Hilarie Orman, Editor | Robert Bruen, Book Review Editor |
Sven Dietrich, Associate Editor | Editor, Reader's Guide |
Jon Millen's
review of the 17th Computer Security Foundations Workshop
Robert Bruen's review
of Cracking Uncovered: Protection against Unsanctioned CD Copying by Kris Kaspersky
Robert Bruen's review
of The Tao of Network Security Monitoring. Beyond Intrusion Detection by
Richard Bejtlich
News Items:
Announcements and correspondence from readers (please contribute!)
Cipher
calls-for-papers
and
calendar
Suggested submission topics include:
Specific topics of interest include, but are not limited to:
Areas of interest include, but are not limited to:
DSN2005 The International Conference on Dependable Systems and Networks, Pacific Convention Center (Pacifico), Yokohama, Japan, June 28 - July 1,2005. (Submission due 19 November 2004) [posted here 9/11/04]
As in the previous three years the policy workshop will be co-located
with SACMAT 2005.
The SACMAT workshop will be co-located with POLICY 2005.
This 5th workshop addresses the design and realization of such privacy and anti-censorship services for the Internet and other communication
networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy
technologies, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business
that present their perspectives on technological issues.
Suggested topics include but are not restricted to:
Furthermore, special techniques may be needed to deal with some data mining applications, such as privacy-preserving mining of imbalanced
data, bioinformatics data, streaming data, etc. It would be valuable to both the privacy and security community and the data
mining community to examine the progress achieved in this area. Researchers with interest in the areas of privacy and
security as well as data mining and machine learning are strongly encouraged to attend the workshop.
Topics of Interest
The topics of interest include, but are not limited to:
new calls or announcements added since Cipher E61
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
(Submission due 30 September 2004)
WITS is the official workshop organised by the IFIP WG 1.7 on "Theoretical Foundations of Security Analysis and Design", established to
promote the investigation on the theoretical foundations of security, discovering and promoting new areas of application of theoretical
techniques in computer security and supporting the systematic use of formal techniques in the development of security related applications.
The members of WG hold their annual workshop as an open event to which all researchers working on the theory of computer security are invited.
This is the fourth workshop of the series. We are seeking sponsorship from ACM SIGPLAN, and plan to be organized in cooperation with GI working
group FoMSESS. Proceedings from of the workshop will be published in the ACM Digital Library. We are also planning a special issue of the Journal
of Computer Security on the workshop.
The 2005 USENIX Annual Technical Conference General Session Program Committee seeks original and innovative papers about modern computing systems, emphasizing implementations with measured results.
The FREENIX track also has a call on open source software. For more info, please see the USENIX page at: http://www.usenix.org/events/usenix05/cfp/freenix.html
This workshop considers the full range of public key technology used for security decisions and supporting functionalities, including authentication, authorization, identity (syndication, federation, and aggregation), and trust. This year, the workshop has a particular interest in how PKI and emerging trust mechanisms will interact with each other at technical, policy and user levels to support trust models that lack a central authority. This workshop has three goals:
ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. Authors are invited to submit full papers presenting new research results related to information security technologies and applications.
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Previously unpublished papers offering novel research contributions in any aspect of computer security or electronic privacy are solicited for submission to the 2005 symposium. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains. Topics of interest include, but are not limited to, the following:
The International Conference on Dependable Systems and Networks 2005(DSN-2005) announces its Call for Contributions for full papers, practical experience reports, workshop proposals, tutorials, student forum, and fast abstracts. Full papers are due November 19th, 2004. Please see www.dsn.org for submission information. Contributions are invited in, but are not limited to:
The policy workshop aims to bring together researchers and practitioners
working on policy-based systems across a wide range of application areas
including policy-based networking, security management, storage area
networking, and enterprise systems. Policy 2005 is the 6th in a series
of successful workshops which since 1999 have provided a forum for
discussion and collaboration between researchers, developers and users
of policy-based systems. This year, in addition to the latest research
results from the communities working in the areas mentioned above, we
encourage contributions on policy-based techniques in support of:
On-demand computing/Utility Computing, SLA/Contract based Management,
Virtualization and Policy-based collaboration.
Papers offering novel research contributions in any aspect of access control are solicited for submission to the Tenth ACM symposium on access
control models and technologies (SACMAT). SACMAT 2005 is the fifth of a successful series of symposiums that continue the tradition, first
established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports
on leading edge issues of access control, including models, systems, applications, and theory. The missions of the symposium are to share novel
access control solutions that fulfill the needs of heterogeneous applications and environments and to identify new directions for future
research and development. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in
the various aspects of access control.
Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and
exploiting their power to track users and their behavior, and restrict the ability to publish or retrieve documents. Approaches to
protecting individuals, groups, but also companies and governments from such profiling and censorship include decentralization,
encryption, distributed trust, and automated policy disclosure.
The cryptographic community is well served by a variety of efficient
and trusted block ciphers. Yet there remains only a limited selection
of trusted, non-proprietary, and royalty-free stream ciphers. SASC is
a special workshop that aims to provide a more complete understanding
of the current state of stream cipher design and analysis. Sponsored
by the ECRYPT Network of Excellence (http://www.ecrypt.eu.org) SASC
will consider the current state of stream cipher knowledge. In
particular it is hoped to expose new and existing stream cipher
proposals, cryptanalytic tools, and design criteria to the wider
attention of the cryptographic community.
The goal of this workshop is to discuss issues of privacy and security in data mining, synergize different views of techniques and policies, and
brainstorm future research directions. Although techniques, such as random perturbation, cryptographic-based methods, and database inference
control have been developed, many of the key problems still remain open in this area. Especially, new privacy and security issues have been
identified, and the scope of this problem has been expanded. In addition to these existing technologies, people attempt to explore new approaches
to tackle the problem.
The workshop seeks submissions from academia and industry presenting novel research on theoretical and practical aspects of DRM, as well as experimental
studie and fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on
technological issues. It is planned to publish accepted papers in the Conferences in Research and Practice in Information Technology series.
This symposium will foster information exchange among researchers and practioners of network and distributed system security services. The intended audience includes those who are interested in the practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than theory. A major goal of the symposium is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings of the symposium will be published by the Internet Society. The Program Committee invites both technical papers and panel proposals. Submissions are solicited for, but are not limited to, the following topics:
The goal of the SAC 2005 TRECK track is to explore the set of applications that either benefit from the use of early trust-based mechanisms or could be enhanced by the integration of an advanced trust engine.
Commentary and Opinion
Reader's guide to recent security and privacy literature
(last updated March 15, 2002)
Listing of academic positions available by
Cynthia Irvine
Research Associate of Computer Science
The Center for Information Systems Security Studies and Research
(CISR) at the Naval Postgraduate School is seeking talented computer
scientists and engineers interested in participating in a program of
research and education in computer and network security. Those with
experience in the following areas are needed: high assurance system
development, networking security, security architecture, software
engineering, distributed systems, and embedded systems.
Job Posted: 07/29/04
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |