd.aegean.gr/trustbus2009/.
DFRWS 2009
9th Digital Forensics Research Workshop,
Montreal, Canada, August 17-19, 2009.
[posted here 2/2/09]
DFRWS brings together leading researchers, developers, practitioners,
and educators interested in advancing the state of the art in digital forensics
from around the world. As the most established venue in the field, DFRWS is the
preferred place to present both cutting-edge research and perspectives on best
practices for all aspects of digital forensics. As an independent organization,
we promote open community discussions and disseminate the results of our work
to the widest audience. Topics of interest include, but are not limited to the following:
- Incident response and live analysis
- Network-based forensics, including network traffic analysis, traceback and attribution
- Event reconstruction methods and tools
- File system and memory analysis
- Application analysis
- Embedded systems
- Small scale and mobile devices
- Large-scale investigations
- Digital evidence storage and preservation
- Data mining and information discovery
- Data hiding and recovery
- File extraction from data blocks (“file carving”)
- Multimedia analysis
- Tool testing and development
- Digital evidence and the law
- Anti-forensics and anti-anti-forensics
- Case studies and trend reports
- Non-traditional approaches to forensic analysis
For more information, please see
http://www.dfrws.org/2009/cfp.shtml.
USENIX-SECURITY 2009
18th USENIX Security Symposium,
Montreal, Canada, August 12–14, 2009.
[posted here 11/12/08]
The USENIX Security Symposium brings together researchers, practitioners,
system administrators, system programmers, and others interested in the
latest advances in the security of computer systems and networks.
Refereed paper submissions are solicited in all areas relating to systems
and network security, including:
- Adaptive security and system management
- Analysis of network and security protocols
- Applications of cryptographic techniques
- Attacks against networks and machines
- Authentication and authorization of users, systems, and applications
- Automated tools for source code analysis
- Botnets
- Cryptographic implementation analysis and construction
- Denial-of-service attacks and countermeasures
- File and filesystem security
- Firewall technologies
- Forensics and diagnostics for security
- Hardware security
- Intrusion and anomaly detection and prevention
- Malicious code analysis, anti-virus, anti-spyware
- Network infrastructure security
- Operating system security
- Privacy-preserving (and compromising) systems
- Public key infrastructure
- Rights management and copyright protection
- Security architectures
- Security in heterogeneous and large-scale environments
- Security policy
- Self-protecting and healing systems
- Techniques for developing secure systems
- Technologies for trustworthy computing
- Usability and security
- Virtualization security
- Voting systems analysis and security
- Web security
- Wireless and pervasive/ubiquitous computing security
For more information, please see
http://www.usenix.org/events/sec09/cfp/.
MetriCon 2009
4th Workshop on Security Metrics,
Held in conjunction with the USENIX Security Symposium (USENIX-Security 2009),
Montreal, Canada, August 11, 2009.
[posted here 5/4/09]
MetriCon 4.0 is intended as a forum for lively, practical discussion in the area of
security metrics. It is a forum for quantifiable approaches and results to problems
afflicting information security today, with a bias towards practical, specific
approaches that demonstrate the value of security metrics with respect to a
security-related goal. Topics and presentations will be selected for their
potential to stimulate discussion in the workshop. Topics that demonstrate
the importance of context include:
- Data and analyses emerging from ongoing metrics efforts
- Studies in specific subject matter areas
- Time and situation-dependent aspects of security metrics
- Long-term trend analysis and forecasts
- Measures of the depth and breadth of security defenses
- Metrics definitions that can be operationalized
- Incorporating unknown vulnerabilities into security metrics
- Security and risk modeling calibrations
- Security measures in system design
- Software assurance initiatives
- Security metrics relationship to security assessments
For more information, please see
http://www.securitymetrics.org/content/Wiki.jsp?page=Metricon4.0.
HotSec 2009
4th USENIX Workshop on Hot Topics in Security,
Held in conjunction with the 18th USENIX Security Symposium (USENIX-Security 2009),
Montreal, Canada, August 11, 2009.
[posted here 3/9/09]
HotSec '09 will bring together innovative practitioners and researchers
in computer security and privacy, broadly defined, to tackle the challenging
problems in this space. While pragmatic and systems-oriented, HotSec takes
a broad view of security and privacy and encompasses research on topics
including but not limited to large-scale threats, network security,
hardware security, software security, programming languages, applied cryptography,
anonymity, human-computer interaction, sociology, economics, and law.
To ensure a vigorous workshop environment, attendance will be by
invitation only. Participants will be invited based on their submissions'
originality, technical merit, topical relevance, and likelihood of leading
to insightful technical discussions that will influence future security
research. Submissions may not be under consideration for publication at
any other venue.
For more information, please see
http://www.usenix.org/events/hotsec09/cfp/.
EVT/WOTE 2009
Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections,
Montreal, Canada, August 10–11, 2009.
[posted here 1/19/09]
EVT/WOTE seeks to bring together researchers from a variety of disciplines,
ranging from computer science and human-computer interaction experts through
political scientists, legal experts, election administrators, and voting
equipment vendors. EVT/WOTE seeks to publish original research on
important problems in all aspects of electronic voting.
In general, we welcome papers on voting topics, including but not limited to:
- Voter registration and pre-voting processes
- Vote collection
- Vote tabulation
- Election auditing
- Design, implementation, and evaluation of new voting technologies and protocols
- Scientific evaluations of existing voting technologies
- System testing methodologies
- Deployment and lifecycle issues
- Threat mitigation
- Usability
- Accessibility
- Legal issues, including the ADA, HAVA, intellectual property,
and nondisclosure agreements on voting system evaluations
- Issues with and evolution of voting technology standards
- Election integrity
- Ballot integrity
- Ballot secrecy
- Voter anonymity
- Voter authentication
- Receipts and coercion resistance
- Anonymous channels
- Secure bulletin boards
- Threat models
- Formal security analysis
- Electoral systems
- Case studies of electronic voting experiments
- Privacy, verifiability, and transparency in e-voting
For more information, please see
http://www.usenix.org/evtwote09/cfpb.
CSET 2009
Workshop on Cyber Security Experimentation and Test,
Held in conjunction with the USENIX Security Symposium (USENIX-Security 2009),
Montreal, Canada, August 10, 2009.
[posted here 4/6/09]
CSET '09 is bringing together researchers and testbed developers to share
their experiences and define a forward-looking agenda for the development of
scientific, realistic evaluation approaches for security threats and defenses;
it provides an important community forum for the exploration of transformational
advances in the field of cyber security experimentation and test.
While we particularly invite papers that deal with security experimentation,
we are also interested in papers that address general testbed/ experiment
issues that have implications on security experimentation such as: traffic
and topology generation, large-scale experiment support,
experiment automation, etc. We are further interested in educational efforts
that involve security experimentation.
For more information, please see
http://www.usenix.org/event/cset09/.
WOOT 2009
3rd USENIX Workshop on Offensive Technologies,
Held in conjunction with the USENIX Security Symposium (USENIX-Security 2009),
Montreal, Canada, August 10, 2009.
[posted here 5/4/09]
Progress in the field of computer security is driven by a symbiotic relationship
between our understandings of attack and of defense. The USENIX Workshop on
Offensive Technologies aims to bring together researchers and practitioners
in system security to present research advancing the understanding of
attacks on operating systems, networks, and applications.
Submission topics include:
- Vulnerability research (software auditing, reverse engineering)
- Penetration testing
- Exploit techniques and automation
- Network-based attacks (routing, DNS, IDS/IPS/firewall evasion)
- Reconnaissance (scanning, software, and hardware fingerprinting)
- Malware design and implementation (rootkits, viruses, bots, worms)
- Denial-of-service attacks
- Web and database security
- Weaknesses in deployed systems (VoIP, telephony, wireless, games)
- Practical cryptanalysis (hardware, DRM, etc.)
For more information, please see
http://www.usenix.org/woot09/cfpm.
HOST 2009
2nd IEEE International Workshop on Hardware-Oriented Security and Trust,
San Francisco, CA, USA, July 27, 2009.
[posted here 2/2/09]
The emergence of a globalized, horizontal semiconductor business model raises
a set of concerns involving the security and trust of the information systems
on which modern society is increasingly reliant for mission-critical functionality.
Hardware-oriented security and trust (HOST) issues span a broad range
including threats related to the malicious insertion of Trojan circuits
designed, e.g., to act as a `kill switch' to disable a chip, to integrated
circuit (IC) piracy, to attacks designed to extract encryption keys and
IP from a chip, and to malicious system disruption and diversion. HOST
covers security and trust issues in all types of electronic devices and
systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded
systems. The mission of HOST is to provide a forum for the presentation
and discussion of research that is of critical significance to the security
of, and trust in, modern society's microelectronic-supported infrastructures.
The IEEE International Workshop on Hardware-Oriented Security and Trust
(HOST 2009) is an open forum for discussions and innovations on all issues
related to hardware security and trust. Paper presentations on topics given
below will highlight the challenges faced with authenticating hardware for
security and trust.
- Trojan detection and isolation
- Authenticating foundry of origin
- Side channel analysis/attacks
- Watermarking
- IP security/FPGA design security
- Cryptographic techniques for hardware security
- IC Metering
- Physical unclonable functions (PUFs)
- Embedded and distributed systems security
- Hardware intrusion detection and prevention
- Security engineering
- Scan-chain encryption
- IP trust
For more information, please see
http://www.engr.uconn.edu/HOST/.
POLICY 2009
IEEE International Symposium on Policies for Distributed Systems and Networks,
Imperial College London, UK, July 20-22, 2009.
[posted here 11/17/08]
The symposium brings together researchers and practitioners working
on policy-based systems across a range of application areas including
policy-based networking, privacy and security management, storage area networking,
and enterprise systems. POLICY 2009 has grown out of a highly successful series
of workshops and this is recognized by the elevation of the event to an IEEE symposium.
This year, in addition to the latest research results from the communities working
in any area of policy-based management and computing, we encourage contributions on
policy-based techniques in support of privacy and security management, including
the policy life-cycle, detection and resolution of inconsistency, refining
policies from users’ requirements, and usability issues.
Topics of interest include, but are not limited to the following:
- Privacy and Security
- Policy Models and Languages
- Policy Applications
For more information, please see
http://ieee-policy.org.
DBSEC 2009
23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security,
Montreal, Canada, July 12-15, 2009.
[posted here 10/27/08]
The 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications
Security provides a forum for presenting original unpublished research
results, practical experiences, and innovative ideas in data and
applications security. Papers and panel proposals are also solicited.
Papers may present theory, techniques, applications, or practical experience
on topics of relevance to IFIP WG 11.3:
- Access Control
- Applied cryptography in data security
- Identity theft and countermeasures
- Integrity maintenance
- Intrusion detection
- Knowledge discovery and privacy
- Organizational security
- Privacy and privacy-preserving data management
- Secure transaction processing
- Secure information integration
- Secure Semantic Web
- Secure sensor monitoring
- Secure Web Services
- Threats, vulnerabilities, and risk management
- Trust management
Additional topics of interest include (but are not limited to):
Critical Infrastructure Protection, Cyber Terrorism, Information Warfare, Database Forensics,
Electronic Commerce Security, and Security in Digital Health Care.
For more information, please see
http://www.ciise.concordia.ca/dbsec09/.
FCC 2009
Workshop on Formal and Computational Cryptography,
Port Jefferson, New York, USA, July 11-12, 2009.
[posted here 4/6/09]
Since the 1980s, two approaches have been developed for analyzing
security protocols. One of the approaches is based on a computational model
that considers issues of computational complexity and probability. Messages
are modeled as bitstrings and security properties are defined in a strong form,
in essence guaranteeing security with high probability against all probabilistic
polynomial-time attacks. However, it is difficult to prove security of large,
complex protocols in this model. The other approach relies on a symbolic model
of protocol execution in which messages are modeled using a term algebra and
cryptographic primitives are treated as perfect black-boxes, e.g. the only way
to decrypt a ciphertext is to use the corresponding decryption key. This abstraction
enables significantly simpler and often automated analysis of complex protocols.
Since this model places strong constraints on the attacker, a fundamental question
is whether such an analysis implies the strong security properties defined in the
computational model. This workshop focuses on approaches that combine and relate
symbolic and computational protocol analysis. Over the last few years, there has
been a spate of research results in this area. One set of results establish
correspondence theorems between the two models, in effect showing that for a
certain class of protocols and properties, security in the symbolic model
implies security in the computational model. In other work, researchers use
language-based techniques such as process calculi and protocol logics to reason
directly about the computational model. Several projects are investigating ways
of mechanizing computationally sound proofs of protocols. The workshop seeks
results in this area of computationally sound protocol analysis:
foundations and tools.
For more information, please see
http://infsec.uni-trier.de/fcc2009/.
DIMVA 2009
6th International Conference on Detection of Intrusions and
Malware & Vulnerability Assessment,
Milan, Italy, July 9-10 , 2009.
[posted here 1/12/09]
The annual DIMVA conference serves as a premier forum for advancing
the state of the art in intrusion detection, malware detection, and
vulnerability assessment.
DIMVA's scope includes, but is not restricted to the following areas:
Intrusion Detection
- Approaches
- Insider detection
- Applications to business level fraud
- Implementations
- Prevention and response
- Result correlation and cooperation
- Evaluation
- Potentials and limitations
- Operational experiences
- Legal and social aspects
Malware Detection
- Techniques
- Acquisition of specimen
- Detection and analysis
- Automated behavior model generation
- Early warning
- Prevention and containment
- Trends and upcoming risks
- Forensics and recovery
- Economic aspects
Vulnerability Assessment
- Vulnerabilities
- Vulnerability detection and analysis
- Vulnerability prevention
- Classification and evaluation
- Situational awareness
For more information, please see
http://www.dimva.org/dimva2009.
CSF 2009
22nd IEEE Computer Security Foundations Symposium,
Port Jefferson, New York, USA, July 8-10, 2009.
[posted here 12/1/08]
The IEEE Computer Security Foundations (CSF) series brings together researchers
in computer science to examine foundational issues in computer security.
Over the past two decades, many seminal papers and techniques have been presented
first at CSF. CiteSeer lists CSF as 38th out of more than 1200 computer science venues
(top 3.11%) in impact based on citation frequency. CiteSeerX lists CSF 2007 as 7th
out of 581 computer science venues (top 1.2%) in impact based on citation frequency.
New theoretical results in computer security are welcome. Also welcome are more
exploratory presentations, which may examine open questions and raise fundamental
concerns about existing theories. Panel proposals are sought as well as papers.
Possible topics include, but are not limited to:
- Access control
- Anonymity and Privacy
- Authentication
- Data and system integrity
- Database security
- Decidability and complexity
- Distributed systems security
- Electronic voting
- Executable content
- Formal methods for security
- Information flow
- Intrusion detection
- Language-based security
- Network security
- Resource usage control
- Security for mobile computing
- Security models
- Security protocols
- Trust and trust management
For more information, please see
http://www.cs.sunysb.edu/csf09/.
SECRYPT 2009
International Conference on Security and Cryptography,
Milan, Italy, July 7-10, 2009.
[posted here 9/22/08]
The purpose of SECRYPT 2009 is to bring together researchers, engineers and
practitioners interested on information systems and applications in the context
of wireless networks and mobile technologies.
Topics of interest include, but are not limited to, provided they fit in one of the
following main topic areas:
Area 1: Access Control and Intrusion Detection
- Intrusion Detection and Vulnerability Assessment
- Authentication and Non-repudiation
- Identification and Authentication
- Insider Threats and Countermeasures
- Intrusion Detection & Prevention
- Identity and Trust Management
- Biometric Security
- Trust models and metrics
- Regulation and Trust Mechanisms
- Data Integrity
- Models for Authentication, Trust and Authorization
- Access Control in Computing Environments
- Multiuser Information
Area 2: Network Security and Protocols
- IPsec, VPNs and Encryption Modes
- Service and Systems Design and QoS Network Security
- Fairness Scheduling and QoS Guarantee
- Reliability and Dependability
- Web Performance and Reliability
- Denial of Service and Other Attacks
- Data and Systems Security
- Data Access & Synchronization
- GPRS and CDMA Security
- Mobile System Security
- Ubiquitous Computing Security
- Security in Localization Systems
- Sensor and Mobile Ad Hoc Network Security
- Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
- Security of GSM/GPRS/UMTS Systems
- Peer-to-Peer Security
- e-Commerce Protocols and Micropayment Schemes
Area 3: Cryptographic Techniques and Key Management
- Smart Card Security
- Public Key Crypto Applications
- Coding Theory and Practice
- Spread Spectrum Systems
- Speech/Image Coding
- Shannon Theory
- Stochastic Processes
- Quantum Information Processing
- Mobile Code & Agent Security
- Digital Rights Management
Area 4: Information Assurance
- Planning Security
- Risk Assessment
- Security Area Control
- Organizational Security Policies and Responsibility
- Security Through Collaboration
- Human Factors and Human Behaviour Recognition Techniques
- Ethical and Legal Implications
- Intrusive, Explicit Security vs. Invisible, Implicit Computing
- Information Hiding
- Information Systems Auditing
- Management of Computing Security
Area 5: Security in Information Systems
- Security for Grid Computing
- Secure Software Development Methodologies
- Security for Web Services
- Security for Databases and Data Warehouses
- e-Health
- Security Engineering
- Security Information Systems Architectures
- Security Requirements
- Security Metrics
- Personal Data Protection
- XML Security
- Workflow and Business Process Security
For more information, please see
http://www.secrypt.org/.
CTC 2009
Cybercrime and Trustworthy Computing Workshop,
Held in conjunction with the 6th International Conference on Autonomic and Trusted Computing (ATC 2009),
Brisbane, Australia, July 7-10, 2009.
[posted here 12/22/08]
Cybercrime continues to be a growth industry, assisted by a combination of
technical factors, such as insecure hardware and software platforms, and
psychological factors, such as user error or naivety. The objective of this
workshop is to bring together two distinct groups to encourage further collaboration -
those who are working on researching cybercrime activity, such as phishing and malware,
and those who are working on technical countermeasures.
Example topic areas on the cybercrime theme might include:
- Phishing, SPAM
- Malware, Botnets
- Scams, including advance fee fraud, romance scams, etc.
- Forensic means to classify e-mail messages or web pages soliciting
cybercrime or providing a vector for attack
- Forensic means to cluster and identify different groups or
modus operandi arising from distinct "kits"
- For the countermeasures side, topic areas might include
Anti-phishing, Anti-virus, Anti-rootkit, Anti-botnet
- User education and/or psychological operations
For more information, please see
http://www.cybercrime.com.au/ctc09.
ATC 2009
6th International Conference on Autonomic and Trusted Computing,
Brisbane, Australia, July 7-10, 2009.
[posted here 12/15/08]
ATC-09 will offer a forum for researchers to exchange ideas and experiences
in the most innovative research and development in these challenging areas and
includes all technical aspects related to autonomic/organic computing (AC/OC) and
trusted computing (TC). Topics include but are not limited to the following:
- AC/OC Theory and Model: Models, negotiation, cooperation, competition,
self-organization, emergence, verification etc.
- AC/OC Architectures and Systems: Autonomic elements & their relationship,
frameworks, middleware, observer/controller architectures, etc.
- AC/OC Components and Modules: Memory, storage, database, device, server, proxy, software, OS, I/O, etc.
- AC/OC Communication and Services: Networks, self-organized net, web service,
grid, P2P, semantics, agent, transaction, etc.
- AC/OC Tools and Interfaces: Tools/interfaces for AC/OC system development,
test, monitoring, assessment, supervision, etc.
- Trust Models and Specifications: Models and semantics of trust, distrust, mistrust,
over-trust, cheat, risk, reputation, reliability, etc.
- Trust-related Security and Privacy: Trust-related secure architecture,
framework, policy, intrusion detection/awareness, protocols, etc.
- Trusted Reliable and Dependable Systems: Fault-tolerant systems, hardware redundancy,
robustness, survivable systems, failure recovery, etc.
- Trustworthy Services and Applications: Trustworthy Internet/web/grid/P2P e-services,
secured mobile services, novel applications, etc.
- Trust Standards and Non-Technical Issues: Trust standards and issues related to
personality, ethics, sociology, culture, psychology, economy, etc.
For more information, please see
http://www.itee.uq.edu.au/~atc09.
ACSISP 2009
14th Australasian Conference on Information Security and Privacy,
Brisbane, Australia, July 1-3, 2009.
[posted here 10/13/08]
Original papers pertaining to all aspects of information security and privacy
are solicited for submission to the 14th Australasian Conference on Information
Security and Privacy (ACISP 2009). Papers may present theory, techniques, applications
and practical experiences on a variety of topics including:
- Cryptology
- Mobile communications security
- Database security
- Authentication and authorization
- Secure operating systems
- Intrusion detection
- Access control
- Security management
- Security protocols
- Network security
- Secure commercial applications
- Privacy Technologies
- Smart cards
- Key management and auditing
- Mobile agent security
- Risk assessment
- Secure electronic commerce
- Privacy and policy issues
- Copyright protection
- Security architectures and models
- Evaluation and certification
- Software protection and viruses
- Computer forensics
- Distributed system security
- Identity management
- Biometrics
For more information, please see
http://conf.isi.qut.edu.au/acisp2009/.
CSI-KDD 2009
ACM SIGKDD Workshop on Cyber Security and Intelligence Informatics,
Held in conjunction with the 15th ACM SIGKDD Conference (SIGKDD 2009),
Paris, France, June 28, 2009.
[posted here 4/27/09]
Computer supported communication and infrastructure are integral parts of modern economy.
Their security is of incredible importance to a wide variety of practical domains
ranging from Internet service providers to the banking industry and e-commerce,
from corporate networks to the intelligence community. Of interest to this workshop
are novel knowledge discovery methods addressing these issues as well as
innovative applications demonstrating the effectiveness of data mining in
solving real-world security problems. The challenge for novel methods
originates from the emergence of new types of contents and protocols, and
only an integrated view on all modes promises optimal results. Innovative
applications are essential as IT-communication as well as computer-supported
technical and social infrastructure have an extremely complex structure and
require a comprehensive approach to prevent criminal activities.
The workshop will bring together researchers working on advanced data
mining approaches for CyberSecurity as well as large-scale security
applications. In addition we anticipate practitioners from large enterprises,
internet service providers, law enforcement and intelligence experts, and government
agencies who want to be informed about the state of the art in CyberSecurity and
Intelligence Informatics. Finally the workshop may be of interest to general
data mining researchers, who want to apply their techniques to this domain.
For more information, please see
http://www.csi-kdd.org/.
NASSUE 2009
International Workshop on Network Assurance and Security Services
in Ubiquitous Environments,
Held in conjunction with the 3rd International Conference on Information
Security and Assurance (ISA 2009),
Seoul, Korea, June 25-27, 2009.
[posted here 1/19/09]
NASSUE workshop is focused on network assurance and security measure, which has become
an important research issue in ubiquitous environments. The objective of this workshop is
to provide an effective forum for original scientific and engineering advances in
NAS issues in UE. Topics (include but are not limited to the following):
- Availability, dependability, survivability, & resilience issues in UE
- Authentication and identity management in UE
- Authorization and access-control in UE
- Risk assessment, and management in UE
- Redundancy, reliability models, and failure prevention of UCS
- Trust modeling and management in UE
- Fault-tolerant architectural and operational models in UE
- Network security issues and protocols in UCS
- Cryptographic protocols and key management in UCS
- Agent-based technologies for NAS
- Cross-layer design for security mechanisms
- Real-time technology for NAS systems
- QoS provisioning in UCS
- Network control technologies for NA
- Novel threat, attacks, vulnerabilities, and countermeasures
- DoS attacks and mitigation
- Reverse engineering of malicious code
- Intrusion detection, IDS / IPS in UE
- Anonymity, user privacy, and location privacy in UE
- Content protection and DRM for UCS
- System/network management techniques and strategies in UE
- Network forensics and fraud detection
- Surveillance and Privacy-enhancing technologies in UE
- Adaptive and Autonomic security for UCS
- Role of biometrics in UE
- NAS issues in e-commerce, e-government, e-health
- NAS implementation in P2P systems, vehicular system, web application,
disaster relief, etc.
- Specification, design, development, and deployment of NAS mechanisms
- Models, architectures and protocols for NAS
- Standards, guidelines and certification for NAS in UE
- Metrics for measuring security, assurance and dependability
- Designing business models with NAS requirements
- Formal methods and software engineering for NAS
- Legal, ethical and policy issues related to NAS in UE
- Proactive approaches to NAS
- New ideas and paradigms for NAS in UE
For more information, please see
http://www.sersc.org/NASSUE2009/.
WNGS 2009
4th International Workshop on Security,
Korea University, Seoul, Korea, June 25-27, 2009.
[posted here 1/12/09]
The workshop will provide an opportunity for academic and industry
professionals to discuss the latest issues and progress in
the area of NGS. The workshop will publish high quality papers which
are closely related to the various theories and practical
applications in NGS. In addition, we expect that the workshop and
its publications will be a trigger for further related research
and technology improvements in this important subject.
Topics (included, but are not limited to):
- Cryptographic Protocol & Application In NGS
- Peer-to-Peer Security & Application
- Privacy & Anonymity in NGS
- Access Control in NGS
- Biometrics in NGS
- Key/Identity Management in NGS
- Smart & Java Cards in NGS
- Mobile Communication in NGS
- Future Aviation in NGS
- Computer Forensics in NGS
- Efficient Implementations in NGS
For more information, please see
http://www.sersc.org/WNGS2009/ .
WEIS 2009
8th Workshop on the Economics of Information Security,
University College London, England, June 24-25, 2009.
[posted here 1/26/09]
The 2009 Workshop on the Economics of Information Security invites original
research papers focused on any aspect of the economics of information security,
including the economics of privacy. We encourage economists, computer scientists,
psychologists, business and management school researchers, law scholars, security
and privacy specialists, as well as industry experts, to submit their research and
attend the Workshop. Suggested topics include (but are not limited to) empirical
and theoretical economic studies of:
- Models and optimality of investment strategies in information security
- Privacy, confidentiality, and anonymity
- Cyber-trust and reputation systems
- Interdependent supply-chain security
- Intellectual property protection
- Information access and provisioning
- Risk management and cyber-insurance
- Security standards and regulation
- Behavioral security and privacy
- Cyber-terrorism policy
- Organizational security and metrics
- Psychological, social, and systemic aspects of risk and security
- Phishing, spam, and cybercrime
- Vulnerability discovery, disclosure, and patching
For more information, please see
http://weis09.infosecon.net/.
MIST 2009
International Workshop on Managing Insider Security Threats,
Held in conjunction with the 3rd IFIP International Conference on Trust Management (IFIPTM 2009),
West Lafayette, IN, USA, June 15-19, 2009.
[posted here 2/2/09]
The objective of this workshop is to showcase the most recent challenges and advances in
security technologies and management systems to address insider security threats.
It may also include state-of-the-art surveys and case analyses of practical significance.
Topics of interest include, but are not limited to the following:
- Theoretical foundations and algorithms for addressing insider threats
- Insider threat assessment and modeling
- Security technologies to prevent, detect and avoid insider threats
- Validating the trustworthiness of staff
- Post-insider threat incident analysis
- Data breach modeling and mitigation techniques
- Registration, authentication and identification
- Certification and authorization
- Database security
- Device control system
- Digital forensic system
- Digital right management system
- Fraud detection
- Network access control system
- Intrusion detection
- Keyboard information security
- Information security governance
- Information security management systems
- Risk assessment and management
- Log collection and analysis
- Trust management
- IT compliance (audit) and continuous auditing
For more information, please see
http://isyou.hosting.paran.com/mist09/.
USENIX 2009
USENIX Annual Technical Conference,
San Diego, CA, USA, June 14-19, 2009.
[posted here 3/30/09]
USENIX Annual Tech has always been the place to present ground-breaking
research and cutting-edge practices in a wide variety of technologies
and environments. We seek high-quality submissions that further the knowledge and
understanding of modern computing systems, with an emphasis on implementations
and experimental results. The USENIX conference has a broad scope,
and specific topics of interest include but are not limited to:
- Architectural interaction
- Cloud computing
- Deployment experience
- Distributed and parallel systems
- Embedded systems
- Energy/power management
- File and storage systems
- Mobile, wireless, and sensor systems
- Networking and network services
- Operating systems
- Reliability, availability, and scalability
- Security, privacy, and trust
- System and network management and troubleshooting
- Usage studies and workload characterization
- Virtualization
- Web technology
For more information, please see
http://www.usenix.org/events/usenix09/.
SECURWARE 2009
3rd International Conference on Emerging Security Information, Systems and Technologies,
Athens, Greece, June 14-19, 2009.
[posted here 10/6/08]
The SECURWARE 2009 is an event covering related topics on theory and practice on security,
cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion
detection and other areas related to low enforcement, security data mining, malware models,
etc. SECURWARE 2009 Special Areas (details in the CfP on site) are:
- ARCH: Security frameworks, architectures and protocols
- SECMAN: Security management
- SECTECH: Security technologies
- SYSSEC: System security
- INFOSEC: Information security
- MALWA: Malware and Anti-malware
- ANTIFO: Anti-forensics
- PRODAM: Profiling data mining
- SECHOME: Smart home security
- SECDYN: Security and privacy in dynamic environments
- ECOSEC: Ecosystem security and trust
- CRYPTO: Cryptography
- CYBER-Threat
For more information, please see
http://www.iaria.org/conferences2009/SECURWARE09.html.
CISS 2009
Communication and Information Systems Security Symposium,
Held in conjunction with the IEEE International Conference on Communications (ICC 2009),
Dresden, Germany, June 14-18, 2009.
[posted here 7/21/08]
With the advent of pervasive computer applications and due to the proliferation
of heterogeneous wired and wireless computer and communication networks, security
and privacy issues have become paramount. This Symposium will address all
aspects of the modeling, design, implementation, deployment, and management
of security algorithms, protocols, architectures, and systems. Furthermore,
contributions devoted to the evaluation, optimization, or enhancement of
security and privacy mechanisms for current technologies, as well as
devising efficient security and privacy solutions for emerging technologies,
are solicited. Topics of interest include, but are not limited to, the following:
- Authentication protocols and message authentication
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography,
mobile template protection
- Computer and network forensics
- Cryptography: Conventional public-key crypto, symmetric-key crypto, advanced
crypto, and quantum crypto
- DDOS attacks, DNS spoofing, and countermeasures
- Formal trust models
- Information hiding and watermarking
- Information systems security
- Intrusion detection, localization, and countermeasures
- Mobile and Wireless network security, including ad hoc networks, P2P
networks, 3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX
- Network security metrics and performance
- Network traffic analysis techniques
- Operating systems security and log analysis tools
- Optical network security
- Privacy and privacy enhancing technologies
- Security modeling and protocol design
- Virtual private networks
- VoIP Security
- Vulnerability, exploitation tools and virus analysis
- Web, eBusiness, eCommerce, eGovernment security
For more information, please see
http://www.ieee-icc.org/2009/.
IH 2009
11th Information Hiding Workshop,
Darmstadt, Germany, June 7-10, 2009.
[posted here 9/29/08]
For many years, Information Hiding has captured the imagination of researchers:
Digital watermarking and steganography protect information, conceal secrets or are
used as core primitives in Digital Rights Management schemes; steganalysis and digital
forensics pose important challenges to investigators; and information hiding plays an important
role in anonymous communication systems. These are but a small number of related topics
and issues. Current research themes include:
- Anonymous communication and privacy
- Low probability of intercept communications
- Digital forensics
- Covert/subliminal channels
- Steganography and steganalysis
- Watermarking algorithms and applications
- Security aspects of watermarking
- Novel data hiding domains
- Multimedia and document security
- Novel applications of information hiding
For more information, please see
http://www.ih09.tu-darmstadt.de/.
MobiSec 2009
1st International Conference on Security and Privacy in Mobile Information and Communication Systems,
Turin, Italy, June 3-5, 2009.
[posted here 9/22/08]
The convergence of information and communication technology is most palpable in the
form of intelligent mobile devices, accompanied by the advent of converged,
and next-generation, communication networks. As mobile communication and information
processing becomes a commodity, economy and society require protection of this
precious resource. MobiSec brings together leading-edge researchers from academia
and industry in the field of mobile systems security and privacy, as well as
practitioners, standards developers and policymakers. Topics of interest include,
but are not limited to the following focus areas:
- Security architectures for next-generation, new-generation,
and converged communication networks
- Trusted mobile devices, hardware security
- Network resilience
- Threat analyses for mobile systems
- Multi-hop authentication and trust
- Non-repudiation of communication
- Context-aware and data-centric security
- Protection and safety of distributed mobile data
- Mobile application security
- Security for voice and multimedia communication
- Machine-to-machine communication security
- Trust in autonomic and opportunistic communication
- Location based applications security and privacy
- Security for the networked home environment
- Security and privacy for mobile communities
- Mobile emergency communication, public safety
- Lawful interception and mandatory data retention
- Security of mobile agents and code
- Idenity management
- Embedded security
For more information, please see
http://www.mobisec.org/.
SACMAT 2009
14th ACM Symposium on Access Control Models and Technologies,
Hotel La Palma, Stresa, Italy, June 3-5, 2009.
[posted here 12/1/08]
Papers offering novel research contributions in all aspects of access control
are solicited for submission to the ACM Symposium on Access Control Models and Technologies
(SACMAT). SACMAT 2009 is the fourteenth of a successful series of symposiums that
continue the tradition, first established by the ACM Workshop on Role-Based Access
Control, of being the premier forum for presentation of research results and experience
reports on leading edge issues of access control, including models, systems, applications,
and theory. The missions of the symposium are to share novel access control solutions
that fulfill the needs of heterogeneous applications and environments and to identify
new directions for future research and development. SACMAT gives researchers and
practitioners a unique opportunity to share their perspectives with others interested
in the various aspects of access control. Accepted papers will be presented at the
symposium and published by the ACM in the symposium proceedings. Outstanding papers
will be invited for possible publication in a prestigious journal in
information assurance area. Topics of interest include but are not limited to:
- Access control models and extensions
- Access control requirements
- Access control design methodology
- Access control mechanisms, systems, and tools
- Access control in distributed and mobile systems
- Access control for innovative applications
- Administration of access control policies
- Delegation
- Identity management
- Policy/Role Engineering
- Safety analysis and enforcement
- Standards for access control
- Trust management
- Trust models
- Theoretical foundations for access control
- Usage control
For more information, please see
http://www.sacmat.org.
ACNS 2009
7th International Conference on Applied Cryptography and Network Security,
Paris, France, June 2-5, 2009.
[posted here 10/6/08]
ACNS is an annual conference concentrating on current developments that
advance the areas of applied cryptography and its application to systems
and network security. The goal is to represent both academic research works
as well as developments in industrial and technical frontiers. Original research
papers pertaining to all aspects of cryptography and network security are
solicited for submission to ACNS'09. Relevant topics include but are not
limited to:
- Applied Cryptography and provably-secure cryptographic protocols
- Design and analysis of efficient cryptographic primitives: public-key
and symmetric-key cryptosystems, block ciphers, and hash functions
- Network security protocols
- Techniques for anonymity; trade-offs between anonymity and utility
- Integrating security into the next-generation Internet: DNS security, routing,
naming, denial-of-service attacks, TCP/IP, secure multicast
- Economic fraud on the Internet: phishing, pharming, spam, and click fraud
- Email and web security
- Public key infrastructure, key management, certification, and revocation
- Security and privacy for emerging technologies: sensor networks, mobile (ad hoc)
networks, peer-to-peer networks, bluetooth, 802.11, RFID
- Trust metrics and robust trust inference in distributed systems
- Security and usability
- Intellectual property protection: metering, watermarking, and digital rights management
- Modeling and protocol design for rational and malicious adversaries
- Automated analysis of protocols
For more information, please see
http://acns09.di.ens.fr/.
SSN 2009
5th International Workshop on Security in Systems and Networks,
Held in conjunction with the International Parallel and Distributed Processing Symposium (IPDPS 2009),
Rome, Italy, May 29, 2009.
[posted here 11/3/08]
This workshop aims to bring together the technologies and researchers who share
interest in the area of network and distributed system security. The main purpose is
to promote discussions of research and relevant activities in security-related subjects.
It also aims at increasing the synergy between academic and industry professionals
working in this area. The workshop seeks papers that address theoretical, experimental,
and work in-progress in the area of cybersecurity at the system and network levels.
Topics covered by the workshop will include, but are not limited to, the
following:
- Ad hoc and sensor network security
- Cryptographic algorithms and distributed digital signatures
- Distributed denial of service attacks
- Distributed intrusion detection and protection systems
- Firewall and distributed access control
- Grid computing security
- Key management
- Network security issues and protocols
- Mobile codes security and Internet Worms
- Security in e-commerce
- Security in peer-to-peer and overlay networks
- Security in mobile and pervasive computing
- Security architectures in distributed and parallel systems
- Security theory and tools in distributed and parallel systems
- Video surveillance and monitoring systems
- Information hiding and multimedia watermarking in distributed systems
- Web content secrecy and integrity
For more information, please see
http://www4.comp.polyu.edu.hk/~csbxiao/ssn09/.
ICIMP 2009
4th International Conference on Internet Monitoring and Protection,
Venice, Italy, May 24-28, 2009.
[posted here 11/17/08]
The International Conference on Internet Monitoring and Protection (ICIMP 2009)
initiates a series of special events targeting security, performance,
vulnerabilities in Internet, as well as disaster prevention and recovery.
Dedicated events focus on measurement, monitoring and lessons learnt in
protecting the user. Special areas of interests can be found
at the conference call-for-paper page.
For more information, please see
http://www.iaria.org/conferences2009/ICIMP09.html.
SADFE 2009
4th International Workshop on Systematic Approaches to Digital Forensic Engineering,
Held in conjunction with the 2009 IEEE Symposium on Security and Privacy (SP 2009),
Oakland, CA, USA, May 21, 2009.
[posted here 12/8/08]
The SADFE (Systematic Approaches to Digital Forensic Engineering) International Workshop
promotes systematic approaches to computer investigations, by furthering the advancement of
digital forensic engineering as a disciplined practice. Most previous SADFE papers have
emphasized cyber crime investigations, and this is still a key focus of the meeting.
However, we also welcome papers on forensics that do not necessarily involve a crime:
general attack analysis, insider threat, insurance and compliance investigations, and
similar forms of retrospective analysis are all viable topics. Digital forensic engineering
is characterized by the application of scientific and mathematical principles to the
investigation and establishment of facts or evidence, either for use within a court of law
or to aid in understanding past events on a computer system. Past speakers and attendees of
SADFE have included computer scientists, social scientists, forensic practitioners, law enforcement,
lawyers, and judges. The synthesis of hard technology and science with social science and practice
forms the foundation of this conference. To advance the state of the art, SADFE-2009 solicits
broad-based, innovative digital forensic engineering technology, techno-legal and practice-related
submissions in the following four areas:
Digital Data and Evidence Management: advanced digital evidence discovery,
collection, and storage
- Identification, authentication and collection of digital evidence
- Post-collection handling of evidence and the preservation of data integrity
- Evidence preservation and storage
- Forensic-enabled architectures and processes, including network processes
- Managing geographically, politically and/or jurisdictionally dispersed data
- Data and web mining systems for identification and authentication of relevant data
Principle-based Digital Forensic Processes: systematic engineering processes supporting
digital evidence management which are sound on scientific, technical and legal grounds
- Legal and technical aspects of admissibility and evidence tests
- Examination environments for digital data
- Courtroom expert witness and case presentation
- Case studies illustrating privacy, legal and legislative issues
- Forensic tool validation: legal implications and issues
- Legal and privacy implications for digital and computational forensic analysis
Digital Evidence Analytics: advanced digital evidence analysis, correlation, and presentation
- Advanced search, analysis, and presentation of digital evidence
- Progressive cyber crime scenario analysis and reconstruction technology
- Legal case construction & digital evidence support
- Cyber-crime strategy analysis & modeling
- Combining digital and non-digital evidence
- Supporting qualitative or statistical evidence
- Computational systems and computational forensic analysis
Forensic-support technologies: forensic-enabled and proactive monitoring/response
- Forensics of embedded or non-traditional devices (e.g. digicams, cell phones, SCADA)
- Innovative forensic engineering tools and applications
- Forensic-enabled support for incident response
- Forensic tool validation: methodologies and principles
- Legal and technical collaboration
- Digital Forensics Surveillance Technology and Procedures
- "Honeypot" and other target systems for data collection and monitoring
For more information, please see
http://conf.ncku.edu.tw/sadfe/sadfe09/.
SEC 2009
24th IFIP International Information Security Conference,
Pafos, Cyprus, May 18-20, 2009.
[posted here 10/27/08]
Papers offering novel and mature research contributions, in any aspect of information
security and privacy, are solicited for submission to the conference.
Papers may present theory, applications, or practical experiences on topics
including but not limited to:
- Access Control
- Applications of Cryptography
- Attacks and Viral Software
- Authentication and Authorization
- Biometrics and Applications
- Critical ICT Resource Protection
- Data and System Integrity
- Data Protection, Ethics
- Digital Content Security
- Identity Management
- Information Hiding
- Information Warfare
- Internet and Web Security
- Intrusion Detection
- Peer-to-Peer Security
- Privacy Enhancing Technologies
- Risk Analysis and Management
- Secure Electronic Voting
- Secure Sensor Networks
- Secure Systems Development
- Security Architectures
- Security Economics
- Security Education
- Security Management
- Security Metrics
- Smart Cards
- SPAM, SPIT, SPIM
- Trust Management and Models
For more information, please see
http://www.sec2009.org/.
SP 2009
30th IEEE Symposium on Security and Privacy,
Oakland/Berkeley, California, USA, May 17-20, 2009.
[posted here 8/11/08]
Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest
developments and bringing together researchers and practitioners.
We solicit previously unpublished papers offering novel research
contributions in any aspect of computer security or privacy. S & P is
interested in all aspects of computer security and privacy. Papers may
present advances in the theory, design, implementation, analysis, or
empirical evaluation of secure systems. Papers without a clear
application to security or privacy will be considered out of scope and
may be rejected without full review. Topics of interest include,
but are not limited to:
- Access control
- Anonymity
- Application-level security
- Attacks and defenses
- Authentication
- Distributed systems security
- Embedded system security
- Forensics
- Hardware-based security
- Information flow
- Information security
- Intrusion detection
- Malicious code
- Language-based security
- Network security
- Physical security
- Privacy-preserving systems
- Recovery
- Secure protocols
- Security architectures
- Security and privacy policies
- System security
- Usability and security
- Web security
For more information, please see
http://oakland09.cs.virginia.edu.
HST 2009
2009 IEEE International Conference on Technologies for Homeland Security,
Westin Hotel, Waltham, MA, USA, May 11 - 13, 2009.
[posted here 12/16/08]
With technical assistance from the US DHS S&T Directorate, US DHS DNDO, and the
US DOE NNSA; and the ninth annual IEEE Conference on Technologies for Homeland
Security HST'09, will focus on novel and innovative technologies, which address
the most pressing national security problems. The conference will bring together
innovators from leading universities, research laboratories, Homeland Security
Centers of Excellence, small businesses, system integrators and the end user
community and provide a forum to discuss ideas, concepts and experimental results.
For detailed information on the Call for Papers, please visit the conference website:
http://www.ieeehomelandsecurityconference.org.
SSDU 2009
3rd International Symposium on Service, Security and its Data
management technologies in Ubi-comp ,
Geneva, Switzerland, May 4-8, 2009.
[posted here 9/22/08]
Ubiquitous Computing (Ubi-comp) is emerging rapidly as an exciting new
paradigm with user-centric environment to provide computing and communication
services at any time and anywhere. In order to realize their advantages, it requires
integrating security, services and data management to be suitable for Ubi-com. However,
there are still many problems and major challenges awaiting for us to solve such as the
security risks in ubiquitous resource sharing, which could be occurred when data resources
are connected and accessed by anyone in Ubi-com. Therefore, it will be needed to explore
more secure and intelligent mechanism in Ubi-com. SSDU-09 is intended to foster the
dissemination of state-of-the-art research in the area of security and intelligence
integrating into Ubi-com and data management technology. The main topics include
but will not be limited to:
- Context-Awareness and its Data mining for Ubi-com service
- Human-Computer Interface and Interaction for Ubi-com
- Smart Homes and its business model for Ubi-com service
- Intelligent Multimedia Service and its Data management for Ubi-com
- USN / RFID for Ubi-com service
- Network security issues, protocols, data security in Ubi-com
- Database protection for Ubi-com
- Privacy Protection and Forensic in Ubi-com
- Multimedia Security in Ubi-com
- Authentication and Access control for data protection in Ubi-com
- Service, Security and its Data management for U-commerce
- New novel mechanism and Applications for Ubi-com
For more information, please see
http://www.sersc.org/SSDU2009/.
iNetSec 2009
IFIP WG 11.4 Workshop on Open Research Problems in Network Security,
Zurich, Switzerland, April 23-24, 2009.
[posted here 1/26/09]
In the past decade, computer networks have fundamentally influenced the ways
in which information is exchanged and handled. Pervasive electronic devices
make our everyday life easier, e.g., by helping us to connect with other people
while mobile, to use services available online, or to pay and use tolls and tickets.
Many of the components employed routinely manage and distribute large amounts of
data for different purposes. As these processes involve sensitive information,
protecting information and the network with suitable security measures is more
important than ever. The objective of this one-day workshop (noon to noon) is to
bring together researchers in the field of network security to discuss the open
problems and future research directions. To this end, we solicit papers describing
interesting unsolved problems and issues in (a certain area of) network security.
Example areas include:
- Social networks
- Self-X networks
- Virtual & overlay networks
- Future Internet
- Wireless mesh networks and protocols
- Sensor nets & embedded systems
- Identity & trust management
- Cryptographic primitives & services
- Security definitions and proofs
- Anonymous networks
- Cross layer security
- Usage control
- Trusted platforms
- Forensics
- Security policies
- Dynamic composition of services
For more information, please see
http://www.zurich.ibm.com/inetsec2009/.
WICOW 2009
3rd Workshop on Information Credibility on the Web,
Held in conjunction with the 18th World Wide Web Conference (WWW 2009),
Madrid, Spain, April 20, 2009.
[posted here 1/19/09]
As computers and computer networks become more common, a huge amount of information,
such as that found in Web documents, has been accumulated and circulated. Such information
helps many people to organize their private and professional lives. However, in general,
the quality control of Web content is insufficient due to low publishing barriers.
In result there is a lot of mistaken or unreliable information on the Web that can have
detrimental effects on users. This calls for technology that would facilitate judging
the trustworthiness of content and the quality and accuracy of the information that users
encounter on the Web. Such technology should be able to handle a wide range of tasks:
extracting credible information related to a given topic, organizing this information,
detecting its provenance, clarifying background, facts, and other related opinions
and the distribution of them, and so on. The issue of Web information reliability
has become also apparent in the view of the recent emergence of many popular Web 2.0
applications, the growth of the so-called Deep Web and the ubiquity of Internet advertising.
The aim of this workshop is to provide a forum for discussion on issues related to information
credibility criteria and the process of its evaluation. We invite submissions on any aspect of
information credibility on the Web. Topics include, but are not limited to:
- Information credibility evaluation and its applications
- Web content analysis for credibility evaluation
- Author's intent detection
- Credibility of Web search results
- Search models and applications for trustworthy content on the Web
- Conflicting opinion detection
- Online media and news credibility
- Multimedia content credibility
- Credibility evaluation of user-generated content
(e.g., Wikipedia, question answering sites)
- Information credibility evaluation in social networks and Web 2.0 applications
- Analysis of information dissemination on the Web (e.g., in blogosphere)
- Spatial and temporal aspects in information credibility on the Web
- Information credibility theory and fundamentals
- Estimation of information age, provenance and validity
- Estimation of author's and publisher's reputation
- Sociological and psychological aspects of information credibility estimation
- Users study for information credibility evaluation
- Persuasive technologies
- Information credibility in online advertising and Internet monetization
- Web spam detection
- Data consistency and provenance
- Processing uncertain data and information
For more information, please see
http://www.dl.kuis.kyoto-u.ac.jp/wicow3/.
IDtrust 2009
8th Symposium on Identity and Trust on the Internet,
Gaithersburg, Maryalnd, USA, April 14-16, 2009.
[posted here 8/11/08]
IDtrust is devoted to research and deployment experience related to making
good security decisions based on identity information, especially when
public key cryptography is used and the human elements of usability are
considered. The success of any business strategy depends on having the right
people gain access to the right information at the right time.
This implies that an IT infrastructure has - among other things - an authorization
framework in place that can respond to dynamic security conditions and regulatory
requirements quickly, flexibly and securely.
What are the authorization strategies that will succeed in the next decade? What
technologies exist to address complex requirements today?
What research is academia and industry pursuing to solve the problems
likely to show up in the next few years? We solicit technical papers and panel
proposals from researchers, systems architects, vendor engineers, and users.
Suggested topics include but are not limited to:
- Reports of real-world experience with the use and deployment of identity
and trust applications for broad use on the Internet (where the population of
users is diverse) and within enterprises who use the Internet (where the population
of users may be more limited), how best to integrate such usage into legacy systems,
and future research directions. Reports may include use cases, business case scenarios,
requirements, best practices, implementation and interoperability reports,
usage experience, etc.
- Identity management protocols (SAML, Liberty, CardSpace, OpenID, and PKI-related protocols)
- Identity metasystems, frameworks, and systems (Shibboleth, Higgins, etc.)
- User-centric identity, delegation, reputation
- Identity and Web 2.0, secure mash-ups, social networking, trust fabric
and mechanisms of “invited networks”
- Identity management of devices from RFID tags to cell phones; Host Identity Protocol (HIP)
- Federated approaches to trust
- Trust management across security domains
- Standards related to identity and trust, including X.509, SPKI/SDSI,
PGP, S/MIME, XKMS, XACML, XRML, and XML signatures
- Intersection of policy-based systems, identity, and trust; identity and trust
policy enforcement, policy and attribute mapping and standardization
- Attribute management, attribute-based access control
- Trust path building and certificate validation in open and closed environments
- Improved usability of identity and trust systems for users and administrators,
including usability design for authorization and policy management, naming,
signing, verification, encryption, use of multiple private keys, and
selective disclosure
- Identity and privacy
- Levels of trust and assurance
- Trust infrastructure issues of scalability, performance, adoption,
discovery, and interoperability
- Use of PKI in emerging technologies (e.g., sensor networks)
- Application domain requirements: web services, grid technologies, document
signatures, (including signature validity over time), data privacy, etc.
For more information, please see
http://middleware.internet2.edu/idtrust/.
ISPEC 2009
5th Information Security Practice and Experience Conference,
Xi'an, China, April 13-15, 2009.
[posted here 8/18/08]
As applications of information security technologies become pervasive,
issues pertaining to their deployment and operation are becoming increasingly
important. ISPEC is an annual conference that brings together researchers and
practitioners to provide a confluence of new information security technologies,
their applications and their integration with IT systems in various
vertical sectors. Topics of interest include, but are not limited to:
- Applications of cryptography
- Critical infrastructure protection
- Digital rights management
- Information security in vertical applications
- Legal and regulatory issues
- Network security
- Privacy and anonymity
- Privacy issues in the use of smart cards and RFID systems
- Risk evaluation and security certification
- Resilience and availability
- Secure system architectures
- Security in e-commerce and e-business and other applications
- Security policy
- Security standards activities
- Trusted Computing
- Trust model and management
- Usability aspects of information security systems
For more information, please see
http://www.ispec2009.net/.
Trust 2009
2nd International Conference on Trusted Computing,
St. Hugh's College, University of Oxford, UK, April 6-8, 2009.
[posted here 8/18/08]
Building on the success of Trust 2008 (held in Villach, Austria, in March 2008),
this conference focuses on trusted and trustworthy computing, both from the
technical and social perspectives. The conference itself will have two main strands,
one devoted to technical aspects and one devoted to the socio-economic aspects of
trusted computing. The conference solicits original papers on any aspect of the
design and application of trusted computing. Topics of interest include, but
are not limited to:
- architecture and implementation technologies for trusted platforms
- limitations of trusted computing
- mobile trusted computing
- implementations of trusted computing (covering both hardware and software)
- applications of trusted computing
- attestation and possible variants (e.g. property-based attestation)
- cryptographic aspects of trusted computing
- intrusion resilience in trusted computing
- virtualisation for trusted computing
- security policy and management of trusted computing
- access control for trusted platforms
- privacy aspects of trusted computing
- verification of trusted computing architectures
For more information, please see
http://www.trust2009.org.
ICIW 2009
4th International Conference on Information Warfare and Security,
Breakwater Lodge, Cape Town, South Africa, March 26-27, 2009.
[posted here 5/5/08]
Information warfare and security are at the forefront of modern defence strategies.
Strong strands of research and interest are developing in the area, including the
understanding of threats and risks to information systems, the development of a
strong security culture, as well as incident detection and post incident investigation.
The International Conference on Information Warfare and Security (ICIW) offers
an opportunity for academics, practitioners and consultants from the US,
North America and elsewhere who are involved in the study, management, development
and implementation of systems and concepts related to information warfare or are
interested in ways to improve information systems security, to come together and
exchange ideas. This conference is continuing to establish itself as a key
event for individuals working in the field from around the world.
For more information, please see
http://academic-conferences.org/iciw/iciw2009/iciw09-home.htm.
IFIP-CIP 2009
Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection,
Hanover, New Hampshire, USA, March 22-25, 2009.
[posted here 7/21/08]
The IFIP Working Group 11.10 on Critical Infrastructure Protection is an active
international community of researchers, infrastructure operators and policy-makers
dedicated to applying scientific principles, engineering techniques and public
policy to address current and future problems in information infrastructure protection.
Papers are solicited in all areas of critical infrastructure protection.
Areas of interest include, but are not limited to:
- Infrastructure vulnerabilities, threats and risks
- Security challenges, solutions and implementation issues
- Infrastructure sector interdependencies and security implications
- Risk analysis and risk assessment methodologies
- Modeling and simulation of critical infrastructures
- Legal, economic and policy issues related to critical infrastructure protection
- Secure information sharing
- Infrastructure protection case studies
- Distributed control systems/SCADA security
- Telecommunications network security
For more information, please see
http://www.ifip1110.org.
PKC 2009
12th IACR International Workshop on Practice and Theory in Public Key Cryptography,
Irvine, California, USA, March 18-20, 2009.
[posted here 8/18/08]
Original research papers on all technical aspects of public
key cryptography are solicited for submission to PKC 2009,
the 12-th International Workshop on Practice and Theory in
Public Key Cryptography. PKC’09 proceedings be published in Sprinter-Verlag
LNCS Series and will be available at the conference.
For more information, please see
http://www.iacr.org/workshops/pkc2009.
PSAI 2009
2nd Workshop on Privacy and Security by means of Artificial Intelligence,
Held in conjunction with ARES 2009,
Fukoka, Japan, March 16-19, 2009.
[posted here 9/8/08]
In this workshop, we aim to convene researchers in the areas of Security,
Data Privacy and Artificial Intelligence. We seek to collect the most recent
advances in artificial intelligence techniques (i.e. neural networks,
fuzzy systems, multi-agent systems, genetic algorithms, image analysis,
clustering, etc), which are applied to the protection of privacy and security.
Individual privacy protection is a hot topic and it must be addressed to
guarantee the proper evolution of a modern society based on the Information
and Communication Techniques (ICTs). However, security policies could invade
individual privacy, especially after the appearance of the new forms of
terrorism. These two concepts (i.e. security and privacy) are somehow
opposite because, most of the times, security is achieved by means of
privacy invasion. Statistical agencies and the like are collecting large
amounts of personal information that has to be protected before its publication.
Different forms of evolutionary computation and clustering have been proposed
to tackle this problem. Moreover, the protection of critical infrastructures
such as airports has invigorated the study of more efficient techniques for
pattern recognition, image analysis, etc.
For more information, please see
http://crises-deim.urv.cat/psai/.
SecSE 2009
3rd Workshop on Secure Software Engineering,
Held in conjunction with conjunction with ARES 2009,
Fukuoka, Japan, March 16-19, 2009.
[posted here 9/8/08]
In our modern society, software is an integral part of everyday life,
and we expect and depend upon software systems to perform correctly. Software
security is about ensuring that systems continue to function correctly also
under malicious attack. As most systems now are web-enabled, the number of
attackers with access to the system increases dramatically and thus the threat
scenario changes. The traditional approach to secure a system includes putting
up defence mechanisms like IDS and firewalls, but such measures are no longer
sufficient by themselves. We need to be able to build better, more robust and
more secure systems. Even more importantly, however, we should strive to achieve
these qualities in all software systems, not just the ones that need special
protection. This workshop will focus on techniques, experiences and lessons
learned for engineering secure and dependable software. Suggested topics include,
but are not limited to:
- Secure architecture and design
- Security in agile software development
- Aspect-oriented software development for secure software
- Security requirements
- Risk management in software projects
- Secure implementation
- Secure deployment
- Testing for security
- Quantitative measurement of security properties
- Static and dynamic analysis for security
- Verification and assurance techniques for security properties
- Lessons learned
- Security and usability
- Teaching secure software development
- Experience reports on successfully attuning developers to secure software engineering
For more information, please see
http://www.sintef.no/secse.
SAC-SEC 2009
24th ACM Symposium on Applied Computing (SAC 2009),
Computer Security Track,
Honolulu, Hawaii, USA, March 8-12, 2009.
[posted here 6/2/08]
Security is nowadays mandatory. However, it remains a tricky process including a
variety of properties. The eigth edition of the Security Track strengthens its aims
at bringing together researchers in any applied issues of computer and information
security. The list of issues is vast, ranging from protocols to workflows.
Topics of interest include but are not limited to:
- software security (protocols, operating systems, etc.)
- hardware security (smartcards, biometric technologies, etc.)
- mobile security (properties for/from mobile agents, etc.)
- network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.)
- alternatives to cryptography (steganography, etc.)
- security-specific software development practices (vulnerability testing, fault-injection resilience, etc.)
- privacy and anonimity (trust management, pseudonimity, identity management, etc.)
- safety and dependability issues (reliability, survivability, etc.)
- cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.)
- security management and usability issues (security configuration, policy management, usability trials etc.)
- workflow and service security (business processes, web services, etc.)
For more information, please see
http://www.dmi.unict.it/~giamp/sac/09cfp.html.
SAC-TREK 2009
24th ACM Symposium on Applied Computing (SAC 2009),
Trust, Reputation, Evidence and other Collaboration Know-how (TRECK) Track,
Honolulu, Hawaii, USA, March 8-12, 2009.
[posted here 6/2/08]
The goal of the ACM SAC 2009 TRECK track remains to review the set of applications
that benefit from the use of computational trust and online reputation. Computational
trust has been used in reputation systems, risk management, collaborative filtering,
social/business networking services, dynamic coalitions, virtual organisations and even
combined with trusted computing hardware modules. The TRECK track covers all computational
trust/reputation applications, especially those used in real-world applications.
The topics of interest include, but are not limited to:
- Recommender and reputation systems
- Trust management, reputation management and identity management
- Pervasive computational trust and use of context-awareness
- Mobile trust, context-aware trust
- Web 2.0 reputation and trust
- Trust-based collaborative applications
- Automated collaboration and trust negotiation
- Trade-off between privacy and trust
- Trust/risk-based security frameworks
- Combined computational trust and trusted computing
- Tangible guarantees given by formal models of trust and risk
- Trust metrics assessment and threat analysis
- Trust in peer-to-peer and open source systems
- Technical trust evaluation and certification
- Impacts of social networks on computational trust
- Evidence gathering and management
- Real-world applications, running prototypes and advanced simulations
- Applicability in large-scale, open and decentralised environments
- Legal and economic aspects related to the use of trust and reputation engines
- User-studies and user interfaces of computational trust and online reputation applications
For more information, please see
http://tech.groups.yahoo.com/group/trustcomp/.
SHA-3 2009
1st SHA-3 Candidate Conference,
Leuven, Belgium, February 25-28, 2009, 2009.
[posted here 12/22/08]
The purpose of the SHA-3 Conference is to allow the submitters of the first round
candidates to present their algorithms, and for NIST to discuss the way forward
with the competition. It appears that the number of accepted submissions will
considerably exceed the number that NIST and the community can analyze
thoroughly in a reasonable time period. NIST is considering ways to involve the
cryptographic community in quickly reducing the number of submissions to a more
manageable number. The process and criteria for this selection will be a major
topic of this conference.
For more information, please see
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html.
FC 2009
13th International Conference on Financial Cryptography and Data Security,
Accra Beach, Barbados, February 23-26, 2009.
[posted here 6/2/08]
At its 13th year edition, Financial Cryptography and Data Security (FC'09) is a well
established and major international forum for research, advanced development, education,
exploration, and debate regarding security in the context of finance and commerce. Original
papers, surveys and presentations on all aspects of financial and commerce security are
invited. Submissions must have a strong and visible bearing on financial and commerce
security issues, but can be interdisciplinary in nature and need not be exclusively
concerned with cryptography or security. Possible topics for submission to the various
sessions include, but are not limited to:
- Anonymity and Privacy
- Auctions and Audits
- Authentication and Identification
- Biometrics
- Certification and Authorization
- Commercial Cryptographic Applications
- Digital Cash and Payment Systems
- Digital Incentive and Loyalty Systems
- Digital Rights Management
- Economics of Information Security
- Financial Regulation and Reporting
- Fraud Detection
- Game Theoretic Approaches to Security
- Identity Theft, Spam, Phishing and Social Engineering
- Infrastructure Design
- Legal and Regulatory Issues
- Microfinance and Micropayments
- Monitoring, Management and Operations
- Reputation Systems
- RFID-Based and Contactless Payment Systems
- Risk Assessment and Management
- Secure Banking and Financial Web Services
- Securing Emerging Computational Paradigms
- Security and Risk Perceptions and Judgments
- Smart Cards and Secure Tokens
- Transactions and Contracts
- Trust Management
- Underground-Market Economics
- Virtual Economies
- Voting Systems
For more information, please see
http://fc09.ifca.ai/.
ICIT 2009
IEEE International Conference on Industrial Technology (ICIT 2009),
Special Session on Wireless Bluetooth Technologies and Cyber Security,
Churchill, Victoria, Australia, February 10-13, 2009.
[posted here 7/14/08]
Nowadays communication, entertainment, transportation, shopping and
medicine have more and more relied on computers and the Internet.
The widespread use of wireless computing, mobile devices and networks
has raised security concerns. Cyber security aims at protection against
unauthorized disclosure, transfer, modification, or destruction,
whether accidental or intentional. We invite researchers, practitioners
and others interested in wireless Bluetooth technologies and cyber security
to submit original research paper or technical report to this Special
Session on Wireless Bluetooth Technologies and Cyber Security
conjunction with IEEE ICIT 2008. Topics are list as follows
but are not limited to:
- Bluetooth Enterprise Systems
- Cellular Systems
- Digital Pens
- Multimedia communications over Wireless
- Location Management
- Wireless Networks Standards and Protocols
- RFID Systems
- Protocols for Mobile Networks
- Security, Privacy and Authentication in Mobile Environments
- Wireless Sensor Networks
- Key Management in Wireless Networks
- Key Distribution in Wireless Sensor Networks
- Cross-layer Design and Optimization
- Ad-hoc Wireless Networks
- Mobile Internet
- Bluetooth Internet
- Ubiquitous Networks
- Smart Sensors and Sensor Networks
- Bluetooth Home Networks
- 3G and 4G Wireless Networks
For more information, please see
http://www.ieee-icit09.org/specialsessions.php.
NDSS 2009
16th Annual Network and Distributed System Security Symposium,
San Diego, California, USA, February 8-11, 2009.
[posted here 5/19/08]
NDSS fosters information exchange among research scientists and practitioners of
network and distributed system security services. The target audience includes
those interested in practical aspects of network and distributed system security,
with a focus on actual system design and implementation (rather than theory). A major
goal is to encourage and enable the Internet community to apply, deploy, and advance
the state of available security technology. The proceedings are published by the
Internet Society. Submissions are solicited in, but not limited to, the following
areas:
- Security of Web-based applications and services.
- Anti-malware techniques: detection, analysis, prevention.
- Intrusion prevention, detection, and response.
- Security for electronic voting.
- Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques.
- Privacy and anonymity technologies.
- Network perimeter controls: firewalls, packet filters, application gateways.
- Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc)
networks, personal communication systems.
- Security for peer-to-peer and overlay network systems.
- Security for electronic commerce: e.g., payment, barter, EDI, notarization,
timestamping, endorsement, and licensing.
- Implementation, deployment and management of network security policies.
- Intellectual property protection: protocols, implementations, metering,
watermarking, digital rights management.
- Integrating security services with system and application security facilities and protocols.
- Public key infrastructures, key management, certification, and revocation.
- Special problems and case studies: e.g., tradeoffs between security and efficiency,
usability, reliability and cost.
- Security for collaborative applications: teleconferencing and video-conferencing.
- Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
- Security for large-scale systems and critical infrastructures.
- Integrating security in Internet protocols: routing, naming, network management.
For more information, please see
http://www.isoc.org/isoc/conferences/ndss/09/.
ESSoS 2009
International Symposium on Engineering Secure Software and Systems,
Leuven, Belgium, February 4-6, 2009.
[posted here 6/30/08]
The goal of this symposium is to bring together researchers and practitioners to
advance the states of the art and practice in secure software engineering. Being one of
the few conference-level events dedicated to this topic, it explicitly aims to bridge
the software engineering and security engineering communities, and promote cross-fertilization.
The technical program includes an experience track for which the submission of highly informative
case studies describing (un)successful secure software project experiences and lessons
learned is explicitly encouraged. The Symposium seeks submissions on subjects related
to its goals. This includes a diversity of topics including (but not limited to):
- scalable techniques for threat modeling and analysis of vulnerabilities
- specification and management of security requirements and policies
- security architecture and design for software and systems
- model checking for security
- specification formalisms for security artifacts
- verification techniques for security properties
- systematic support for security best practices
- security testing
- security assurance cases
- programming paradigms, models and DLS's for security
- program rewriting techniques
- processes for the development of secure software and systems
- security-oriented software reconfiguration and evolution
- security measurement
- automated development
- trade-off between security and other non-functional requirements
- support for assurance, certification and accreditation
For more information, please see
http://distrinet.cs.kuleuven.be/events/essos2009/.
IFIP-DF 2009
5th Annual IFIP WG 11.9 International Conference on Digital Forensics,
Orlando, Florida, USA, January 25-28, 2009.
[posted here 4/14/08]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active
international community of scientists, engineers and practitioners dedicated to
advancing the state of the art of research and practice in the emerging field of
digital forensics. The Fifth Annual IFIP WG 11.9 International Conference on
Digital Forensics will provide a forum for presenting original, unpublished
research results and innovative ideas related to the extraction, analysis
and preservation of all forms of electronic evidence. Keynote presentations, revised
papers and details of panel discussions will be published as an edited volume -
the fifth in the series entitled Research Advances in Digital Forensics (Springer)
in the summer of 2009. Technical papers are solicited in all areas related to
the theory and practice of digital forensics. Areas of special interest include,
but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Network forensics
- Portable electronic device forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics
For more information, please see
http://www.ifip119.org.
GENISEC 2009
Workshop on GENI and Security,
Davis, California, USA, January 22-23, 2009.
[posted here 12/1/08]
The Global Environment for Network Innovations (GENI) is a suite of network research
infrastructures now in its design and prototyping phase. It is sponsored by the
National Science Foundation to support experimental research in network science and engineering.
The goal of this workshop is to engage the security community in GENI's design and
prototyping, to ensure that security issues are properly considered during its development.
First, what classes of security experiments should GENI support? What capabilities will
GENI require to allow the conduct of these experiments? The capabilities may be intrinsic
to GENI (such as equipment or software of a particular kind) or extrinsic (such as
organizational management, or external interfaces and connectivity). Experiments
involving malware or vulnerabilities analysis may require that parts of the
infrastructure suite be partitioned from other parts. Deploying and testing new
protocols may require that the suite be partitioned to prevent errors in the
implementation or in the protocol itself from interfering with other uses of
the infrastructure. Second, how can GENI itself be adequately secured and
protected from attack? What forms of authentication, authorization, and
accountability would be most appropriate? As access to GENI will be from
the Internet, GENI will be exposed to potential attackers. Other types
of attack may involve physical compromise of the systems making up GENI,
or of the Internet (or other) infrastructure that provides support for
GENI. Protocols, management and organizational procedures and processes,
and access control mechanisms must be developed to safeguard both the GENI
resource and the data and software that researchers deploy on it.
As the GENI Project Office expects to issue its 2nd solicitation for GENI
analysis and prototyping subcontracts in the middle of December, with
proposals due in mid-February, it is anticipated that topics discussed at
the workshop will lead to proposals from the security community.
We invite short (1 paragraph preferably; at most 1 page) statements of ideas
addressing these two issues. For example, what security-related experiments would you
like to run on GENI, and what benefit would you expect from them? What constraints or
requirements would you need to carry out the experiments? How can we shield other
experiments and work being done using GENI from the effects of your (or others?)
experiments? How can we prevent GENI from being attacked? The workshop is designed
to discuss these, and other, questions.
For more information, please see
http://seclab.cs.ucdavis.edu/meetings/genisec/.
|