|
|
News, Commentary and Opinion
NewsBits: Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
Nothing new since Cipher E144.
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
Requests for inclusion in the list should sent per instructions.
new calls or announcements added since Cipher E144
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
SP 2019 40th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20-22, 2019. (Submissions due first day of each month)
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
BigTrust 2018 2nd International Workshop on Trust, Security and Privacy for Big Data, Chengdu, China, October 9-12, 2018. (Submissions due 30 July 2018)
Big Data has the potential for enabling new insights to change science, engineering, medicine, healthcare, finance, business, and ultimately society itself. Current work on Big Data focuses on information processing such as data mining and analysis. However, trust, security and privacy of Big Data are vital concerns that have received less research focus. Regarding the above context, this workshop proposal is aimed at bringing together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data. BigTrust 2018 is a part of MASS 2018, the 15th IEEE International Conference on Mobile Ad-hoc and Sensor Systems.
NDSS 2019 26th Annual Network and Distributed System Security Symposium, San Diego, California, USA, February 24-27, 2019. (Submissions due 7 August 2018)
The Network and Distributed System Security Symposium is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. Technical papers and panel proposals are solicited. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2019. The Proceedings will be made freely accessible from the Internet Society webpages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent. Submissions are solicited in, but not limited to, the following areas:
NordSec 2018 23rd Nordic Conference on Secure IT Systems, Oslo, Norway, November 28-30, 2018. (Submissions due 10 August 2018)
NordSec addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry. In addition to regular research paper submissions, we invite participants to present their ideas in poster sessions during lunches and coffee breaks. NordSec 2018 welcomes contributions within, but not limited to, the following areas:
CODASPY 2019 9th ACM Conference on Data and Application Security and Privacy, Dallas, TX, USA, March 25-27, 2019. (Submissions due 3 September 2018)
CODASPY has had eight successful years and the goal of the conference is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
FPS 2018 11th International Symposium on Foundations & Practice of Security, Montreal, Canada, November 13-15, 2018. (Submissions due 3 September 2018)
We invite researchers and practitioners from all countries working in security, privacy, trustworthy data systems and related areas to participate in the event. Protecting the communication and data infrastructure of an increasingly inter-connected world has become vital to the normal functioning of all aspects of our world. Security has emerged as an important scientific discipline whose many multifaceted complexities deserve the attention and synergy of the mathematical, computer science and engineering communities. The aim of FPS is to discuss and exchange theoretical and practical ideas that address security issues in inter-connected systems. It aims to provide scientific presentations as well as to establish links, promote scientific collaboration, joint research programs, and student exchanges between institutions involved in this important and fast moving research field. We also invite papers from researchers and practitioners working in security, privacy, trustworthy data systems and related areas to submit their original papers.
IFIP 11.9 DF 2019 15th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 28-30, 2019. (Submissions due 17 September 2018)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately sixty participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the fifteenth volume in the well-known Research Advances in Digital Forensics book series (Springer, Heidelberg, Germany) during the summer of 2019. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
Springer International Journal of Information Security, Special Issue on IoT Security and Privacy, (Submissions due 1 October 2018)
Guest Editors: akeshi Takahashi (National Institute of
Information and Communications Technology, Japan), Rodrigo Roman Castro
(Universidad de Malaga, Spain), Ryan Ko (University of Waikato, New Zealand),
Bilhanan Silverajan (Tampere University of Technology, Finland),
and Said Tabet (Dell EMC, USA).
The Internet is gradually transforming from a communication platform for
conventional IT appliances into the Internet of Things (IoT),
increasingly interconnecting many assorted devices and sensors.
These devices are generally referred as IoT devices, and many of
them are inexpensive and can be constrained in terms of energy,
bandwidth and memory. The establishment of IoT ecosystems in
various domains is bringing multiple benefits to human users and
companies alike. Example of such domains include Smart Homes,
Smart Cities, the Industrial Internet and even Intelligent
Transportation Systems. However, the IoT as a whole - including
related paradigms such as Machine-to-Machine (M2M) and Cyber-Physical
Systems (CPS) - is susceptible to a multitude of threats. In fact,
many IoT devices currently are insecure and have many security
vulnerabilities. For example, many vulnerable IoT devices which
have been infected with malware have subsequently become comprised
into large botnets, resulting in devastating DDOS attacks.
Consequently, ensuring the security of such IoT ecosystems -
before, during, and after an attack takes place - is a crucial
issue for our society at this moment. This special issue aims to
collect contributions by leading-edge researchers from academia
and industry, show the latest research results in the field of
IoT security and privacy, and provide valuable information to
researchers as well as practitioners, standards developers and
policymakers. Its aim is to focus on the research challenges and
issues in IoT security. Manuscripts regarding novel algorithms,
architectures, implementations, and experiences are welcome.
Topics include but are not limited to:
IEEE Internet of Things Journal, Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures, (Submissions due 1 October 2018)
Guest Editors: Cristina Alcaraz (University of Malaga, Spain),
Mike Burmester (Florida State University, USA),
Jorge Cuellar (Siemens, Germany), Xinyi Huang (Fujian Normal University, China),
Panayiotis Kotzanikolaou (University of Piraeus, Greece),
and Mihalis Psarakis (University of Piraeus, Greece).
The Internet of Things (IoT) opens the door to new technological
opportunities for a wide range of applications that cover e-health,
smart homes and automation, e-commerce, location-based services,
smart vehicles, fleet management and remote system monitoring.
However, at the same time as these technological opportunities
grow so does the threat surface for potential adversaries
targeting at various, interconnected ICT systems and consequently
at ICT-dependent critical systems, such as SCADA (Supervisory
Control and Data Acquisition Systems) systems. At this point,
attackers could take advantage from the incorporation of the
paradigm to exploit new security gaps, probably caused by
unforeseen interoperability and adaptability problems.
Indeed, the deployment of Internet-enabled embedded devices that
are distributed over major critical domains, may create indirect
and non-obvious inter-connections with the underlying Critical
Infrastructures (CIs). Examples of such inter-connected systems may
include traffic monitoring and control systems communicating with
smart vehicles, energy related systems communicating with smart
homes and smart meters, monitoring systems connected with autonomous
sensors in nuclear plants, power grids and body area networks.
There is a need to further explore the security issues related
to IoT technologies to assure the resilience of CIs against
advanced IoT-based attacks. The goal of this special issue is
therefore to address the diverse security challenges and
related to IoT-enabled CIs (IoT-CIs) and their resilience
to advanced threats.
Suggested topics include, but are not limited to, the following:
Human-centric Computing and Information Sciences, Thematic Issue on Security, Trust and Privacy for Human-centric Internet of Things, (Submissions due 30 October 2018)
Guest Editors: Kyung-Soo Lim (Electronics and Telecommunication
Research Institute, Korea), Isaac Woungang (Ryerson University, Canada),
Javier Lopez (University of Malaga, Spain),
Sherali Zeadally (University of Kentucky, USA), and
Damien Sauveron (XLIM (UMR CNRS 7252 / Universite de Limoges), France).
The aim of this thematic series is to publish articles that cover
the various developments in theory and practice related to the
latest methods, solutions, and case studies in security, trust,
and privacy for human-centric internet of things (IoT). Submitted
articles should present research contributions that help solve
the challenges that arise in developing a secure and privacy-aware
human-centric IoT. This can be achieved by proposing security
policies, algorithms, protocols, frameworks, and solutions for
human-centric IoT ecosystems. We also welcome high-quality review
articles, which focus on the analysis and integration of diverse
kinds of approaches such as artificial intelligence cognitive
computing, blockchain, big data mining, or soft computing in
the area of human-centric IoT security. Topics of interest
include but are not limited to:
EuroSP 2019 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, June 17-19, 2019. (Submissions due 13 November 2018)
The IEEE European Symposium on Security and Privacy (EuroS&P) is the European sister conference of the established IEEE S&P symposium. It is a premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy. The emphasis is on building or attacking real systems, even better if actually deployed, rather than presenting purely theoretical results. Papers may present advances in the design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Papers that shed new light on past results by means of sound theory or thorough experimentation are also welcome. Topics of interest include:
IEEE Internet Computing Magazine, Special Issue on the Meaning of Identity on the Internet, (Submissions due 4 December 2018)
Guest Editors: Hilarie Orman (Purple Streak, Inc., USA)
and Kent Seamons (Brigham Young University, USA).
An online identity used to be a simple login name for a time-sharing
system, but today an online presence consists of a fabric of identities
created through websites, apps, and constantly evolving social media.
We constantly deal with people, things, and institutions that have
attributes and history that are varied, subject to change, secured
through questionable practices, and authenticated both formally and
informally. How do we transfer the concept of ñwhoî to an Internet
environment? This special issue will explore new trends in identity
granting, establishment, verification, management, use, and trust
in an Internet computing environment. We would like to highlight
methods that have the potential for easily enabling identities to
be used for a variety of Internet purposes. We envision a Internet
with a secure identity ecosystem that meets the needs of the worldÕs
population of billions of individuals and objects while balancing
privacy and accountability.
The technologies of the future may include blockchain, smart identity
contracts, artificial intelligence, functional encryption, expanded
use of social media identities, identity aggregation techniques, new
types of biometrics, etc. We are interested in articles that cover
how they can contribute to the overall vision. Topics of interest
include but arenÍt limited to the following:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP (or other TCs) | Open Access Proceedings | |
Cipher past issues archive | ||
IEEE Computer Society | Cipher Privacy Policy |