Hilarie Orman, Editor | Robert Bruen, Book Review Editor |
Sven Dietrich, Associate Editor | Editor, Reader's Guide |
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
new calls or announcements added since Cipher E58
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
IEEE Internet Computing Special Homeland Security Issue
November/December 2004. (submissions due April 1, 2004) [posted 02/18/04]
Guest Editors
Michael Reiter - Carnegie Mellon University
Pankaj Rohatgi - IBM T.J. Watson Research Center
"Homeland security" is a major concern for governments worldwide, which must protect their populations and the critical infrastructures that support them, including power systems, communications, government and military functions, and food and water supplies. In this special issue, we seek contributions describing the role of Internet and information technologies in homeland security, both as an infrastructure to be protected and as a tool for enabling the defense of other critical infrastructures.
On one hand, information technology can be used for mitigating risk and enabling effective responses to disasters of natural or human origin. However, its suitability for this role is plagued by questions ranging from dependability concerns to the risks that some technologies -- surveillance, profiling, information aggregation, and so on -- pose to privacy and civil liberties.
On the other hand, information technology is itself an infrastructure to be protected. This includes not only the Internet infrastructure but also the complex systems that control critical infrastructure such as energy, transportation, and manufacturing. While control systems have traditionally been proprietary and closed, the trend toward the use of standard computer and networking technologies coupled with the use of more open networks for communication makes these systems increasingly vulnerable to catastrophic attacks and failures.
We invite researchers and information technologists to submit original articles on the use of Internet and information technologies for homeland security and on the protection of critical technology assets. Of particular interest are articles that describe technology within the context of an actual deployment or initiative in homeland security. Indeed, articles focusing on these larger initiatives or the policy debates surrounding them are also welcome, provided that they offer a strong technology component. Articles detailing technology without a compelling application to homeland security are discouraged. Commercial advertisements will be rejected.
Relevant topics include, but are not limited to:
For more information, please see http://www.computer.org/internet/call4ppr.htm
The aim of this workshop is to provide a forum for continued activity in this area, to bring computer security researchers in contact with the LICS'04 and ICALP'04 communities, and to give LICS and ICALP attendees an opportunity to talk to experts in computer security. We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories.
Topics include, but are not limited to:
Composition issues authentication Formal specification availability and denial of service Foundations of verification covert channels Information flow analysis cryptographic protocols Language-based security confidentiality Logic-based design for integrity and privacy Program transformation intrusion detection Security models malicious code Static analysis mobile code Statistical methods mutual distrust Trust management security policiesFor more details, see: http://www.cs.chalmers.se/~andrei/FCS04/.
The 2004 International Conference on Information and Communications Security will be the sixth event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas. Original papers are solicited for submission.
Areas of interest include but are not limited to:
The objective of this workshop is to bring together researchers from research communities in wireless networking, security, applied cryptography, and dependability; with the goal of fostering interaction. With the proliferation of wireless networks, issues related to secure and dependable operation of such networks are gaining importance. Topics of interest include, but are not limited to:
Commentary and Opinion
Robert Bruen's review of Security Warrior by Peikari, Cyrus and Anton Chuvakin
Robert Bruen's review of Hacking. The Art of Exploitation by Jon Erikson
Robert Bruen's review of Security Assessment Case Studies for Implementing the NSA IAM by Miles, Greg, Russ Rogers, Ed Fuller, Matthew Hoagberg and Ted Dykstra
NewsBits: Announcements and correspondence from readers (please contribute!)
"Networked computers reside at the heart of systems on which people now rely, both in critical national infrastructures and in their homes, cars, and offices. Today, many of these systems are far too vulnerable to cyber attacks that can inhibit their function, corrupt important data, or expose private information."
Reader's guide to recent security and privacy literature
(last updated March 15, 2002)
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
New address:
Charles N. Payne, Jr.
Member, Technical Staff
Adventium Labs
100 Mill Place
111 Third Avenue South
Minneapolis, MN 55401 USA
http://www.adventiumlabs.org
EMAIL: charles.payne@adventiumlabs.org
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |