Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:01/02/12

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 2011

CoSec 2011 3rd IEEE Workshop on Collaborative Security Technologies, Bangalore, India, December 12, 2011. [posted here 09/12/11]
The severity of attacks on networks and critical infrastructures are on the rise over recent years and seem to continue to do so. Surprisingly at times, many of the attacks can be individually simple yet highly damaging due to their large-scale co-ordination and polymorphic replication with continuous self-upgradation using a mix of peer-to-peer and command-and-control architectures. Conventional approaches of single-hosted security defensives are becoming increasingly less effective in the face of such sophisticated and co-ordinated multi-front attacks using bot-nets of compromised always-on, always-connected computers. In contrast, a distributed defense pattern shows promise both in terms of manageability, reduced operating costs and architectural simplicity. This broad area of defense using Collaborative Security technologies works on the principles of sharing (1) information and knowledge for accelerating detection of and response to new attacks and threats; and (2) resources for increasing the efficiency and reducing resource consumption. The 3rd International workshop on Collaborative Security Technologies aims to bring to the forefront innovative approaches that involve the use of collaborative methods for security and privacy. The central theme of this workshop is to focus attention on the collaborative and intelligent approaches towards design of security systems so as to make them more robust and reliable.

For more information, please see http://www.imsaa.org/.

WICT-NDF 2011 World Congress on Information and Communication Technologies, Intrusion Detection and Forensics, Mumbai, India, December 11-14, 2011. [posted here 05/30/11]
Authors are invited to submit original papers containing cutting edge research, novel research vision or work-in-progress in any area of intrusion detection and forensics. All accepted papers will be published in the conference proceedings by IEEE. The track will cover a wide range of topics. Topics of interest include but are not limited to:
- Host and Network based approaches
- Anomaly and specification-based approaches
- Lightweight, data mining and soft computing approaches
- Hybrid Approaches to information discovery and intrusion detection
- Formal Models, Framework and Architectures
- Botnets and vulnerabilities
- Malware, Worm, Virus and Spyware
- Insider attack detection and investigation
- High Performance and Real-Time Environments, including large-scale, high data volume/ high-Speed networks.
- Highly distributed and heterogeneous environments
- Embedded system and small scale environments
- Special environments, including wireless, mobile, sensor networks and smart grid
- Virtual and Cloud Environments
- Social network analysis
- Deception systems and honeypots
- Incident response and live analysis
- Traceback and attribution
- Event reconstruction methods and tools
- Attacks against IDS, IDS protection and tolerance
- Anti-forensics and anti-anti-forensics
- Visualization Techniques
- Performance evaluation, metrics and benchmarking
- Commercial products and their directions
- Test Beds and Datasets

For more information, please see http://www.mirlabs.org/wict11/index.php-c=main&a=show&id=34.htm.

CANS 2011 10th International Conference on Cryptology and Network Security, Sanya, China, December 10-12, 2011. [posted here 06/20/11]
TCANS 2011 welcomes research results on all aspects of applied cryptography and network security. Although papers that blend these two areas are preferred, results within applied cryptography or network security are also of interest. Topics of interest include but are not limited to:
- Access Control
- Anonymity and Pseudonymity and Untraceability
- Authentication and Identification
- Biometrics
- Block and Stream Ciphers
- Cryptographic Algorithms, Protocols and Schemes
- Denial of Service: Attacks and Countermeasures
- Digital Rights Management
- Hash Functions
- Information Hiding and Watermarking
- Internet Security
- Intrusion Detection and Prevention
- Key management
- Peer-to-Peer Security
- Phishing, Spam and Fraud Countermeasures
- PKI-s, Identity and Trust Management
- Public-Key Cryptography
- Secure Hardware
- Security Modeling and Architectures
- Spyware Analysis and Detection
- Wireless, Ad Hoc, Mobile, Cellular and Sensor Network Security

For more information, please see http://www.infosec.sdu.edu.cn/cans2011/cfp.html.

WPLS 2011 Workshop on Physical Layer Security, Held in conjunction with the IEEE Globecom Conference 2011, Houston, Texas, USA, December 9, 2011. [posted here 06/07/11]
There has been a growing interest in recent times in using resources at the Physical Layer for designing novel security techniques that compliment existing cryptographic methods. Such solutions often exploit the unique characteristics of wireless channels in defeating both active and passive adversaries. The Physical–Layer Security Workshop aims to bring together researchers working on various aspects of Physical layer security to present their latest research activity. Prospective Authors are encouraged to submit unpublished contributions in physical-layer security including (but not limited to) the following topics:
- Code design for wiretap channels
- Alignment and structured codes for wiretap channels
- Secrecy capacity of multipath, fading, MIMO channels
- Effects of channel state information on secure communications
- Cooperative secure communications
- Secret key agreement and distillation
- Secret key capacity of wireless channels
- Integration of physical-layer security into wireless systems
- Practical and implementation issues
- Game theoretic Models for PHY-Security

For more information, please see http://www.comm.utoronto.ca/~akhisti/GlobecomWorkshop/.

ACSAC 2011 27th Annual Computer Security Applications Conference, Orlando, Florida, USA, December 5-9, 2011. [posted here 04/25/11]
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference. We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:
- Access control
- Assurance
- Audit and audit reduction
- Biometrics
- Boundary control devices
- Certification and accreditation
- Database security
- Denial of service protection
- Distributed systems security
- Electronic commerce security
- Enterprise security management
- Forensics
- Identity management
- Incident response planning
- Insider threat protection
- Integrity
- Intellectual property rights protection
- Intrusion detection and prevention
- Malware
- Mobile and wireless security
- Multimedia security
- Network resiliency
- Operating systems security
- Peer-to-peer security
- Privacy and data protection
- Privilege management
- Product evaluation criteria and compliance
- Risk/vulnerability assessment
- Securing cloud infrastructures
- Security engineering and management
- Security in service oriented architectures
- Security usability
- Software security
- Supply chain risk management
- Trust management
- Virtualization security
- VoIP security
- Web 2.0/3.0 security

For more information, please see http://www.acsac.org/.

WIFS 2011 IEEE Workshop on Information Forensics and Security, Foz do Iguaçu, Brazil, November 29 – December 2, 2011. [posted here 04/11/11]
The IEEE International Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE’s Information Forensics and Security Technical Committee (IEEE IFS TC). WIFS is a venue for knowledge exchange that encompasses a broad range of disciplines and facilitates the exchange of ideas between various disparate communities that constitute information security. With this focus, we hope that researchers will identify new opportunities for collaboration across disciplines and gain new perspectives. The conference will feature prominent keynote speakers, tutorials, and lecture sessions. Appropriate topics of interest include, but are not limited to:
- Computer security: intrusion detection, vulnerability analysis, cloud security
- Biometrics: emerging modalities, fuzzy extractors, attacks and countermeasures
- Cryptography for multimedia content: multimedia encryption, signal processing in the encrypted domain, traitor tracing codes
- Data hiding: watermarking, steganography and steganalysis
- Content Protection: conditional access, digital rights management (secure clocks, proximity detection, DRM architectures, DRM interoperability)
- Hardware Security: Identification, PUFS, Anti-counterfeiting
- Forensics Analysis: device identification, data recovery, processing history recovery, validation of forensic evidence
- Network Security: traffic monitoring, intrusion detection, incident response, network tomography, surveillance and traceback
- Usable Security, and usability aspects of security
- Information Theoretical Security
- Privacy: legal, ethical, social, and economical issues, anonymity, social network obfuscation
- (Video) Surveillance: arrays of sensors design and analysis, content tracking, events recognition, large crowd behavior analysis
- Secure Applications: e-Voting, e-Commerce, IPTV, VOD, VoIP, Medical

For more information, please see http://www.wifs11.org.

INTRUST 2011 International Conference on Trusted Systems, Beijing, China, November 27-29, 2011. [posted here 06/20/11]
Building on the success of INTRUST 2009 and INTRUST 2010 (both were held in Beijing, P. R. China), this conference focuses on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. INTRUST 2011 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. The conference will have an academic track and an industrial track. This call for papers is for contributions to both of the tracks. Submissions to the academic track should emphasize theoretical and practical research contributions to general trusted system technologies, while submissions to the industrial track may focus on experiences in the implementation and deployment of real-world systems. Topics of relevance include but are not limited to:
- Fundamental features and functionalities of trusted systems
- Primitives and mechanisms for building a chain of trust
- Design principles and architectures of trusted modules and platforms
- Implementation technologies for trusted modules and platforms
- Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems
- Scalable safe network operation in trusted systems
- Mobile trusted systems, such as trusted mobile platforms, sensor networks, mobile (ad hoc) networks, peer-to-peer networks, Bluetooth, etc.
- Storage aspects for trusted systems
- Applications of trusted systems, e.g. trusted email, web services and various e-commerce services
- Trustworthy infrastructures and services for cloud computing
- Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management
- Software protection for trusted systems
- Hardware security for trusted systems
- Authentication and access control for trusted systems
- Key, identity and certificate management for trusted systems
- Privacy aspects for trusted systems
- Attestation aspects for trusted systems, including the measurement and verification of the behaviour of trusted systems
- Standards organizations and their contributions to trusted systems, such as TCG, ISO/IEC, IEEE 802.11, etc.
- Emerging technologies for trusted systems, such as RFID, memory spots, smart cards, etc.
- Trust metrics and robust trust inference in distributed systems
- Usability and reliability aspects for trusted systems
- Trust modeling, economic analysis and protocol design for rational and malicious adversaries
- Virtualisation for trusted systems
- Limitations of trusted systems
- Security analysis of trusted systems, including formal method proofs, provable security and automated analysis
- Security policies for, and management of, trusted systems
- Intrusion resilience and revocation aspects for trusted systems
- Scalability aspects of trusted systems
- Compatibility aspects of trusted systems
- Experiences in building real-world trusted systems
- Socio-economic aspects of trusted systems

For more information, please see http://www.onets.com.cn/intrust11.

TrustCom 2011 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, November 16-18, 2011. [posted here 03/07/11]
With rapid development and increasing complexity of computer and communications systems and networks, user requirements for trust, security and privacy are becoming more and more demanding. However, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. Therefore, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time. As useful and innovative technologies, trusted computing and communications are attracting researchers with more and more attention. IEEE TrustCom-11 is an international conference for presenting and discussing emerging ideas and trends in trusted computing and communications in computer systems and networks from both the research community as well as the industry.

For more information, please see http://trust.csu.edu.cn/conference/trustcom2011.

TSCloud 2011 1st IEEE International Workshop on Trust and Security in Cloud Computing, Changsha, China, November 16, 2011. [posted here 05/23/11]
The TSCloud workshop tries to bring together researchers with an interest in theoretical foundations and practical approaches to trust and security in cloud computing. The emphasis is on high-impact, novel/adopted theories and paradigms that address mathematical and logical underpinnings in trust and security in cloud computing, e.g. encryption, obfuscation, virtualisation security, governance, accountability, etc. Topics of interest include, but are not limited to:
- Malware detection in cloud computing
- Cryptography and encryption techniques for cloud computing
- Data obfuscation for cloud computing
- Accountability in cloud computing
- Security in virtualised environments
- Governance, regulation and compliance in cloud computing
- Data analytics for security in cloud computing
- Visualization for security in cloud computing
- Cloud computing threat detection techniques
- Trust in cloud services
- Trust reputation systems for cloud computing
- Reports on critical, real-life security and trust use cases in cloud computing
- Secure and trusted workflows in cloud computing
- Position papers on issues in security and trust in cloud computing

For more information, please see http://tscloud.org.

IWSEC 2011 6th International Workshop on Security, Tokyo, Japan, November 8-10, 2011. [posted here 02/07/11]
Original papers on the research and development of various security topics are solicited for submission to IWSEC 2011. Topics of interest for IWSEC 2011 include but are not limited to:
- Foundations of Security
- Security in Networks and Ubiquitous Computing Systems
- Security in Real Life Applications

For more information, please see http://www.iwsec.org/2011/index.html.

eCrime Researchers Summit 2011 6th IEEE eCrime Researchers Summit, Held in conjunction with the 2011 APWG General Meeting, San Diego, CA, USA, November 7-9, 2011. [posted here 05/23/11]
eCRS 2011 will bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it, Topics of interests include (but are not limited to):
- Phishing, rogue-AV, pharming, click-fraud, crimeware, extortion and emerging attacks
- Technical, legal, political, social and psychological aspects of fraud and fraud prevention
- Malware, botnets, ecriminal/phishing gangs and collaboration, or money laundering
- Techniques to assess the risks and yields of attacks and the success rates of countermeasures
- Delivery techniques, including spam, voice mail and rank manipulation; and countermeasures
- Spoofing of different types, and applications to fraud
- Techniques to avoid detection, tracking and takedown; and ways to block such techniques
- Honeypot design, data mining, and forensic aspects of fraud prevention
- Design and evaluation of user interfaces in the context of fraud and network security
- Best practices related to digital forensics tools and techniques, investigative procedures, and evidence acquisition, handling and preservation

For more information, please see http://ecrimeresearch.org.

Q2SWinet 2011 7th Symposium on QoS and Security for Wireless Mobile Networks, Miami Beach, Florida, USA, October 31- November 4, 2011. [posted here 04/11/11]
In recent years, wireless and mobile communication systems have become increasingly popular as an inexpensive and promising means for ubiquitous communications. In this scenario, the QoS provisioning and the management of network security have become crucial tasks to determine the success of future generation wireless mobile networks. Q2SWinet 2011 calls for cutting-edge research achievements on the provisioning of QoS and Security in wireless and mobile networks. Authors are encouraged to submit full papers presenting new research related to theory or practice of all aspects of Quality of Service and Security issues in mobile and wireless systems. Topics include:
- Security in Wireless MANETs, VANETs, Sensor, Mesh and PCS Networks
- Secure PHY, MAC and Routing Protocols
- Secure Cooperation-Based Systems and Services
- Security for Cognitive Radio Networks
- Intrusion Detection in Wireless Ad hoc and Sensor Networks
- Privacy, anonymity and authentication
- Trust Establishment
- Cooperation and Prevention of Non-cooperative Behavior
- Incentive Aware Secure Protocol Design
- QoS for Wireless Multimedia Networks and Systems
- QoS for Wireless/Wired Hybrid Systems
- QoS support and Mobility Management in Wireless Internet
- QoS-Aware Routing for Wireless Networks
- QoS Metrics
- Wireless Network Survivability
- Wireless Systems Reliability
- Field operating tests, Performance Modeling and Simulation Techniques
- Real-time and QoS-aware Wireless Networks

For more information, please see http://q2swinet2011.prism.uvsq.fr/.

SAFECONFIG 2011 4th Symposium on Configuration Analytics and Automation, Arlington, VA, USA, October 31 - November 1, 2011. [posted here 09/12/11]
A typical enterprise network might have hundreds of security appliances such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers and crypto systems. An enterprise network may also have other non-security devices such as routers, name servers, protocol gateways, etc. These must be logically integrated into a security architecture satisfying security goals at and across multiple networks. Logical integration is accomplished by consistently setting thousands of configuration variables and rules on the devices. The configuration must be constantly adapted to optimize protection and block prospective attacks. The configuration must be tuned to balance security with usability. These challenges are compounded by the deployment of mobile devices and ad hoc networks. The resulting security configuration complexity places a heavy burden on both regular users and experienced administrators and dramatically reduces overall network assurability and usability. This workshop will bring together academic as well as industry researchers to exchange experiences, discuss challenges and propose solutions for offering assurable and usable security.

For more information, please see http://www.safeconfig.org/.

Nordsec 2011 16th Nordic Workshop on Secure IT-Systems, Tallinn, Estonia, October 26-28, 2011. [posted here 06/07/11]
The conference welcomes contributions in the form of papers, short papers, and posters. Since 1996, the NordSec conferences have brought together computer security researchers and practitioners from around the world, and particularly from the Nordic countries and Northern Europe. The conference focuses on applied IT security and is intended to encourage interaction between academic and industrial research. Student papers and posters are particularly encouraged. Submissions reporting industrial or governmental experiences are also encouraged and will be given special consideration. Contributions should reflect original research, developments, studies and practical experience within all areas of IT security. With the theme "IT Security in Governance", this year's conference will emphasize policies, strategies and technologies related to the security and sustainability of processes executed by heterogeneous organizations, departments or organizational clusters of all sizes. NordSec 2011 also welcomes contributions over a broad range of topics in IT security, including, but not limited to, the following areas:
- Applied cryptography
- Commercial security policies and their enforcement
- Communication and network security
- Computer crime and information warfare
- Hardware and smart card applications
- Internet and web security
- Intrusion detection
- Language-based techniques for security
- New ideas and paradigms in security
- Operating system security
- Privacy and anonymity
- Security education and training
- Security evaluation and measurement
- Security management and audit
- Security modeling and metrics
- Access control and security models
- Security protocols
- Social engineering and phishing
- Security usability
- Economics, law and social aspects of security
- Software security and malware
- Trust and identity management

For more information, please see http://nordsec2011.cyber.ee.

DSPSR 2011 1st IEEE/IFIP EUC Workshop on Data Management, Security and Privacy in Sensor Networks and RFID, Held in conjunction with the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2011), Melbourne, Australia, October 24-26, 2011. [posted here 05/23/11]
As the real world deployment of wireless sensor networks and RFID systems becomes increasingly common place, the issues of data management, security and privacy of these systems need to be addressed. Sensor networks and RFID make possible innovative applications in important areas such as healthcare, homeland security, early warning systems, emergency response and other time and/or life critical situations. These applications demand that the management of data, the security of these systems from a network and application perspective as well as the privacy of these systems from a user and data perspective are efficient and can be guaranteed. Hence the main motivation for this workshop is to bring together researchers and practitioners working on related areas in wireless sensor networks and RFID to present current research advances. The aim of the workshop is to provide a platform for the discussion of the major research challenges and achievements on the following topics of interest but not limited to:
- Data Fusion and Aggregation
- Information discovery and query processing
- Network Scheduling
- Distributed Information Processing
- Remote reprogramming
- Intrusion detection and response
- Privacy preserving techniques
- Network Resilience and Recovery
- Vulnerability and Cryptanalysis
- Lightweight Cryptography for sensors and RFID
- Security Standards, Frameworks and Protocols
- Security in mobile sensor and RFID systems
- Trust management and related frameworks
- Security policy and management
- Key management techniques
- Security Issues in specific application contexts (e.g., healthcare, military, supply chains)

For more information, please see http://www.deakin.edu.au/~rchell/DSPSR2011.html.

DRM 2011 11th ACM Workshop on Digital Rights Management, Held in conjunction with the ACM CCS 2011, Chicago, IL, USA, October 21, 2011. [posted here 06/06/11]
The ACM Workshop on Digital Rights Management is an international forum that serves as an interdisplinary bridge between areas that can be applied to solving the problem of Intellectual Property protection of digital content. These include: cryptography, software and computer systems design, trusted computing, information and signal processing, intellectual property law, policy-making, as well as business analysis and economics. Its purpose is to bring together researchers from the above fields for a full day of formal talks and informal discussions, covering new results that will spur new investigations regarding the foundations and practices of DRM. Topics of interest include but are not limited to:
- Content identification including digital watermarking and fingerprinting
- Anonymous publishing
- Privacy and DRM
- Architectures for DRM systems
- Security issues, including authorization
- Supporting cryptographic technology including traitor tracing, broadcast encryption
- Software tamper resistance, obfuscation, plagiarism detection
- Trusted computing, attestation, hardware support for DRM
- Usability aspects of DRM systems
- Attacks against DRM systems
- Web services related to DRM systems
- Implementations and case studies
- Regulatory authority for DRM, interoperability
- IP protection
- Business models for online content distribution, risk management
- Copyright-law issues, including but not limited to fair use
- Digital policy management
- DRM and consumer rights, labeling and competition law

For more information, please see http://drm11.cased.de/.

CCSW 2011 ACM Cloud Computing Security Workshop, Held in conjunction with the ACM CCS 2011, Chicago, IL, USA, October 21, 2011. [posted here 04/25/11]
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. CCSW aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including (but not limited to):
- practical cryptographic protocols for cloud security
- secure cloud resource virtualization mechanisms
- secure data management outsourcing (e.g., database as a service)
- practical privacy and integrity mechanisms for outsourcing
- foundations of cloud-centric threat models
- secure computation outsourcing
- remote attestation mechanisms in clouds
- sandboxing and VM-based enforcements
- trust and policy management in clouds
- secure identity management mechanisms
- new cloud-aware web service security paradigms and mechanisms
- cloud-centric regulatory compliance issues and mechanisms
- business and security risk models and clouds
- cost and usability models and their interaction with security in clouds
- scalability of security in global-size clouds
- trusted computing technology and clouds
- binary analysis of software for remote attestation and cloud protection
- network security (DOS, IDS etc.) mechanisms for cloud contexts
- security for emerging cloud programming models
- energy/cost/efficiency of security in clouds

For more information, please see http://crypto.cs.stonybrook.edu/ccsw11.

AISec 2011 4th Workshop on Artificial Intelligence and Security, Held in conjunction with ACM CCS 2011, Chicago, IL, USA, October 21, 2011. [posted here 05/09/11]
We invite original research papers describing the use of AI or Machine Learning in security and privacy problems. We also invite position papers discussing the role of AI or Machine Learning in security and privacy. Submitted papers may not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Topics of interest include, but are not limited to:
- Adversarial Learning
- Robust Statistics
- Online Learning
- Spam detection
- Botnet detection
- Intrusion detection
- Malware identification
- Privacy-preserving data mining
- Design and analysis of CAPTCHAs
- Phishing detection and prevention
- AI approaches to trust and reputation
- Vulnerability testing through intelligent probing (e.g. fuzzing)
- Content-driven security policy management & access control
- Techniques and methods for generating training and test sets
- Anomalous behavior detection (e.g. for the purposes of fraud prevention, authentication)

For more information, please see http://tsig.fujitsulabs.com/~aisec2011/.

InfoSecHiComNet 2011 International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking, Haldia, Purba Medinipur, West Bengal, India, October 19-22, 2011. [posted here 06/06/11]
The International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking (InfoSecHiComNet 2011) focuses in disseminating the latest research results in all technical and practical aspects of cryptography and security and the impact on security in the developments of the related areas of high performance computing and networks. It consists of the following three tracks: Cryptography, Security Aspects in High-Performance Computing, and Security Aspects in Networks. The conference solicits original technical papers, not previously published and not currently under review for publication elsewhere.

For more information, please see http://infosechicomnet2011.hithaldia.in.

SecIoT 2011 2nd Workshop on the Security of the Internet of Things, Held in conjunction with IEEE iThings 2011, Dalian, China, October 19, 2011. [posted here 05/23/11]
While there are many definitions of the Internet of Things (IoT), all of them revolve around the same central concept: a world-wide network of interconnected objects. These objects will make use of multiple technological building blocks, such as wireless communication, sensors, actuators, and RFID, in order to allow people and things to be connected anytime anyplace, with anything and anyone. However, mainly due to the inherent heterogeneity of this vision and its broad scope, there will not be a single silver bullet security solution that will fulfill all the security requirements of the IoT. Therefore: How we can include security as a core element of the IoT? How the IoT will interact with other security mechanisms of the Future Internet? What security requirements will be truly challenged by the ultimate vision of the IoT? It is precisely the goal of this workshop to bring together researchers and industry experts in areas relevant to the security of the Internet of Things to discuss these and other significant issues. Moreover, this workshop also has the objective to serve as a forum for not only presenting cutting-edge research, but also for debating the role of security and its practical implications in the development of the IoT. Topics of interest for the workshop include the following:
- New security problems in the context of the IoT
- Privacy risks and data management problems
- Identifying, authenticating, and authorizing entities
- Development of trust frameworks for secure collaboration
- New cryptographic primitives for constrained "things"
- Connecting heterogeneous ecosystems and technologies
- Legal Challenges and Governance Issues
- Resilience to external and internal attacks
- Context-Aware Security
- Providing protection to an IP-connected IoT
- Web services security and other application-layer issues
- Distributed policy enforcement and rights management
- Usability of Security and Privacy Technologies in the context of the IoT

For more information, please see http://www.isac.uma.es/seciot11.

STC 2011 6th ACM Workshop on Scalable Trusted Computing, Held in conjunction with the ACM CCS 2011, Chicago, IL, USA, October 17, 2011. [posted here 04/11/11]
Built on the continuous success of ACM STC 2006-2010, this workshop focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. The workshop solicits two types of original papers that are single-column using at least 11pt fonts. The length of the full-paper submissions is at most 15 pages excluding bibliography, appendix etc. The total number of pages should not be more than 20, whereas the reviewers are not required to read the appendix. The length of short/work-in-progress/position-paper submissions is at most 8 pages excluding bibliography. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to:
- security policies and models of trusted computing
- architecture and implementation technologies for trusted platform
- limitations, alternatives and tradeoffs regarding trusted computing
- trusted computing in cloud and data center
- cloud-based attestation services
- trusted smartphone devices and systems
- trust in smart grid, energy, and Internet of Things
- trusted emerging and future Internet infrastructure
- trusted online social network
- trust in authentications, users and computing services
- hardware based trusted computing
- software based trusted computing
- pros and cons of hardware based approach
- remote attestation of trusted devices
- censorship-freeness in trusted computing
- cryptographic support in trusted computing
- case study in trusted computing
- principles for handling scales
- scalable trust supports and services in cloud
- trusted embedded computing and systems
- virtualization and trusted computing

For more information, please see http://www.cs.utsa.edu/~acmstc/stc2011/.

WPES 2011 10th ACM Workshop on Privacy in the Electronic Society, Held in conjunction with the ACM CCS 2011, Chicago, IL, USA, October 17, 2011. [posted here 05/23/11]
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to:
- anonymity, pseudonymity, and unlinkability
- data correlation and leakage attacks
- data security and privacy
- electronic communication privacy
- economics of privacy
- information dissemination control
- personally identifiable information
- privacy-aware access control
- privacy and anonymity in the Web
- privacy in cloud and grid systems
- privacy and confidentiality management
- privacy and data mining
- privacy in the digital business
- privacy in the electronic records
- privacy enhancing technologies
- privacy in health care and public administration
- privacy and human rights
- privacy metrics
- privacy in mobile systems
- privacy in outsourced scenarios
- privacy policies
- privacy vs. security
- privacy in social networks
- privacy threats
- privacy and virtual identity
- public records and personal privacy
- user profiling
- wireless privacy

For more information, please see http://wpes11.rutgers.edu/.

ACM-CCS 2011 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, October 17-21, 2011. [posted here 02/07/11]
The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope. Accepted papers will be published by ACM Press in the conference proceedings. Outstanding papers will be invited for possible publication in a special issue of the ACM Transactions on Information and System Security.

For more information, please see http://www.sigsac.org/ccs/CCS2011/.

CRiSIS 2011 6th International Conference on Risks and Security of Internet and Systems, Timisoara, Romania, September 26-28, 2011. [posted here 02/07/11]
The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies. Prospective authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications and case studies, such as telemedicine, banking, e-government and critical infrastructure, are also welcome. The list of topics includes but is not limited to:
- Analysis and management of risks
- Attacks and defences
- Attack data acquisition and network monitoring
- Cryptography, Biometrics, Watermarking
- Dependability and fault tolerance of Internet applications
- Distributed systems security
- Embedded system security
- Intrusion detection and Prevention systems
- Hardware-based security and Physical security
- Trust management
- Organizational, ethical and legal issues
- Privacy protection and anonymization
- Security and dependability of operating systems
- Security and safety of critical infrastructures
- Security and privacy of peer-to-peer system
- Security and privacy of wireless networks
- Security models and security policies
- Security of new generation networks, security of VoIP and multimedia
- Security of e-commerce, electronic voting and database systems
- Traceability, metrology and forensics
- Use of smartcards and personal devices for Internet applications
- Web security

For more information, please see http://www.crisis-conference.org/.

MetriSec 2011 7th International Workshop on Security Measurements and Metrics, Held in conjunction with the International Symposium on Empirical Software Engineering and Measurement (ESEM 2011), Banff, Alberta, Canada, September 21, 2011. [posted here 03/07/11]
Quantitative assessment is a major stumbling block for software and system security. Although some security metrics exist, they are rarely adequate. The engineering importance of metrics is intuitive: you cannot consistently improve what you cannot measure. Economics is an additional driver for security metrics: customers are unlikely to pay a premium for security if they are unable to quantify what they receive. The goal of the workshop is to foster research into security measurements and metrics and to continue building the community of individuals interested in this field. This year, MetriSec continues its co-location with ESEM, which offers an opportunity for the security metrics folks to meet the metrics community at large. The organizers solicit original submissions from industry and academic experts on the development and application of repeatable, meaningful measurements in the fields of software and system security. The topics of interest include, but are not limited to:
- Security metrics
- Security measurement and monitoring
- Development of predictive models
- Experimental validation of models
- Formal theories of security metrics
- Security quality assurance
- Empirical assessment of security architectures and solutions
- Mining data from attack and vulnerability repositories: e.g. CVE, CVSS
- Software security metrics
- Static analysis metrics
- Simulation and statistical analysis
- Security risk analysis
- Industrial experience

For more information, please see http://metrisec2011.cs.nku.edu/.

RAID 2011 14th International Symposium on Recent Advances in Intrusion Detection, Menlo Park, CA, USA, September 20-21, 2011. [posted here 01/17/11]
This symposium, the 14th in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. The Recent Advances in Intrusion Detection (RAID) International Symposium series furthers advances in intrusion defense by promoting the exchange of ideas in a broad range of topics. As in previous years, all topics related to intrusion detection, prevention and defense systems and technologies are within scope, including but not limited to the following:
- Network and host intrusion detection and prevention
- Anomaly and specification-based approaches
- IDS cooperation and event correlation
- Malware prevention, detection, analysis, containment
- Web application security
- Insider attack detection
- Intrusion response, tolerance, and self-protection
- Operational experiences with current approaches
- Intrusion detection assessment and benchmarking
- Attacks against intrusion detection systems
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis and forensics
- Adversarial machine learning for security
- Visualization techniques
- High-performance intrusion detection
- Legal, social, and privacy issues
- Network exfiltration detection
- Botnet analysis, detection, and mitigation
- Cyber-physical systems

For more information, please see http://raid2011.org.

SAFECOMP 2011 30th International Conference on Computer Safety, Reliability and Security, Naples, Italy, September 19-21, 2011. [posted here 11/8/10]
SAFECOMP is an annual event covering the state-of-the-art, experience and trends in the areas of safety, security and reliability of critical computer applications. The 2011 Key theme is "Safety and security of computer-based systems and infrastructures: from risk assessment to threat mitigation". Papers are invited in application and industrial sectors as well as research areas. Especially papers on industrial experience and practice are encouraged.

For more information, please see http://www.safecomp2011.unina.it/.

DPM 2011 6th International Workshop on Data Privacy Management, Held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, September 15-16, 2011. [posted here 05/23/11]
The aim of this workshop is to discuss and exchange the ideas related to privacy data management. We invite papers from researchers and practitioners working in privacy, security, trustworthy data systems and related areas to submit their original papers in this workshop. Topics of interest include, but are not limited to the following:
- Privacy Information Management
- Privacy Policy-based Infrastructures and Architectures
- Privacy-oriented Access Control Languages and Models
- Privacy in Trust Management
- Privacy Data Integration
- Privacy Risk Assessment and Assurance
- Privacy Services
- Privacy Policy Analysis
- Lightweight cryptography & Cryptanalysis
- Query Execution over Privacy Sensitive Data
- Privacy Preserving Data Mining
- Hippocratic and Water-marking Databases
- Privacy for Integrity-based Computing
- Privacy Monitoring and Auditing
- Privacy in Social Networks
- Privacy in Ambient Intelligence (AmI) Applications
- Individual Privacy vs. Corporate/National Security
- Code-based Cryptology
- Privacy in computer networks
- Privacy and RFIDs
- Privacy in sensor networks

For more information, please see http://dpm2011.dyndns.org/.

TrustED 2011 1st International Workshop on Trustworthy Embedded Devices, Leuven, Belgium, September 15-16, 2011. [posted here 08/01/11]
This workshop targets selected aspects of cyber-physical systems. Of particular interests are security aspects of smartphones and their interfaces to other embedded devices. We aim at bringing together experts from academia and research institutes, industry and government for discussing and investigating problems, challenges and some recent scientific and technological developments in this field. This includes (but is not limited to) the following topics:
- Smartphone Security (e.g., OS, middleware, hardware)
- Physical Cryptographic and Security Primitives (e.g., PUFs, Signal Fingerprints)
- Hardware Entangled Security
- Embedded System Security (e.g., OS security, Attestation, Control Flow Integrity)
- IP Protection for Embedded Systems
- Distance Bounding
- Privacy Aspects of Embedded Systems (e.g., medical devices, electronic IDs)
- Attacks on Embedded Systems and Reverse Engineering
- Physical and logical convergence (e.g., secure and privacy-preserving facility management

For more information, please see http://trusted.trust.cased.de.

FAST 2011 8th International Workshop on Formal Aspects of Security & Trust, Held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, September 15-16, 2011. [posted here 04/11/11]
The eighth International Workshop on Formal Aspects of Security and Trust aims at continuing the successful efforts of the previous FAST workshops, fostering cooperation among researchers in the areas of security and trust. Computing and network infrastructures have become pervasive, and now support a great deal of economic activity. Thus, society needs suitable security and trust mechanisms. Interactions increasingly span several enterprises and involve loosely structured communities of individuals. Participants in these activities must control interactions with their partners based on trust policies and business logic. Trust-based decisions effectively determine the security goals for shared information and for access to sensitive or valuable resources. FAST focuses on the formal models of security and trust that are needed to state goals and policies for these interactions. We also seek new and innovative techniques for establishing consequences of these formal models. Implementation approaches for such techniques are also welcome.

For more information, please see http://www.iit.cnr.it/FAST2011/Unico.htm.

SETOP 2011 4th International Workshop on Autonomous and Spontaneous Security, Held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, September 15-16, 2011. [posted here 05/23/11]
The SETOP Workshop seeks submissions that present research results on all aspects related to spontaneous and autonomous security. Topics of interest include, but are not limited to the following:
- Security policy deployment
- Self evaluation of risk and impact
- Distributed intrusion detection
- Cryptography & Cryptanalysis
- Autonomous and spontaneous response
- Trust establishment
- Lightweight cryptography
- Selfish behaviour and collaboration enforcement
- Security in autonomous networks
- Security in ad hoc networks
- Security in sensor/RFID networks
- Security of Next Generation Networks
- Security in Cloud Computing
- Security of Service Oriented Architecture
- Security of opportunistic networks
- Privacy in self-organized networks
- Secure localization
- Context aware and ubiquitous computing
- Secure interoperability and negotiation
- Self-organization in secure routing
- Identity management
- Modelling and validation of security

For more information, please see http://setop2011.dyndns.org/.

EuroPKI 2011 8th European Workshop on Public Key Services, Applications and Infrastructures, Held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, September 15-16, 2011. [posted here 03/21/11]
EuroPKI is a successful series of workshops that started in 2004. For the 2011 edition, the scope will cover all research aspects of Public Key Services, Applications and Infrastructures. In particular, we encourage also submissions dealing with any innovative applications of public key cryptography. Submitted papers may present theory, applications or practical experiences on topics including, but not limited to:
- Anonymity and Privacy
- Architecture and Modeling
- Authentication
- Authorization and Delegation
- Case Studies
- Certificates Status
- Certification Policy and Practices
- Credentials
- Cross Certification
- Directories
- eCommerce/eGovernment
- Evaluation
- Fault-Tolerance and reliability
- Federations
- Group signatures
- ID-based schemes
- Identity Management and eID
- Implementations
- Interoperability
- Key Management
- Legal issues
- Long-time archiving
- Mobile PKI
- Multi-signatures
- Policies & Regulations
- Privacy
- Privilege Management
- Protocols
- Repositories
- Risk/attacks
- Standards
- Timestamping
- Trust management
- Trusted Computing
- Ubiquitous scenarios
- Usage Control
- Web services security

For more information, please see http://www.cosic.esat.kuleuven.be/europki2011/.

NSPW 2011 New Security Paradigms Workshop, Marin County, CA, USA, September 12-15, 2011. [posted here 02/21/11]
The New Security Paradigms Workshop (NSPW) is seeking papers that address the current limitations of information security. Today's security risks are diverse and plentiful - botnets, database breaches, phishing attacks, targeted cyber attacks - and yet present tools for combating them are insufficient. To address these limitations, NSPW welcomes unconventional, promising approaches to important security problems and innovative critiques of current security theory and practice. We are particularly interested in perspectives from outside computer security, both from other areas of computer science (such as operating systems, human-computer interaction, databases, programming languages, algorithms) and other sciences that study adversarial relationships such as biology and economics. We discourage papers that offer incremental improvements to security and mature work that is appropriate for standard information security venues.

For more information, please see http://www.nspw.org.

ESORICS 2011 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. [posted here 01/17/11]
ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. We encourage submissions of papers discussing industrial research and development. Suggested topics include but are not restricted to:
- Access Control
- Accountability
- Ad hoc Networks
- Anonymity
- Applied Cryptography
- Attacks and Viral Software
- Authentication and Delegation
- Biometrics
- Database Security
- Digital Content Protection
- Distributed Systems Security
- Electronic Payments
- Embedded Systems Security
- Inference Control
- Information Hiding
- Identity Management
- Information Flow Control
- Integrity
- Intrusion Detection
- Formal Security Methods
- Language-Based Security
- Network Security
- Phishing and Spam Prevention
- Privacy
- Risk Analysis and Management
- Secure Electronic Voting
- Security Architectures
- Security Economics
- Security and Privacy Policies
- Security for Mobile Code
- Security in Location Services
- Security in Social Networks
- Security Models
- Security Verification
- Software Security
- Steganography
- Systems Security
- Trust Models and Management
- Trustworthy User Devices
- Web Security
- Wireless Security

For more information, please see https://www.cosic.esat.kuleuven.be/esorics2011/.

SecureComm 2011 7th International Conference on Network Security & Privacy, London, United Kingdom, September 7-9, 2011. [posted here 03/07/11]
SecureComm’11 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated. The aim of SecureComm is to bring together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers, in order to engage in a discussion about common goals and explore important research directions in the field. SecureComm also serves as a venue for learning about state-of-the-art in security and privacy research, giving attendees the opportunity to network with experts in the field. Topics include:
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Malware and botnets
- Communication Privacy and Anonymity
- Distributed denial of service
- Public Key Infrastructures, key management, credentials
- Web security
- Secure Routing, Naming/Addressing, Network Management
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems, Web 2.0

For more information, please see http://www.securecomm.org.

IWSSC 2011 1st International Workshop on Securing Services on the Cloud, Held in conjunction with the 5th International Conference on Network and System Security (NSS 2011), Milan, Italy, September 6-8, 2011. [posted here 04/25/11]
The ongoing merge between Service-Oriented Architectures (SOAs) and the Cloud computation paradigm provides a new environment fostering the integration of services located within company boundaries with those on the Cloud. An increasing number of organizations implement their business processes and applications via runtime composition of services made available on the Cloud by external suppliers. This scenario is changing the traditional view of security introducing new service security risks and threats, and requires re-thinking of current development, testing, and verification methodologies. IWSSC 2011 aims to address the security issues related to the deployment of services on the Cloud, along with evaluating their impact on traditional security solutions for software and network systems. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security of services implemented on the Cloud, as well as experimental studies in Cloud infrastructures, the implementation of services, and lessons learned. Topics of interest include, but are not limited to:
- Security in Cloud services
- Software verification in critical services
- Static code analysis of software services
- Test-based verification of services
- Authentication and access control on the Cloud
- Challenges in moving critical systems to the Cloud
- Cybercrime and cyberterrorism on the Cloud
- Communication confidentiality and integrity
- Data security and privacy on the Cloud
- Formal methods for the Cloud
- Homeland security
- Information assurance and trust management
- Intrusion detection on the Cloud
- Model-based validation of services
- Orchestration and choreography
- RESTful service security
- SOAP security
- Security certification of services
- Security metrics on the Cloud
- Security models and architectures
- Security patterns for the Cloud
- Security protocols on the Cloud

For more information, please see http://sesar.dti.unimi.it/iwssc2011.

NSS 2011 5th International Conference on Network and System Security, Milan, Italy, September 6-8, 2011. [posted here 02/21/11]
NSS is an annual international conference covering research in network and system security. The 5th International Conference on Network and System Security (NSS 2011) will be held in Milan, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include, but are not limited to:
- Active Defense Systems
- Adaptive Defense Systems
- Analysis, Benchmark of Security Systems
- Authentication
- Biometric Security
- Complex Systems Security
- Database and System Security
- Data Protection
- Data/System Integrity
- Distributed Access Control
- Distributed Attack Systems
- Denial-of-Service
- Electronic Communication Privacy
- High Performance Network Virtualization
- High Performance Security Systems
- Hardware Security
- Identity Management
- Intelligent Defense Systems
- Insider Threats
- Intellectual Property Rights Protection
- Internet and Network Forensics
- Intrusion Detection and Prevention
- Key Distribution and Management
- Large-Scale Attacks and Defense
- Malware
- Network Resiliency
- Network Security
- RFID Security and Privacy
- Security Architectures
- Security for Critical Infrastructures
- Security in P2P Systems
- Security in Cloud and Grid Systems
- Security in E-Commerce
- Security in Pervasive/Ubiquitous Computing
- Security and Privacy in Smart Grid
- Security and Privacy in Wireless Networks
- Secure Mobile Agents and Mobile Code
- Security Policy
- Security Protocols
- Security Simulation and Tools
- Security Theory and Tools
- Standards and Assurance Methods
- Trusted Computing
- Trust Management
- World Wide Web Security

For more information, please see http://anss.org.au/nss2011.

EC2ND 2011 7th European Conference on Computer Network Defense, Gothenburg, Sweden, September 6-7, 2011. [posted here 04/11/11]
EC2ND invites submissions presenting novel ideas at an early stage with the intention to act as a discussion forum and feedback channel for promising, innovative security research. While our goal is to solicit ideas that are not completely worked out, and might have challenging and interesting open questions, we expect submissions to be supported by some evidence of feasibility or preliminary quantitative results. This year we are especially interested in papers concerning the protection against attacks in "special environments" (such as the ICT component of the smart grid) or protection against attacks that could cause a large societal impact. Topics include but are not limited to:
- Intrusion Detection
- Denial-of-Service
- Privacy Protection
- Security Policy
- Peer-to-Peer and Grid Security
- Network Monitoring
- Web Security
- Vulnerability Management and Tracking
- Network Forensics
- Wireless and Mobile Security
- Cryptography
- Network Discovery and Mapping
- Incident Response and Management
- Malicious Software
- Web Services Security
- Legal and Ethical Issues

For more information, please see http://2011.ec2nd.org/.

PBD 2011 1st International Workshop on Privacy by Design, Held in conjunction with the Sixth International Conference on Availability, Reliability and Security (ARES 2011), Vienna, Austria, August 22-26, 2011. [posted here 02/21/11]
While data privacy was in the past mainly assured through procedures, laws or static access control policies, these protection mechanisms tend to be ineffective once data is ubiquitously available, outsourced to partially untrusted servers or processed by third parties. In addition, most current approaches towards achieving privacy - such as anonymisation and aggregation - are either incompatible with the increasing complexity of data usage or easy to compromise due to advances in statistical analysis and availability of side-information. Recent research tries to provide technical solutions in order to minimize the exposure of sensitive data while still allowing data-driven business models. For example, cryptographic schemes such as Secure Multiparty Computation, data-centric protection schemes such as Enterprise Rights Management or trusted virtualization technologies may be used to make IT systems intrinsically privacy friendly, finally contributing to the vision of "privacy by design". The aim of the workshop is to bring together researchers, systems engineers and privacy professionals in order to drive the concept of Privacy by Design and discuss implementation aspects as well as the surrounding legal and economic issues. The main topics of interest comprise but are not limited to:
- design issues of privacy-enhanced systems
- cryptographic approaches for privacy
- practical aspects of Secure Multiparty Computation
- data centric security
- Information/Enterprise Rights Management
- privacy-enhanced system architectures
- privacy and biometrics
- privacy in the cloud
- Privacy Enhancing Technologies
- censorship resistance
- economic and legal aspects of privacy
- usability of Privacy Enhancing Technologies

For more information, please see http://www.ares-conference.eu/conf/index.php?option=com_content&view=article&id=53 .

SecSE 2011 5th International Workshop on Secure Software Engineering, Held in conjunction with the ARES 2011, Vienna, Austria, August 22-26, 2011. [posted here 1/31/11]
Software security is about protecting information and ensuring that systems continue to function correctly even when under malicious attack. The traditional approach of securing a system has been to create defensive walls such as intrusion detection systems and firewalls around it, but there are always cracks in these walls, and thus such measures are no longer sufficient by themselves. We need to be able to build better, more robust and more _inherently secure_ systems, and we should strive to achieve these qualities in all software systems, not just in the ones that _obviously_ need special protection. This workshop will focus on techniques, experiences and lessons learned for building secure and dependable software. Suggested topics include, but are not limited to:
- Secure architecture and design
- Security in agile software development
- Aspect-oriented software development for secure software
- Security requirements
- Risk management in software projects
- Secure implementation
- Secure deployment
- Testing for security
- Quantitative measurement of security properties
- Static and dynamic analysis for security
- Verification and assurance techniques for security properties
- Security and usability
- Design and deployment of secure services
- Secure composition and adaptation of services
- Teaching secure software development
- Experience reports on successfully attuning developers to secure software engineering
- Lessons learned

For more information, please see http://www.sintef.org/secse.

WISA 2011 12th International Workshop on Information Security Applications, Jeju Island, Korea, August 22-24, 2011. [posted here 04/11/11]
The focus of this workshop is on all technical and practical aspects of cryptographic and non-cryptographic security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry. The areas of interest include, but are not limited to:
- Internet & Wireless Security
- E-Commerce Protocols
- Access Control & Database Security
- Biometrics & Human Interface
- Network Security & Intrusion Detection
- Security & Trust Management
- IPTV Security
- Content Protection & Service Security
- Digital Rights Management
- Secure Software & Systems
- Information Hiding
- Digital Forensics
- Secure Hardware
- Cyber Indication & Intrusion Detection
- Multicast & Group Security
- Secure Application Protocols
- Secure Coding
- Smart Cards & Applications
- Mobile Security
- Privacy & Anonymity
- Public Key Crypto Applications
- Threats & Information Warfare
- Virus Protection & Applications
- Ubiquitous Computing Security
- Combating SPAM
- ID Management
- Peer-to-Peer Security
- Information Assurance
- RFID Security & Applications
- Sensor Network Security & Applications
- Common Criteria
- Critical Information Infrastructure Protection
- Video Surveillance Systems
- Smartphone Security

For more information, please see http://www.wisa.or.kr.

SAC 2011 18th International Workshop on Selected Areas in Cryptography, Toronto, Ontario, Canada, August 11-12, 2011. [posted here 02/21/11]
The Workshop on Selected Areas in Cryptography (SAC) is an annual conference dedicated to specific themes in the area of cryptographic system design and analysis. Authors are encouraged to submit original papers related to the themes for the SAC 2011 workshop:
- Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, and MAC algorithms.
- Efficient implementations of symmetric and public key algorithms.
- Mathematical and algorithmic aspects of applied cryptology.
- Cryptographic tools and methods for securing clouds.

For more information, please see http://sac2011.ryerson.ca/SAC11_poster.pdf.

USENIX Security 2011 20th USENIX Security Symposium , San Francisco, CA, USA, August 10–12, 2011. [posted here 11/8/10]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. Refereed paper submissions are solicited in all areas relating to systems and network security, including:
- Adaptive security and system management
- Analysis of network and security protocols
- Applications of cryptographic techniques
- Attacks against networks and machines
- Authentication and authorization of users, systems, and applications
- Automated tools for source code analysis
- Botnets
- Cryptographic implementation analysis and construction
- Denial-of-service attacks and countermeasures
- File and filesystem security
- Firewall technologies
- Forensics and diagnostics for security
- Hardware security
- Intrusion and anomaly detection and prevention
- Malicious code analysis, anti-virus, anti-spyware
- Network infrastructure security
- Operating system security
- Privacy-preserving (and compromising) systems
- Public key infrastructure
- Rights management and copyright protection
- Security architectures
- Security in heterogeneous and large-scale environments
- Security policy
- Self-protecting and -healing systems
- Techniques for developing secure systems
- Technologies for trustworthy computing
- Usability and security
- Voting systems analysis and security
- Wireless and pervasive/ubiquitous computing security
- Web security, including client-side and server-side security

For more information, please see https://db.usenix.org/events/sec11/cfp/.

HotSec 2011 6th USENIX Workshop on Hot Topics in Security, Held in conjunction with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 9, 2011. [posted here 02/21/11]
HotSec is renewing its focus by placing singular emphasis on new security ideas and problems. Works reflecting incremental ideas or well understood problems will not be accepted. Cross-discipline papers identifying new security problems or exploring approaches not previously applied to security will be given special consideration. All submissions should propose new directions of research, advocate non-traditional approaches, report on noteworthy experience in an emerging area, or generate lively discussion around an important topic. HotSec takes a broad view of security and privacy and encompasses research on topics including but not limited to:
- Large-scale threats
- Network security
- Hardware security
- Software security
- Physical security
- Programming languages
- Applied cryptography
- Privacy
- Human-computer interaction
- Emerging computing environment
- Sociology
- Economics

For more information, please see http://www.usenix.org/hotsec11/cfpa.

HealthSec 2011 2nd USENIX Workshop on Health Security and Privacy, Held in conjunction with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 9, 2011. [posted here 02/21/11]
The focus of HealthSec '11 is the exploration of security and privacy issues that arise from the exploding quantity of digital personal health information, in both the provider and the patient settings. The Program Committee strongly encourages cross-disciplinary interactions between fields, including, but not limited to, technology, medicine, and policy. Surprising results and thought-provoking ideas will be strongly favored; complete papers with polished results in well-explored research areas are comparatively discouraged. We will select position papers that show potential to stimulate or catalyze further research and explorations of new directions, as well as extended abstracts that explore a specific issue a little more deeply, including preliminary results. Position papers are solicited on topics in all areas relating to healthcare information security and privacy, including:
- Security and privacy models for healthcare information systems
- Industry experience in securing healthcare information systems
- Design and deployment of patient-oriented systems for securely accessing and managing personal health data
- Security and privacy threats against existing and future medical devices--and countermeasures
- Regulatory and policy issues of healthcare information systems
- Privacy of medical information
- Usability issues, especially combined with security constraints
- Threat models for healthcare information systems

For more information, please see http://www.usenix.org/healthsec11/cfpa/.

EVT/WOTE 2011 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections, Held in conjunction with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-9, 2011. [posted here 02/21/11]
USENIX, ACCURATE, and IAVoSS are sponsoring the 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE '11). EVT/WOTE brings together researchers from a variety of disciplines, ranging from computer science and human-computer interaction experts through political scientists, legal experts, election administrators, and voting equipment vendors. Papers should contain original research in any area related to electronic voting technologies and verifiable elections. Example applications include but are not limited to:
- Ballot-box electronic voting systems
- Remote electronic voting systems
- Voter registration systems
- Procedures for ballot auditing
- Cryptographic (or non-cryptographic) verifiable election schemes

For more information, please see http://www.usenix.org/evtwote11/cfpa.

WOOT 2011 5th USENIX Workshop on Offensive Technologies, Held in conjunction with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 8, 2011. [posted here 03/07/11]
Computer security is unique among systems disciplines in that practical details matter and concrete case studies keep the field grounded in practice. WOOT provides a forum for high-quality, peer-reviewed papers discussing tools and techniques for attack. Submissions should reflect the state of the art in offensive computer security technology, either surveying previously poorly known areas or presenting entirely new attacks. Submission topics include but are not limited to:
- Vulnerability research (software auditing, reverse engineering)
- Penetration testing
- Exploit techniques and automation
- Network-based attacks (routing, DNS, IDS/IPS/firewall evasion)
- Reconnaissance (scanning, software, and hardware fingerprinting)
- Malware design and implementation (rootkits, viruses, bots, worms)
- Denial-of-service attacks
- Web and database security
- Weaknesses in deployed systems (VoIP, telephony, wireless, games)
- Practical cryptanalysis (hardware, DRM, etc.)

For more information, please see http://www.usenix.org/woot11/cfpa/.

FOCI 2011 1st Workshop on Free and Open Communications on the Internet, Held in conjunction with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 8, 2011. [posted here 04/25/11]
The first USENIX Workshop on Free and Open Communications on the Internet (FOCI) seeks to bring together researchers and practitioners from both technology and policy who are working on policies or technologies to detect or circumvent practices that inhibit free and open communications on the Internet. The growth of the Internet offers great promise for improving the communication capabilities of many users, but our increasing dependence on networked communications also makes it easier for organizations to control, monitor, or block user communications. ISPs and governments routinely restrict access to Internet content and services, either by censoring access to the information or by degrading the performance of various services (e.g., violating network neutrality). Indeed, although we think of the Internet as enabling the "democratization" of communications, free and open access is at risk: the Open Net Initiative reports that nearly 60 countries censor some access to information on the Internet. Similarly, ISPs can degrade network performance for certain subsets of users for some or all services. For example, some ISPs have been found to routinely block or throttle certain application traffic (e.g., BitTorrent). This growing trend towards blocking, tampering with, or otherwise restricting communications on the Internet calls for better techniques for both monitoring the state of restrictions on Internet content and communications (i.e., improving "transparency") and circumventing attempts to censor, degrade, or or otherwise tamper with Internet communications. In many cases, this technology must be both deniable (i.e., it must allow the user to deny knowledge about using the technology) and robust to blocking.

For more information, please see http://www.usenix.org/events/foci11/cfp/.

CSET 2011 4th Workshop on Cyber Security Experimentation and Test, Held in conjunction with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 8, 2011. [posted here 01/31/11]
The focus of CSET is on the science of cyber security evaluation, as well as experimentation, measurement, metrics, data, and simulations as those subjects relate to computer and network security. The science of cyber security is challenging for a number of reasons:
- Data: There is an absence of data usable by the community. Moreover, there is no clear understanding of what good data would look like if it was obtained, and how the value of data changes over time.
- Realism: Experiments must faithfully recreate the relevant features of the phenomena they investigate in order to obtain correct results, yet data about threats and the Internet landscape is sparse, modeling humans is hard, and issues of scaling (up or down) are not well understood. Hence careful reasoning about "realism" is required.
- Rigor: Repeatability and correctness must be ensured in any scientific experimentation. These can be extremely hard to achieve.
- Risk: Cyber security experiments naturally carry significant risk if not properly contained and controlled. At the same time, these experiments may well require some degree of interaction with the larger world to be useful.

Meeting these challenges requires transformational advance in understanding of the relationship between scientific method and cyber security evaluation, as well as transformational advance in capability of the underlying resources and infrastructure and usability of the data. The 4th Workshop on Cyber Security Experimentation and Test (CSET '11) invites submissions on the science, design, architecture, construction, operation, and use of cyber security data and experiments.

For more information, please see http://www.usenix.org/events/cset11/cfp/.

DFRWS 2011 11th Digital Forensics Research Conference, New Orleans, LA, USA, August 1-3, 2011. [posted here 09/20/10]
DFRWS brings together leading researchers, developers, practitioners, and educators interested in advancing the state of the art in digital forensics from around the world. As the most established venue in the field, DFRWS is the preferred place to present both cutting-edge research and perspectives on best practices for all aspects of digital forensics. As an independent organization, we promote open community discussions and disseminate the results of our work to the widest audience. We invite original contributions as research papers, panel proposals, Work-in-Progress talks, workshop proposals, and demo proposals. Topics of Interest:
- Forensic analysis
- Incident response and live analysis
- Network-based forensics, including network traffic analysis, traceback and attribution
- Event reconstruction methods and tools
- File system and memory analysis
- Application analysis
- Embedded systems
- Small scale and mobile devices
- Large-scale investigations
- Digital evidence storage and preservation
- Data mining and information discovery
- Data hiding and recovery
- Data extraction and reconstruction
- Multimedia analysis
- Database forensics
- Tool testing and development
- Digital evidence and the law
- Anti-forensics and anti-anti-forensics
- Case studies and trend reports
- Malware forensics
- Data visualization in forensic analysis
- Forensics of virtual and cloud environments
- Investigation of insider attacks
- Error rates of forensic methods
- Interpersonal communications and social network analysis
- Non-traditional approaches to forensic analysis

For more information, please see http://www.dfrws.org/.

MobiPST 2011 1st International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems, Held in conjunction with the ICCCN 2011, Maui, Hawaii, July 31, 2011. [posted here 03/21/11]
This workshop aims to bring together the technologists and researchers who share interest in the area of security, privacy and trust in mobile and wireless systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trust related issues in the context of mobile and wireless systems.

For more information, please see http://ocu-stars.okcu.edu/ksha/mobipst2011.html.

PETS 2011 11th Privacy Enhancing Technologies Symposium, Waterloo, ON, Canada, July 27-29, 2011. [posted here 11/29/10]
Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and exploiting their power to track users and their behavior. Approaches to protecting individuals, groups, but also companies and governments, from profiling and censorship include decentralization, encryption, distributed trust, and automated policy disclosure. The 11th Privacy Enhancing Technologies Symposium addresses the design and realization of such privacy services for the Internet and other data systems and communication networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives. The symposium seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. We encourage submissions with novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues. Suggested topics include but are not restricted to:
- Anonymous communications and publishing systems
- Attacks on privacy and privacy technologies
- Censorship resistance
- Data protection technologies
- Economics of privacy and PETs
- Fielded systems and techniques for enhancing privacy in existing systems
- Location privacy
- Privacy and anonymity in Peer-to-Peer, Cloud, and Ubiquitous Computing Environments
- Privacy and inference control in databases
- Privacy-enhanced access control or authentication/certification
- Privacy-friendly payment mechanisms for PETs and other services
- Privacy in Online Social Networks
- Privacy policy languages and tools
- Privacy threat models
- Profiling and data mining
- Pseudonyms, identity management, linkability, and reputation
- Reliability, robustness and abuse prevention in privacy systems
- Traffic analysis
- Transparency enhancing tools
- Usability issues and user interfaces for PETs

For more information, please see http://petsymposium.org/2011/.

ID 2011 ACM/Springer International Workshop on Identity: Security, Management & Applications, Kochi, Kerala, India, July 22-24, 2011. [posted here 01/10/11]
2011 ACM/Springer International Workshop on Identity ID 2011: Security, Management & Applications, is designated to meet with researchers, engineers and practitioners from academia, service providers, industry and government working on Identity-based Internet & infrastructure systems. ID 2011 aims to bring to forefront the recent trends in most significant technology topics such as Identity Management (IdM), Cloud Computing, Internet of Things (IoT), Service Oriented Architecture (SoA), Security & Privacy Systems, Access Management, Risk Management, and Role and Policy Management, etc in software, hardware and firmware applications running on private and public networks.

For more information, please see http://www.acc-rajagiri.org/ID2011.html.

VizSec 2011 8th International Symposium on Visualization for Cyber Security, Held in conjunction with the Symposium on Usable Privacy and Security (SOUPS 2011), Pittsburgh, PA, USA, July 20, 2011. [posted here 03/07/11]
The annual symposium joins academic, government, and industry leaders from around the globe to share the latest developments and applications of visualization techniques to address current cyber security challenges. Researchers and practitioners are invited to submit technical papers and panel session proposals that offer a novel contribution to security visualization. Papers are encouraged on new visualization technologies and methods that have been applied and demonstrated to be useful in a range of security domains including, but not limited to, computer forensics, risk assessment, cryptography, malware analysis, and situational awareness.

For more information, please see http://www.vizsec2011.org/.

PST 2011 9th International Conference on Privacy, Security and Trust, Montreal, Quebec, Canada, July 19-21, 2011. [posted here 10/11/10]
PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers whose topics include, but are NOT limited to, the following:
- Privacy Preserving / Enhancing Technologies
- Critical Infrastructure Protection
- Network and Wireless Security
- Operating Systems Security
- Intrusion Detection Technologies
- Secure Software Development and Architecture
- PST Challenges in e-Services, e.g. e-Health, e-Government, e Commerce
- Network Enabled Operations
- Digital forensics
- Information Filtering, Data Mining and Knowledge from Data
- National Security and Public Safety
- Security Metrics
- Recommendation, Reputation and Delivery Technologies
- Continuous Authentication
- Trust Technologies, Technologies for Building Trust in e-Business Strategy
- Observations of PST in Practice, Society, Policy and Legislation
- Digital Rights Management
- Identity and Trust management
- PST and Cloud Computing
- Human Computer Interaction and PST
- Implications of, and Technologies for, Lawful Surveillance
- Biometrics, National ID Cards, Identity Theft
- PST and Web Services / SOA
- Privacy, Traceability, and Anonymity
- Trust and Reputation in Self-Organizing Environments
- Anonymity and Privacy vs. Accountability
- Access Control and Capability Delegation
- Representations and Formalizations of Trust in Electronic and Physical Social Systems

For more information, please see http://pstnet.unb.ca/pst2011.

ESAS 2011 6th IEEE International Workshop on Engineering Semantic Agent Systems, Held in conjunction with IEEE COMPSAC 2011, Munich, Germany, July 18-22, 2011. [posted here 02/07/11]
Semantic web technologies render dynamic, heterogeneous, distributed, shared semantic content equally accessible to human reader and software agents. ESAS Workshops Series focuses on concepts, foundations and applications of semantic agent systems and bringing forward better practices of engineering them. Research and technologies related to Semantic Web and agent systems are very much in focus at ESAS. Topics of interest span a wide spectrum of both theory and practice of semantics and agent architectures, including software agents, mobile agents, autonomous semantic agents, context-aware intelligent agents, agents as semantic web services, multi-agent systems, agent communities, cooperation and goal seeking through shared policy and ontology, safety & security in semantic multi-agent information systems, and other QoS issues.

For more information, please see http://compsac.cs.iastate.edu/workshop_details.php?id=32&y.

DBSec 2011 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy, Richmond, Virginia, USA, July 11-13, 2011. [posted here 12/6/10]
The 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security. Both research papers and panel proposals are solicited. Papers may present theory, techniques, applications, or practical experience on topics of relevance to IFIP WG 11.3:
- Access control
- Applied cryptography in data security and privacy
- Identity theft and countermeasures
- Integrity maintenance
- Intrusion detection
- Knowledge discovery and privacy
- Organizational security
- Privacy and privacy-preserving data management
- Secure transaction processing
- Secure information integration
- Secure semantic web
- Secure sensor monitoring
- Secure web services
- Threats, vulnerabilities, and risk management
- Trust management

For more information, please see http://www.egr.vcu.edu/dbsec2011/.

HAISA 2011 International Conference on Human Aspects of Information Security & Assurance, London, United Kingdom, July 7-8, 2011. [posted here 06/06/11]
It is commonly acknowledged that security requirements cannot be addressed by technical means alone, and that a significant aspect of protection comes down to the attitudes, awareness, behaviour and capabilities of the people involved. Indeed, people can potentially represent a key asset in achieving security, but at present, factors such as lack of awareness and understanding, combined with unreasonable demands from security technologies, can dramatically impede their ability to do so. Ensuring appropriate attention and support for the needs of users should therefore be seen as a vital element of a successful security strategy. People at all levels (i.e. from organisations to domestic environments; from system administrators to end-users) need to understand security concepts, how the issues may apply to them, and how to use the available technology to protect their systems. In addition, the technology itself can make a contribution by reducing the demands upon users, simplifying protection measures, and automating a variety of safeguards. With the above in mind, this conference specifically addresses information security issues that relate to people. It concerns the methods that inform and guide users' understanding of security, and the technologies that can benefit and support them in achieving protection. The conference welcomes papers addressing research and case studies in relation to any aspect of information security that pertains to the attitudes, perceptions and behaviour of people, and how human characteristics or technologies may be positively modified to improve the level of protection. Indicative themes include:
- Information security culture
- Awareness and education methods
- Enhancing risk perception
- Public understanding of security
- Usable security
- Psychological models of security software usage
- User acceptance of security policies and technologies
- User-friendly authentication methods
- Biometric technologies and impacts
- Automating security functionality
- Non-intrusive security
- Assisting security administration
- Impacts of standards, policies, compliance requirements
- Organizational governance for information assurance
- Simplifying risk and threat assessment
- Understanding motivations for misuse
- Social engineering and other human-related risks
- Privacy attitudes and practices
- Computer ethics and security

For more information, please see http://www.haisa.org.

DIMVA 2011 8th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Amsterdam, The Netherlands, July 7-8, 2011. [posted here 11/8/10]
The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. DIMVA's scope includes, but is not restricted to the following areas:
Intrusion Detection
- Novel approaches & new environments
- Insider detection
- Prevention & response
- Data leakage
- Result correlation & cooperation
- Evasion attacks
- Potentials & limitations
- Operational experiences
- Privacy, legal & social aspects
Malware Detection
- Automated analysis, reversing & execution tracing
- Containment & sandboxed operation
- Acquisition of specimen
- Infiltration
- Behavioral models
- Prevention & containment
- Trends & upcoming risks
- Forensics & recovery
- Economic aspects
Vulnerability Assessment
- Vulnerability detection & analysis
- Vulnerability prevention
- Web application security
- Fuzzing techniques
- Classification & evaluation
- Situational awareness

For more information, please see http://www.dimva.org/dimva2011.

ASA 2011 5th International Workshop on Analysis of Security APIs, Paris, France, June 30, 2011. [posted here 02/21/11]
Security APIs allow untrusted code to access sensitive resources in a secure way. Security API analysis is an emerging field of computer security research. The aim of the ASA workshop is to bring together researchers working in security API analysis for a day of presentations and discussions. Since the field is relatively young, polished research papers will not be solicited. Instead, the workshop will follow the format that was highly successful at ASA in 2007-10: prospective participants are invited to submit a short (1-4 page) abstract describing their current work and/or interests in the area. We plan to have two sessions of 20-minute talks by participants, with each session followed by informal discussion. There will also be a workshop dinner in the evening, and subject to confirmation, an invited speaker. The scope of ASA runs from theoretical results and formalisms for API analysis right through to applications and empirical results with security APIs deployed `in the field'. Applications of interest include (but are not limited to) financial applications (e.g. APIs of Hardware Security Modules), smartcard APIs, the Trusted Computing Architecture, and security APIs for web based systems.

For more information, please see http://www.lsv.ens-cachan.fr/~steel/asa5/.

IFIPTM 2011 5th IFIP International Conference on Trust Management, Copenhagen, Denmark, June 29 - July 1, 2011. [posted here 10/12/10]
The mission of the IFIPTM 2011 Conference is to share research solutions to problems of Trust and Trust management, including related Security and Privacy issues, and to identify new issues and directions for future research and development work. IFIPTM 2011 invites submissions presenting novel research on all topics related to Trust, Security and Privacy, including but not limited to those listed below:
Security, trust and privacy
- formal aspects (specification, reasoning and analysis)
- applications and services
- policy management
- in social networks and emerging contexts
- in collaborative applications, crowdsourcing and wiki systems
- ethical, sociological, psychological and legal aspects
- human-computer interaction and usable systems
Trust and reputation management systems
- architectures and models
- metrics and computation
- applications
Identity management and trust
- anonymity, privacy and accountability
- legal aspects
Trustworthy systems
- platforms & Standards
- software and services
- applications

For more information, please see http://www.ifiptm.org/.

CSF 2011 24th IEEE Computer Security Foundations Symposium, Domaine de l'Abbaye des Vaux-de-Cernay, France, June 27-29, 2011. [posted here 12/6/10]
New theoretical results in computer security are welcome. Also welcome are more exploratory presentations, which may examine open questions and raise fundamental concerns about existing theories. Panel proposals are sought as well as papers. Possible topics include, but are not limited to:
- Access control
- Distributed systems security
- Language-based security
- Anonymity and Privacy
- Electronic voting
- Network security
- Authentication
- Executable content
- Resource usage control
- Data and system integrity
- Formal methods for security
- Security for mobile computing
- Database security
- Information flow
- Security models
- Data provenance
- Intrusion detection
- Security protocols
- Decidability and complexity
- Hardware-based security
- Trust and trust management

For more information, please see http://csf2011.inria.fr/.

STM 2011 7th International Workshop on Security and Trust Management, Held in conjunction with IFIPTM 2011, Copenhagen, Denamrk, June 27-28, 2011. [posted here 02/21/11]
STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM'11 is the seventh workshop in this series and will be held in Copenhagen, Denmark in conjunction with IFIPTM 2011. Topics of interest include, but are not limited to:
- access control
- cryptography
- digital right management
- economics of security
- key management
- ICT for securing digital as well as physical assets
- identity management
- networked systems security
- privacy and anonymity
- reputation systems and architectures
- security and trust management architectures
- semantics and computational models for security and trust
- trust assessment and negotiation
- trust in mobile code
- trust in pervasive environments
- trust models
- trust management policies
- trusted platforms and trustworthy systems
- trustworthy user devices

For more information, please see http://www.isac.uma.es/stm11.

RFIDsec 2011 7th Workshop on RFID Security , Amherst, MA, USA, June 26-28, 2011. [posted here 02/07/11]
The RFIDSec workshop focuses on security and data-protection issues in advanced contactless technologies like RFID. It stresses implementation aspects imposed by resource constraints. Topics of the workshop include but are not limited to:
- New applications for secure RFID systems
- Data protection and privacy-enhancing techniques for RFID
- Cryptographic protocols for RFID
- Integration of secure RFID systems
- Data mining and other systemic approaches to RFID security
- Resource-efficient implementation of cryptography
- Attacks on RFID systems
- RFID security hardware e.g. RFID with PUF, RFID Trojans, ...

For more information, please see http://rfid-cusp.org/rfidsec/.

TRUST 2011 4th International Conference on Trust and Trustworthy Computing, Pittsburgh, PA, USA, June 22-24, 2011. [posted here 11/8/10]
This conference focuses on trusted and trustworthy computing, both from the technical and social perspectives. The conference itself has two main strands, one devoted to technical aspects and one devoted to socio-economic aspects of trusted computing. The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to:
Technical Strand
- Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
- Trust, Security and Privacy in embedded systems
- Trust, Security and Privacy in social networks
- Trusted mobile platforms and mobile phone security
- Implementations of trusted computing (hardware and software)
- Applications of trusted computing
- Trustworthy infrastructures and services for cloud computing (including resilience)
- Attestation and integrity verification
- Cryptographic aspects of trusted and trustworthy computing
- Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)
- Intrusion resilience in trusted computing
- Virtualization for trusted platforms
- Secure storage
- Security policy and management of trusted computing
- Access control for trusted platforms
- Privacy aspects of trusted computing
- Verification of trusted computing architectures
- Usability and end-user interactions with trusted platforms
- Limitations of trusted computing
Socio-economic Strand
- Usability and user perceptions of trustworthy systems and risks
- Effects of trustworthy systems upon user, corporate, and governmental behavior
- Economic drivers for trustworthy systems in corporate environment
- The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
- The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
- The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
- Game theoretical approaches to modeling or designing trustworthy systems
- Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
- Experimental economics studies of trustworthiness
- The interplay between privacy, privacy enhancing technologies and trustworthy systems
- Critiques of trustworthy systems

For more information, please see http://www.trust2011.org.

FCS 2011 Workshop on Foundations of Computer Security, Held in conjunction with LICS 2011, Toronto, Ontario, Canada, June 20, 2011. [posted here 01/17/11]
Computer security is an established field of computer science of both theoretical and practical significance. In recent years, there has been increasing interest in logic-based foundations for various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis. The aim of the workshop FCS'11 is to provide a forum for continued activity in different areas of computer security, bringing computer security researchers in closer contact with the LICS community and giving LICS attendees an opportunity to talk to experts in computer security, on the one hand, and contribute to bridging the gap between logical methods and computer security foundations, on the other. We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories, as well as in new results on developing and applying automated reasoning techniques and tools for the formal specification and analysis of security protocols.

For more information, please see http://www.di.ens.fr/~blanchet/fcs11/.

D-SPAN 2011 2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks, Held in conjunction with IEEE WoWMoM 2011, Lucca, Italy, June 20, 2011. [posted here 01/17/11]
D-SPAN 2011, the Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), is focused on defining new problems and developing novel techniques for data security and privacy issues in wireless and mobile networks. With the emergence of data-intensive wireless networks such as wireless sensor networks and data-centric mobile applications such as location-based services, the traditional boundaries between these three disciplines are blurring. This workshop solicits papers from two main categories: (1) papers that consider the security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined, e.g., MANET, cellular, vehicular, ad hoc, cognitive, as well as sensor networks, and (2) papers that use data analytics techniques to address security and privacy problems in wireless networks. The workshop provides a venue for researchers to present new ideas with impact on three communities: wireless networks, databases, and security. The list of topics includes, but not limited to:
- Foundations in wireless security & privacy (game theory, information theory, belief models, etc)
- Location privacy in wireless networks
- Secure data collection and aggregation for wireless sensor networks
- Secure data collection in body-area networks
- Secure data processing in mobile ad-hoc networks (MANET)
- Secure query processing over wireless sensor networks
- Security and privacy of RFID systems
- Security and privacy for data streaming
- Security for cognitive radio networks
- Tradeoffs between Security and Communication Performance

For more information, please see http://home.gwu.edu/~nzhang10/DSPAN2011/.

USENIX-ATC 2011 2011 USENIX Annual Technical Conference, Portland, Oregon, USA, June 15–17, 2011. [posted here 11/22/10]
Authors are invited to submit original and innovative papers to the Refereed Papers Track of the 2011 USENIX Annual Technical Conference. We seek high-quality submissions that further the knowledge and understanding of modern computing systems, with an emphasis on implementations and experimental results. We encourage papers that break new ground or present insightful results based on practical experience with computer systems. USENIX ATC has a broad scope, and specific topics of interest include but are not limited to:
- Architectural interaction
- Cloud computing
- Deployment experience
- Distributed and parallel systems
- Embedded systems
- Energy/power management
- File and storage systems
- Mobile, wireless, and sensor systems
- Networking and network services
- Operating systems
- Reliability, availability, and scalability
- Security, privacy, and trust
- System and network management and troubleshooting
- Usage studies and workload characterization
- Virtualization

For more information, please see http://www.usenix.org/events/atc11/cfp/.

SACMAT 2011 16th ACM Symposium on Access Control Models and Technologies, Innsbruck, Austria, June 15-17, 2011. [posted here 09/20/10]
ACM SACMAT is the premier forum for the presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The aims of the symposium are to share novel access control solutions that fulfil the needs of heterogeneous applications and environments, and to identify new directions for future research and development. SACMAT provides researchers and practitioners with a unique opportunity to share their perspectives with others interested in the various aspects of access control. Papers offering novel research contributions in all aspects of access control are solicited. We solicit proposals for panels and systems demonstrations as well. Topics of Interest:
- Access control models and extensions
- Access control requirements
- Access control design methodology
- Access control mechanisms, systems, and tools
- Access control in distributed and mobile systems
- Access control for innovative applications
- Administration of access control policies
- Delegation
- Identity management
- Policy/Role engineering
- Safety analysis and enforcement
- Standards for access control
- Trust management
- Trust and risk models in access control
- Theoretical foundations for access control models
- Usability in access control systems
- Usage control

For more information, please see http://sacmat.org/.

WiSec 2011 4th ACM Conference on Wireless Network Security, Hamburg, Germany, June 14-17, 2011. [posted here 08/30/10]
As wireless and mobile networking becomes ubiquitous, security and privacy gains in importance. The focus of ACM Conference on Wireless Network Security (ACM WiSec) is on exploring attacks on (and threats facing) wireless communication as well as techniques to address them. Settings of interest include: cellular, metropolitan, mesh, local-area, personal-area, home, vehicular, sensor, ad hoc, satellite, and underwater networks as well as cognitive radio and RFID. Topics of interest include, but are not limited to:
- Naming and addressing vulnerabilities
- Key management in wireless/mobile environments
- Secure neighbor discovery / Secure localization
- Secure PHY and MAC protocols
- Trust establishment
- Intrusion detection, detection of malicious behavior
- Revocation of malicious parties
- Denial of service
- User privacy, location privacy
- Anonymity, unobservability, prevention of traffic analysis
- Identity theft and phishing in mobile networks
- Charging & secure payment
- Cooperation and prevention of non-cooperative behavior
- Economics of wireless security
- Vulnerability and attack modeling
- Incentive-aware secure protocol design
- Jamming/Anti-jamming communication
- Cross-layer design for security
- Monitoring and surveillance
- Cryptographic primitives for wireless communication
- Formal methods for wireless security
- Mobile/wireless platform and systems (OS and application) security

For more information, please see http://www.sigsac.org/wisec/WiSec2011.

ACNS 2011 9th International Conference on Applied Cryptography and Network Security, Nerja, Malaga, Spain, June 7-10, 2011. [posted here 10/18/10]
Original papers on all aspects of applied cryptography as well as computer/network security and privacy are solicited. Topics of interest include, but are not limited, to:
- Applied cryptography and cryptographic protocols
- Cryptographic primitives, e.g., cryptosystems, ciphers and hash functions
- Network security protocols
- Privacy, anonymity and untraceability
- Security for the next-generation Internet
- Internet fraud, e.g., phishing, pharming, spam, and click fraud
- Email and web security
- Public key infrastructures, key management, certification and revocation
- Trust and its metrics
- Usable security and cryptography
- Intellectual property protection and digital rights management
- Modeling and protocol design
- Automated protocols analysis
- Secure virtualization and security in cloud computing
- Security and privacy in sensor, mobile, ad hoc and delay-tolerant networks, p2p systems, as well as wireless (e.g., RFID, Bluetooth) communications

For more information, please see http://www.isac.uma.es/acns2011/.

IFIP-SEC 2011 26th IFIP TC-11 International Information Security Conference, Luzern, Switzerland, June 7-9, 2011. [posted here 09/20/10]
The SEC conferences are in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP (International Federation for Information Processing). IFIP SEC 2011 aims at bringing together primarily researchers, but also practitioners from academia, industry and governmental institutions for elaborating and discussing IT Security and Privacy Challenges that we are facing today and in the future. Papers offering novel and mature research contributions, in any aspect of information security and privacy are solicited for submission to the 26th IFIP TC-11 International Information Security Conference. Papers may present theory, applications, or practical experiences on security and privacy topics including but not limited to:
- Access Control
- Anonymity
- Applications of Cryptography
- Attacks and Malicious Software
- Authentication and Authorization
- Biometrics and Applications
- Critical ICT Resources Protection
- Data and Systems Integrity
- Data Protection
- ECommerce Privacy & Security
- Enterprise Security
- Identity Management
- Information Hiding
- Information Warfare
- Internet and Web Security
- Intrusion Detection
- IT-Forensics
- Mobile Computing Security
- Mobile Networks Security
- Network Security Protocols
- Multilateral Security
- Peer-to-Peer Security
- Privacy Enhancing Technologies
- RFID Privacy & Security
- Risk Analysis and Management
- Secure Electronic Voting
- Secure Sensor Networks
- Secure Systems Development
- Security Architectures
- Security Economics
- Security Education
- Security Management
- Security Metrics
- Semantic Web Privacy & Security
- Smart Cards
- Software Security
- Spam, SPIT, SPIM
- Transparency Enhancing Tools
- Trust Management and Models
- Trusted Computing
- Ubiquitous Privacy & Security
- Usability of Security and Privacy

For more information, please see http://www.sec2011.org/.

POLICY 2011 12th IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, June 6-8, 2011. [posted here 11/8/10]
The symposium brings together researchers and practitioners working on policy-based systems across a wide range of application domains including policy-based networking, privacy, trust and security management, autonomic computing, pervasive systems and enterprise systems. POLICY 2011 is the 12th in a series of successful events, which have provided a forum for discussion and collaboration between researchers, developers and users of policy-based systems. In addition to the areas mentioned above, we specifically encourage this year contributions on policy-based techniques in support of Cloud computing and Enterprise Service Oriented applications as well as the use of reasoning, verification and learning techniques in policy-based systems

For more information, please see http://ieee-policy.org.

ICC-CISS 2011 IEEE ICC 2011, Communication and Information Systems Security Symposium, Kyoto, Japan, June 5-9, 2011. [posted here 08/30/10]
With the advent of pervasive computer applications and due to the proliferation of heterogeneous wired and wireless computer and communication networks, security, privacy and trust issues have become paramount. This Symposium will address all aspects of the modeling, design, implementation, deployment, and management of security algorithms, protocols, architectures, and systems. Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security and privacy mechanisms for current technologies, as well as devising efficient security and privacy solutions for emerging areas from physical layer technology to the application layer, are solicited. Topics of interest include, but are not limited to, the following:
- Authentication protocols and message authentication
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography, mobile template protection
- Computer and network forensics
- Cryptanalysis
- DDOS attacks, DNS spoofing, intrusion, localization and countermeasures
- Digital right management: information hiding, watermarking, fingerprinting, and traitor tracing scheme
- Formal trust models, security modeling and protocol design
- Information systems security and security management
- Mobile and Wireless network security, including ad hoc networks, P2P networks, 3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX
- Network security metrics and performance
- Operating systems and application security and analysis tools
- Optical network security
- Physical security and hardware/software security
- Privacy and privacy enhancing technologies
- Public-key, symmetric-key, applied crypto, coding-based cryptography
- Quantum cryptography
- Virtual private networks and group security
- VoIP, IPTV, DAB, and other multimedia security
- Vulnerability, exploitation tools and virus analysis
- Web, Cloud, eBusiness, eCommerce, eGovernment security

For more information, please see http://www.ieee-icc.org/2011/.

HOST 2011 4th IEEE International Sympoium on Hardware-Oriented Security and Trust, San Diego, CA, June 5-6, 2011. [posted here 11/8/10]
A wide range of applications, from secure RFID tagging to high-end trusted computing, relies on dedicated and trusted hardware platforms. The security and trustworthiness of such hardware designs are critical to their successful deployment and operation. Recent advances in tampering and reverse engineering show that important challenges lie ahead. For example, secure electronic designs may be affected by malicious circuits, Trojans that alter system operation. Furthermore, dedicated secure hardware implementations are susceptible to novel forms of attack that exploit side-channel leakage and faults. Third, the globalized, horizontal semiconductor business model raises concerns of trust and intellectual-property protection. HOST 2011 is a forum for novel solutions to address these challenges. Innovative test mechanisms may reveal Trojans in a design before they are able to do harm. Implementation attacks may be thwarted using side-channel resistant design or fault-tolerant designs. New security-aware design tools can assist a designer in implementing critical and trusted functionality, quickly and efficiently. HOST 2011 seeks contributions based on, but not limited to, the following topics:
- Trojan detection and isolation
- Implementation Attacks and Countermeasures
- Side channel Analysis and Fault Analysis
- Intellectual Property Protection and Metering
- Tools and Methodologies for Secure Hardware Design
- Hardware Architectures for Cryptography
- Hardware Security Primitives: PUFs and TRNGs
- Applications of Secure Hardware
- Interaction of Secure Hardware and Software

For more information, please see http://www.engr.uconn.edu/HOST/.

WISTP 2011 5th Workshop in Information Security Theory and Practice, Heraklion, Crete, Greece, June 1-3, 2011. [posted here 08/30/10]
Technical enhancements of mobile network infrastructures and the availability of powerful mobile devices are rapidly changing the way in which users interact and communicate in everyday life. These devices include but not limited to PDAs, mobile phones, smart cards, wireless sensors, and RFID tags. Among the main common features of these devices include constraint resources and wireless communications. WISTP 2011 aims to address the security and privacy issues that are increasingly exposed by mobile communications and related services, along with evaluating their impact on individuals, and the society at large. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy of mobile and smart devices, as well as experimental studies of fielded systems based on wireless communication, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to:
- Authentication and access control
- Ad hoc networks security and privacy
- Biometrics, national ID cards
- Data security and privacy
- Digital rights management
- Embedded systems security
- Human and psychological aspects of security
- Identity management
- Information assurance and trust management
- Intrusion detection and information filtering
- Lightweight cryptography
- Mobile and ubiquitous network security
- Mobile codes security
- Mobile commerce security
- Mobile devices security
- Privacy enhancing technologies
- RFID systems security
- Secure self-organization and self-configuration
- Security in location services
- Security metrics
- Security models and architectures
- Security of GSM/GPRS/UMTS systems
- Security and privacy policies
- Security protocols
- Smart card security
- Vehicular network security and privacy
- Wireless communication security and privacy
- Wireless sensor network security and privacy

For more information, please see http://www.wistp.org/.

ISPEC 2011 7th Information Security Practice and Experience Conference, Guangzhou, China, May 30 - June 1, 2011. [posted here 10/11/10]
ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. Authors are invited to submit full papers presenting new research results related to information security technologies and applications. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:
- Applied cryptography
- Access control
- Digital rights management
- Economic incentives for deployment of information security systems
- Information security in vertical applications
- Network security
- Privacy and anonymity
- Risk evaluation and security certification
- Resilience and availability
- Secure system architectures
- Security policy
- Security protocols
- Trust model and management
- Usability aspects of information security systems

For more information, please see http://ispec2011.jnu.edu.cn/.

PETSE 2011 3rd International Workshop on Privacy Enhanced Technology and Security Engineering, Busan, Korea, May 26-28, 2011. [posted here 01/10/11]
The integration of the advanced wireless technology and Internet tends to increase connections of computing devices. However, in order to achieve such integration, security problems and privacy concerns such as personal information outflows should be considered. Privacy enhanced technology and security engineering are required for technical security and personal information protection. The aim of this workshop is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Privacy Enhanced Technology and Security Engineering.

For more information, please see http://www.ftrai.org/petse2011/.

SGSC 2011 IEEE International Workshop on Smart Grid Security and Communications, Held in conjunction with the 2011 IEEE International Symposium on Parallel and Distributed Processing and Application (ISPA2011), Busan, Korea, May 26-28, 2011. [posted here 11/29/10]
IThe Smart Grid concept arose in response to a combination of external factors that are economic, political, environmental, societal and technical in nature. At the power distribution system level, this concept has motivated the coordination and integration of modern energy, communications, control, and information technologies. However, the downside is that as the grid provides mission-critical services, which need to be secure and reliable. Hence, there is a need for security strategies to protect core infrastructures when transforming conventional power networks to smart grids, for instance, from malicious code and cascading errors. The underlying requirements for a reliable and secure Smart Grid pertain to an adherence to standards, best practices, as well as a high degree of architectural discipline. This workshop serves to unite common research interests in Smart Grid technologies to discuss and address related security issues, and share novel security solutions. Topics of interest include, but are not limited to:
- Security standard for Smart Grid
- Privacy protection in Smart Grid
- Vulnerability analysis & risk management
- Secure key management and access control in Smart Grid
- Power distribution with full cyber security
- Software security relevant to Smart Grid
- Communication security in Smart Grid
- Security of Advanced Metering Infrastructure (AMI)
- Killer applications for Smart Grid
- Reliable self-healing for Smart Grid
- Information communication and control technology for Smart Grid
- Secure routing and interconnectivity for Smart Grid
- Scheduling, resource allocation and optimization methodology
- Power distribution under computation and communication constraints
- Incorporation of demand response, smart appliance and consumer devices
- Consumer-to-consumer power re-distribution and networking

For more information, please see http://sgsc.ee.ccu.edu.tw/.

W2SP 2011 Web 2.0 Security and Privacy 2011 Workshop, Held in conjunction with IEEE Symposium on Security and Privacy (SP 2011), Berkeley, CA, USA, May 26, 2011. [posted here 01/18/11]
W2SP brings together researchers, practitioners, web programmers, policy makers, and others interested in the latest understanding and advances in the security and privacy of the web, browsers and their eco-system. We have had four years of successful W2SP workshops. This year, we will additionally invite selected papers to a special issue of the journal. We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages). The scope of W2SP 2011 includes, but is not limited to:
- Trustworthy cloud-based services
- Privacy and reputation in social networks
- Security and privacy as a service
- Usable security and privacy
- Security for the mobile web
- Identity management and psuedonymity
- Web services/feeds/mashups
- Provenance and governance
- Security and privacy policies for composible content
- Next-generation browser technology
- Secure extensions and plug-ins
- Advertisement and affiliate fraud
- Measurement study for understanding web security and privacy

For more information, please see http://w2spconf.com/2011/cfp.html.

SADFE 2011 International Workshop on Systematic Approaches to Digital Forensic Engineering, Held in conjunction with the IEEE Symposium on Security and Privacy (SP 2011), Berkeley, CA, USA, May 26, 2011. [posted here 01/10/11]
The SADFE (Systematic Approaches to Digital Forensic Engineering) International Workshop promotes systematic approaches to cyber crime investigations, by furthering the advancement of digital forensic engineering as a disciplined science and practice. Today's digital artifacts permeate our lives and are part of every crime and every case of digital discovery. The field of digital forensics faces many challenges, including scale, scope and presentation of highly technical information in legal venues to nontechnical audiences. Digital evidence may be extant for only nanoseconds or for years; they may consist of a single modified bit, or huge volumes of data; they may be found locally or spread globally throughout a complex digital infrastructure on public or private systems. Following the success of previous SADFE workshops, cyber crime investigations and digital forensics tools will continue to be the key topics of the meeting. We also welcome a broader range of digital forensics papers that do not necessarily involve either crime or digital forensics tools. General attack analysis, the insider threat, insurance and compliance investigations, similar forms of retrospective analysis, and digital discovery are all viable topics. Past speakers and attendees of SADFE have included computer and information scientists, social scientists, digital forensic practitioners, IT professionals, law enforcement, lawyers, and judges. The synthesis of science with practice and the law with technology form the foundation of this conference. SADFE addresses the gap between today's practice and the establishment of digital forensics as a science. To advance the field, SADFE-2011 solicits broad-based, innovative approaches to digital forensic engineering in the following four areas:
- Digital Data and Evidence Management: advanced digital evidence discovery, collection, and storage
- Scientific Principle-based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds
- Digital Evidence Analytics: advanced digital evidence analysis, correlation, and presentation
- Forensic-support technologies: forensic-enabled and proactive monitoring/response

To honor the outstanding work in digital forensics, the SADFE will provide awards for the highest overall quality papers and posters from the accepted program, as measured by scientific contribution, depth, and impact. A student must be the first author to be eligible for the best student paper award.

For more information, please see http://conf.ncku.edu.tw/sadfe/sadfe11/.

SP 2011 32nd IEEE Symposium on Security & Privacy, The Claremont Resort, Berkeley/Oakland, California, USA, May 22-25, 2011. [posted here 08/16/10]
Since 1980, the IEEE Symposium on Security and Privacy (S&P) has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of computer security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems. Topics of interest include:
- Access control
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Censorship and censorship-resistance
- Distributed systems security
- Embedded systems security
- Forensics
- Hardware security
- Intrusion detection
- Language-based security
- Malware
- Metrics
- Network security
- Privacy-preserving systems
- Protocol security
- Secure information flow
- Security and privacy policies
- Security architectures
- System security
- Usability and security
- Web security

For more information, please see http://oakland32-submit.cs.ucsb.edu/.

SAR/SSI 2011 International Conference on Network and Information Systems Security, La Rochelle, France, May 18-21, 2011. [posted here 11/8/10]
The SAR-SSI conference series provides a forum for presenting novel research results, practical experiences and innovative ideas in network and information systems security. The goal of SAR-SSI-2011 is fostering exchanges among academic researchers, industry and a wider audience interested in network and information system security. The conference will offer a broad area of events, ranging from panels, tutorials, technical presentations and informal meetings. Prospective authors are encouraged to submit papers describing novel research contributions as well as proposals for tutorials and panels.

For more information, please see http://sarssi-conf.org.

IH 2011 13th Information Hiding Conference, Prague, Czech Republic, May 18-20, 2011. [posted here 12/13/10]
For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to investigators; and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topic share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled. Current research themes include:
- Anonymity and privacy
- Covert/subliminal channels
- Digital rights management
- Fingerprinting and embedding codes
- Multimedia and document security
- Multimedia forensics and counter forensics
- Novel applications of information hiding
- Other data hiding domains (e.g. text, software, etc.)
- Security metrics for information hiding
- Steganography and steganalysis
- Theoretical aspects of information hiding and detection
- Watermarking (algorithms, security, attacks)

For more information, please see http://www.ihconference.org/.

RFIDsec-Asia 2011 Workshop on RFID Security, Wuxi, China, April 6-8, 2011. [posted here 08/30/10]
RFIDsec aims to bridge the gap between cryptographic & security researchers and RFID developers through invited talks and contributed presentations. The RFIDsec Asia workshop is aligned with RFIDSec. RFIDsec’11 Asia provides a forum to address the fundamental issues in theory and practice related to security and privacy issues, designs, standards, and case studies in the development of RFID systems, EPCglobal network, and Internet of Things (IoT). Submissions and interactions from academia, government and industry are welcome and appreciated. Moreover, the workshop plans to organize summit and exhibition for Internet of Things and RFID. Topics of the conference include but not limited to:
- Cryptographic protocols for RFID/IoT: Authentication protocols, Key update mechanisms, Scalability issues
- Integration of secure RFID/IoT systems: RFID security hardware, Middleware and security, (Public-key) Infrastructures, Case studies
- Resource-efficient implementation of cryptography: Small-footprint hardware, Low-power architectures
- Attacks & Countermeasures on RFID/IoT systems
- New applications for secure RFID/IoT systems
- Data protection for RFID/IoT
- Trust Model, data protection and sharing for EPCglobal network
- RFID sensor security
- Context based RFID/IoT security and privacy
- Privacy-enhancing techniques for RFID/IoT
- Privacy-preserving techniques for RFID/IoT
- Legal aspects of RFID/IoT security and privacy
- Risk assessment & management of RFID/IoT security
- Privacy and security challenges for sensor networks/IoT

For more information, please see http://wuxi.ss.pku.edu.cn/~RFIDSec2011/.

LEET 2011 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Boston, MA, USA, March 29, 2011. [posted here 12/6/10]
Now in its fourth year, LEET continues to provide a unique forum for the discussion of threats to the confidentiality of our data, the integrity of digital transactions, and the dependability of the technologies we increasingly rely on. We encourage submissions of papers that focus on the malicious activities themselves (e.g., reconnaissance, exploitation, privilege escalation, rootkit installation, attack), our responses as defenders (e.g., prevention, detection, and mitigation), or the social, political, and economic goals driving these malicious activities and the legal and ethical codes guiding our defensive responses. Topics of interest include but are not limited to:
- Infection vectors for malware (worms, viruses, etc.)
- Botnets, command and control channels
- Spyware
- Operational experience
- Forensics
- Click fraud
- Measurement studies
- New threats and related challenges
- Boutique and targeted malware
- Phishing
- Spam
- Underground economy
- Miscreant counterintelligence
- Carding and identity theft
- Denial-of-service attacks
- Hardware vulnerabilities
- Legal issues
- The arms race (rootkits, anti-anti-virus, etc.)
- New platforms (cellular networks, wireless networks, mobile devices)
- Camouflage and detection
- Reverse engineering
- Vulnerability markets and zero-day economics
- Online money laundering
- Understanding the enemy
- Data collection challenges

For more information, please see http://www.usenix.org/events/leet11/cfp/.

IFIP-CIP 2011 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2011. [posted here 07/30/10]
The IFIP Working Group 11.10 on Critical Infrastructure Protection is an active international community of researchers, infrastructure operators and policy-makers dedicated to applying scientific principles, engineering techniques and public policy to address current and future problems in information infrastructure protection. Following the success of the first four conferences, the Fifth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection will again provide a forum for presenting original, unpublished research results and innovative ideas related to all aspects of critical infrastructure protection. Papers and panel proposals are solicited. Submissions will be refereed by members of Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.10. The conference will be limited to seventy participants to facilitate interactions among researchers and intense discussions of research and implementation issues. Papers are solicited in all areas of critical infrastructure protection. Areas of interest include, but are not limited to:
- Infrastructure vulnerabilities, threats and risks
- Security challenges, solutions and implementation issues
- Infrastructure sector interdependencies and security implications
- Risk analysis and risk assessment methodologies
- Modeling and simulation of critical infrastructures
- Legal, economic and policy issues related to critical infrastructure protection
- Secure information sharing
- Infrastructure protection case studies
- Distributed control systems/SCADA security
- Telecommunications network security

For more information, please see http://www.ifip1110.org.

SAC-TRECK 2011 26th ACM Symposium on Applied Computing, Track: Trust, Reputation, Evidence and other Collaboration Know-how (TRECK), TaiChung, Taiwan, March 21-25, 2011. [posted here 07/12/10]
The goal of the ACM SAC 2011 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications. The topics of interest include, but are not limited to:
- Trust management, reputation management and identity management
- Pervasive computational trust and use of context-awareness
- Mobile trust, context-aware trust
- Web 2.0 reputation and trust
- Trust-based collaborative applications
- Automated collaboration and trust negotiation
- Trade-off between privacy and trust
- Trust/risk-based security frameworks
- Combined computational trust and trusted computing
- Tangible guarantees given by formal models of trust and risk
- Trust metrics assessment and threat analysis
- Trust in peer-to-peer and open source systems
- Technical trust evaluation and certification
- Impacts of social networks on computational trust
- Evidence gathering and management
- Real-world applications, running prototypes and advanced simulations
- Applicability in large-scale, open and decentralised environments
- Legal and economic aspects related to the use of trust and reputation engines
- User-studies and user interfaces of computational trust and online reputation applications

For more information, please see http://www.trustcomp.org/treck/.

SESOC 2011 3rd International Workshop on Security and Social Networking, Held in conjunction with the PerCom 2011, Seattle, WA, USA, March 21, 2011. [posted here 07/26/10]
Future pervasive communication systems aim at supporting social and collaborative communications: the evolving topologies are expected to resemble the actual social networks of the communicating users and information on their characteristics can be a powerful aid for any network operation. New emerging technologies that use information on the social characteristics of their participants raise entirely new privacy concerns and require new reflections on security problems such as trust establishment, cooperation enforcement or key management. The aim of this workshop is to encompass research advances in all areas of security, trust and privacy in pervasive communication systems, integrating the social structure of the network as well. Topics of Interest include:
- all types of emerging privacy concerns
- new aspects of trust
- decentralized social networking services
- availability and resilience
- community based secure communication
- data confidentiality, data integrity
- anonymity, pseudonymity
- new key management approaches
- secure bootstrapping
- security issues in forwarding, routing
- security aspects regarding cooperation
- new approaches to reputation
- new attack paradigms
- social engineering, and phishing
- new requirements for software security
- malware

For more information, please see http://www.sesoc.org.

CSC 2011 Workshop on Cryptography and Security in Clouds, Zurich, Switzerland, March 15-16, 2011. [posted here 12/6/10]
The cloud computing model offers cheap access to a variety of standardized services, but comes with concerns about the correctness, privacy, and integrity of remote data and computations. Cryptographic mechanisms can reduce such trust by allowing the user to protect its data and computations, as well as to verify aspects of remote computation. The aim of this workshop is to bring together researchers and practitioners working in cryptography and security, from academia and industry, who are interested in the security of current and future cloud computing technology. The workshop considers the viewpoint of cloud-service providers as well as the concerns of cloud users. The goal is to create a dialogue about common goals and to discuss solutions for security problems in cloud computing, with emphasis on cryptographic methods. Topics of interest include:
- Data privacy and integrity
- Proofs of storage
- Remote attestation and verification
- Secure outsourcing of computation
- Verification of outsourced computation
- Storage integrity
- Private remote storage
- Obfuscation of programs and data
- Identity management in cloud computing
- Robust generation of cryptographic random bits
- Cryptosystems with conditional decryption (such as searchable encryption or functional encryption)
- Trusted computing
- Virtualization security

For more information, please see http://www.zurich.ibm.com/~cca/csc2011/.

LightSec 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, Istanbul, Turkey, March 14-15, 2011. [posted here 09/20/10]
The main goal of this workshop is to promote and initiate novel research on the security & privacy issues for applications that can be termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Topics of interest include, but are not limited to:
- Design, analysis and implementation of lightweight cryptographic protocols & applications
- Cryptographic hardware development for constrained domains
- Design, analysis and implementation of security & privacy solutions for wireless embedded systems
- Design, analysis and implementation of lightweight privacy-preserving protocols & systems
- Design and analysis of fast and compact cryptographic algorithms
- Wireless network security for low-resource devices
- Low-power crypto architectures
- Fast and compact biometric-based algorithms for authentication and identification
- Scalable protocols and architectures for security and privacy
- Formal methods for analysis of lightweight cryptographic protocols

For more information, please see http://www.light-sec.org.

WECSR 2011 2nd Workshop on Ethics in Computer Security Research, Bay Gardens Beach Resort, St. Lucia, March 4, 2011. [posted here 09/10/10]
Computer security often leads to discovering interesting new problems and challenges. The challenge still remains to follow a path acceptable for Institutional Review Boards at academic institutions, as well as compatible with ethical guidelines for professional societies or government institutions. However, no exact guidelines exist for computer security research yet. This workshop will bring together computer security researchers, practitioners, policy makers, and legal experts. This workshop solicits submissions describing or suggesting ethical and responsible conduct in computer security research. While we focus on setting standards and sharing prior experiences and experiments in computer security research, successful or not, we tap into research behavior in network security, computer security, applied cryptography, privacy, anonymity, and security economics. This workshop will favor discussions among participants, in order to shape the future of ethical standards in the field.

For more information, please see http://www.cs.stevens.edu/~spock/wecsr2011/.

FC 2011 15th International Conference on Financial Cryptography and Data Security, Bay Gardens Beach Resort, St. Lucia, February 28 - March 4, 2011. [posted here 07/19/10]
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and inter-disciplinary efforts are particularly encouraged.

For more information, please see http://ifca.ai/fc11/.

CODASPY 2011 1st ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, February 21-23, 2011. [posted here 05/10/10]
Data and the applications that manipulate data are the crucial assets in today's information age. With the increasing drive towards availability of data and services anytime anywhere, security and privacy risks have increased. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and/or the mobile devices they carry with them and computing new information of value to society and individuals. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the conference is to discuss novel exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts.

For more information, please see http://www.codaspy.org/.

CT-RSA 2011 RSA Conference, The Cryptographers' Track, San Francisco, CA, USA, February 14-18, 2011. [posted here 07/19/10]
The RSA Conference is the largest annual computer security event, with over 350 vendors, and thousands of attendees. The Cryptographers' Track (CT-RSA) is a research conference within the RSA Conference. CT- RSA has begun in 2002, and has become an established venue for presenting cryptographic research papers. Original research papers pertaining to all aspects of cryptography are solicited. Submissions may present applications, techniques, theory, and practical experience on topics including, but not limited to:
- public-key encryption
- symmetric-key encryption
- cryptanalysis
- digital signatures
- hash functions
- cryptographic protocols
- tamper-resistance
- fast implementations
- elliptic-curve cryptography
- lattice-based cryptography
- quantum cryptography
- formal security models
- network security
- hardware security
- e-commerce

For more information, please see http://ct-rsa2011.di.uoa.gr.

FSE 2011 18th International Workshop on Fast Software Encryption, Lyngby, Denmark, February 14-16, 2011. [posted here 09/20/10]
FSE 2011 is the 18th annual Fast Software Encryption workshop, for the tenth year sponsored by the International Association for Cryptologic Research (IACR). Original research papers on symmetric cryptology are invited for submission to FSE 2011. The workshop concentrates on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and message authentication codes (MACs).

For more information, please see http://fse2011.mat.dtu.dk/.

ESSoS 2011 International Symposium on Engineering Secure Software and Systems, Madrid, Spain, February 9-10, 2011. [posted here 03/29/10]
Trustworthy, secure software is a core ingredient of the modern world. Unfortunately, the Internet is too. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):
- scalable techniques for threat modeling and analysis of vulnerabilities
- specification and management of security requirements and policies
- security architecture and design for software and systems
- model checking for security
- specification formalisms for security artifacts
- verification techniques for security properties
- systematic support for security best practices
- security testing
- security assurance cases
- programming paradigms, models and DLS's for security
- program rewriting techniques
- processes for the development of secure software and systems
- security-oriented software reconfiguration and evolution
- security measurement
- automated development
- trade-off between security and other non-functional requirements
- support for assurance, certification and accreditation

For more information, please see http://distrinet.cs.kuleuven.be/events/essos2011/.

NDSS 2011 Network & Distributed System Security Symposium, San Diego, California, USA, February 6-9, 2011. [posted here 06/07/10]
The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technology. Special emphasis will be made to accept papers in the core theme of network and distributed systems security. Consequently, papers that cover networking protocols and distributed systems algorithms are especially invited to be submitted. Moreover, practical papers in these areas are also very welcome. Submissions are solicited in, but not limited to, the following areas:
- Integrating security in Internet protocols: routing, naming, network management
- High-availability wired and wireless networks
- Security for Cloud Computing
- Future Internet architecture and design
- Security of Web-based applications and services
- Anti-malware techniques: detection, analysis, and prevention
- Security for future home networks, Internet of Things, body-area networks
- Intrusion prevention, detection, and response
- Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
- Privacy and anonymity technologies
- Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
- Security for Vehicular Ad-hoc Networks (VANETs)
- Security for peer-to-peer and overlay network systems
- Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
- Implementation, deployment and management of network security policies
- Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
- Public key infrastructures, key management, certification, and revocation
- Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
- Security for collaborative applications: teleconferencing and video-conferencing
- Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
- Applying Trustworthy Computing mechanisms to secure network protocols and distributed systems

For more information, please see http://hotcrp.cylab.cmu.edu/ndss11/.

IFIP-DF 2011 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 30 – February 2, 2011. [posted here 05/10/10]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging field of digital forensics. The Seventh Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately sixty participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume – the seventh in the series entitled Research Advances in Digital Forensics (Springer) in the summer of 2011. Revised and/or extended versions of selected papers from the conference will be published in special issues of one or more international journals. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Network forensics
- Portable electronic device forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see http://www.ifip119.org.

CCNC-Secuity 2011 8th IEEE Consumer Communications and Networking Conference, Security and Content Protection Track, Las Vegas, NV, USA, January 8-11, 2011. [posted here 06/07/10]
The Security and Content Protection Track focuses on security and privacy issues in all areas of consumer communications and networking. The topics include, but are not limited to:
- Security for Home Networks, PANs & BANS
- Firewalls and Intrusion Detection
- Worm and Malware Defences
- Combating Phishing and Spam
- Secure Configuration
- Consumer-friendly Security Models & Tools
- Portable Devices Disinfection
- Control of Personal Data
- Reputation and Trust Mechanisms
- Authentication, Authority and Auditing for CE
- Copyright and Privacy Protection
- Digital Rights Management
- Streaming and Network Anonymity

For more information, please see http://icsd.i2r.a-star.edu.sg/staff/jianying/ccnc2011-scp.html.