[Om-announce] Security Rockstars – Start-up Competition - apply now until July 15, 2016

2016-07-01 Thread res.mb.conference
CALL FOR APPLICATIONS
Security Rockstars - Start-up Competition in Information Security
www.securityrockstars.com

*
APPLY NOW until July 15, 2016
*

Apply now for “Security Rockstars”  -  the European Information Security 
Start-up Competition organized by SBA Research and supported by partners from 
the public and private sector.
The competition's goal is to find and support innovative ideas and solutions in 
the area of Information Security.

Submission deadline for proposals is 15 July 2016. The final pitch takes place 
in the context of the CCS Conference on 24 October 2016 in Vienna 
(https://www.sigsac.org/ccs/CCS2016/).


PRICES:


First place: 20.000 EUR
Second place: 10.000 EUR
Thirs place: 5.000 EUR

TOP 25
A detailed business plan will be drawn up under the guidance of experts and 
with the help of the "Innovation Box" by WhatAVenture. 25+ experts - university 
professors, serial entrepreneurs, CISOs of Fortune 500 companies and venture 
capitalists - will screen these concepts and give feedback. Additionally, the 
best 25 will receive an invitation to attend the final event of the competition 
taking place during ACM CCS 2016, one of the most acknowledged international 
academic conferences for information security.

TOP 10
The Top 10 participants will be invited to join a 5-day start-up boot camp in 
Vienna as well as receive the opportunity to present their idea at a vendor 
booth at the Security Rockstars finals.

TOP 5
The Top 5 participants will present in front of an expert jury as well as 250+ 
senior security professionals from Top 500 companies and leading universities 
during the Security Rockstars finals on the 24th of October in the Hofburg in 
Vienna.


IMPORTANT DATES:


15  July  2016 - Submission deadline for the abstract
1 August 2016 - Nomination Top 25
1 September 2016 - Submission deadline for the business plan
24 September 2016 - Nomination Top 5
20 October 2016 - Sponsor workshops and “Meet the Founders” evening event
21 October 2016 - Sponsor workshops and pitch training
22 October 2016 - Presentation training
23 October 2016 - Final workshop and day of preparation with the experts from 
WhatAVenture
24 October 2016 - ACM CCS 2016 in Vienna with the final pitches as well as 
award ceremony


SUBMISSION


Stage 1 – Abstract

To make entering the competition easy for early-stage start-ups as well, only a 
short abstract or pitch deck is necessary during the first stage, summarizing 
the problem and its technical solution (max. one page) as well as presenting 
the team and the business model (max. one page).

For more information please visit: 
www.securityrockstars.com

Follow Security Rockstars on Facebook and Twitter:
www.facebook.com/SecRockStars
https://twitter.com/SecRockStars


___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] Call for Papers: IWSAC 2016

2016-07-01 Thread Filippo Gaudenzi
[Apologies if you receive multiple copies of this message]
 
***
CALL FOR PAPERS
***

FOURTH INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSAC 2016)
Held in conjunction with the 12nd International Conference on Signal Image 
Technology & Internet Based Systems (SITIS 2016)
One day between November 28 - December 1, 2016, Naples, Italy
Web site: http://sesar.di.unimi.it/IWSAC2016

IWSAC 2016 BACKGROUND AND GOALS
Cloud computing paradigm provides a new environment fostering the integration 
of services located within company boundaries with those in the Cloud. An 
increasing number of organizations implement their business processes and 
applications via runtime composition of services made available in the Cloud by 
external suppliers. This scenario is changing the traditional view of security 
introducing new service security risks and threats, and requires re-thinking of 
current assurance, development, testing, and verification methodologies. In 
particular, security assurance in the cloud is becoming a pressing need to 
increase the confidence of the cloud actors that the cloud and its services are 
behaving as expected, and requires novel approaches addressing cloud 
peculiarities. In addition, the increasing usage of cloud resources as a means 
to perform big data analytics introduces the need of adapting existing 
assurance solutions towards big data. On one side, security assurance 
techniques can benefit from the availability of big data (big data for security 
assurance), while on the other side they can be applied to verify properties of 
big data analytics (security assurance for big data). IWSAC 2016 is the fourth 
edition of the International Workshop on Security Assurance in the Cloud. It 
aims to address the security assurance issues related to Cloud and Big Data 
environments, along with evaluating their impact on traditional security 
solutions for software and network systems.

The workshop seeks submissions from academia and industry presenting novel 
research on all theoretical and practical aspects of security and assurance of 
Cloud and Big Data services, as well as experimental studies in Cloud and Big 
Data infrastructures, the implementation of services, and lessons learned. 
Topics of interest include, but are not limited to:  

* Accountability in the cloud
* Authentication and access control in the cloud
* Big Data for security assurance
* Big Data analytics monitoring and testing
* Big Data analytics verification
* Big Data security and privacy
* Challenges in moving critical systems to the cloud
* Cloud audit, certification, and compliance
* Cloud transparency, introspection, and outrospection
* Data security and privacy in the Cloud
* Evidence-based assurance of cloud services
* Information assurance and trust management 
* Intrusion detection in the cloud
* Policy compliance
* Security assurance in the cloud 
* Security assurance for big data
* Security and assurance protocols in the cloud
* Security and privacy in the cloud
* Service level agreements
* Service procurement in the cloud
* Verification of cloud services

IMPORTANT DATES
Submission deadline: September 11, 2016 (11:59 PM American Samoa time)
Acceptance/Reject notification: October 9, 2016
Camera-ready: October 16, 2016
Author Registration: October 23, 2016

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap papers that have been published or 
that are simultaneously submitted to a journal or conference/workshop with 
proceedings. Each submission should be at most 8 pages in total including 
bibliography and well-marked appendices, and must follow the IEEE double 
columns publication format available at
- [Microsoft Word DOC] 
ftp://pubftp.computer.org/Press/Outgoing/proceedings/instructA4x2.doc
- [LaTex Formatting Macros] 
ftp://pubftp.computer.org/Press/Outgoing/proceedings/IEEE_CS_LatexA4x2.zip

Submissions are to be made to the submission web site 
https://www.easychair.org/conferences/?conf=sitis2016 by selecting track 
"Workshop on Security Assurance in the Cloud". Only pdf files will be accepted. 
Submissions not meeting these guidelines risk rejection without consideration 
of their merits. All submitted papers will be carefully evaluated based on 
originality, significance, technical soundness, and clarity of expression by at 
least three reviewers. The organizers will examine the reviews and make final 
paper selections.

Authors of accepted papers must guarantee that their papers will be presented 
at the workshop. At least one author of each accepted paper must register for 
the workshop. A single registration for the workshop or the conference allows 
attending both events.

All the papers accepted for the workshop will be included in the conference 
proceedings. The proceedings will be published by IEEE Computer Society. 
Content will be submitted to the indexing companies for possible indexing. The 
proceedings will be available at the 

[Om-announce] Call for Papers: IWSAC 2016

2016-07-01 Thread Filippo Gaudenzi
[Apologies if you receive multiple copies of this message]
 
***
CALL FOR PAPERS
***

FOURTH INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSAC 2016)
Held in conjunction with the 12nd International Conference on Signal Image 
Technology & Internet Based Systems (SITIS 2016)
One day between November 28 - December 1, 2016, Naples, Italy
Web site: http://sesar.di.unimi.it/IWSAC2016

IWSAC 2016 BACKGROUND AND GOALS
Cloud computing paradigm provides a new environment fostering the integration 
of services located within company boundaries with those in the Cloud. An 
increasing number of organizations implement their business processes and 
applications via runtime composition of services made available in the Cloud by 
external suppliers. This scenario is changing the traditional view of security 
introducing new service security risks and threats, and requires re-thinking of 
current assurance, development, testing, and verification methodologies. In 
particular, security assurance in the cloud is becoming a pressing need to 
increase the confidence of the cloud actors that the cloud and its services are 
behaving as expected, and requires novel approaches addressing cloud 
peculiarities. In addition, the increasing usage of cloud resources as a means 
to perform big data analytics introduces the need of adapting existing 
assurance solutions towards big data. On one side, security assurance 
techniques can benefit from the availability of big data (big data for security 
assurance), while on the other side they can be applied to verify properties of 
big data analytics (security assurance for big data). IWSAC 2016 is the fourth 
edition of the International Workshop on Security Assurance in the Cloud. It 
aims to address the security assurance issues related to Cloud and Big Data 
environments, along with evaluating their impact on traditional security 
solutions for software and network systems.

The workshop seeks submissions from academia and industry presenting novel 
research on all theoretical and practical aspects of security and assurance of 
Cloud and Big Data services, as well as experimental studies in Cloud and Big 
Data infrastructures, the implementation of services, and lessons learned. 
Topics of interest include, but are not limited to:  

* Accountability in the cloud
* Authentication and access control in the cloud
* Big Data for security assurance
* Big Data analytics monitoring and testing
* Big Data analytics verification
* Big Data security and privacy
* Challenges in moving critical systems to the cloud
* Cloud audit, certification, and compliance
* Cloud transparency, introspection, and outrospection
* Data security and privacy in the Cloud
* Evidence-based assurance of cloud services
* Information assurance and trust management 
* Intrusion detection in the cloud
* Policy compliance
* Security assurance in the cloud 
* Security assurance for big data
* Security and assurance protocols in the cloud
* Security and privacy in the cloud
* Service level agreements
* Service procurement in the cloud
* Verification of cloud services

IMPORTANT DATES
Submission deadline: September 11, 2016 (11:59 PM American Samoa time)
Acceptance/Reject notification: October 9, 2016
Camera-ready: October 16, 2016
Author Registration: October 23, 2016

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap papers that have been published or 
that are simultaneously submitted to a journal or conference/workshop with 
proceedings. Each submission should be at most 8 pages in total including 
bibliography and well-marked appendices, and must follow the IEEE double 
columns publication format available at
- [Microsoft Word DOC] 
ftp://pubftp.computer.org/Press/Outgoing/proceedings/instructA4x2.doc
- [LaTex Formatting Macros] 
ftp://pubftp.computer.org/Press/Outgoing/proceedings/IEEE_CS_LatexA4x2.zip

Submissions are to be made to the submission web site 
https://www.easychair.org/conferences/?conf=sitis2016 by selecting track 
"Workshop on Security Assurance in the Cloud". Only pdf files will be accepted. 
Submissions not meeting these guidelines risk rejection without consideration 
of their merits. All submitted papers will be carefully evaluated based on 
originality, significance, technical soundness, and clarity of expression by at 
least three reviewers. The organizers will examine the reviews and make final 
paper selections.

Authors of accepted papers must guarantee that their papers will be presented 
at the workshop. At least one author of each accepted paper must register for 
the workshop. A single registration for the workshop or the conference allows 
attending both events.

All the papers accepted for the workshop will be included in the conference 
proceedings. The proceedings will be published by IEEE Computer Society. 
Content will be submitted to the indexing companies for possible indexing. The 
proceedings will be available at the