![]() |
|
Commentary and Opinion
Richard Austin's review of Crimeware: Understanding New Attacks and Defenses by M. Jakobsson and Z. Ramzan
Review of the Computer Security Foundations Symposium (CMU, Pittsburgh, Pennsylvania, USA, June 23-25, 2008) by Kumar Avijit
NewsBits: Announcements and correspondence from readers (please contribute!)
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
IWDW 2008 7th International Workshop on Digital Watermarking, Busan, Korea, November 10-12, 2008. (Submissions due 15 July 2008)
IWDW 2008 is the seventh of a series of international work-shops focusing on digital watermarking and relevant techniques. It will provide an excellent opportunity for researchers and practitioners to present as well as to keep abreast with the latest developments in watermarking technologies. IWDW 2008 aims to provide a high quality forum for dissemination of research results. Areas of interest include, but are not limited to:
DSSC 2008 1st International Workshop on Dependable and Secure Services Computing, Held in conjunction with IEEE APSCC 2008, Yilan, Taiwan, December 9-12, 2008. (Submissions due 15 July 2008)
Service-Oriented Computing (SOC) is an emerging paradigm that puts Technology,
Business, and People altogether. Since SOC is reshaping the modern business model
and services industry, security and dependability are becoming crucial issues.
The prime goal of DSSC lies in associating Services Computing with higher
level of dependability and security. More specifically, we aim to provide
a platform for researchers in the dependability and security communities
to interact with researchers in the SOC community, so that efficacious
cross pollination of ideas could occur between these areas. We encourage
submissions from both industry and academia. The topics of interest of
ISC include, but are not limited to, the following:
System and Service Dependability
SKM 2008 Workshop on Secure Knowledge Management, Richardson, Texas, USA, November 3-4, 2008. (Submissions due 18 July 2008)
Knowledge management is the methodology for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively capture and share data as well as use the knowledge of individuals within an organization. Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important. Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications. The proposed workshop in Secure Knowledge Management will help in raising the awareness of academics and practitioners in this critical area of research and develop important questions that need to be tackled by the research community. Topics of interest include, and are not limited to:
ICISS 2008 4th International Conference on Information Systems Security, Hyderabad, India, December 16-20, 2008. (Submissions due 19 July 2008)
The ICISS 2008 encourages submissions from academia, industry and government addressing theoretical and practical problems in information and systems security and related areas. Topics of interest include but are not limited to:
NordSec 2008 13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark, October 9-10, 2008. (Submissions due 23 July 2008)
The NordSec workshops are focused on applied computer security and are intended to encourage interchange and cooperation between research and industry. NordSec 2008 is organized by the Technical University of Denmark. NordSec 2008 has a special focus on "Security for the Citizens"; papers and extended abstracts on this topic are especially welcome. Topics include, but are not limited to, the following areas of computer security:
IEEE Network Magazine, Special Issue on Recent Developments in Network Intrusion Detection, 1st quarter of 2009. (Submission Due 1 August 2008)
Guest editors: Thomas M. Chen (Swansea University, UK), Judy Fu (Motorola Labs, USA), Liwen He (BT Group, Chief Technology Office, UK), and Tim Strayer (BBN Technologies, USA)
Internet-connected computers are constantly exposed to a variety of possible attacks through exploits, social engineering, password cracking, and malicious software. Networks allow intruders to reach a large number of potential targets quickly and remotely with relatively low risk of traceability. Public attention on cyber attacks has grown with post-9/11 concerns over vulnerabilities of critical infrastructures and new regulations increasing accountability of organizations for loss of private data. Concerns have also been heightened by the prevalence of hidden spyware and bots among PC users.
Existing network-based intrusion detection methods depend on monitoring traffic and detecting evidence of attacks through known signatures or anomalous traffic behavior. However, intruders are continually changing their techniques to try new attack vectors and new ways to evade defenses. Network intrusion detection is challenged to adapt with new capabilities to recognize and respond to current attack methods.
The goal of this special issue of IEEE Network is to share new research developments in network intrusion detection. Papers should add to current understanding of new attack vectors, advances in packet collection and analysis, and state-of-the-art techniques for recognizing, tracing, and responding to attacks. Papers should contain substantial tutorial content and be understandable to a broad general audience, not only security experts. Topics of interest include:
MidSec 2008 1st International Workshop on Middleware Security, Held in conjunction with the 9th ACM International Middleware Conference (MIDDLEWARE 2008), Leuven, Belgium, December 2, 2008. (Submissions due 1 August 2008)
Modern applications are more and more predominantly built around distributed programming paradigms. Event-based systems, mobile agent frameworks, peer-to-peer networks, grid computing, and Web service applications are examples of architectures that are used by a large share of the present software base. These paradigms expose applications to new, ever-growing security threats. For this reason, middleware platforms have always been mindful about offering out-of-the-box security services like communication encryption, user authentication, and access control. Such features are now considered commodities in many middleware platforms, e.g., CORBA, Java EE, and .NET. However, focused research is still necessary to address advanced areas of security. Examples are identity management, privacy and anonymity, accountability, application protection, and so on. The goal of this workshop is to provide a venue for the security and the middleware communities to collaborate and create new momentum for the topic area. Original submissions are welcome from both academic and industry experts. The topics of interest include, but are not limited to:
SAC-TREK 2009 24th ACM Symposium on Applied Computing (SAC 2009), Trust, Reputation, Evidence and other Collaboration Know-how (TRECK) Track, Honolulu, Hawaii, USA, March 8-12, 2009. (Submissions due 16 August 2008)
The goal of the ACM SAC 2009 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications. The topics of interest include, but are not limited to:
SAC-SEC 2009 24th ACM Symposium on Applied Computing (SAC 2009), Computer Security Track, Honolulu, Hawaii, USA, March 8-12, 2009. (Submissions due 16 August 2008)
Security is nowadays mandatory. However, it remains a tricky process including a variety of properties. The eigth edition of the Security Track strengthens its aims at bringing together researchers in any applied issues of computer and information security. The list of issues is vast, ranging from protocols to work-flows. Topics of interest include but are not limited to:
Inscrypt 2008 4th International Conferences on Information Security and Cryptology, Beijing, China, December 14-17, 2008. (Submissions due 20 August 2008)
Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:
ICIT 2009 IEEE International Conference on Industrial Technology (ICIT 2009), Special Session on Wireless Bluetooth Technologies and Cyber Security, Churchill, Victoria, Australia, February 10-13, 2009. (Submissions due 25 August 2008)
Nowadays communication, entertainment, transportation, shopping and medicine have more and more relied on computers and the Internet. The widespread use of wireless computing, mobile devices and networks has raised security concerns. Cyber security aims at protection against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. We invite researchers, practitioners and others interested in wireless Bluetooth technologies and cyber security to submit original research paper or technical report to this Special Session on Wireless Bluetooth Technologies and Cyber Security conjunction with IEEE ICIT 2008. Topics are list as follows but are not limited to:
ICIW 2009 4th International Conference on Information Warfare and Security, Breakwater Lodge, Cape Town, South Africa, March 26-27, 2009. (Submissions due 4 September 2008)
Information warfare and security are at the forefront of modern defence strategies. Strong strands of research and interest are developing in the area, including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. The International Conference on Information Warfare and Security (ICIW) offers an opportunity for academics, practitioners and consultants from the US, North America and elsewhere who are involved in the study, management, development and implementation of systems and concepts related to information warfare or are interested in ways to improve information systems security, to come together and exchange ideas. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
ESSoS 2009 International Symposium on Engineering Secure Software and Systems, Leuven, Belgium, February 4-6, 2009. (Submissions due 8 September 2008)
The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The technical program includes an experience track for which the submission of highly informative case studies describing (un)successful secure software project experiences and lessons learned is explicitly encouraged. The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):
NDSS 2009 16th Annual Network and Distributed System Security Symposium, San Diego, California USA, February 8-11, 2009. (Submissions due 12 September 2008)
NDSS fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society. Submissions are solicited in, but not limited to, the following areas:
Wiley's Security and Communication Networks Journal, Special Issue on Security in Mobile Wireless Networks, 4th quarter of 2009. (Submission Due 30 September 2008)
Guest editors: Abderrahim Benslimane (University of Avignon, France), Chadi Assi (Concordia University, Montreal, Canada), Stamatios V. Kartalopoulos (University of Oklahoma, USA), and Fred Nen-Fu Huang (National Tsing Hua University, Taiwan)
Security has become a primary concern in order to provide protected communication in mobile networks. Unlike the wired networks, the unique characteristics of mobile networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology and absence of a trusted infrastructure. Ubiquitous roaming impacts on a radio access system by requiring that it supports handover between neighbouring cells and different networks. Also, mobile networks are more exposed to interferences than wired networks. There are several components that contribute to this: adjacent channels, co-channels, Doppler shifts, multipath, and fading. This SI aims to identify and explore the different issues and challenges related to security aspects in mobile networks. What are the impacts (benefits or inconvenience) of mobility on security? What are the appropriate mobility models to have a good level of security? Are Classical IDS approaches appropriate for mobile environments? How can be managed security when Mobility pattern and/or behaviour prediction? The complete security solution should span both layers, and encompass all three security components of prevention, detection, and reaction. Topics of interest include, but are not limited to, the following as they relate to mobile networks:
EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, April 1, 2009. (Submission Due 1 October 2008)
Guest editors: Mérouane Debbah (Supélec, France), Hesham El-Gamal (Ohio State University, USA), H. Vincent Poor (Princeton University, USA), and Shlomo Shamai (Technion, Israel)
Security is a critical issue in multiuser wireless networks in which secure transmissions are becoming increasingly difficult to obtain in highly mobile and distributed environments. In his seminal works of the late 1940s, Shannon formalized the concepts of capacity (as a transmission efficiency measure) and equivocation (as a measure of secrecy). Together with Wyner's fundamental formulation of the wiretap channel in the 1970s, this work laid the groundwork for the area of wireless physical area security. Interest in this area has exploded in recent years, motivated by the rise of wireless networking in general and by the increasing interest in large mobile networks with light infrastructure, which are extremely difficult to secure by traditional methods.
The objective of this special issue (whose preparation is carried out under the auspices of the EC Network of Excellence in Wireless Communications NEWCOM++) is to gather recent advances in the area of wireless physical layer security from the theoretical, such as the analysis of the secrecy capacity of various channel models, to more practical interests such as the development of codes and other communication schemes that can provide security in real networks. Suitable topics for this special issue dedicated to physical layer security include but are not limited to:
IFIP-DF 2009 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 25-28, 2009. (Submissions due 15 October 2008)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging field of digital forensics. The Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the fifth in the series entitled Research Advances in Digital Forensics (Springer) in the summer of 2009. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
FC 2009 13th International Conference on Financial Cryptography and Data Security, Accra Beach, Barbados, February 23-26, 2009. (Submissions due 17 October 2008)
At its 13th year edition, Financial Cryptography and Data Security (FC'09) is a well established and major international forum for research, advanced development, education, exploration, and debate regarding security in the context of finance and commerce. Original papers, surveys and presentations on all aspects of financial and commerce security are invited. Submissions must have a strong and visible bearing on financial and commerce security issues, but can be interdisciplinary in nature and need not be exclusively concerned with cryptography or security. Possible topics for submission to the various sessions include, but are not limited to:
Listing of academic positions available by
Cynthia Irvine
(Nothing new since May and Cipher E84)
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |