|
|
Listing of academic positions available by
Cynthia Irvine
Commentary and Opinion
Richard Austin's review of Virtual Honeypots: From Botnet Tracking to Intrusion Detection by Niels Provos and Thorsten Holz
NewsBits: Announcements and correspondence from readers (please contribute!)
NIST Announces Publication of AES Mode Galois Counter Mode (GCM)
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
new calls or announcements added since Cipher E81
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
Calendar of Events
UPSEC 2008 Workshop on Usability, Psychology, and Security, Co-located with the 5th USENIX Symposium on Networked Systems Design & Implementation (NSDI 2008), San Francisco, California, USA, April 14, 2008. (Submissions due 18 January 2008)
Information security involves both technology and people. To design and deploy secure systems, we require an understanding of how users of those systems perceive, understand, and act on security risks and threats. This one-day workshop will bring together an interdisciplinary group of researchers, systems designers, and developers to discuss how the fields of human computer interaction, applied psychology, and computer security can be brought together to inform innovations in secure systems design. We seek to deepen the conversation about usable security to go beyond the user interface, toward developing useful and usable systems of humans and technology. Topics include but are not limited to:
ATC 2008 5th International Conference on Autonomic and Trusted Computing, Oslo, Norway, June 23-25, 2008. (Submissions due 19 January 2008)
Computing systems including hardware, software, communication and networks are growing dramatically in both scale and heterogeneity, becoming overly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, Autonomic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-x operations to the maximum extent possible without human intervention or guidance. Organic Computing (OC) additionally emphasizes natural-analogue concepts like self-organization and controlled emergence. Trusted/Trustworthy Computing (TC) aims at making computing and communication systems as well as services available, predictable, traceable, controllable, assessable, sustainable, dependable, persist-able, security/privacy protect-able, etc. ATC-08 addresses the most innovative research and development in these challenging areas and includes all technical aspects related to autonomic/organic computing (AC/OC) and trusted computing (TC). Topics of interest include, but are not limited to:
WISTP 2008 Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation Networks, Sevilla, Spain, May 13-16, 2008. (Submissions due 20 January 2008)
With the rapid technological development of information technologies and with the
transition from the common to the next generation networks, computer systems and
especially embedded systems are becoming more mobile and ubiquitous, increasingly
interfacing with the physical world. Ensuring the security of these complex and yet,
resource constraint systems has emerged as one of the most pressing challenges.
Another important challenge is related to the convergence of these new technologies.
The aim of this second workshop is to bring together researchers and practitioners in
related areas and to encourage interchange and cooperation between the research
community and the industrial/consumer community. Topics of interest include,
but are not limited to:
Smart Devices
SSDU 2008 2nd International Symposium on Service, Security and its Data management technologies in Ubi-comp, Held in conjunction with the 3rd International Conference on Grid and Pervasive Computing (GPC 2008), Kunming, China, May 25-28, 2008. (Submissions due 24 January 2008)
Ubiquitous Computing (Ubi-comp) is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services at any time and anywhere. In order to realize their advantages, it requires integrating security, services and data management to be suitable for Ubi-com. However, there are still many problems and major challenges awaiting for us to solve such as the security risks in ubiquitous resource sharing, which could be occurred when data resources are connected and accessed by anyone in Ubi-com. Therefore, it will be needed to explore more secure and intelligent mechanism in Ubi-com. Topics include:
CSF 2008 21st IEEE Computer Security Foundations Symposium, Pittsburgh, PA, USA, June 23-25, 2008. (Submissions due 29 January 2008)
The IEEE Computer Security Foundations (CSF) series brings together researchers in computer science to examine foundational issues in computer security. Over the past two decades, many seminal papers and techniques have been presented first at CSF. The CiteSeer Impact page (http://citeseer.ist.psu.edu/impact.html ) lists CSF as 38th out of more than 1200 computer science venues, top 3.11% in impact based on citation frequency. New theoretical results in computer security are welcome. Also welcome are more exploratory presentations, which may examine open questions and raise fundamental concerns about existing theories. Panel proposals are sought as well as papers. Possible topics include, but are not limited to:
Elsevier Computer Standards and Interfaces, Special issue on Information and Communications Security, Privacy and Trust: Standards and Regulations, Summer 2008. (Submission Due 30 January 2008)
Guest editors: Bhavani Thuraisingham (University of Texas at Dallas, USA)
and Stefanos Gritzalis (niversity of the Aegean, Greece)
Most of the research and development work carried out by universities, research centers and
private companies today, is based, in some way or another, on international standards or
pre-standards that have been produced under the auspices of recognized standardization
bodies. On top of that, many market sectors have recognized standardization as a prerequisite
for the provision of high quality services and products, thus triggering a large number of
multi-sectoral voluntary standards. For many years the Security field was somehow isolated
in the Information and Communications Technology arena. Inevitably this isolation has been
inherited to the standards governing the security, privacy, and trust techniques and
mechanisms that are currently employed. It is therefore important to inform the scientific
community about these problems and facilitate better collaboration on the security,
privacy, and trust aspects of international standards and regulations.
We welcome the submission of papers that: provide information about activities and progress
of security, privacy, and trust standardization work; focus on critical comments on
standards and standardization activities; discuss actual projects results;
disseminate experiences and case studies in the application and exploitation of
established and emerging standards, methods and interfaces. The areas of interest
may include, but not limited, to:
USENIX-Security 2008 17th USENIX Security Symposium, San Jose, California, USA, July 28-August 1, 2008. (Submissions due 30 January 2008)
On behalf of the 17th USENIX Security Symposium (USENIX Security '08) program committee, we are inviting you to submit high-quality papers in all areas relating to systems and network security. Please note that the USENIX Security Symposium is primarily a systems security conference. Papers whose contributions are primarily new cryptographic algorithms or protocols, cryptanalysis, electronic commerce primitives, etc., may not be appropriate for this conference. Refereed paper submissions are solicited in all areas relating to systems and network security, including:
NYS-IA 2008 3rd Annual Symposium on Information Assurance, Albany, NY, USA, June 4-5, 2008. (Submissions due 31 January 2008)
Authors are invited to submit original and unpublished papers to the 3rd Annual Symposium on Information Assurance, which will be jointly held with the 11th Annual NYS Cyber Security Conference. This two day event attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. The conference program will be organized into topics not limited to:
SADFE 2008 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, Held in conjunction with the 2008 IEEE Symposium on Security and Privacy (SP 2008), The Claremont Resort, Oakland, CA, USA, May 22, 2008. (Submissions due 1 February 2008)
The SADFE (Systematic Approaches to Digital Forensic Engineering) International Workshop promotes systematic approaches to cyber crime investigation, by furthering the advancement of digital forensic engineering as a disciplined practice. Digital forensic engineering is characterized by the application of scientific and mathematical principles to the investigation and establishment of facts or evidence, either for use within a court of law or to aid understanding of cyber crimes or cyber-enabled crimes. To advance the state of the art, SADFE 2008 solicits broad-based, innovative digital forensic engineering technology, techno-legal and practice-related submissions in the following four areas:
DIMVA 2008 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Paris, France, July 10-11, 2008. (Submissions due 4 February 2008)
The annual DIMVA conference serves as a premier forum for advancing the state
of the art in intrusion detection, malware detection, and vulnerability assessment.
Each year DIMVA brings together international experts from academia, industry and
government to present and discuss novel research in these areas. DIMVA is organized
by the special interest group Security - Intrusion Detection and Response of
the German Informatics Society (GI). DIMVA's scope includes, but is not
restricted to the following areas:
Intrusion Detection
PODC 2008 27th Annual ACM SIGACT-SIGOPS Symposium on the Principles of Distributed Computing, Toronto, Canada, August 18-21, 2008. (Submissions due 4 February 2008)
PODC solicits papers on all areas of distributed systems. We encourage submissions dealing with any aspect of distributed computing from the theoretical or experimental viewpoints. The common goal is to improve understanding of principles underlying distributed computing. Topics of interest include the following subjects in distributed systems:
ICIMP 2008 3rd International Conference on Internet Monitoring and Protection, Bucharest, Romania, June 29 - July 5, 2008. (Submissions due 5 February 2008)
The International Conference on Internet Monitoring and Protection (ICIMP 2008) initiates a series of special events targeting security, performance, vulnerabilities in Internet, as well as disaster prevention and recovery. Dedicated events focus on measurement, monitoring and lessons learnt in protecting the user. ICIMP 2008 Tracks include:
Wiley InterScience Security and Communication Networks Journal, Special Issue on Clinical Information Systems (CIS) Security, July/August 2008. (Submission Due 10 February 2008)
Guest editors: Theodore Stergiou (KPMG Kyriacou Advisors AE, Greece),
Dimitrios Delivasilis (Incrypto Ltd., Greece),
Mark S Leeson (University of Warwick, UK),
and Ray Yueh-Min Huang (National Cheng-Kung University, Taiwan, R.O.C.)
Managing records of patient care has become an increasingly complex issue with
the widespread use of advanced technologies. The vast amount of information for every
routine care must be securely processed over different data bases. Clinical Information
Systems (CIS) address the need for a computerized approach in managing personal health
information. Hospitals and public or private health insurance organizations are
continuously upgrading their database and data management systems to more sophisticated
architectures. The possible support of the large patient archives and the flexibility of
a CIS in providing up-to-date patient information and worldwide doctors collaboration,
have leveraged the research on CIS both in academic and government domains.
At the same time, it has become apparent that patients require more control over their
clinical data, either being results of clinical examinations or medical history. Due to
the large amount of information that can be found on the Internet and the free access to
medical practitioners and hospitals worldwide, patients may choose to communicate their
information so as to obtain several expert opinions regarding their conditions. Given
the sensitive nature of the information stored and inevitably in transit, security has
become an issue of outmost necessity. Numerous EU and US research projects have been
launched to address security in CIS (e.g. EUROMED, ISHTAR, RESHEN), whereas regulatory
compliance to acts such as the HIPAA has become an obligation for centers moving to CIS.
This Special Issue will serve as a venue for both academia and industry individuals and
groups working in this fast-growing research area to share their experiences and
state-of-the-art work with the readers. The topics of interest in this Special Issue
include, but are not limited to:
ACISP 2008 13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, July 14-16, 2008. (Submissions due 11 February 2008)
ACISP 2008 is the main computer security and cryptography conference organized in Australia that provides an avenue for discussion and exchange of ideas for researchers from academia and industry. Original papers pertaining to all aspects of information security and privacy are solicited for submission to the ACISP 2008. Papers may present theory, techniques, applications and practical experiences on a variety of topics. Topics of interest include, but are not limited to:
CARDIS 2008 8th Smart Card Research and Advanced Application Conference, Royal Holloway, University of London, Egham, Surrey, UK, September 8-11, 2008. (Submissions due 15 February 2008)
Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Submissions across a broad range of smart card development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of smart card technology. As a response to the growing development of contactless applications and RFID systems, a special interest is also devoted to low cost cryptographic mechanisms and physical security of constrained devices. Topics of interest include, but are not limited to:
EUROSEC 2008 European Workshop on System Security, Held in conjunction with the Annual ACM SIGOPS EuroSys conference (EUROSYS 2008), Glasgow, Scotland, March 31, 2008. (Submissions due 15 February 2008)
The workshop aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The focus of the workshop is on novel, practical, systems-oriented work. EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to):
IFIP-DAS 2008 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008. (Submissions due 20 February 2008)
The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security. Papers and panel proposals are also solicited. Proceedings will be published by Springer as the next volume in the Research Advances in Database and Information Systems Security series. Papers may present theory, techniques, applications, or practical experience on topics of relevance to IFIP WG 11.3:
SHPCS 2008 Workshop on Security and High Performance Computing Systems, Held in conjunction with the 2008 International Conference on High Performance Computing & Simulation (HPCS 2008) and the 22nd European Conference on Modelling and Simulation (ECMS 2008), Nicosia, Cyprus, June 3-6, 2008. (Submissions due 21 February 2008)
This workshop addresses relationships between security and high performance systems in three directions. First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems. Second, it covers how to use high performance computing systems to solve security problems. Third, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In all these directions, various performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure. This workshop covers (but is not limited to) the following topics:
SOUPS 2008 Symposium On Usable Privacy and Security, Carnegie Mellon University, Pittsburgh, PA, USA, July 23-25, 2008. (Submissions due 29 February 2008)
The 2008 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, discussion sessions, and in-depth sessions (workshops and tutorials). We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. Topics include, but are not limited to:
W2SP 2008 2nd Workshop on Web 2.0 Security and Privacy, Held in conjunction with the 2008 IEEE Symposium on Security and Privacy (SP 2008), The Claremont Resort, Oakland, CA, USA, May 22, 2008. (Submissions due 1 March 2008)
The goal of this one day workshop is to bring together researchers and practitioners from academia and industry to focus on understanding Web 2.0 security and privacy issues, and establishing new collaborations in these areas. Web 2.0 is about connecting people and amplifying the power of working together. The mixing of technology and social interaction is occurring in the context of a wave of technologies supporting rapid development of these interpersonal and business interactions. Many of the new web technologies rely on the composition of content and services from multiple sources, resulting in complex technology compositions (mash-ups). The content composition trend is likely to continue. The lure of these technologies is the promise of simpler ways to compose software service and content, at lower cost. However, there are issues with respect to management of identities, reputation, privacy, anonymity, transient and long term relationships, and composition of function and content, both on the server side and at the client (web browser). While the security and privacy issues are not new, these issues are increasingly becoming acute as the technologies are adopted and adapted to appeal to wider audiences. Some of these technologies deliberately bypass existing security mechanisms. This workshop is intended to discuss the limitations of the current technologies and explore alternatives. The scope of W2SP 2008 includes, but is not limited to:
ISC 2008 Information Security Conference, Taipei, Taiwan, September 15-18, 2008. (Submissions due 1 March 2008)
ISC aims to attract high quality papers in all technical aspects of information security. The topics of interest of ISC include, but are not limited to, the following:
IWSSE 2008 2nd International Workshop on Security in Software Engineering, Held in conjunction with the IEEE COMPSAC 2008, Turku, July 28 August 1, 2008. (Submissions due 1 March 2008)
Secure software engineering has become an emerging interdisciplinary area across software engineering, programming languages, and security engineering. Secure software engineering focuses on developing secure software and understanding the security risks and managing these risks throughout the life-cycle of software. The purpose of the workshop is to bring together researchers and practitioners who work closely in this area to create a forum for reporting and discussing recent advances in improving security in software engineering and inspiring collaborations and innovations on new methods and techniques to advance software security in our practices. Researchers and practitioners worldwide are invited to present their research expertise and experience, and discuss the issues and challenges in security from software engineering perspective. Submissions of quality papers in the following non-exhaustive list of topics are invited:
Globecom-CCNS 2008 Computer and Communications Network Security Symposium, Held in conjunction with the IEEE Global Communications Conference (GLOBECOM 2008), New Orleans, LA, USA, November 30 - December 4, 2008. (Submissions due 15 March 2008)
The Computer and Communications Network Security Symposium will address all aspects of the modelling, design, implementation,deployment, and management of computer/network security algorithms, protocols,architectures, and systems. Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security mechanisms for current technologies as well as devising efficient security and privacy solutions for emerging technologies are solicited. Topics of interest include:
Pairing 2008 2nd International Conference on Pairing-based Cryptography, Egham, UK, September 1-3, 2008. (Submissions due 16 March 2008)
Pairing-based cryptography is an extremely active area of research which has
allowed elegant solutions to a number of long-standing open problems in
cryptography (such as efficient identity-based encryption). New developments
continue to be made at a rapid pace. The aim of "Pairing" conference is thus
to bring together leading researchers and practitioners from academia and industry,
all concerned with problems related to pairing-based cryptography. Authors are
invited to submit papers describing their original research on all aspects of
pairing-based cryptography, including, but not limited to the following topics:
Area I: Novel cryptographic protocols
DFRWS 2008 8th Annual Digital Forensic Research Workshop, Baltimore, MD, USA, August 11-13, 2008. (Submissions due 17 March 2008)
DFRWS brings together leading researchers, developers, practitioners, and educators interested in advancing the state of the art in digital forensics from around the world. As the most established venue in the field, DFRWS is the preferred place to present both cutting-edge research and perspectives on best practices for all aspects of digital forensics. As an independent organization, we promote open community discussions and disseminate the results of our work to the widest audience. We invite original contributions as research papers, panel proposals, Work-in-Progress talks, and demo proposals. All papers are evaluated through a double-blind peer-review process, and those accepted will be published in printed proceedings by Elsevier. Topics of Interest include:
ICITS 2008 International Conference on Information Theoretic Security, Calgary, Canada, August 10-13, 2008. (Submissions due 23 March 2008)
This is the second conference in a series of conferences that is aimed to bring together the leading researchers in the area of information and quantum theoretic security. This series of conferences is a successor to the 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005). The first ICITS conference was held in Madrid, after Eurocrypt 2007. Conference proceedings will be published by Springer Verlag in the Lecture Notes in Computer Science. The topics of interest are on work on any aspect of information theoretical security, this means security based on information theory. This includes, but is not limited to the following topics:
ESORICS 2008 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. (Submissions due 31 March 2008)
Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Thirteenth European Symposium on Research in Computer Security (ESORICS 2008). Organized in a series of European countries, ESORICS is confirmed as the European research event in computer security. The symposium started in 1990 and has been held on alternate years in different European countries and attracts an international audience from both the academic and industrial communities. From 2002 it has been held yearly. The Symposium has established itself as one of the premiere, international gatherings on Information Assurance. Papers may present theory, technique, applications, or practical experience on topics including:
RAID 2008 11th International Symposium on Recent Advances in Intrusion Detection, Cambridge, Massachusetts, USA, September 15-17, 2008. (Submissions due 4 April 2008)
This symposium, the 11th in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. The Recent Advances in Intrusion Detection (RAID) International Symposium series furthers advances in intrusion defense by promoting the exchange of ideas in a broad range of topics. As in previous years, all topics related to intrusion detection, prevention and defense systems and technologies are within scope, including but not limited to the following:
NSPW 2008 New Security Paradigm Workshop, Olympic Valley, CA, USA, September 22-25, 2008. (Submissions due 11 April 2008)
The computers of the world are under siege. Denial of service attacks plague commercial sites, large and small. Major companies are hacked for consumer credit card numbers. Phishing attacks for personal information are commonplace, and million-machine botnets are a reality. Our tools for combating these threats-cryptography, firewalls, access controls, vulnerability scanners, malware and intrusion detectors--are insufficient. We need radical new solutions, but most security researchers propose only incremental improvements. Since 1992, the New Security Paradigm Workshop (NSPW) has been a home for research that addresses the fundamental limitations of current work in information security. NSPW welcomes papers that present a significant shift in thinking about difficult security issues, build on such a recent shift, offer a contrarian view of accepted practice or policy, or address non-technological aspects of security. Our program committee particularly looks for new approaches to information security, early thinking on new topics, innovative solutions to long-time problems, and controversial issues which might not be accepted at other conferences but merit a hearing. We discourage papers that represent completed or established works, or offer incremental improvements to well-established models. NSPW expects a high level of scholarship from contributors, including awareness of prior work produced before the World Wide Web.
IWSEC 2008 3rd International Workshop on Security, Kagawa, Japan, November 25-27, 2008. (Submissions due 18 April 2008)
The aim of IWSEC2008 is to contribute to security research and development addressing the topics from traditional theory and tools on security to other up-to-date issues. Topics include but are not limited to:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |