|
|
Commentary and Opinion
News Items
Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
Posted June 2011
University of Waterloo
Waterloo, ON, Canada
Postdoctoral Research Position
Open until filled
http://crysp.uwaterloo.ca/prospective/postdoc/
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
WPES 2011 10th ACM Workshop on Privacy in the Electronic Society, Held in conjunction with the ACM CCS 2011, Chicago, IL, USA, October 17, 2011. (Submissions due 16 July 2011)
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to:
WPLS 2011 Workshop on Physical Layer Security, Held in conjunction with the IEEE Globecom Conference 2011, Houston, Texas, USA, December 9, 2011. (Submissions due 19 July 2011)
There has been a growing interest in recent times in using resources at the Physical Layer for designing novel security techniques that compliment existing cryptographic methods. Such solutions often exploit the unique characteristics of wireless channels in defeating both active and passive adversaries. The PhysicalLayer Security Workshop aims to bring together researchers working on various aspects of Physical layer security to present their latest research activity. Prospective Authors are encouraged to submit unpublished contributions in physical-layer security including (but not limited to) the following topics:
eCrime Researchers Summit 2011 6th IEEE eCrime Researchers Summit, Held in conjunction with the 2011 APWG General Meeting, San Diego, CA, USA, November 7-9, 2011. (Submissions due 21 July 2011)
eCRS 2011 will bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it, Topics of interests include (but are not limited to):
Nordsec 2011 16th Nordic Workshop on Secure IT-Systems, Tallinn, Estonia, October 26-28, 2011. (Submissions due 31 July 2011)
The conference welcomes contributions in the form of papers, short papers, and posters. Since 1996, the NordSec conferences have brought together computer security researchers and practitioners from around the world, and particularly from the Nordic countries and Northern Europe. The conference focuses on applied IT security and is intended to encourage interaction between academic and industrial research. Student papers and posters are particularly encouraged. Submissions reporting industrial or governmental experiences are also encouraged and will be given special consideration. Contributions should reflect original research, developments, studies and practical experience within all areas of IT security. With the theme "IT Security in Governance", this year's conference will emphasize policies, strategies and technologies related to the security and sustainability of processes executed by heterogeneous organizations, departments or organizational clusters of all sizes. NordSec 2011 also welcomes contributions over a broad range of topics in IT security, including, but not limited to, the following areas:
INTRUST 2011 International Conference on Trusted Systems, Beijing, China, November 27-29, 2011. (Submissions due 1 August 2011)
Building on the success of INTRUST 2009 and INTRUST 2010 (both were held in Beijing, P. R. China), this conference focuses on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. INTRUST 2011 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. The conference will have an academic track and an industrial track. This call for papers is for contributions to both of the tracks. Submissions to the academic track should emphasize theoretical and practical research contributions to general trusted system technologies, while submissions to the industrial track may focus on experiences in the implementation and deployment of real-world systems. Topics of relevance include but are not limited to:
NDSS 2012 Network & Distributed System Security Symposium, San Diego, California, USA, February 5-8, 2012. (Submissions due 9 August 2011)
The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. Overall, we are looking for not only for solid results but also for crazy out of the box ideas. Areas of interest include (but are not limited to):
WICT-NDF 2011 World Congress on Information and Communication Technologies, Intrusion Detection and Forensics, Mumbai, India, December 11-14, 2011. (Submissions due 15 August 2011)
Authors are invited to submit original papers containing cutting edge research, novel research vision or work-in-progress in any area of intrusion detection and forensics. All accepted papers will be published in the conference proceedings by IEEE. The track will cover a wide range of topics. Topics of interest include but are not limited to:
Wiley Security and Communication Networks Journal, Special Issue on Applications of Machine Learning Techniques to Intrusion Detection and Digital Forensics, 2012, (Submission Due 15 August 2011)
Editor: Ajith Abraham (Norwegian University of Science and Technology, Norway), Anjali Sardana (Indian Institute of Technology Roorkee, India), ManPyo Hong (Ajou University, South Korea), Irfan Ahmed (Queensland University of Technology, Australia), and Rafael Accorsi (University of Freiburg, Germany)
The security of computers and their networks is a major concern. As the computing devices become more pervasive and connected (such as from personal computer running a simple desktop application to embedded systems controlling a critical infrastructure), they face versatile and unknown threats ranging from sophisticated malwares, to less prevalent but still serious attacks like Web site defacement, denial of service attacks, financial fraud and network break-ins. They are both critical and costly and required to be detected in-time. Moreover, the detection of intrusions often leads to the forensic investigation requiring the acquisition of massive volume of data and their analysis. The manual effort to deal with the problems is costly and time consuming and thus, brings the need of machine learning techniques that are often used to efficiently and reliably perform this labour intensive work. In this special issue, we plan to present the cutting edge research focusing on intrusion detection and digital forensics with the application of machine learning techniques. The Journal is soliciting submissions based on an open call for papers covering areas that are included but not limited to the following:
International Journal of Information Security, Special Issue on SCADA and Control System Security, 2012, (Submission Due 21 August 2011)
Editor: Irfan Ahmed (Queensland University of Technology, Australia),
Martin Naedele (ABB Corporate Research, Switzerland),
Charles Palmer (Dartmouth College, USA),
Ryoichi Sasaki (Tokyo Denki University, Japan),
Bradley Schatz (Queensland University of Technology, Australia),
and Andrew West (Invensys Operations Management, Australia)
Supervisory control and data acquisition (SCADA) and industrial control systems
monitor and control a wide range of industrial and infrastructure processes
such as manufacturing production lines, water treatment, fuel production and
electricity distribution. Such systems are usually built using a variety of
commodity computer and networking components, and are becoming increasingly
interconnected with corporate and other Internet-visible networks. As a result,
they face significant threats from internal and external actors. For example,
the now famous Stuxnet (which is a Windows-specific computer worm containing a
rootkit and four zero-day attacks) was specifically written to attack SCADA
systems that alone caused multi-million dollars damages in 2010. The critical
requirement for high availability in SCADA and industrial control systems,
along with the use of bespoke, resource constrained computing devices, legacy
operating systems and proprietary software applications limits the
applicability of traditional information security solutions. Thus, research
focusing on devising security solutions that are applicable in the control
systems context is imperative, as evidenced by the increased focus on the
problem by governments worldwide. This Special Issue aims to present the
latest developments, trends and research solutions addressing security of
the computers and networks used in SCADA and other industrial control systems.
The topics of interest include but not limited to, intrusion detection
and prevention, malware, vulnerability analysis of control systems protocols,
digital forensics, application security and performance impact of security
methods and tools in control systems. This list is not exhaustive and other
relevant topics will be considered.
CT-RSA 2012 RSA Conference, Cryptographers' Track, San Francisco, California, USA, February 27-March 2, 2012. (Submissions due 29 August 2011)
The RSA Conference is the largest annual information security event, with hundreds of vendors and thousands of attendees. Among the 20 tracks of the RSA conference, the Cryptographers' Track stands out, offering a glimpse of academic research in the field of cryptography. The Cryptographers' Track was founded in 2001, and it has since established its presence in the cryptographic community. To support the academic exchange, RSA conference offers a special academic discount for registration, as well as a waiver for the speakers presenting their papers that were accepted to CT-RSA 2012. Original research papers pertaining to all aspects of cryptography are solicited. Submissions may present applications, techniques, theory, and practical experience on topics including, but not limited to:
IFIP-DF 2012 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, University of Pretoria, Pretoria, South Africa, January 3-5, 2012. (Submissions due 15 September 2011)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately sixty participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the eighth in the series entitled Research Advances in Digital Forensics (Springer) in the summer of 2012. Revised and/or extended versions of selected papers from the conference will be published in special issues of one or more international journals. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
FC 2012 16th Financial Cryptography and Data Security, Divi Flamingo Beach Resort, Bonaire, February 27 - March 2, 2012. (Submissions due 15 September 2011)
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and inter-disciplinary works are particularly encouraged. The topics include:
ESSoS 2012 4th International Symposium on Engineering Secure Software and Systems, Eindhoven, The Netherlands, February 16 - 17, 2012. (Submissions due 18 September 2011)
Trustworthy, secure software is a core ingredient of the modern world. Unfortunately, the Internet is too. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):
Elsevier Computers & Electrical Engineering, Special Issue on Recent Advances in Security and Privacy in Distributed Communications, September 2012, (Submission Due 30 September 2011)
Editor: Gregorio Martinez (University of Murcia, Spain), Felix Gomez Marmol (NEC Laboratories Europe, Germany), and Jose M. Alcaraz Calero (Hewlett-Packard Laboratories, United Kingdom)
Security services need to be considered as part of most communication proposals being discussed nowadays in distributed communication environments. Additionally, in the last few years, privacy has been gaining interest from both the designers and the customers of security solutions, thus being considered now as a key aspect for them. For a good security and/or privacy design, one needs to be informed of the latest advances in this field, this being the main objective of this special issue. This special issue is intended to report the most recent research works related to security and privacy, particularly in the following fields:
IEEE Systems Journal, Special Issue on Security and Privacy in Complex Systems, 2012, (Submission Due 1 October 2011)
Editor: Sushil Jajodia (George Mason University, USA) and Pierangela Samarati (Universita` degli Studi di Milano, Italy)
Today's information society relies on a globally interconnected infrastructure composed of diverse and widely distributed systems. It is of utmost importance to ensure proper protection to such complex systems, or systems-of-systems, to ensure security, privacy, and availability of the infrastructure as well as of resources and information it provides and manages. The problem is far from trivial, due to the criticality and the social impact of the applications and services relying on this global infrastructure, as well as the complexity given by the co-existence and co-operation of, possibly heterogeneous, component systems. The goal of this special issue is to collect high-quality contributions on security and privacy in complex systems and systems-of-systems. We solicit submissions from academia, industry, and government presenting novel and original research on all theoretical and practical aspects of security and privacy in complex systems. The focus of the special issue spans security and privacy theory, technology, methodology, and applications in complex systems. Submitted papers should therefore explicitly address issues in the complex system scenario. Topics of interest include, but are not limited, to the ones listed below provided that they are treated with specific focus on the complex system scenario:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |