[Om-announce] ​ Summer School on Real-World Crypto and Privacy, June 5-10, Croatia

2016-03-02 Thread Veelasha
 [Apologies to those who receive multiple copies of this announcement]




​ ​
​  ​
 Call for Participation


​​
Summer School on Real-World Crypto and Privacy


​ ​
 June 5-10, 2016, Sibenik (Croatia)

 http://summerschool-croatia.cs.ru.nl/2016/



After the big success of the Summer School on Real-World Crypto and
Privacy in 2015, we are planning the next edition for June 5-10, 2016 in
Sibenik, Croatia.

The purpose of the School is to attract not only Ph.D. students and
postdocs, but also people from industry who are interested in recent
developments in cryptography. The program will start with 2 days of
plenary talks followed by an excursion to the Kornati National Park on
June 8. The last 2 days will include more advanced talks on recent
topics organized in two parallel sessions.

List of confirmed invited speakers:

- Lejla Batina, Radboud University, The Netherlands and KU Leuven, Belgium
- Gilles Barthe, IMDEA Software Institute, Spain
- David Basin, ETH Zurich, Switzerland
- Daniel J. Bernstein, Technische Universiteit Eindhoven, The
Netherlands and University of Illinois at Chicago, USA
- Joppe Bos, NXP Semiconductors, Belgium
- Srdjan Capkun, ETH Zurich, Switzerland
- Joan Daemen, STMicroelectronics and Radboud University
- Claudia Diaz, KU Leuven, Belgium
- Roger Dingledine, The Tor Project, USA
- Rachel Greenstadt, Drexel University, USA
- J. Alex Halderman, University of Michigan, USA
- Nadia Heninger, University of Pennsylvania, USA
- Ari Juels, Cornell University, USA
- Tanja Lange, Technische Universiteit Eindhoven, The Netherlands
- Nele Mentens, KU Leuven, Belgium
- Guevara Noubir, Northeastern University, USA
- Kenny Paterson, RHUL, UK
- Adrian Perrig, ETH Zurich, Switzerland
- Bart Preneel, KU Leuven, Belgium
- Phillip Rogaway, University of California, Davis, USA
- Peter Schwabe, Radboud University, The Netherlands
- Benjamin Smith, INRIA and École Polytechnique, France
- Martijn Stam, University of Bristol, UK
- François-Xavier Standaert, Université catholique de Louvain, Belgium
- Carmela Troncoso, IMDEA Software Institute, Spain
- Ingrid Verbauwhede, KU Leuven, Belgium


Early registration is open until May 01.
Stipends for students are also available.

For more information, see http://summerschool-croatia.cs.ru.nl/2016/
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: IEEE Access Special Issue on Big Data, Due on March 15 (extended, firm)

2016-03-02 Thread Shui Yu
Dear colleagues and friends,

Due to many requests for extension, we have extended this SI for two weeks.



we apology for possible cross posting, and thank you for distributing this
CFP

---

*IEEE Assess is the most visible journal of IEEE, which will bring
significant citation of your work.*



*Theoretical Foundations for Big Data Applications: Challenges and
Opportunities (*
*http://www.ieee.org/publications_standards/publications/ieee_access/theoretical_foundations_for_big_data.pdf*
*
)*



Submission deadline: March 15, 2016 (firm, extended)



It is critical to explore theoretical perspective of Big Data to
efficiently and effectively guide its applications. We have witnessed the
significant development in Big Data from various communities, such as the
mining and learning algorithms from the artificial intelligence community,
networking facilities from networking community, and software platforms for
software engineering community. However, Big Data applications introduce
unprecedented challenges to us, and existing theories and techniques have
to be extended, upgraded to serve the forthcoming real Big Data
applications, we even need to invent new tools for Big Data applications.
We desperately desire theoretical work from various disciplines, such as
statistics, machine learning, graph theory, networking, parallel computing,
security and privacy, and so on.



The purpose of this special section is to solicit the latest theoretical
research outputs for Big Data applications. We prefer survey or tutorial
style articles with clear application background for this special section.
The areas of interest include, but are not limited to, the following.



-  Measurement for Big Data

-  Mathematical representation for Big Data

-  Statistics for Big Data

-  Mining and learning theory for Big Data

-  Networking theory for Big Data

-  Security and privacy theory for Big Data

-  Data compression for Big Data

-  Parallel and distributed algorithms for Big Data

-  Software platform design for Big Data

-  Scheduling theory for Big Data

-  Performance modelling for Big Data tools

-  Theoretical challenges in Big Data

-  Theoretical solutions for Big Data

-  Data management for Big Data



We highly recommend the submission of multimedia with each article as it
significantly increases the visibility and usage of articles.



Associate Editor: Dr Shui Yu, Deakin University, Australia. Email:
shui...@deakin.edu.au

Guest Editors:

1) Dr Chonggang Wang, Member Technical Staff, InterDigital Communications,
USA

2) Prof Ke Liu, Director of Division of Computer Science, National Natural
Science Foundation of China

3) Prof Albert Y. Zomaya, School of Information Technologies, The
University of Sydney, Australia



IEEE *Access *Editor in Chief: Michael Pecht, Professor and Director,
CALCE, University of Maryland



Paper submission: Contact Associate Editor and submit manuscript to:
http://mc.manuscriptcentral.com/ieee-access



For information regarding IEEE *Access *including its publication policy
and fees, please visit the website http://ieee.org/ieee-access

For Inquiries regarding this special section, please contact: Bora M. Onat,
Managing Editor, IEEE *Access *(Phone: (732) 562-6036, ieeeacc...@ieee.org)
or Dr Shui Yu (shui...@deakin.edu.au )

-- 

-

Shui YU, PhD, Senior Lecturer

School of Information Technology, Deakin University,

221 Burwood Highway, Burwood, VIC 3125,  Australia.

Telephone:0061 3 9251 7744

http://www.deakin.edu.au/~syu
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Spam:*****] [Om-announce] Call For Papers: DASC 2016, Auckland, New Zealand, 8-12 August 2016

2016-03-02 Thread Conference Contact
Apologies if you receive multiple copies of this message

 IEEE DASC 2016 CFP ***
The 14th IEEE International Conference on Dependable, Autonomic and Secure
Computing
(DASC 2016)
http://cse.stfx.ca/~dasc2016/
Auckland, New Zealand, 8-12 August 2016
Sponsored by
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable
Computing (TCSC)


INTRODUCTION
=

As computer systems become increasingly large and complex, their
Dependability, Security and Autonomy play critical role at supporting
next-generation science, engineering, and commercial applications. These
systems consist of heterogeneous software/hardware/network components of
changing capabilities, availability, and in varied contexts. They provide
computing services to large pools of users and applications, and thus are
exposed to a number of dangers such as accidental/deliberate faults, virus
infections, malicious attacks, illegal intrusions, natural disasters, etc.
As a result, too often computer systems fail, become compromised, or
perform poorly and therefore untrustworthy. Thus, it remains a challenge to
design, analyse, evaluate, and improve the dependability and security for a
trusted computing environment. Trusted computing targets computing and
communication systems as well as services that are autonomous, dependable,
secure, privacy protect-able, predictable, traceable, controllable,
assessable and sustainable.

The scale and complexity of information systems evolve towards overwhelming
the capability of system administrators, programmers, and designers. This
calls for the autonomic computing paradigm, which meets the requirements of
self-management by providing self-optimization, self-healing,
self-configuration, and self-protection. As a promising means to implement
dependable and secure systems in a self-managing manner, autonomic
computing technology needs to be further explored. On the other hand, any
autonomic system must be trustworthy to avoid the risk of losing control
and retain confidence that the system will not fail. Trusted and autonomic
computing and communications need synergistic research efforts covering
many disciplines, ranging from computer science and engineering, to the
natural sciences and the social sciences. It requires scientific and
technological advances in a wide variety of fields, as well as new
software, system architectures, and communication systems that support the
effective and coherent integration of the constituent technologies.

DASC 2016 will be held on 8-12 August 2016 in Auckland, New Zealand,
co-located with CyberSciTech 2016, IEEE DataCom 2016 and IEEE PICom 2016.
It aims to bring together computer scientists, industrial engineers, and
researchers to discuss and exchange experimental and theoretical results,
novel designs, work-in-progress, experience, case studies, and
trend-setting ideas in the areas of dependability, security, trust and/or
autonomic computing systems.


SCOPE AND TOPICS


Topics of particular interests include the following tracks, but are not
limited to:

- Autonomic Computing Theory, Models, Architectures and Communications
- Cloud Computing with Autonomic and Trusted Environment
- Dependable Automatic Control Techniques and Systems
- Dependability Models and Evaluation Algorithms
- Dependable Sensors, Devices, Embedded Systems
- Dependable Electronic-Mechanical Systems, Optic-Electronic Systems
- Self-improvement in Dependable Systems
- Self-healing, Self-protection and Fault-tolerant Systems
- Hardware and Software Reliability, Verification and Testing
- Software Engineering for Dependable Systems
- Safety-critical Systems in Transportation and Power System
- Security Models and Quantifications
- Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS
- Self-protection and Intrusion-detection in Security
- DRM, Watermarking Technology, IP Protection
- Context-aware Access Control
- Virus Detections and Anti-Virus Techniques/Software
- Cyber Attack, Crime and Cyber War
- Human Interaction with Trusted and Autonomic Computing Systems
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- QoS in Communications and Services
- Information and System Security
- Reliable Computing and Trusted Computing
- Wireless Emergency and Security Systems
- Information Technology in Biomedicine
- Multimedia Security Issues over Mobile and Wireless Networks
- Multimedia in Mobile Computing: Issues, System Design and Performance
Evaluation
- Software Architectures and Design for Emerging Systems
- Software Engineering for Emerging Networks, Systems, and Mobile Systems
- Service Oriented Architectures


IMPORTANT DATES
===

Workshop Proposal Due: 29 February 2016
Paper Submission Due: 15 March 2016
Author Notification: 30 April 2016
Camera-ready Paper Due: 31 May 2016
Registration Due: 31 May 2016
Conference Date: 8-12 August 2016


PAPER SUBMISSION GUIDELINE

[Om-announce] AiML-2016: FINAL CALL FOR PAPERS

2016-03-02 Thread Stéphane Demri
(sorry for multiple copies)

AiML-2016:  FINAL CALL FOR PAPERS
Abstract submission: 10 March 2016
Full paper submission: 17 March 2016

11TH INTERNATIONAL CONFERENCE ON ADVANCES IN MODAL LOGIC
BUDAPEST, 29 AUGUST -- 2 SEPTEMBER 2016

  http://phil.elte.hu/aiml2016/
 

Advances in Modal Logic is an initiative aimed at presenting
the state of the art in modal logic and its various applications. The
initiative consists of a conference series together with volumes based 
on the conferences. Information about the AiML series can be obtained 
at http://www.aiml.net. AiML-2016 is the 11th conference in the series.

TOPICS
We invite submission on all aspects of modal logic, including:

- history of modal logic
- philosophy of modal logic
- applications of modal logic
- computational aspects of modal logic (complexity and decidability of
modal and temporal logics, modal and temporal logic programming,
model checking, model generation, theorem proving for modal logics)
- theoretical aspects of modal logic (algebraic/categorical perspectives
on modal logic, coalgebraic modal logic, completeness and canonicity,
correspondence and duality theory, many-dimensional modal logics,
modal fixed point logics, model theory of modal logic, proof theory
of modal logic)
- specific instances and variations of modal logic (description logics,
modal logics over non-boolean bases, dynamic logics and other process
logics, epistemic and deontic logics, modal logics for agent-based
systems, modal logic and game theory, modal logic and grammar
formalisms, provability and interpretability logics, spatial and
temporal logics, hybrid logic, intuitionistic logic, substructural
logics, computationally light fragments of all such logics)

Papers on related subjects will also be considered.

PAPER SUBMISSIONS
There will be two types of submissions to AiML-2016:

(1) Full papers for publication in the proceedings and presentation at the
conference.

(2) Short presentations intended for presentation at the conference
but not for the published proceedings.

Both types of papers should be submitted electronically using the
EasyChair submission page at

  https://easychair.org/conferences/?conf=aiml16

At least one author of each accepted paper or short presentation must
register for and attend the conference.

(1) FULL PAPERS
Authors are invited to submit, for presentation at the conference and
publication in the proceedings, full papers reporting on original 
research and not submitted elsewhere. The proceedings of AiML-2016 will 
be published by College Publications

http://www.collegepublications.co.uk

in a volume to be made available at the conference.

The submissions should be at most 15 pages, with an optional technical
appendix of up to 5 pages, together with a plain-text abstract of 
100-200 words. The submissions must be typeset in LaTeX, using the style 
files and template that is provided on the AiML-2016 website
http://phil.elte.hu/aiml2016/.

We also ask authors of full papers to submit the abstract in plain 
text via EasyChair by 10 March.

(2) SHORT PRESENTATIONS.
These should be at most 5 pages. They may describe preliminary
results, work in progress etc., and will be subject to light reviewing. 
The accepted submissions will be made available at the conference, and the
authors will have the opportunity to give short presentations 
(of up to 15 minutes) on them.

INVITED SPEAKERS INCLUDE: 
Kit Fine (New York University, USA)
Sonja Smets (ILLC, Universiteit van Amsterdam)
Yde Venema  (ILLC, Universiteit van Amsterdam)
Guram Bezhanishvili (New Mexico State University)

LOCAL ORGANIZING COMMITTEE
Tamas Bitai (Eotvos University, Budapest, Hungary)
Reka Markovich (Eotvos University, Budapest, Hungary)
Andras Mate (Eotvos University, Budapest, Hungary)
Péter Mekis (Eotvos University, Budapest, Hungary)
Attila Molnar (Eotvos University, Budapest, Hungary)
Gergely Szekely  (Alfred Rényi Institute of Mathematics, Hungarian Academy of 
Sciences)

PROGRAMME COMMITTEE
Natasha Alechina (University of Nottingham)
Carlos Areces (FaMAF, Universidad Nacional de Córdoba)
Philippe Balbiani (IRIT, Toulouse, France)
Alexandru Baltag (FNWI ILLC)
Lev Beklemishev (Steklov Mathematical Institute of Russian Academy of Sciences 
in Moscow)
Thomas Bolander (Technical University of Denmark)
Torben Brauner (Roskilde University, Denmark)
Serenella Cerrito (Laboratoire IBISC, Evry France)
Stephane Demri (LSV, CNRS, ENS Cachan)
Valeria de Paiva (Nuance, USA)
David Fernandez-Duque (Instituto Tecnológico Autónomo de México)
Melvin Fitting (Lehman College, CUNY, USA)
David Gabelaia  (The Free University of Tbilisi, Tbilisi, Georgia)
Silvio Ghilardi (Università degli Studi di Milano, Italy)
Valentin Goranko (Stockholm University)
Rajeev Gore (The Australian National University)
Andreas Herzig (IRIT, Toulouse, France)
Rosalie Iemhoff (Utrecht University)
Agi Kurucz (King's College 

[Om-announce] Extended Deadline: ARES EU PROJECTS SYMPOSUM 2016 - Call for Workshops

2016-03-02 Thread res.mb.conference
 ARES EU PROJECTS SYMPOSUM 2016 - CALL FOR WORKSHOPS

**
The 11th International Conference on Availability, Reliability and Security

 (ARES 2016)
August 31 - September 2, 2016, Salzburg, Austria
http://www.ares-conference.eu/conference/ares-eu-symposium/
**

***
ARES EU SYMPOSIUM

The 11th International Conference on Availability, Reliability and Security 
(ARES) will bring together researchers and practitioners in the area of 
dependability. ARES will highlight the various aspects of security - with 
special focus on the crucial linkage between availability, reliability and 
security. Based on the success of the ARES EU Projects Symposium 2015 we 
cordially invite EU project partners to organize a workshop at the ARES EU 
Projects Symposium 2016.

The ARES EU Symposium will be held in conjunction with ARES 2016 and will offer 
you the following opportunities:
* Disseminate the results of your EU research projects (Horizon 2020, FP7, 
ERA-NET, ITEA, COST)
* Meet potential project partners
* Exchange ideas within the scientific community
* Explore Salzburg


CONFERENCE OFFICERS

General Chair
Dominik Engel, Salzburg University of Applied Sciences, Austria
Program Committee Chairs
Stephen B. Wicker, Cornell University, USA
Dominik Engel, Salzburg University of Applied Sciences, Austria


IMPORTANT DATES

Proposal Submission Deadline: February 29, 2016  March 17, 2016
Workshop Proposal Notification: 2 weeks after submission of proposal
Proceedings Version: June 20, 2016
Conference:  August 31 - September 2, 2016

Tentative Schedule:
09:00 - 10:30 Symposium sessions
10:30 - 11:00 Coffee break
11:00 - 12:30 Symposium sessions
12:30 - 14:00 Lunch
14:00 - 16:00 Consortium meetings / ARES sessions / free time for sightseeing
16:00 - 18:00 Networking / poster session
18:00 Networking Event (meet ARES participants)


SUBMISSION

Proposals should include following items:
* Organisational Information
o Name and affiliation of organisers
o Name of the project and link to website
o Programme: Horizon 2020, FP7, ERA-NET, ITEA, COST
o List of project partners that you intend to invite
o Open / Closed session: Can researchers related to the topics that are not in 
the consortium
 (1) attend and/or (2) submit to the session?
* Content
o Project abstract
o Short description of the planned symposium session

If the papers should be published by CPS (IEEE Xplore Digital Library) please 
address also following items:
* Programme committee
* Planned review process. The acceptance rate should be less than 40%.

Please send your proposal to Shadya Ayoub 
(say...@sba-research.org) by March 17, 2016.


TOPCIS of interest include, but are not limited to:

Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security   Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and 
Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] Call for Papers - 23rd ACM Conference on Computer and Communication Security (ACM CCS 2016)

2016-03-02 Thread Giovanni Livraga
ACM CCS 2016 Call for Papers

23rd ACM Conference on Computer and Communication Security
October 24 - 28, 2016, Hofburg Palace, Vienna, Austria


Paper Submission Due:May 23, 2016 23:59 UTC-11
First round reviews sent to authors: July 5, 2016
Author comments due on:  July 8, 2016 23:59 UTC-11
Acceptance Notification: July 22, 2016
Camera Ready Papers Due: August 16, 2016


The ACM CCS conference seeks submissions from academia, government, 
and industry presenting novel research results in all practical and 
theoretical aspects of computer and communications security. Papers 
should be related to the construction, evaluation, application, or 
operation of secure systems. Theoretical papers must make a convincing 
argument for the relevance of the results to secure systems. All topic 
areas related to computer and communications security are of interest 
and in scope. Accepted papers will be published by ACM Press in the 
conference proceedings.


Paper Submission Process

Submissions must be made by the deadline of Monday, May 23, 2016 23:59 UTC-11. 
The review process will be carried out in two phases and authors will 
have an opportunity to comment on the first-phase reviews.

Submitted papers must not substantially overlap papers that have been 
published or that are simultaneously submitted to a journal, conference 
or workshop. Simultaneous submission of the same work is not allowed. 
Note that submitted papers cannot be withdrawn from the process after 
the first phase reviews are received by authors. Authors of accepted 
papers must guarantee that their papers will be presented at the 
conference.


Paper Format

Submissions must be at most 12 pages in double-column ACM format 
(http://www.acm.org/sigs/publications/ proceedings-templates) including 
the bibliography and well-marked appendices. Submissions must be 
anonymized and avoid obvious self-references. Only PDF files will be 
accepted. Submissions not meeting these guidelines risk rejection without 
consideration of their merits.


Conflicts of Interest
-
The program co-chairs require cooperation from both authors and program 
committee members to prevent submissions from being evaluated by reviewers 
who have a conflict of interest. During the submission process, we will 
ask authors to identify members of the program committee with whom they 
have a conflict of interest. This includes anyone with close personal 
or professional relationship to any of the authors, such as close family 
members, people from the same department/group, and recent collaborators 
(e.g. collaborated on a joint paper in the last two years). It also 
includes anyone in a position of substantial influence on (or by) the a
uthors, such as advisor or advisee (at any time in the past), 
line-of-management 
relationship, grant program manager, etc.

In rare cases, we will allow conflict-of-interest designation due to 
personal or professional animosity. In such cases, we require that in 
addition to marking the conflict during submission, the authors contact 
the program co-chairs by email and explain the reason for this conflict.

Program committee members who have a conflict of interest with a paper, 
including program co-chairs, will be excluded from evaluation and 
discussion of the paper. In the case of a program co-chair, the other 
co-chairs who do not have conflicts will be responsible for managing 
that paper.

___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] Call for Papers - Technical Sessions at RTSI 2016

2016-03-02 Thread sara.foresti
TECHNICAL SESSION CALL FOR PAPERS

***
Technical sessions on:
* New Frontiers in Adaptive Computing Systems
* Security and Privacy in Emerging Scenarios

2nd International Forum on Research and Technologies for Society
and Industry (RTSI 2016)
Bologna, Italy, 7-9 September 2016
http://rtsi16.apice.unibo.it
***

RTSI 2016 is Organized by the IEEE Italy Section and Alma Mater 
Studiorum - Universita' di Bologna, Italy.
The primary purposes of the RTSI series of events are:
- to promote and to strengthen partnerships and cooperation between
academia and industry;
- to increase the public understanding and awareness of how engineering
and technology can positively affect people quality of life;
- to promote discussion between the research community and related
government bodies about effective and successful research policies;
- to disseminate recent advancements, research/technology solutions,
and novel applications;
- to discuss inter-disciplinary ideas and to promote cross-fertilizing
cooperation between researchers working in different research areas.


NEW FRONTIERS IN ADAPTIVE COMPUTING SYSTEMS
(Chair: Marco Santambrogio - Politecnico di Milano)
As the push for parallelism and adaptability continues to increase
the complexity of computing systems, system design has become
incredibly complex; optimizing for performance and power efficiency
is now nearly impossible for the application programmer. 
To assist the programmer, a variety of techniques for optimizing
performance and power at runtime have been developed, but many
employ the use of speculative threads or performance counters.
These approaches result in stolen cycles, or the use of an extra
core, and such expensive penalties can greatly reduce the potential
gains. Within this context imagine a revolutionary computing system
that can observe its own execution and optimize its behavior around
a user's or application's needs. Imagine a programming capability
by which users can specify their desired goals rather than how to
perform a task, along with constraints in terms of an energy
budget, a time constraint, or simply a preference for an approximate
answer over an exact answer. Imagine further a computing system that
performs better according to a user's preferred goal the longer it
runs an application. Such an architecture will enable, for example,
a handheld radio or a cell phone that can run cooler the longer the
connection time. Or, a system that can perform reliably and
continuously in a range of environments by tolerating hard and
transient failures through self healing. Adaptive computing systems
are the key technology to succeed in doing this. They will be able
to configure, heal, optimize, improve interaction and protect
themselves without the need for human intervention, exploiting
abilities that allow them to automatically find the best way to
accomplish a given goal with the resources at hand. Within this
context, imagine a revolutionary computing system that can observe
its own execution and optimize its behavior around the external
environment, user's and application's needs. Research in adaptive
computing systems leverages the new balance of resources to improve
performance, utilization, reliability and programmability.
Within this context, the proposed session is intended to present
innovative works in this challenging area.


SECURITY AND PRIVACY IN EMERGING SCENARIOS
(Chair: Sara Foresti - Universita' degli Studi di Milano)
The recent evolution of ICT enables people to perform tasks and access
data/services anywhere at any time, since people (and things) can
always be connected to the Internet. These emerging scenarios provide
unprecedented advantages for final users, which however come at the
price of novel security and privacy risks. Today, more and more data
are stored and elaborated in the cloud (under the control of a third
party), home and personal appliances are accessible form outside
(making them more vulnerable to attacks), sensors track users'
locations and activities (and exchange data). These are only a few
examples of how emerging scenarios are changing the security and
privacy risks to which we are exposed. This technical session aims
to bring together researchers and practitioners interested in
discussing and finding solutions to the security and privacy issues
characterizing emerging scenarios.


IMPORTANT DATES
Submission of draft papers: 29 March 2016
Notification of acceptance: 28 April 2016
Final submission: 10 June 2016
Early registration: 11 July 2016


AUTHORS INSTRUCTIONS
Prospective Authors of papers are invited to submit a draft paper
(typically 2-4 pages for the draft version, 4-6 pages for the final
paper, in standard IEEE two-column format) via EDAS by suggesting the
related Technical Session. 
The paper should contain a complete description of the proposed
technical