|
|
Commentary and Opinion
Review of the 20th Annual Computer Security Applications Conference (Tucson, AZ, December 6-10, 2004) by Jeremy Epstein
Robert Bruen's review of The Digital Person Technology and Privacy in the Information Age by Daniel Solove
Ross Patel's review of Surviving Security by Amanda Andress and Mandy Andress
Robert Bruen's review of Privacy: What Developers and IT Professionals Should Know by J. C. Cannon
NewsBits: Announcements and correspondence from readers (please contribute!)
UK Infosec Initiative contributed by Ross Patel
PITAC Report Approved contributed by Gene Spafford
CERIAS Hosts Email Lists for Information Assurance and Security contributed by Gene Spafford
US Air Force Lab Chief Scientist contributed by Gene Spafford
Cipher
calls-for-papers
and
calendar
Calendar
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
IEEE Journal on Selected Areas in Communications, High-speed Network Security -- Architecture, Algorithms, and Implementation, 4th Quarter 2006. (Submission due 1 September 2005)
Guest editors: H. Jonathan Chao (Polytechnic University), Wing Cheong Lau (Qualcomm), Bin Liu (Tsinghua University), Peter Reiher (University of California at Los Angeles), and Rajesh Talpade (Telcordia Technologies)
While the recent proliferation of broadband wireline and wireless networking technologies have substantially increased the available network capacity and enabled a wide-range of feature-rich high-speed communication services, security remains a major concern. Large-scale, high-profile system exploits and network attacks have become common recurring events that increasingly threaten the proper functioning and continual success of the communication infrastructure and services. One key aspect of mitigating such increasing threats is to develop new security/defense architectures, systems, methodologies and algorithms which can scale together with the communications infrastructure in terms of operating speed, operational simplicity and manageability, etc. The aim of this issue is to bring together the work done by researchers and practitioners in understanding the theoretical, architectural, system, and implementation issues related to all aspects of security in high-speed networks. We seek original, previously unpublished and completed contributions not currently under review by another journal. Areas of interest include but are not limited to the following topics related to high-speed network security:
SDCS 2005 2nd International Workshop on Security in Distributed Computing Systems, Held in conjunction with the 25th International Conference on Distributed Computing Systems (ICDCS-2005), Columbus, OH, USA, June 6-9 , 2005. (Submissions due 10 January 2005) here 12/13/04]
In recent years, interest has increased in the field of security of distributed computing systems, since securing a large-scale networked system becomes a great challenge. These include the control mechanisms, mobile code security, denial-of-service attacks, trust management, modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis. We will focus our program on issues related to important properties of system security, such as measurability, sustainability, affordability, and usability in distributed computing systems. Topics of interest include, but are not limited to:
Original papers are solicited for submission to the refereed stream of AusCERT2005 - the AusCERT Asia Pacific Information Technology Security Conference. This stream will run within the regular conference program which is being organised by AusCERT. Full papers submitted to this stream will be refereed by members of the international program committee and published in the conference proceedings.
Topics of interest include, but are not limited to:
WOSIS, Third International Workshop on Security In Information Systems, held in conjunction with the 7th International Conference on Enterprise Information Systems (ICEIS 2005), Miami Beach, FL, USA, May 24-25, 2005. (Submissions due 25 January 2005)
Information Systems Security is one of the most pressing challenges facing all kind of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in keeping their information safe, in avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc. This workshop will serve as a forum to gather academics, researchers, practitioners and students in the field of security in information systems. The workshop will present new developments, lessons learned from real world cases, and would provide the exchange of ideas and discussion on specific areas. Topics of interest include, but are not limited to:
CCCT 2005, 3rd International Conference on Computing, Communications and Control Technologies (CCCT '05), Austin, TX, USA, July 24-27, 2005. (Submissions due 9 February 2005)
CCCT '05 is an International Conference that will bring together researchers, developers, practitioners, consultants and users of Computer, Communications and Control Technologies, with the aim to serve as a forum to present current and future work, solutions and problems in these fields, as well as in the relationships among them. Consequently, efforts will be done in order to promote and to foster the analogical thinking required by the Systems Approach for interdisciplinary cross-fertilization, "epistemic things" generation and "technical objects" production. Suggested topics in the area of Computing/Information Systems and Technologies include, but are not restricted to:
ACISP, 10th Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 4-6, 2005. (Submissions due 11 February 2005)
Original papers pertaining to all aspects of information security and privacy are solicited for submission to the 10th Australasian Conference on Information Security and Privacy (ACISP 2005). Papers may present theory, techniques, applications and practical experiences on a variety of topics including: Topics of interest include, but are not limited to:
ICALP 32nd International Colloquium on Automata, Languages and Programming, Lisboa, Portugal, July 11-15, 2005. (Submissions due 13 February 2005)
ICALP'05 innovates on the structure of its traditional scientific program with the inauguration of a new special Track (C). The aim of Track C is to allow a deeper coverage of a particular topic, to be specifically selected for each year's edition of ICALP on the basis of its timeliness and relevance for the theoretical computer science community. This year, Track C subject is Security and Cryptography Foundations.
Topics of interest for Track C include, but are not limited to:
IAW 2005 6th IEEE SMC Information Assurance Workshop, West Point, NY, USA, June 15-17, 2005 (Submissions due 6 March 2005)
The workshop is designed to provide a forum for Information Assurance researchers and practitioners to share their research and experiences. Attendees hail from industry, government, and academia. The focus of this workshop is on innovative, new technologies designed to address important Information Assurance issues.
Last year the IEEE IAW added a new track on Honeynet Technologies, sponsored by the Honeynet Project (www.honeynet.org). This will remain a specific focus of the IAW this year. New this year to the technical track are sessions on Security Data Visualization techniques and Biometrics. Other areas of particular interest at this workshop include, but are not limited to:
RAID 2005 Eighth International Symposium on Recent Advances in Intrusion Detection, Seattle, Washington, USA, September 7-9, 2005 (Submissions due 31 March 2005)
This symposium, the eighth in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss intrusion detection technologies and issues from the research and commercial perspectives. The RAID International Symposium series is intended to further advances in intrusion defense by promoting the exchange of ideas in a broad range of topics.
For RAID 2005 we are expanding our historical scope from a focus on intrusion detection to the broader field of intrusion defense. Of particular interest are intrusion tolerant systems and systems for which detection triggers an adaptive response. As in 2004, we welcome papers that address issues related to intrusion defense, including information gathering and monitoring, as a part of a larger, not necessarily purely technical, perspective. We also invite papers on the following topics, as they bear on intrusion detection and the general problem of information security:
ISC 2005 The 8th Information Security Conference, Singapore, 20-23 September 2005. (Submissions due 11 April 2005)
ISC'05 will be held in Singapore on 20-23 September, 2005. Original papers on all technical aspects of information security are solicited for submission to ISC'05. Topics of interest include, but are not limited to, the following:
FloCon 2005 Second Annual FloCon Workshop, New Orleans, Louisiana, USA, September 20-22, 2005. (Submissions due 15 April 2005)
FloCon is an open workshop that provides a forum for researchers, operational analysts, and other parties interested in the security analysis of large volumes of traffic to develop the next generation of flow-based analysis. Flow is an abstraction of network traffic in which packets are grouped together by common attributes over time. In security, flow has been used to survey and analyze large networks and long periods of time, but the field is still in its infancy.
FloCon 2005 will have an active workshop structure: our goal is to have presentations coupled with working breakout sessions on specific topics. Based on submissions and suggestions, we will develop a three-day track.
Appropriate topics include, but are not limited to, the following:
MADNES '05 Secure Mobile Ad-hoc Networks and Sensors workshop, Held in conjunction with the ISC '05 conference, September 20-22, 2005, Singapore. (Submissions due 2 May 2005)
The MADNES workshop. co-sponsored by the SAIT Laboratory and the U.S. Army Research Office will feature information about security in mobile and ad-hoc networks. Proceedings will be published as Springer-Verlag, LNCS. Topics of interest include:
IWAP 2005 The 4th International Workshop for Applied PKI, 21-23 September 2005, Singapore. (Submissions due 16 June 2005)
IWAP'05 will be held in Singapore on September 21-23, 2005. Original papers on all aspects of PKI are solicited for submission to IWAP'05. Topics of interest include, but are not limited to, the following:
Reader's guide to recent security and privacy literature
(last updated March 15, 2002)
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |