|
|
Commentary and Opinion
Comments on the 5-Minute Talks at the Security and Privacy Symposium 2007 (Oakland/Berkeley, California, May 20-23, 2007) by Tom Hinke
Richard Austin's review of Security Metrics: Replacing Fear, Uncertainty and Doubt by Andrew Jacquith
NewsBits: Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
Doctoral position in cryptography
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
Calendar entries
Calls for Papers, new since Cipher E78
NordSec 2007 12th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, October 11-12, 2007. (Submissions due 23 July 2007)
Since 1996, the NordSec workshops have brought together computer security researchers and practitioners from the Nordic countries, Northern Europe, and elsewhere. The workshop is focused on applied computer security and is intended to encourage interchange and cooperation between research and industry. Topics include, but are not limited to, the following areas of computer security:
ASIAN 2007 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security, Carnegie Mellon University, Doha, Qatar, December 9-11, 2007. (Submissions due 27 July 2007)
The ASIAN conference series provides a forum for researchers throughout Asia to present cutting-edge results
in yearly-themed areas of Computer Science, to discuss advances in these fields, and to interact with
researchers from other continents. The 2007 edition focuses on computer and network security.
New results in the fields of computer and network security are welcome. Also welcome are more
exploratory presentations, which may examine open questions and raise fundamental concerns
about existing theories and practices. Topics of interest include, but are not limited to:
TGC 2007 The Symposium on Trustworthy Global Computing, Sophia-Antipolis, France, November 5-6, 2007. (Submissions due 27 July 2007)
The Symposium on Trustworthy Global Computing is an international annual venue dedicated to safe and
reliable computation in global computers. It focuses on providing tools and frameworks for constructing
well-behaved applications and for reasoning about their behaviour and properties in models of computation
that incorporate code and data mobility over distributed networks with highly dynamic topologies and
heterogeneous devices. We solicit paper in all areas of global computing,
including (but not limited to):
ICICS 2007 9th International Conference on Information and Communications Security, Zhengzhou, Henan Province, China, December 12-15, 2007. (Submissions due 1 August 2007)
The 2007 International Conference on Information and Communications Security will be the 9th
event in the ICICS conference series, started in 1997, that brings together individuals involved
in multiple disciplines of Information and Communications Security in order to foster exchange of
ideas. Original papers on all aspects of information and communications security are solicited for
submission to ICICS 2007. Areas of interests include but not limited to:
EURASIP Journal on Advances in Signal Processing Special issue on Signal Processing Applications in Network Intrusion Detection Systems March 2008. (Submission Due 1 September 2007)
Guest editors: Chin-Tser Huang (University of South Carolina, USA), Rocky K. C. Chang (The Hong Kong Polytechnic University, Hong Kong),
and Polly Huang (National Taiwan University, Taiwan)
Signal processing techniques have found applications in NIDSs because of their ability to detect novel intrusions and attacks,
which cannot be achieved by signature-based NIDS. It has been shown that network traffic possesses the property of
self-similarity. Therefore, the objective of NIDS based on signal processing techniques is to profile the pattern
of normal network traffic or application-level behavior and model intrusions or unwanted traffic as anomalies.
Wavelets, entropy analysis, and data mining techniques are examples in this regard. However, the major challenges
of the signal processing-based approaches lie in the adaptive modeling of normal network traffic and the high
false alarm rate due to the inaccuracy of the modeled normal traffic pattern. The emergence of a variety of
wireless networks and the mobility of nodes in such networks only add to the complexity of the problems.
The goal of this special issue is to introduce state-of-the-art techniques and encourage research regarding
various aspects in the application of signal processing techniques to network intrusion detection systems.
In particular, the special issue encourages novel solutions that improve the accuracy and adaptivity of
intrusion detection and addresses the automation of intrusion classification and correlation.
Topics of interest include (but are not limited to):
SAC-TRECK 2008 23rd ACM Symposium on Applied Computing, Track: Trust, Recommendations, Evidence and other Collaboration Know-how, Fortaleza, Ceará, Brazil, March 16-20, 2008. (Submissions due 8 September 2007)
Computational models of trust and online reputation mechanisms have been gaining momentum. The goal of the
ACM SAC 2008 TRECK track remains to review the set of applications that benefit from the use of
computational trust and online reputation. Computational trust has been used in reputation systems,
risk management, collaborative filtering, social/business networking services, dynamic coalitions,
virtual organisations and even combined with trusted computing hardware modules. The TRECK track
covers all computational trust applications, especially those used in real-world applications.
The topics of interest include, but are not limited to:
WiSec 2008 1st ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, March 31 - April 2, 2008. (Submissions due 15 September 2007)
As wireless communications are becoming ubiquitous, their security is gaining in importance.
The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless
networks as well as techniques to thwart them. Topics of interest include,
but are not limited to:
IFIP-DF 2008 4th Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan, January 27-30, 2008. (Submissions due 15 September 2007)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international
community of scientists, engineers and practitioners dedicated to advancing the state of the
art of research and practice in the emerging field of digital forensics. The Fourth Annual
IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting
original, unpublished research results and innovative ideas related to the extraction, analysis
and preservation of all forms of electronic evidence. Technical papers are solicited in all
areas related to the theory and practice of digital forensics. Areas of special interest
include, but are not limited to:
FC 2008 12th International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, January 28-31, 2008. (Submissions due 25 September 2007)
Financial Cryptography and Data Security is a major international forum for research,
advanced development, education, exploration, and debate regarding information assurance
in the context of finance and commerce. The conference covers all aspects of securing
transactions and systems. Submissions focusing on both theoretical (fundamental) and
applied real-world deployments are solicited. The goal of the conference is to bring
security/cryptography researchers and practitioners together with economists, bankers,
implementers, and policy-makers. Topics include (but are not limited to):
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |