[SC-L] CFP: Mobile Security Technologies (MoST) 2014 - Call for Participation - May 17

2014-05-06 Thread Larry Koved
http://mostconf.org/2014/cfp.html 

Mobile Security Technologies (MoST) 2014 

Saturday May 17, 2014

co-located with 
The 34th IEEE Symposium on Security and Privacy (IEEE SP 2014) 
an event of
The IEEE Computer Society's Security and Privacy Workshops (SPW 2014)  

Mobile Security Technologies (MoST) brings together researchers, 
practitioners, policy makers, and hardware and software developers of 
mobile systems to explore the latest understanding and advances in the 
security and privacy for mobile devices, applications, and systems. 
Topics 
We are seeking both short position papers (2-4 pages) and longer papers (a 
maximum of 10 pages). The scope of MoST 2014 includes, but is not limited 
to, security and privacy specifically for mobile devices and services 
related to: 
Device hardware 
Operating systems 
Middleware 
Mobile web 
Secure and efficient communication 
Secure application development tools and practices 
Privacy 
Vulnerabilities and remediation techniques 
Usable security 
Identity and access control 
Risks in putting trust in the device vs. in the network/cloud 
Special applications, such as medical monitoring and records 
Mobile advertisement 
Secure applications and application markets 
Economic impact of security and privacy technologies

Paper Submission Instructions 

All accepted papers will be published online in the workshop proceedings. 

Organizing Committee 
Hao Chen, University of California, Davis 
Larry Koved, IBM Research
Program Chair 
Kapil Singh, IBM Research

Program Committee 
Kevin Butler (University of Oregon)
Hao Chen (University of California, Davis)
William Enck (North Carolina State University)
Adrienne Porter Felt (Google)
Rajarshi Gupta (Qualcomm Research Silicon Valley)
Markus Jakobsson (Qualcomm Research Silicon Valley)
Jaeyeon Jung (Microsoft Research)
Larry Koved (IBM Research)
Zhichun Li (NEC Research Labs)
Long Lu (Stony Brook University)
Adrian Ludwig (Google)
David Wagner (University of California, Berkeley)


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] CFP: Mobile Security Technologies (MoST) 2014 - Deadline extended to March 10

2014-03-09 Thread Larry Koved
http://mostconf.org/2014/cfp.html 

Mobile Security Technologies (MoST) 2014

co-located with 
The 34th IEEE Symposium on Security and Privacy (IEEE SP 2014) 
an event of
The IEEE Computer Society's Security and Privacy Workshops (SPW 2014) 

Mobile Security Technologies (MoST) brings together researchers, 
practitioners, policy makers, and hardware and software developers of 
mobile systems to explore the latest understanding and advances in the 
security and privacy for mobile devices, applications, and systems.
Topics
We are seeking both short position papers (2-4 pages) and longer papers (a 
maximum of 10 pages). The scope of MoST 2014 includes, but is not limited 
to, security and privacy specifically for mobile devices and services 
related to:
Device hardware
Operating systems
Middleware
Mobile web
Secure and efficient communication
Secure application development tools and practices
Privacy
Vulnerabilities and remediation techniques
Usable security
Identity and access control
Risks in putting trust in the device vs. in the network/cloud
Special applications, such as medical monitoring and records
Mobile advertisement
Secure applications and application markets
Economic impact of security and privacy technologies

Paper Submission Instructions

All accepted papers will be published online in the workshop proceedings. 
Important Dates
Paper submission deadline: March 10, 2014 (11:59pm US-PST).
Acceptance notification: March 31, 2014.

Organizing Committee
Hao Chen, University of California, Davis
Larry Koved, IBM Research
Program Chair
Kapil Singh, IBM Research
Program Committee
Kevin Butler (University of Oregon)
Hao Chen (University of California, Davis)
William Enck (North Carolina State University)
Adrienne Porter Felt (Google)
Rajarshi Gupta (Qualcomm Research Silicon Valley)
Markus Jakobsson (Qualcomm Research Silicon Valley)
Jaeyeon Jung (Microsoft Research)
Larry Koved (IBM Research)
Zhichun Li (NEC Research Labs)
Long Lu (Stony Brook University)
Adrian Ludwig (Google)
David Wagner (University of California, Berkeley)___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] CFP: Mobile Security Technologies (MoST) 2014

2014-02-19 Thread Larry Koved
http://mostconf.org/2014/cfp.html 

Mobile Security Technologies (MoST) 2014 

co-located with 
The 34th IEEE Symposium on Security and Privacy (IEEE SP 2014) 
an event of
The IEEE Computer Society's Security and Privacy Workshops (SPW 2014)  

Mobile Security Technologies (MoST) brings together researchers, 
practitioners, policy makers, and hardware and software developers of 
mobile systems to explore the latest understanding and advances in the 
security and privacy for mobile devices, applications, and systems. 
Topics 
We are seeking both short position papers (2-4 pages) and longer papers (a 
maximum of 10 pages). The scope of MoST 2014 includes, but is not limited 
to, security and privacy specifically for mobile devices and services 
related to: 
Device hardware 
Operating systems 
Middleware 
Mobile web 
Secure and efficient communication 
Secure application development tools and practices 
Privacy 
Vulnerabilities and remediation techniques 
Usable security 
Identity and access control 
Risks in putting trust in the device vs. in the network/cloud 
Special applications, such as medical monitoring and records 
Mobile advertisement 
Secure applications and application markets 
Economic impact of security and privacy technologies

Paper Submission Instructions 

All accepted papers will be published online in the workshop proceedings. 
Important Dates 
Paper submission deadline: March 3, 2014 (11:59pm US-PST). 
Acceptance notification: March 31, 2014.

Organizing Committee 
Hao Chen, University of California, Davis 
Larry Koved, IBM Research
Program Chair 
Kapil Singh, IBM Research

Program Committee 
Kevin Butler (University of Oregon)
Hao Chen (University of California, Davis)
William Enck (North Carolina State University)
Adrienne Porter Felt (Google)
Rajarshi Gupta (Qualcomm Research Silicon Valley)
Markus Jakobsson
Jaeyeon Jung (Microsoft Research)
Larry Koved (IBM Research)
Zhichun Li (NEC Research Labs)
Long Lu (Stony Brook University)
Adrian Ludwig (Google)
David Wagner (University of California, Berkeley)
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] CFP: Mobile Security Technologies (MoST) 2014 - March 3 submission deadline

2014-02-08 Thread Larry Koved
http://mostconf.org/2014/cfp.html 

Mobile Security Technologies (MoST) 2014

co-located with 
The 34th IEEE Symposium on Security and Privacy (IEEE SP 2014) 
an event of
The IEEE Computer Society's Security and Privacy Workshops (SPW 2014) 

Mobile Security Technologies (MoST) brings together researchers, 
practitioners, policy makers, and hardware and software developers of 
mobile systems to explore the latest understanding and advances in the 
security and privacy for mobile devices, applications, and systems.
Topics
We are seeking both short position papers (2-4 pages) and longer papers (a 
maximum of 10 pages). The scope of MoST 2014 includes, but is not limited 
to, security and privacy specifically for mobile devices and services 
related to:
Device hardware
Operating systems
Middleware
Mobile web
Secure and efficient communication
Secure application development tools and practices
Privacy
Vulnerabilities and remediation techniques
Usable security
Identity and access control
Risks in putting trust in the device vs. in the network/cloud
Special applications, such as medical monitoring and records
Mobile advertisement
Secure applications and application markets
Economic impact of security and privacy technologies

Paper Submission Instructions

All accepted papers will be published online in the workshop proceedings. 
Important Dates
Paper submission deadline: March 3, 2014 (11:59pm US-PST).
Acceptance notification: March 31, 2014.

Organizing Committee
Hao Chen, University of California, Davis
Larry Koved, IBM Research
Program Chair
Kapil Singh, IBM Research

Program Comittee
Kevin Butler (University of Oregon)
Hao Chen (University of California, Davis)
William Enck (North Carolina State University)
Adrienne Porter Felt (Google)
Rajarshi Gupta (Qualcomm Research Silicon Valley)
Markus Jakobsson
Jaeyeon Jung (Microsoft Research)
Larry Koved (IBM Research)
Zhichun Li (NEC Research Labs)
Long Lu (Stony Brook University)
Adrian Ludwig (Google)
David Wagner (University of California, Berkeley) ___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] CFP: Mobile Security Technologies (MoST) 2014

2014-01-27 Thread Larry Koved
http://mostconf.org/2014/cfp.html 

Mobile Security Technologies (MoST) 2014

co-located with 
The 34th IEEE Symposium on Security and Privacy (IEEE SP 2014) 
an event of
The IEEE Computer Society's Security and Privacy Workshops (SPW 2014) 

Mobile Security Technologies (MoST) brings together researchers, 
practitioners, policy makers, and hardware and software developers of 
mobile systems to explore the latest understanding and advances in the 
security and privacy for mobile devices, applications, and systems.
Topics
We are seeking both short position papers (2-4 pages) and longer papers (a 
maximum of 10 pages). The scope of MoST 2014 includes, but is not limited 
to, security and privacy specifically for mobile devices and services 
related to:
Device hardware
Operating systems
Middleware
Mobile web
Secure and efficient communication
Secure application development tools and practices
Privacy
Vulnerabilities and remediation techniques
Usable security
Identity and access control
Risks in putting trust in the device vs. in the network/cloud
Special applications, such as medical monitoring and records
Mobile advertisement
Secure applications and application markets
Economic impact of security and privacy technologies

Paper Submission Instructions

All accepted papers will be published online in the workshop proceedings. 
Important Dates
Paper submission deadline: March 3, 2014 (11:59pm US-PST).
Acceptance notification: March 31, 2014.

Organizing Committee
Hao Chen, University of California, Davis
Larry Koved, IBM Research
Program Chair
Kapil Singh, IBM Research
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___