|
|
Commentary, Opinion, News
Richard Austin's review of Fuzzing for Security Testing and Quality Assurance by Ari Takanen, Jared D. Demott and Charles Miller
NewsBits: Announcements and correspondence from readers (please contribute!)
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
IDtrust 2009 8th Symposium on Identity and Trust on the Internet, Gaithersburg, Maryalnd, USA, April 14-16, 2009. (Submissions due 17 November 2008)
IDtrust is devoted to research and deployment experience related to making good security decisions based on identity information, especially when public key cryptography is used and the human elements of usability are considered. The success of any business strategy depends on having the right people gain access to the right information at the right time. This implies that an IT infrastructure has - among other things - an authorization framework in place that can respond to dynamic security conditions and regulatory requirements quickly, flexibly and securely. What are the authorization strategies that will succeed in the next decade? What technologies exist to address complex requirements today? What research is academia and industry pursuing to solve the problems likely to show up in the next few years? We solicit technical papers and panel proposals from researchers, systems architects, vendor engineers, and users. Suggested topics include but are not limited to:
ISPEC 2009 5th Information Security Practice and Experience Conference, Xi'an, China, April 13-15, 2009. (Submissions due 20 November 2008)
As applications of information security technologies become pervasive, issues pertaining to their deployment and operation are becoming increasingly important. ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. Topics of interest include, but are not limited to:
SSN 2009 5th International Workshop on Security in Systems and Networks, Held in conjunction with the International Parallel and Distributed Processing Symposium (IPDPS 2009), Rome, Italy, May 29, 2009. (Submissions due 28 November 2008)
This workshop aims to bring together the technologies and researchers who share interest in the area of network and distributed system security. The main purpose is to promote discussions of research and relevant activities in security-related subjects. It also aims at increasing the synergy between academic and industry professionals working in this area. The workshop seeks papers that address theoretical, experimental, and work in-progress in the area of cybersecurity at the system and network levels. Topics covered by the workshop will include, but are not limited to, the following:
SSDU 2009 3rd International Symposium on Service, Security and its Data management technologies in Ubi-comp, Geneva, Switzerland, May 4-8, 2009. (Submissions due 30 November 2008)
Ubiquitous Computing (Ubi-comp) is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services at any time and anywhere. In order to realize their advantages, it requires integrating security, services and data management to be suitable for Ubi-com. However, there are still many problems and major challenges awaiting for us to solve such as the security risks in ubiquitous resource sharing, which could be occurred when data resources are connected and accessed by anyone in Ubi-com. Therefore, it will be needed to explore more secure and intelligent mechanism in Ubi-com. SSDU-09 is intended to foster the dissemination of state-of-the-art research in the area of security and intelligence integrating into Ubi-com and data management technology. The main topics include but will not be limited to:
Security and Communication Networks Journal, Special Issue on Security and Trust Management for Dynamic Coalitions Submission Due 30 November 2008)
Guest editor: Theo Dimitrakos (British Telecommunications plc, UK),
Fabio Martinelli (Institute of Informatics and Telematics, National
Research Council, Italy), and Bruce Schneier (British Telecommunications plc, USA)
There is an increasing interest and deployment of technologies that allow cooperation
among entities that may act collectively. These entities may form dynamic coalitions
where entities may leave and join, may show mobility aspects (either logical or physical),
and may act in a collective manner. Examples of these coalitions can be found in
the digital world, including: a) Crowds of users walking on the streets with
advanced context aware converged telecommunication devices; b) A group of
robots, manned and unmanned vehicles equipped with processors, sensors,
smartphones, etc. interacting with each other, with their environment, and
with a command or a control node, such as the command and control site of
a defence coalition or a civil traffic control; c) A set of organizations
(possibly virtual) sharing some resource for service provisions, or so called
Virtual Organisations; d) Collaborative processes that use resources and
services offered by partners in a Virtual Organisation; and e) Web 2.0
mash-ups and composite Web Services that are composed of services and
applications offered by different service providers over a public network.
These dynamic coalitions involve several technologies as peer to peer systems (P2P),
mobile ad hoc networks (MANETs), and service oriented architectures such as
those realised in GRID computing and Web Services Frameworks. There are several
research areas identified as follows: a) Security in dynamic coalitions;
b) trust in dynamic coalitions; c) security and trust interplay; and
d) secure processes and service composition. This special issue is proposed
to cover research results and innovation case studies on security and
trust management on dynamic coalitions. Topics of interest include but
are not limited to:
IFIP-CIP 2009 Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 22-25, 2009. (Submissions due 31 December 2008)
The IFIP Working Group 11.10 on Critical Infrastructure Protection is an active international community of researchers, infrastructure operators and policy-makers dedicated to applying scientific principles, engineering techniques and public policy to address current and future problems in information infrastructure protection. Papers are solicited in all areas of critical infrastructure protection. Areas of interest include, but are not limited to:
ACNS 2009 7th International Conference on Applied Cryptography and Network Security, Paris, France, June 2-5, 2009. (Submissions due 12 January 2009)
ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers. Original research papers pertaining to all aspects of cryptography and network security are solicited for submission to ACNS'09. Relevant topics include but are not limited to:
SECURWARE 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, Athens, Greece, June 14-19, 2009. (Submissions due 20 January 2009)
The SECURWARE 2009 is an event covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related to low enforcement, security data mining, malware models, etc. SECURWARE 2009 Special Areas (details in the CfP on site) are:
IH 2009 11th Information Hiding Workshop, Darmstadt, Germany, June 7-10, 2009. (Submissions due 1 February 2009)
For many years, Information Hiding has captured the imagination of researchers: Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in Digital Rights Management schemes; steganalysis and digital forensics pose important challenges to investigators; and information hiding plays an important role in anonymous communication systems. These are but a small number of related topics and issues. Current research themes include:
MobiSec 2009 1st International Conference on Security and Privacy in Mobile Information and Communication Systems, Turin, Italy, June 3-5, 2009. (Submissions due 2 February 2009)
The convergence of information and communication technology is most palpable in the form of intelligent mobile devices, accompanied by the advent of converged, and next-generation, communication networks. As mobile communication and information processing becomes a commodity, economy and society require protection of this precious resource. MobiSec brings together leading-edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymakers. Topics of interest include, but are not limited to the following focus areas:
USENIX-SECURITY 2009 18th USENIX Security Symposium, Montreal, Canada, August 1214, 2009. (Submissions due 4 February 2009)
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. Refereed paper submissions are solicited in all areas relating to systems and network security, including:
ACSISP 2009 14th Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 1-3, 2009. (Submissions due 9 February 2009)
Original papers pertaining to all aspects of information security and privacy are solicited for submission to the 14th Australasian Conference on Information Security and Privacy (ACISP 2009). Papers may present theory, techniques, applications and practical experiences on a variety of topics including:
IEEE Transactions on Information Forensics and Security, Special Issue on Electronic Voting December 2009. (Submission Due 15 February 2009)
Guest editor: Ronald L. Rivest (MIT, USA, Lead Guest Editor),
David Chaum (Voting Systems Institute, USA), Bart Preneel (Katholieke Universiteit Leuven, Belgium),
Aviel D. Rubin (Johns Hopkins University, USA),
Donald G. Saari (University of California at Irvine, USA),
and Poorvi L. Vora (The George Washington University, USA)
Following the discovery of a wide variety of flaws in electronic voting technology
used in the US and other parts of the world, there has recently been a spurt of
research activity related to electronic voting. The activity has been broad,
ranging from the design of voting systems that specify what information is
collected from voters and how it is used to determine one or many winners,
through the development of cryptographic vote counting systems and the
experimental security analysis of deployed voting systems, the experimental
study of the usability of voting systems, to the development of methods for
identifying election fraud. Most of the work has of necessity been
interdisciplinary, involving contributions from experts in the areas of
cryptography, computer security, information theory, political science,
statistics, usability, game theory, mathematical modeling, etc. This special
issue aims to provide an overview of the research area of electronic voting,
with a focus on original results. The scope includes both remote and
polling-place voting, and the areas of interest include, but are not
limited to, the following:
SECRYPT 2009 International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009. (Submissions due 17 February 2009)
The purpose of SECRYPT 2009 is to bring together researchers, engineers
and practitioners interested on information systems and applications
in the context of wireless networks and mobile technologies.
Topics of interest include, but are not limited to, provided they fit
in one of the following main topic areas:
Area 1: Access Control and Intrusion Detection
DBSEC 2009 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal, Canada, July 12-15, 2009. (Submissions due 20 February 2009)
The 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security. Papers and panel proposals are also solicited. Papers may present theory, techniques, applications, or practical experience on topics of relevance to IFIP WG 11.3:
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Special Issue on Adaptive Security Systems 2010. (Submission Due 15 March 2009)
Guest editor: Yang Xiang (Central Queensland University, Australia)
and Wanlei Zhou (Deakin University, Australia)
This special issue on Adaptive Security Systems in ACM TAAS focuses on
autonomous and adaptive security system theories, technologies, and
reallife applications. Original papers are solicited for this special
issue. Suggested topics include, but are not limited to:
Adaptive Security System Theories
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |