|
|
Commentary and Opinion
Conference and Workshop Announcements
Cipher
calls-for-papers
new calls or announcements added since Cipher E88
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Special Issue on Adaptive Security Systems 2010. (Submission Due 15 March 2009)
Guest editor: Yang Xiang (Central Queensland University, Australia)
and Wanlei Zhou (Deakin University, Australia)
This special issue on Adaptive Security Systems in ACM TAAS focuses on
autonomous and adaptive security system theories, technologies, and
reallife applications. Original papers are solicited for this special
issue. Suggested topics include, but are not limited to:
Adaptive Security System Theories
DFRWS 2009 9th Digital Forensics Research Workshop, Montreal, Canada, August 17-19, 2009. (Submissions due 16 March 2009)
DFRWS brings together leading researchers, developers, practitioners, and educators interested in advancing the state of the art in digital forensics from around the world. As the most established venue in the field, DFRWS is the preferred place to present both cutting-edge research and perspectives on best practices for all aspects of digital forensics. As an independent organization, we promote open community discussions and disseminate the results of our work to the widest audience. Topics of interest include, but are not limited to the following:
Elsevier Journal on Computer Networks, Special Issue on Performance Sensitive Security for Very Large Scale Collaboration December 2009. (Submission Due 18 March 2009)
Guest editor: Deborah A. Frincke (PNNL, University of Washington, USA),
Frank Siebenlist (Argonne National Laboratory, University of Chicago, USA),
and Mine Altunay (Fermi National Laboratory, USA)
It is anticipated that this trend towards very large-scale collaboration
will continue and that these virtual organizations will become increasingly
complex and diverse. Exascale computing is predicted by some to be a
necessity to support scientific as well as business activities by 2018.
It will be important for security solutions to scale equally well, so that
the collaboration is enriched by usable, management-friendly,
performance-sensitive security solutions, rather than hindered by them.
In this special issue, we emphasize research approaches that show promise
in providing performance sensitive security for very large scale collaboration.
Performance sensitivity here refers both to traditional computer performance
measures as well as the usability of the security solution being proposed -
collaboration should be supported, rather than hindered, by the security
solutions. Topics of interest include, but are not limited to:
MIST 2009 International Workshop on Managing Insider Security Threats, Held in conjunction with the 3rd IFIP International Conference on Trust Management (IFIPTM 2009), West Lafayette, IN, USA, June 15-19, 2009. (Submissions due 22 March 2009)
The objective of this workshop is to showcase the most recent challenges and advances in security technologies and management systems to address insider security threats. It may also include state-of-the-art surveys and case analyses of practical significance. Topics of interest include, but are not limited to the following:
SADFE 2009 4th International Workshop on Systematic Approaches to Digital Forensic Engineering, Held in conjunction with the 2009 IEEE Symposium on Security and Privacy (SP 2009), Oakland, CA, USA, May 21, 2009. (Submissions due 25 March 2009)
The SADFE (Systematic Approaches to Digital Forensic Engineering) International
Workshop promotes systematic approaches to computer investigations, by furthering
the advancement of digital forensic engineering as a disciplined practice.
Most previous SADFE papers have emphasized cyber crime investigations, and this
is still a key focus of the meeting. However, we also welcome papers on
forensics that do not necessarily involve a crime: general attack analysis,
insider threat, insurance and compliance investigations, and similar forms of
retrospective analysis are all viable topics. Digital forensic engineering
is characterized by the application of scientific and mathematical
principles to the investigation and establishment of facts or evidence,
either for use within a court of law or to aid in understanding past
events on a computer system. Past speakers and attendees of SADFE
have included computer scientists, social scientists, forensic
practitioners, law enforcement, lawyers, and judges. The synthesis
of hard technology and science with social science and practice
forms the foundation of this conference. To advance the state of
the art, SADFE-2009 solicits broad-based, innovative digital
forensic engineering technology, techno-legal and practice-related
submissions in the following four areas:
Digital Data and Evidence Management: advanced digital
evidence discovery, collection, and storage
DaSECo 2009 1st International Workshop on Defence against Spam in Electronic Communication, Held in conjunction with the 20th International Conference on Database and Expert Systems Applications (DEXA 2009), Linz, Austria, August 31 - September 4, 2009. (Submissions due 30 March 2009)
The workshop on Defence against Spam in Electronic Communication invites the submission of papers. Researchers and practitioners are encouraged to submit papers on all aspects of misuse and protection concerning electronic communication including email, instant messaging, text messaging, and voice over internet protocol. Topics of interest include novel applications of electronic messaging, abatement of abuses of electronic messaging, spam, spit (spam over internet telephony), spim (spam over instant messenger), spom (spam over mobile phone), phishing, identify theft via messaging, viruses, and spyware.
SECURECOMM 2009 5th International ICST Conference on Security and Privacy for Communication Networks, Athens, Greece, September 14-18, 2009. (Submissions due 31 March 2009)
Securecomm seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. However, topics in other areas (e.g., formal methods, database security, secure software, foundations of cryptography) will be considered only if a clear connection to private or secure communications/networking is demonstrated. The aim of Securecomm is to bring together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers, in order to engage in a discussion about common goals and explore important research directions in the field. TOPICS of interest include, but are not limited to, the following:
ISC 2009 12th Information Security Conference, Pisa, Italy, September 7-9, 2009. (Submissions due 31 March 2009)
ISC is an annual international conference covering research in and applications of information security. The twelfth Information Security Conference (ISC 2009) will be held in Pisa, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of information security. Topics of interest include, but are not limited to:
IWSEC 2009 4th International Workshop on Security, Toyama, Japan, October 28-30, 2009. (Submissions due 3 April 2009)
The aim of IWSEC2009 is to contribute to research and development of various security topics: theory and applications of traditional and up-to-date security issues. Topics include but are not limited to:
SRDS 2009 28th International Symposium on Reliable Distributed Systems, Niagara Falls, New York, USA, September 27-30, 2009. (Submissions due 3 April 2009)
For 28 years, the Symposium on Reliable Distributed Systems has been a traditional forum for researchers and practitioners who are interested in distributed systems design and development, particularly with properties such as reliability, availability, safety, security, and real time. We welcome original research papers as well as papers that deal with design, development and experimental results of operational systems. We are also soliciting papers for an experience track that presents on-going industrial projects, prototype systems and exploratory or emerging applications. The major areas of interest include, but are not limited to, dependability, security and/or real-time aspects within the following topics:
SIN 2009 2nd ACM International Conference on Security of Information and Networks, Eastern Mediterranean University, Gazimagusa, TRNC, North Cyprus, October 6-10, 2009. (Submissions due 13 April 2009)
The 2nd International Conference on Security of Information and Networks (SIN 2009) provides an international forum for presentation of research and applications of security in information and networks. SIN 2009 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice. Its drive is to convene a high quality, well-attended, and up-to-date conference on scientific and technical issues of security in information, networks, and systems. The main theme of SIN 2009 is Intelligent Systems for Information Assurance, Security, and Public Policy in the Age of e-Euphoria.
NSS 2009 3rd International Conference on Network & System Security, Gold Coast, Australia, October 19-21, 2009. (Submissions due 15 April 2009)
While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. We will focus our program on issues related to Network and System Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of this conference is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry and governments. Topics of interest include, but not limited to:
ESORICS 2009 14th European Symposium on Research in Computer Security, Saint Malo, France, September 21-25, 2009. (Submissions due 17 April 2009)
Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Fourteenth European Symposium on Research in Computer Security (ESORICS 2009). The Symposium has established itself as one of the premiere, international gatherings on Information Assurance. Papers may present theory, technique, applications, or practical experience on topics including, but not limited to:
NSPW 2009 New Security Paradigms Workshop, The Queen's College, University of Oxford, UK, September 8-11, 2009. (Submissions due 17 April 2009)
The New Security Paradigms Workshop (NSPW) is seeking papers that address the current limitations of information security. Today's security risks are diverse and plentiful--botnets, database breaches, phishing attacks, distributed denial-of-service attacks--and yet present tools for combatting them are insufficient. To address these limitations, NSPW welcomes unconventional, promising approaches to important security problems and innovative critiques of current security practice. We are particularly interested in perspectives from outside computer security, both from other areas of computer science (such as operating systems, human-computer interaction, databases, programming languages, algorithms) and other sciences that study adversarial relationships such as biology and economics. We discourage papers that offer incremental improvements to security and mature work that is appropriate for standard information security venues. By encouraging researchers to think ``outside the box'' and giving them an opportunity to communicate with open-minded peers, NSPW seeks to foster paradigm shifts in the field of information security.
HOST 2009 2nd IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, July 27, 2009. (Submissions due 17 April 2009)
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust (HOST) issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g., to act as a `kill switch' to disable a chip, to integrated circuit (IC) piracy, to attacks designed to extract encryption keys and IP from a chip, and to malicious system disruption and diversion. HOST covers security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. The mission of HOST is to provide a forum for the presentation and discussion of research that is of critical significance to the security of, and trust in, modern society's microelectronic-supported infrastructures. The IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009) is an open forum for discussions and innovations on all issues related to hardware security and trust. Paper presentations on topics given below will highlight the challenges faced with authenticating hardware for security and trust.
WISTP 2009 Workshop on Information Security Theory and Practices (Smart Devices, Pervasive Systems, and Ubiquitous Networks), Bruxelles, Belgium, September 2-4, 2009. (Submissions due 19 April 2009)
With the rapid technological development of information technologies and with the transition from the common to the next generation networks, computer systems and especially embedded systems are becoming more mobile and ubiquitous, increasingly interfacing with the physical world. Ensuring the security of these complex and yet, resource constraint systems has emerged as one of the most pressing challenges. Protecting the privacy of the user immersed in such systems is a similarly pressing concern. The aim of this third workshop is to bring together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. The workshop will consist of technical paper presentations, one special session for student papers and several invited talks.
ACM-CCS 2009 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, November 9-13, 2009. (Submissions due 20 April 2009)
The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security, as well as case studies and implementation experiences. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope.
DMM 2009 1st International Workshop on Denial of service Modelling and Mitigation, Held in conjunction with 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Australia, October 19-21, 2009. (Submissions due 20 April 2009)
Denial of service attacks represent an increasing threat to the security of networks and systems critical to commercial, industrial and government enterprises. Addressing the denial-of-service problem is proving to be an ongoing challenge and further advances are needed in: the design and analysis of denial of service resistant protocols and architectures; effective tools and techniques for detecting and responding to attacks; forensic attribution of attacks; and the application of trust and reputation schemes in formulating attack responses. This workshop actively solicits recent advances from industrial, academic and government researchers and engineers in the areas of:
VizSec 2009 Workshop on Visualization for Cyber Security, Atlantic City, NJ, USA, October 11, 2009. (Submissions due 24 April 2009)
The 6th International Workshop on Visualization for Cyber Security is a forum that brings together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques. Co-located this year with IEEE InfoVis/Vis/VAST, VizSec will continue to provide opportunities for the two communities to collaborate and share insights into providing solutions for security needs through visualization approaches. This year our focus is on advancing Visualization for Cyber Security as a scientific discipline. While art, engineering, and intuitions regarding the human element will always remain important if we are to obtain useful cyber security visualizations, advances in the scientific practice of research are needed. The scientific aspects of visualization for cyber security draw both on empirical observation (similar to many natural and social sciences) and formal science (such as the formal derivations in mathematics). Barriers confronting current researchers include concerns about available data, lack of a common agreement about what constitutes sound experimental design, the difficulties of measuring the relative effectiveness of security visualizations in practice, and the lack of a common understanding of user requirements. While many researchers are making progress in these and other critical areas, much work yet remains. Papers offering novel contributions in security visualization are solicited. Papers may present technique, applications, practical experience, theory, or experiments and evaluations. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application. We encourage papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including how visualization applies to:
LISA 2009 23rd USENIX Large Installation System Administration Conference, Baltimore, MD, USA, November 1-6, 2009. (Submissions due 30 April 2009)
Effective administration of a large site requires a good understanding of modern tools and techniques, together with their underlying principles but the human factors involved in managing and applying these technologies in a production environment are equally important. Bringing together theory and practice is an important goal of the LISA conference, and practicing system administrators as well as academic researchers all have valuable contributions to make. Topics of interest include, but are not limited to the following:
ICDF2C 2009 International Conference on Digital Forensics & Cyber Crime, Albany, NY, USA, September 30 - October 2, 2009. (Submissions due 30 April 2009)
The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far reaching including: law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. Suggested topics for submission of papers are (but not limited to):
IEEE Transactions on Software Engineering (TSE), Special Issue on Exception Handling: From Requirements to Software Maintenance November 2009. (Submission Due 1 May 2009)
Guest editor: Alessandro Garcia (Lancaster University, UK),
Valerie Issarny (INRIA, France),
and Alexander Romanovsky (Newcastle University, UK)
With the complexity of contemporary software systems increasingly
growing, we still have much to learn on how software engineering
practice can contribute to improving specification, design, testing,
and evolution of exception handling. Our body of knowledge on effective
exception handling in software projects is still limited and fragmented.
It is not surprising that recent field studies have identified that
error handling design in industrial applications typically exhibits
poor quality independently of the underlying programming language
and application domain. A holistic application of software engineering
principles and techniques can certainly improve the treatment of
exception handling across the software lifecycle. In this context,
one of the underlying motivations of this special issue is to revisit
the research directions involving exception handling in software
engineering after one decade the first successful issue on this
topic has appeared in IEEE TSE. This special issue will serve as
a key reference for researchers, practitioners and educators to
understand the most recent innovations, trends, experiences and
concerns involving exception handling aspects in software engineering.
We invite submissions approaching exception handling on all areas
of software development and maintenance, such as model-driven development,
requirements engineering, refactoring, software evolution, reverse
engineering, contemporary modularity techniques (e.g., aspect-oriented
programming and feature-oriented programming), and formal methods.
The special issue is intended to cover a wide range of topics, from
theoretical foundations to empirical studies, with all of them presenting
innovative ideas on the interplay of exception handling and software
engineering. Topics of interest include (but are not limited to)
the following:
HotSec 2009 4th USENIX Workshop on Hot Topics in Security, Held in conjunction with the 18th USENIX Security Symposium (USENIX-Security 2009), Montreal, Canada, August 11, 2009. (Submissions due 4 May 2009)
HotSec '09 will bring together innovative practitioners and researchers in computer security and privacy, broadly defined, to tackle the challenging problems in this space. While pragmatic and systems-oriented, HotSec takes a broad view of security and privacy and encompasses research on topics including but not limited to large-scale threats, network security, hardware security, software security, programming languages, applied cryptography, anonymity, human-computer interaction, sociology, economics, and law. To ensure a vigorous workshop environment, attendance will be by invitation only. Participants will be invited based on their submissions' originality, technical merit, topical relevance, and likelihood of leading to insightful technical discussions that will influence future security research. Submissions may not be under consideration for publication at any other venue.
WIFS 2009 1st IEEE International Workshop on Information Forensics and Security, London, UK, December 6-9, 2009. (Submissions due 22 May 2009)
The IEEE International Workshop on Information Forensics and Security (WIFS) is the first workshop to be organized by the IEEE's Information Forensics and Security Technical Committee. Our aspiration is to create a venue for knowledge exchange that encompasses a broad range of disciplines and facilitates the exchange of ideas between various disparate communities that constitute information security. By so doing, we hope that researchers will identify new opportunities for collaboration across disciplines and gain new perspectives. Appropriate topics of interest include, but are not limited to:
MetriSec 2009 5th International Workshop on Security Measurements and Metrics, Held in conjunction with the International Symposium on Empirical Software Engineering and Measurement (ESEM 2009), Lake Buena Vista, Florida, USA, October 14, 2009. (Submissions due 28 May 2009)
Quantitative assessment is a major stumbling blocks for software and system security. Although some security metrics exist, they are rarely adequate. The engineering importance of metrics is intuitive: you cannot consistently improve what you cannot measure. Economics is an additional drive for security metrics: customers should be enabled to quantify which of two IT products is more appropriate. The goals of this workshop are to showcase and foster research into security measurements and metrics and to keep building the community of individuals interested in this area. MetriSec continues the tradition started by the Quality of Protection (QoP) workshop series. This year, the new co-location with ESEM is an opportunity for the security metrics folks to meet the metrics community at large. The organizers solicit original submissions from industry and academic experts on the development and application of repeatable, meaningful measurements in the fields of software and system security. The topics of interest include, but are not limited to:
InSPEC 2009 2nd International Workshop on Security and Privacy in Enterprise Computing, Held in conjunction with the 13th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2009), Auckland, New Zealand, August 31 - September 4, 2009. (Submissions due 31 May 2009)
In recent years several technologies have emerged for enterprise computing. Workflows are now widely adopted by industry and distributed workflows have been a topic of research for many years. Today, services are becoming the new building blocks of enterprise systems and service-oriented architectures are combining them in a flexible and novel way. In addition, with wide adoption of e-commerce, business analytics that exploits multiple, heterogeneous data sources have become an important field. Ubiquitous computing technologies, such as RFID or sensor networks change the way business systems interact with their physical environment, such as goods in a supply chain or machines on the shop floor. All these technological trends are accompanied also by new business trends due to globalization that involve innovative forms of collaborations such as virtual organizations. Further, the increased speed of business requires IT systems to become more flexible and highly dynamic. All of these trends bring with them new challenges to the security and privacy of enterprise computing. New concepts for solving these challenges require the combination of many disciplines from computer science and information systems, such as cryptography, networking, distributed systems, process modeling and design, access control, privacy etc. The goal of this workshop is to provide a forum for exchange of novel research in these areas among the experts from academia and industry. Completed work as well as research in progress is welcome, as we want to foster the exchange of novel ideas and approaches.
CANS 2009 8th International Conference on Cryptography and Network Security, Kanazawa, Ishikawa, Japan, December 12-14, 2009. (Submissions due 1 June 2009)
The main goal of this conference is to promote research on all aspects of network security, as well as to build a bridge between research on cryptography and on network security. We therefore welcome scientific and academic papers with this focus. Areas of interest for CANS 2009 include, but are not limited to:
ACSAC 2009 25th Annual Computer Security Applications Conference, Honolulu, Hawaii, USA, December 7-11, 2009. (Submissions due 1 June 2009)
We solicit papers offering novel contributions in computer and application security. Papers should present techniques or applications with practical experience. Papers are encouraged on technologies and methods that have been demonstrated to improve information systems security and that address lessons from actual application. We are especially interested in papers that address the application of security technology, the implementation of systems, and lessons learned. Suggested topics:
Information Systems Frontiers, Special Issue on Security Management and Technologies for Protecting Against Internal Data Leakages Spring or Summer 2010. (Submission Due 14 August 2009)
Guest editor: David Chadwick (University of Kent, UK),
Hang Bae Chang (Daejin University, South Korea),
Ilsun You (Korean Bible University, South Korea),
and Seong-Moo Yoo (University of Alabama in Huntsville, USA)
During the past decades, information security developments have been mainly
concerned with preventing illegal attacks by outsiders, such as hacking,
virus propagation, and spyware. However, according to a recent Gartner
Research Report, information leakage caused by insiders who are legally
authorized to have access to some corporate information is increasing
dramatically. These leakages can cause significant damages such as
weakening the competitiveness of companies (and even countries).
Information leakage caused by insiders occurs less frequently than
information leakage caused by outsiders, but the financial damage is
much greater. Countermeasures in terms of physical, managerial, and
technical aspects are necessary to construct an integral security
management system to protect companies' major information assets
from unauthorized internal attackers. The objective of this special
issue is to showcases the most recent challenges and advances in
security technologies and management systems to prevent leakage of
organizations' information caused by insiders. It may also include
state-of-the-art surveys and case analyses of practical significance.
We expect that the special issue will be a trigger for further research
and technology improvements related to this important subject.
Topics(include but are not limited to):
IFIP-DF 2010 6th Annual IFIP WG 11.9 International Conference on Digital Forensics, University of Hong Kong, Hong Kong, January 3-6, 2010. (Submissions due 15 August 2009)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging field of digital forensics. The Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |