|
|
Commentary and Opinion
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Calendar
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
WNGS 2009 4th International Workshop on Security, Korea University, Seoul, Korea, June 25-27, 2009. (Submissions due 16 January 2009)
The workshop will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of NGS. The workshop will publish high quality papers which are closely related to the various theories and practical applications in NGS. In addition, we expect that the workshop and its publications will be a trigger for further related research and technology improvements in this important subject. Topics (included, but are not limited to):
SADFE 2009 4th International Workshop on Systematic Approaches to Digital Forensic Engineering, Held in conjunction with the 2009 IEEE Symposium on Security and Privacy (SP 2009), Oakland, CA, USA, May 21, 2009. (Submissions due 17 January 2009)
The SADFE (Systematic Approaches to Digital Forensic Engineering) International
Workshop promotes systematic approaches to computer investigations, by
furthering the advancement of digital forensic engineering as a disciplined
practice. Most previous SADFE papers have emphasized cyber crime investigations,
and this is still a key focus of the meeting. However, we also welcome papers
on forensics that do not necessarily involve a crime: general attack analysis,
insider threat, insurance and compliance investigations, and similar forms of
retrospective analysis are all viable topics. Digital forensic engineering is
characterized by the application of scientific and mathematical principles to
the investigation and establishment of facts or evidence, either for use
within a court of law or to aid in understanding past events on a computer
system. Past speakers and attendees of SADFE have included computer scientists,
social scientists, forensic practitioners, law enforcement, lawyers, and judges.
The synthesis of hard technology and science with social science and practice
forms the foundation of this conference. To advance the state of the art,
SADFE-2009 solicits broad-based, innovative digital forensic engineering
technology, techno-legal and practice-related submissions in the following
four areas:
Digital Data and Evidence Management: advanced digital evidence discovery,
collection, and storage
ATC 2009 6th International Conference on Autonomic and Trusted Computing, Brisbane, Australia, July 7-10, 2009. (Submissions due 19 January 2009)
ATC-09 will offer a forum for researchers to exchange ideas and experiences in the most innovative research and development in these challenging areas and includes all technical aspects related to autonomic/organic computing (AC/OC) and trusted computing (TC). Topics include but are not limited to the following:
SECURWARE 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, Athens, Greece, June 14-19, 2009. (Submissions due 20 January 2009)
The SECURWARE 2009 is an event covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related to low enforcement, security data mining, malware models, etc. SECURWARE 2009 Special Areas (details in the CfP on site) are:
SACMAT 2009 14th ACM Symposium on Access Control Models and Technologies, Hotel La Palma, Stresa, Italy, June 3-5, 2009. (Submissions due 23 January 2009)
Papers offering novel research contributions in all aspects of access control are solicited for submission to the ACM Symposium on Access Control Models and Technologies (SACMAT). SACMAT 2009 is the fourteenth of a successful series of symposiums that continue the tradition, first established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The missions of the symposium are to share novel access control solutions that fulfill the needs of heterogeneous applications and environments and to identify new directions for future research and development. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control. Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings. Outstanding papers will be invited for possible publication in a prestigious journal in information assurance area. Topics of interest include but are not limited to:
IH 2009 11th Information Hiding Workshop, Darmstadt, Germany, June 7-10, 2009. (Submissions due 1 February 2009)
For many years, Information Hiding has captured the imagination of researchers: Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in Digital Rights Management schemes; steganalysis and digital forensics pose important challenges to investigators; and information hiding plays an important role in anonymous communication systems. These are but a small number of related topics and issues. Current research themes include:
MobiSec 2009 1st International Conference on Security and Privacy in Mobile Information and Communication Systems, Turin, Italy, June 3-5, 2009. (Submissions due 2 February 2009)
The convergence of information and communication technology is most palpable in the form of intelligent mobile devices, accompanied by the advent of converged, and next-generation, communication networks. As mobile communication and information processing becomes a commodity, economy and society require protection of this precious resource. MobiSec brings together leading-edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymakers. Topics of interest include, but are not limited to the following focus areas:
USENIX-SECURITY 2009 18th USENIX Security Symposium, Montreal, Canada, August 12-14, 2009. (Submissions due 4 February 2009)
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. Refereed paper submissions are solicited in all areas relating to systems and network security, including:
CSF 2009 22nd IEEE Computer Security Foundations Symposium, Port Jefferson, New York, USA, July 8-10, 2009. (Submissions due 6 February 2009)
The IEEE Computer Security Foundations (CSF) series brings together researchers in computer science to examine foundational issues in computer security. Over the past two decades, many seminal papers and techniques have been presented first at CSF. CiteSeer lists CSF as 38th out of more than 1200 computer science venues (top 3.11%) in impact based on citation frequency. CiteSeerX lists CSF 2007 as 7th out of 581 computer science venues (top 1.2%) in impact based on citation frequency. New theoretical results in computer security are welcome. Also welcome are more exploratory presentations, which may examine open questions and raise fundamental concerns about existing theories. Panel proposals are sought as well as papers. Possible topics include, but are not limited to:
DIMVA 2009 6th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Milan, Italy, June/July, 2009. (Submissions due 6 February 2009)
The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. DIMVA's scope includes, but is not restricted to the following areas:
ACSISP 2009 14th Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 1-3, 2009. (Submissions due 9 February 2009)
Original papers pertaining to all aspects of information security and privacy are solicited for submission to the 14th Australasian Conference on Information Security and Privacy (ACISP 2009). Papers may present theory, techniques, applications and practical experiences on a variety of topics including:
IEEE Transactions on Information Forensics and Security, Special Issue on Electronic Voting December 2009. (Submission Due 15 February 2009)
Guest editor: Ronald L. Rivest (MIT, USA, Lead Guest Editor),
David Chaum (Voting Systems Institute, USA), Bart Preneel (Katholieke Universiteit Leuven, Belgium),
Aviel D. Rubin (Johns Hopkins University, USA),
Donald G. Saari (University of California at Irvine, USA),
and Poorvi L. Vora (The George Washington University, USA)
Following the discovery of a wide variety of flaws in electronic voting technology
used in the US and other parts of the world, there has recently been a spurt of
research activity related to electronic voting. The activity has been broad,
ranging from the design of voting systems that specify what information is
collected from voters and how it is used to determine one or many winners,
through the development of cryptographic vote counting systems and the
experimental security analysis of deployed voting systems, the experimental
study of the usability of voting systems, to the development of methods for
identifying election fraud. Most of the work has of necessity been
interdisciplinary, involving contributions from experts in the areas of
cryptography, computer security, information theory, political science,
statistics, usability, game theory, mathematical modeling, etc. This special
issue aims to provide an overview of the research area of electronic voting,
with a focus on original results. The scope includes both remote and
polling-place voting, and the areas of interest include, but are not
limited to, the following:
CTC 2009 Cybercrime and Trustworthy Computing Workshop, Held in conjunction with the 6th International Conference on Autonomic and Trusted Computing (ATC 2009), Brisbane, Australia, July 7-10, 2009. (Submissions due 15 February 2009)
Cybercrime continues to be a growth industry, assisted by a combination of technical factors, such as insecure hardware and software platforms, and psychological factors, such as user error or naivety. The objective of this workshop is to bring together two distinct groups to encourage further collaboration - those who are working on researching cybercrime activity, such as phishing and malware, and those who are working on technical countermeasures. Example topic areas on the cybercrime theme might include:
SECRYPT 2009 International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009. (Submissions due 17 February 2009)
The purpose of SECRYPT 2009 is to bring together researchers, engineers
and practitioners interested on information systems and applications
in the context of wireless networks and mobile technologies.
Topics of interest include, but are not limited to, provided they fit
in one of the following main topic areas:
Area 1: Access Control and Intrusion Detection
DBSEC 2009 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal, Canada, July 12-15, 2009. (Submissions due 20 February 2009)
The 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security. Papers and panel proposals are also solicited. Papers may present theory, techniques, applications, or practical experience on topics of relevance to IFIP WG 11.3:
TrustBus 2009 6th International Conference on Trust, Privacy, and Security in Digital Business, Held in conjunction with the 20th International Conference on Database and Expert Systems Applications (DEXA 2009), Linz, Austria, August 31 - September 4, 2009. (Submissions due 20 February 2009)
TrustBus'09 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy, including, but not limited to:
POLICY 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, Imperial College London, UK, July 20-22, 2009. (Submissions due 2 March 2009)
The symposium brings together researchers and practitioners working on policy-based systems across a range of application areas including policy-based networking, privacy and security management, storage area networking, and enterprise systems. POLICY 2009 has grown out of a highly successful series of workshops and this is recognized by the elevation of the event to an IEEE symposium. This year, in addition to the latest research results from the communities working in any area of policy-based management and computing, we encourage contributions on policy-based techniques in support of privacy and security management, including the policy life-cycle, detection and resolution of inconsistency, refining policies from users' requirements, and usability issues. Topics of interest include, but are not limited to the following:
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Special Issue on Adaptive Security Systems 2010. (Submission Due 15 March 2009)
Guest editor: Yang Xiang (Central Queensland University, Australia)
and Wanlei Zhou (Deakin University, Australia)
This special issue on Adaptive Security Systems in ACM TAAS focuses on
autonomous and adaptive security system theories, technologies, and
reallife applications. Original papers are solicited for this special
issue. Suggested topics include, but are not limited to:
Adaptive Security System Theories
Elsevier Journal on Computer Networks, Special Issue on Performance Sensitive Security for Very Large Scale Collaboration December 2009. (Submission Due 18 March 2009)
Guest editor: Deborah A. Frincke (PNNL, University of Washington, USA),
Frank Siebenlist (Argonne National Laboratory, University of Chicago, USA),
and Mine Altunay (Fermi National Laboratory, USA)
It is anticipated that this trend towards very large-scale collaboration
will continue and that these virtual organizations will become increasingly
complex and diverse. Exascale computing is predicted by some to be a
necessity to support scientific as well as business activities by 2018.
It will be important for security solutions to scale equally well, so that
the collaboration is enriched by usable, management-friendly,
performance-sensitive security solutions, rather than hindered by them.
In this special issue, we emphasize research approaches that show promise
in providing performance sensitive security for very large scale collaboration.
Performance sensitivity here refers both to traditional computer performance
measures as well as the usability of the security solution being proposed -
collaboration should be supported, rather than hindered, by the security
solutions. Topics of interest include, but are not limited to:
SECURECOMM 2009 5th International ICST Conference on Security and Privacy for Communication Networks, Athens, Greece, September 14-18, 2009. (Submissions due 31 March 2009)
Securecomm seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. However, topics in other areas (e.g., formal methods, database security, secure software, foundations of cryptography) will be considered only if a clear connection to private or secure communications/networking is demonstrated. The aim of Securecomm is to bring together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers, in order to engage in a discussion about common goals and explore important research directions in the field. TOPICS of interest include, but are not limited to, the following:
IWSEC 2009 4th International Workshop on Security, Toyama, Japan, October 28-30, 2009. (Submissions due 3 April 2009)
The aim of IWSEC2009 is to contribute to research and development of various security topics: theory and applications of traditional and up-to-date security issues. Topics include but are not limited to:
SIN 2009 2nd ACM International Conference on Security of Information and Networks, Eastern Mediterranean University, Gazimagusa, TRNC, North Cyprus, October 6-10, 2009. (Submissions due 13 April 2009)
The 2nd International Conference on Security of Information and Networks (SIN 2009) provides an international forum for presentation of research and applications of security in information and networks. SIN 2009 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice. Its drive is to convene a high quality, well-attended, and up-to-date conference on scientific and technical issues of security in information, networks, and systems. The main theme of SIN 2009 is Intelligent Systems for Information Assurance, Security, and Public Policy in the Age of e-Euphoria.
LISA 2009 23rd USENIX Large Installation System Administration Conference, Baltimore, MD, USA, November 1-6, 2009. (Submissions due 30 April 2009)
Effective administration of a large site requires a good understanding of modern tools and techniques, together with their underlying principles but the human factors involved in managing and applying these technologies in a production environment are equally important. Bringing together theory and practice is an important goal of the LISA conference, and practicing system administrators as well as academic researchers all have valuable contributions to make. Topics of interest include, but are not limited to the following:
IEEE Transactions on Software Engineering (TSE), Special Issue on Exception Handling: From Requirements to Software Maintenance November 2009. (Submission Due 1 May 2009)
Guest editor: Alessandro Garcia (Lancaster University, UK),
Valerie Issarny (INRIA, France),
and Alexander Romanovsky (Newcastle University, UK)
With the complexity of contemporary software systems increasingly
growing, we still have much to learn on how software engineering
practice can contribute to improving specification, design, testing,
and evolution of exception handling. Our body of knowledge on effective
exception handling in software projects is still limited and fragmented.
It is not surprising that recent field studies have identified that
error handling design in industrial applications typically exhibits
poor quality independently of the underlying programming language
and application domain. A holistic application of software engineering
principles and techniques can certainly improve the treatment of
exception handling across the software lifecycle. In this context,
one of the underlying motivations of this special issue is to revisit
the research directions involving exception handling in software
engineering after one decade the first successful issue on this
topic has appeared in IEEE TSE. This special issue will serve as
a key reference for researchers, practitioners and educators to
understand the most recent innovations, trends, experiences and
concerns involving exception handling aspects in software engineering.
We invite submissions approaching exception handling on all areas
of software development and maintenance, such as model-driven development,
requirements engineering, refactoring, software evolution, reverse
engineering, contemporary modularity techniques (e.g., aspect-oriented
programming and feature-oriented programming), and formal methods.
The special issue is intended to cover a wide range of topics, from
theoretical foundations to empirical studies, with all of them presenting
innovative ideas on the interplay of exception handling and software
engineering. Topics of interest include (but are not limited to)
the following:
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |