|
|
Commentary and Opinion
Listing of academic positions available by
Cynthia Irvine
New listings:
Naval Postgraduate School
Monterey, California
CS Department Faculty Positions
Open until filled
http://www.nps.edu/Academics/Schools/GSOIS/Departments/CS/Faculty/Openings/CSFacultyOpenings.html
Posted June 2011 (updated August 2011)
University of Waterloo
Waterloo, ON, Canada
Postdoctoral Research Position
Open until filled
http://crysp.uwaterloo.ca/prospective/postdoc/
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
Elsevier Computers & Electrical Engineering, Special Issue on Recent Advances in Security and Privacy in Distributed Communications, September 2012, (Submission Due 30 September 2011)
Editor: Gregorio Martinez (University of Murcia, Spain), Felix Gomez Marmol (NEC Laboratories Europe, Germany), and Jose M. Alcaraz Calero (Hewlett-Packard Laboratories, United Kingdom)
Security services need to be considered as part of most communication proposals being discussed nowadays in distributed communication environments. Additionally, in the last few years, privacy has been gaining interest from both the designers and the customers of security solutions, thus being considered now as a key aspect for them. For a good security and/or privacy design, one needs to be informed of the latest advances in this field, this being the main objective of this special issue. This special issue is intended to report the most recent research works related to security and privacy, particularly in the following fields:
CoSec 2011 3rd IEEE Workshop on Collaborative Security Technologies, Bangalore, India, December 12, 2011. (Submissions due 30 September 2011)
The severity of attacks on networks and critical infrastructures are on the rise over recent years and seem to continue to do so. Surprisingly at times, many of the attacks can be individually simple yet highly damaging due to their large-scale co-ordination and polymorphic replication with continuous self-upgradation using a mix of peer-to-peer and command-and-control architectures. Conventional approaches of single-hosted security defensives are becoming increasingly less effective in the face of such sophisticated and co-ordinated multi-front attacks using bot-nets of compromised always-on, always-connected computers. In contrast, a distributed defense pattern shows promise both in terms of manageability, reduced operating costs and architectural simplicity. This broad area of defense using Collaborative Security technologies works on the principles of sharing (1) information and knowledge for accelerating detection of and response to new attacks and threats; and (2) resources for increasing the efficiency and reducing resource consumption. The 3rd International workshop on Collaborative Security Technologies aims to bring to the forefront innovative approaches that involve the use of collaborative methods for security and privacy. The central theme of this workshop is to focus attention on the collaborative and intelligent approaches towards design of security systems so as to make them more robust and reliable.
IEEE Systems Journal, Special Issue on Security and Privacy in Complex Systems, 2012, (Submission Due 1 October 2011)
Editor: Sushil Jajodia (George Mason University, USA) and Pierangela Samarati (Universita` degli Studi di Milano, Italy)
Today's information society relies on a globally interconnected infrastructure composed of diverse and widely distributed systems. It is of utmost importance to ensure proper protection to such complex systems, or systems-of-systems, to ensure security, privacy, and availability of the infrastructure as well as of resources and information it provides and manages. The problem is far from trivial, due to the criticality and the social impact of the applications and services relying on this global infrastructure, as well as the complexity given by the co-existence and co-operation of, possibly heterogeneous, component systems. The goal of this special issue is to collect high-quality contributions on security and privacy in complex systems and systems-of-systems. We solicit submissions from academia, industry, and government presenting novel and original research on all theoretical and practical aspects of security and privacy in complex systems. The focus of the special issue spans security and privacy theory, technology, methodology, and applications in complex systems. Submitted papers should therefore explicitly address issues in the complex system scenario. Topics of interest include, but are not limited, to the ones listed below provided that they are treated with specific focus on the complex system scenario:
IFIP-DF 2012 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, University of Pretoria, Pretoria, South Africa, January 3-5, 2012. (Submissions due 7 October 2011)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately sixty participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the eighth in the series entitled Research Advances in Digital Forensics (Springer) in the summer of 2012. Revised and/or extended versions of selected papers from the conference will be published in special issues of one or more international journals. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
POST 2012 1st Conference on Principles of Security and Trust, Tallinn, Estonia, March 24 - April 1, 2012. (Submissions due 7 October 2011)
Principles of Security and Trust is a broad forum related to the theoretical and foundational aspects of security and trust. Papers of many kinds are welcome: new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems. We seek submissions proposing theories to clarify security and trust within computer science; submissions establishing new results in existing theories; and also submissions raising fundamental concerns about existing theories. We welcome new techniques and tools to automate reasoning within such theories, or to solve security and trust problems. Case studies that reflect the strengths and limitations of foundational approaches are also welcome, as are more exploratory presentations on open questions. Areas of interest include:
WECSR 2012 3rd Workshop on Ethics in Computer Security Research, Divi Flamingo Resort, Bonaire, March 2, 2012. (Submissions due 31 October 2011)
Computer security often leads to discovering interesting new problems and challenges. The challenge still remains to follow a path acceptable for Institutional Review Boards at academic institutions, as well as compatible with ethical guidelines for professional societies or government institutions. However, no exact guidelines exist for computer security research yet. This workshop will bring together computer security researchers, practitioners, policy makers, and legal experts. This workshop solicits submissions describing or suggesting ethical and responsible conduct in computer security research. While we focus on setting standards and sharing prior experiences and experiments in computer security research, successful or not, we tap into research behavior in network security, computer security, applied cryptography, privacy, anonymity, and security economics. This workshop will favor discussions among participants, in order to shape the future of ethical standards in the field. It will be co-located with the Sixteenth International Conference on Financial Cryptography and Data Security 2012. We solicit submissions in three categories: Position papers, Case studies, and Panel proposals.
SP 2012 33rd IEEE Symposium on Security and Privacy, San Francisco Bay Area, California, USA, May 20-23, 2012. (Submissions due 16 November 2012)
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of computer security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems. Topics of interest include:
USEC 2012 Workshop on Usable Security, Held in conjunction with the Financial Cryptography and Data Security (FC 2012), Divi Flamingo Beach Resort, Bonaire, March 2, 2012. (Submissions due 16 November 2011)
Many aspects of data security combine technical and human factors. If a highly secure system is unusable, users will move their data to less secure but more usable systems. Problems with usability are a major contributor to many high-profile security failures today. However, usable security is not well-aligned with traditional usability for three reasons. First, security is rarely the desired goal of the individual. In fact, security is usually orthogonal and often in opposition to the actual goal. Second, security information is about risk and threats. Such communication is most often unwelcome. Increasing unwelcome interaction is not a goal of usable design. Third, since individuals must trust their machines to implement their desired tasks, risk communication itself may undermine the value of the networked interaction. For the individual, discrete technical problems are all understood under the rubric of online security (e.g., privacy from third parties use of personally identifiable information, malware). A broader conception of both security and usability is therefore needed for usable security. The workshop on Usable Security invites submissions on all aspects of human factors and usability in the context of security. USEC'12 aims to bring together researchers already engaged in this interdisciplinary effort with other researchers in areas such as economics, intelligent interactions, artificial intelligence, theoretical computer science, and modeling. We encourage AI, HCI, security, psychologists, risk analysts, computer scientists, security specialists, business school faculty, and industry experts to submit original research. We particularly encourage collaborative research from authors in multiple fields.
Elsevier Computer Networks, Special Issue on Botnet Activity: Analysis, Detection and Shutdown, 2012, (Submission Due 1 December 2011)
Editors: Ronaldo Salles (Military Institute of Engineering, Brazil),
Guofei Gu (Texas A&M University, USA),
Thorsten Holz (Ruhr-University Bochum, Germany),
and Morton Swimmer (Trend Micro Deutschland, Germany)
Large scale attacks and criminal activities experienced in recent years have
exposed the Internet to serious security breaches, and alarmed the world
regarding cyber crime. In the center of this problem are the so called
botnets -- collections of infected zombie machines (bots) controlled by
the botmaster to perpetrate malicious activities and massive attacks.
Some recent botnets are composed of millions of infected machines,
making use of this attack vector inevitably harmfully. Hence, it is
paramount to detect, analyze and shutdown such overlay networks
before they become active. This special issue of Computer Networks is
intended to foster the dissemination of high quality research in all
aspects regarding botnet activity, detection and countermeasures. The
objective of this special issue is to publish papers presenting
detection algorithms, traffic monitoring and identification, protocols
and architectures, as well as botnet modeling, behavior, simulation,
statistics, dissemination, analysis, preventive procedures and
possible countermeasures. Only technical papers describing previously
unpublished, original, state-of-the-art research, and not currently
under review by a conference or journal will be considered. We solicit
papers in a variety of topics related to botnet research including,
but not limited to:
COSADE 2012 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, May 3-4, 2012. (Submissions due 12 December 2011)
Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design- and development process. This workshop provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to meet experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks.
SEC 2012 27th IFIP International Information Security and Privacy Conference, Creta Maris Hotel, Heraklion, Crete, Greece, June 4-6, 2012. (Submissions due 10 January 2012)
Papers offering novel research contributions in any aspect of computer security are solicited for submission to the 27th IFIP International Information Security and Privacy Conference. The focus is on original, high quality, unpublished research and implementation experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. We encourage submissions of papers discussing industrial research and development. Papers should focus on topics which include, but are not limited to, the following:
ACNS 2012 10th International Conference on Applied Cryptography and Network Security, Singapore, June 26-29, 2012. (Submissions due 5 February 2012)
The conference seeks submissions from academia, industry, and government presenting novel research on all aspects of applied cryptography as well as network security and privacy. Papers describing novel paradigms, original directions, or non-traditional perspectives are also encouraged. The conference has two tracks: a research track and an industry track. Topics of interest include, but are not limited to:
IEEE Internet Computing, Track Articles on Computer Crime, 2012, (Submission will be accepted for this track from 15 July 2011 to 15 July 2012)
Editors: Nasir Memon (New York University, USA) and Oliver Spatscheck (AT&T, USA)
As the Internet has grown and extended its reach into every part of people's
lives, it shouldn't be surprising that criminals have seized the opportunity
to expand their activities into this new realm. This has been fostered in
particular by the fact that the Internet was designed as an open and trusting
environment. Unfortunately many of these architectural choices are fundamental
to the Internet's success and current architecture and are therefore hard to
overcome. Computer crime ranges from rather simple crimes such as theft of
intellectual property or computer and network resources to complex cooperate
espionage or even cyber terrorism. This special track for Internet Computing
seeks original articles that cover computer crime as it relates to the
Internet. Appropriate topics include:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |