[Om-announce] SocialSec 2017 Melbourne: Submission Deadline Extended to 20 Sep 2017

2017-09-12 Thread Conference Contact
***
3rd International Symposium on Security and Privacy in Social Networks and
Big Data
Melbourne, Australia, 13-15 December 2017
http://nsclab.org/socialsec2017/
***


Symposium Outline
=

Social Networks and Big Data have pervaded all aspects of our daily lives.
With their unparalleled popularity, social networks have evolved from the
platforms for social communication and news dissemination, to indispensable
tools for professional networking, social recommendations, marketing, and
online content distribution. Social Networks, together with other
activities, produce Big Data that is beyond the ability of commonly used
computer software and hardware tools to capture, manage, and process within
a tolerable elapsed time. It has been widely recognised that security and
privacy are the critical challenges for Social Networks and Big Data
applications due to their scale, complexity and heterogeneity.

The 3rd International Symposium on Security and Privacy in Social Networks
and Big Data (SocialSec 2017) will be held in Melbourne, Australia on 13-15
December 2017. It follows the success of SocialSec 2015 in Hangzhou, China
and SocialSec 2016 in Fiji. The aim of the symposium is to provide a
leading edge forum to foster interactions between researchers and
developers with the security and privacy communities in Social Networks and
Big Data, and to give attendees an opportunity to interact with experts in
academia, industry, and governments.


Co-located Events
=

- 13th International Conference on Information Security Practice and
Experience (ISPEC 2017)


Important Dates
===

Paper Submission Due: Extended to 20 September 2017
Author Notification: 30 September 2017
Camera-ready Paper Due: 05 October 2017
Registration Due: 05 October 2017
Symposium Date: 13-15 December 2017


Symposium Topics


The symposium seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
security and privacy in Social Networks and Big Data. Papers describing
case studies, implementation experiences, and lessons learned are also
encouraged. Topics of interest include but are not limited to:

- Attacks in/via social networks
- Information control and detection
- Malicious behaviour modelling in social networks
- Malicious information propagation via social networks
- Phishing problems in social networks
- Privacy protection in social networks
- Big data analytics for threats and attacks prediction
- Spam problems in social networks
- Trust and reputations in social networks
- Big data outsourcing
- Big data forensics
- Security and privacy in big database
- Applied cryptography for big data
- Big data system security
- Mobile social networks security
- Security and privacy in cloud
- Forensics in social networks and big data


Instructions for authors


Submission Portal: https://easychair.org/conferences/?conf=socialsec2017

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. The page limit is 16 pages excluding appendices and
bibliography and up to 20 pages in total, using at least 11-point fonts and
with reasonable margins. Detailed auther instructions and LaTeX/Word
templates for LNCS publications can be found via the following link.

Springer LNCS Author Information:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. All papers accepted
by SocialSec 2017 will be included in a special track of the ISPEC 2017
conference proceedings, published by Springer as part of the Lecture Notes
in Computer Science (LNCS) series, and indexed by EI Engineering, ISI
Conference Proceedings Index, Scopus and other major indexing services.

Journal Special Issue
=

Selected papers presented at SocialSec 2017 will be invited to consider
submission after significant extension for the following special issue in
SCI-Indexed Journal:

Special Issue on Social Network Security and Privacy
Concurrency and Computation: Practice and Experience (CCPE) (Impact Factor:
1.133)
http://www.cc-pe.net/journalinfo/issues/2018.html#ISPEC/SocialSec2017


Conference Organisation
===

General Chair
-
Symeon Papadopoulos, CERTH-ITI, Greece
Yang Xiang, Swinburne University of Technology, Australia
Wanlei Zhou, Deakin University, Australia

Program Committee Chair
---
Yuhong Liu, Santa Clara University, USA
Yu Wang, Deakin University, Australia

Publicity Chair
---
Joseph K. Liu, Monash University, Australia


Program Committee

[Om-announce] CFP: IDCS 2017, 11-13 December 2017, Mana Island Resort and Spa, Fiji

2017-07-19 Thread Conference Contact
urne, Australia
Giancarlo Fortino, University of Calabria, Italy
Dimitrios Georgakopolous, RMIT University, Australia
Mukaddim Pathan, Telstra, Australia


Conference Contact
==

Email: neer...@unifiji.ac.fj
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: CSS 2017, Xi'an, China, October 23-25, 2017

2017-05-02 Thread Conference Contact
CSS 2017 CFP



The CSS-2017 symposium is the 9th International Symposium on Cyberspace
Safety and Security. It provides a leading edge forum to foster interaction
between researchers and developers with the cyberspace safety and security
communities, and to give attendees an opportunity to network with experts
in this area. It focusses on Cyberspace Safety and Security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability issues of cyberspace.



*Venue & Time*: Xi’an China, October 23-25, 2017

*Important Dates*: May 27, 2017 (Paper Submission Due), August 15, 2017
(Acceptance Notification)



*Tracks*


· Track 1: Privacy Preserving

· Track 2: Intrusion Detection and Forensics

· Track 3: Cyber Physical System Security

· Track 4: Big Data Security

· Track 5: Mobile Security


*Special issues*


Future Generation Computer Science (SCI, IF=2.786)

Concurrency and Computation: Practice and Experience (SCI, IF=0.94)

Cluster Computing (SCI, IF=1.514)


*Scope*


We invite submissions from academia, government, and industry presenting
novel research on all theoretical and practical aspects of computer and
network security. Areas of interest for CSS 2017 include, but are not
limited to:



Web security [Track 1,2,4]

Database security [Track 4]

Adversary machine learning [Track 4]

Data mining security [Track 4]

Watermarking [Track 2]

Security in social networks [Track 1,2,4]

Access control [Track 2,3,5]

Cyber physical security [Track 3]

Trust computing [Track 2,3,5]

Digital forensics [Track 2]

Intrusion detection [Track 2]

Malware and botnet [Track 2]

Vulnerability and risk assessment [Track 2,3,5]

Denial-of-Service attacks [Track 2,3]

Anonymous communication [Track 2]

Security in wireless communication [Track 2,5]

Security in mobile devices [Track 5]

Privacy preserving [Track 1]

Attacks to privacy [Track 1]

Cloud computing security [Track 1,2,4]

Operation system security [Track 2,5]

Software security [Track 2,5]

Security architecture [Track 2,3]



*Instructions for authors*



The accepted papers from this conference will be submitted for publication
in IEEE Xplore as well as other Abstracting and Indexing (A) databases
(EI Compendex). Distinguished papers, after further revisions, will be
considered for possible publication in several SCI & EI indexed special
issues of prestigious international journals. By submitting a paper to the
conference, authors assure  that if the paper is accepted, at least one
author will attend the conference and present the paper. Papers should be
written in English conforming to the IEEE conference proceedings format
(8.5" x 11", Two-Column). Papers should be submitted through the paper
submission system at the conference website. Full Papers (up to 8 pages, or
12 pages with the over length charge) and Short Papers (up to 4 pages) are
solicited.
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: SocialSec 2016, Fiji with new SCI-Indexed Journal Special Issue

2016-08-25 Thread Conference Contact

2nd IEEE International Symposium on Security and Privacy in Social Networks
and Big Data
Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016
http://nsclab.org/socialsec2016/


We are delighted to announce that SocialSec 2016 will feature a special
issue on Social Network Security and Privacy in Concurrency and
Computation: Practice and Experience (CCPE).

JOURNAL SPECIAL ISSUE
=

Selected papers presented at the SocialSec 2016 will be invited to consider
submission (after significant extension) for the following special issue in
CCPE.

Special Issue on Social Network Security and Privacy
Concurrency and Computation: Practice and Experience (CCPE)
http://www.cc-pe.net/journalinfo/


Symposium Outline
=

Social Networks and Big Data have pervaded all aspects of our daily lives.
With their unparalleled popularity, social networks have evolved from the
platforms for social communication and news dissemination, to indispensable
tools for professional networking, social recommendations, marketing, and
online content distribution. Social Networks, together with other
activities, produce Big Data that beyond the ability of commonly used
computer software and hardware tools to capture, manage, and process within
a tolerable elapsed time.

Due to their scale, complexity and heterogeneity, a number of technical and
social challenges in Social Networks and Big Data must be addressed. It has
been widely recognised that security and privacy are the critical issues.
On one hand, Social Networks and Big Data have been an effective platform
for the attackers to launch attacks and distribute malicious information.
On the other hand, privacy leakage through Social Networks and Big Data has
become common exercise. Following the success of the first event, the aim
of the 2nd IEEE International Symposium on Security and Privacy in Social
Networks and Big Data (IEEE SocialSec 2016) is to provide a leading edge
forum to foster interactions between researchers and developers with the
security and privacy communities in Social Networks and Big Data, and to
give attendees an opportunity to interact with experts in academia,
industry, and governments.

IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa,
Yanuca Island, Fiji on 8-10 December 2016. Get ready to enjoy a unique trip
in an wonderful island in this Globe.


Co-located Events
=

- 6th International Symposium on Cloud and Service Computing (SC2-2016)
- 3rd International Conference on Internet of Vehicles (IOV 2016)
- 16th International Conference on Computer and Information Technology (CIT
2016)


Important Dates
===

Paper Submission Due: 7 September 2016
Author Notification: 28 September 2016
Camera-ready Paper due: 5 October 2016
Registration due: 5 October 2016
Symposium Date: 8-10 December 2016


Symposium Topics


The symposium seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
security and privacy in Social Networks and Big Data. Papers describing
case studies, implementation experiences, and lessons learned are also
encouraged. Topics of interest include but are not limited to:

- Attacks in/via social networks
- Information control and detection
- Malicious behaviour modelling in social networks
- Malicious information propagation via social networks
- Phishing problems in social networks
- Privacy protection in social networks
- Big data analytics for threats and attacks prediction
- Spam problems in social networks
- Trust and reputations in social networks
- Big data outsourcing
- Big data forensics
- Security and privacy in big database
- Applied cryptography for big data
- Big data system security
- Mobile social networks security
- Security and privacy in cloud
- Forensics in social networks and big data


Instructions for authors


Submission Website: https://easychair.org/conferences/?conf=socialsec2016

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 8 pages in A4 format, including tables, figures, references and
appendixes, in IEEE Computer Society proceedings format with Portable
Document Format (.pdf). Please refer to
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
for preparing the submission.

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a paper
should be regarded as a commitment that, should the paper be accepted, at
least one of the authors will register and attend the symposium 

[Om-announce] SCI-Indexed Journal Special Issue for CIT 2016, Fiji, 8-10 December 2016

2016-08-25 Thread Conference Contact
*** IEEE CIT 2016 CFP ***
16th IEEE International Conference on Computer and Information Technology
Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016
http://nsclab.org/cit2016/
*

We are delighted to announce that CIT 2016 will feature a special issue on
Security and Privacy in Social Big Data in Future Generation Computer
Systems (FGCS).

JOURNAL SPECIAL ISSUE
=

Selected papers presented at the CIT 2016 will be invited to consider
submission (after significant extension) for the following special issue in
FGCS.

Special Issue on Security and Privacy in Social Big Data
Future Generation Computer Systems (FGCS)
http://www.journals.elsevier.com/future-generation-computer-systems


INTRODUCTION


IEEE CIT 2016 is the 16th edition of the highly successful International
Conference on Computer and Information Technology. The goal of the
conference is to provide a forum for scientists, engineers and researchers
to discuss and exchange novel ideas, results, experiences and
work-in-process on all aspects of computer and information technology. CIT
has become a major platform for researchers and industry practitioners from
different fields of computer and information technology. Each year, CIT
attendees appreciate and benefit from multidisciplinary exchanges in
computer and information technology. In previous years, CIT has attracted
many high quality research papers spanning over the various aspects of
information technology, computing science and computer engineering. These
papers highlight foundational work that strives to push beyond limits of
existing computer technologies, including experimental efforts, innovative
systems, and investigations that identify weaknesses in existing IT
services.

IEEE CIT 2016 will be held on 8-10 December 2016 in Shangri-La's Fijian
Resort and Spa, Fiji, co-located with SC2-2016, IOV 2016, and IEEE
SocialSec 2016.


CO-LOCATED EVENTS
=

- 6th International Symposium on Cloud and Service Computing (SC2-2016)
- 3rd International Conference on Internet of Vehicles (IOV 2016)
- 2nd IEEE International Symposium on Security and Privacy in Social
Networks and Big Data (IEEE SocialSec 2016)


IMPORTANT DATES
===

Paper Submission Due: 7 September 2016 (Firm Deadline)
Author Notification: 28 September 2016
Camera-ready Paper due: 5 October 2016
Registration due: 5 October 2016
Symposium: 8-10 December 2016


SCOPE AND TOPICS


Topics of particular interests include the following tracks, but are not
limited to:

- Information Technology
- Computer Science
- Signal Processing
- Networking and Internet of Things
- Reliability, Security, Privacy and Trust
- Applications, Business and Social Issues
- Database and Data Management
- Software Engineering
- Microwave and Radar
- System Software and Software Engineering
- Pattern Recognition, Data Mining and Artificial Intelligence
- Information Technology for Biomedicine and Smart Health
- Wireless Communications
- Mobile Multimedia Communications
- Wireless and Mobile Computing
- Future Internet
- Cellular Network and 5G
- Social Computing and Social Network
- Web Technologies


AUTHOR GUIDELINE


All papers need to be submitted electronically through the paper submission
system (http://cse.stfx.ca/~cit2016/sub/) with PDF format. The materials
presented in the papers should not be published or under submission
elsewhere. Each paper is limited to 8 pages (or 10 pages with over length
charge) including figures and references using IEEE Computer Society
Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You
can confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page (http://www.computer.org/web/cs-cps/).

Once accepted, the paper will be included into the IEEE conference
proceedings published by IEEE Computer Society Press (indexed by EI). At
least one of the authors of any accepted paper is requested to register the
paper at the conference.


ORGANISATION COMMITTEES
===

General Chairs
--
A B M Shawkat Ali, The University of Fiji, Fiji
Yang Xiang, Deakin University, Australia
Albert Zomaya, The University of Sydney, Australia

Program Chairs
--
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Qun Jin, Waseda University, Japan
Xiaodong Lin, University of Ontario Institute of Technology, Canada
Vincenzo Piuri, Universita' degli Studi di Milano, Italy

Program Vice-Chairs
---
Aniello Castiglione, University of Salerno and University of Naples, Italy
Yu Wang, Deakin University, Australia
Jun Zhang, Deakin University, Australia

Publicity Chairs

Al-Sakib Khan Pathan, Southeast University, Bangladesh
Yi Qian, University of Nebraska-Lincoln, USA
Xin Zhu,The University of Aizu, Japan

Workshop 

[Om-announce] Extended Deadline for CIT 2016, Fiji, 8-10 December 2016

2016-08-15 Thread Conference Contact
*** IEEE CIT 2016 CFP ***
16th IEEE International Conference on Computer and Information Technology
Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016
http://nsclab.org/cit2016/
*


INTRODUCTION


IEEE CIT 2016 is the 16th edition of the highly successful International
Conference on Computer and Information Technology. The goal of the
conference is to provide a forum for scientists, engineers and researchers
to discuss and exchange novel ideas, results, experiences and
work-in-process on all aspects of computer and information technology. CIT
has become a major platform for researchers and industry practitioners from
different fields of computer and information technology. Each year, CIT
attendees appreciate and benefit from multidisciplinary exchanges in
computer and information technology. In previous years, CIT has attracted
many high quality research papers spanning over the various aspects of
information technology, computing science and computer engineering. These
papers highlight foundational work that strives to push beyond limits of
existing computer technologies, including experimental efforts, innovative
systems, and investigations that identify weaknesses in existing IT
services.

IEEE CIT 2016 will be held on 8-10 December 2016 in Shangri-La's Fijian
Resort and Spa, Fiji, co-located with SC2-2016, IOV 2016, and IEEE
SocialSec 2016.


CO-LOCATED EVENTS
=

- 6th International Symposium on Cloud and Service Computing (SC2-2016)
- 3rd International Conference on Internet of Vehicles (IOV 2016)
- 2nd IEEE International Symposium on Security and Privacy in Social
Networks and Big Data (IEEE SocialSec 2016)


IMPORTANT DATES
===

Paper Submission Due: 7 September 2016 (Firm Deadline)
Author Notification: 28 September 2016
Camera-ready Paper due: 5 October 2016
Registration due: 5 October 2016
Symposium: 8-10 December 2016


SCOPE AND TOPICS


Topics of particular interests include the following tracks, but are not
limited to:

- Information Technology
- Computer Science
- Signal Processing
- Networking and Internet of Things
- Reliability, Security, Privacy and Trust
- Applications, Business and Social Issues
- Database and Data Management
- Software Engineering
- Microwave and Radar
- System Software and Software Engineering
- Pattern Recognition, Data Mining and Artificial Intelligence
- Information Technology for Biomedicine and Smart Health
- Wireless Communications
- Mobile Multimedia Communications
- Wireless and Mobile Computing
- Future Internet
- Cellular Network and 5G
- Social Computing and Social Network
- Web Technologies



AUTHOR GUIDELINE


All papers need to be submitted electronically through the paper submission
system (http://cse.stfx.ca/~cit2016/sub/) with PDF format. The materials
presented in the papers should not be published or under submission
elsewhere. Each paper is limited to 8 pages (or 10 pages with over length
charge) including figures and references using IEEE Computer Society
Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You
can confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page (http://www.computer.org/web/cs-cps/).

Once accepted, the paper will be included into the IEEE conference
proceedings published by IEEE Computer Society Press (indexed by EI). At
least one of the authors of any accepted paper is requested to register the
paper at the conference.


ORGANISATION COMMITTEES
===

General Chairs
--
A B M Shawkat Ali, The University of Fiji, Fiji
Yang Xiang, Deakin University, Australia
Albert Zomaya, The University of Sydney, Australia

Program Chairs
--
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Qun Jin, Waseda University, Japan
Xiaodong Lin, University of Ontario Institute of Technology, Canada
Vincenzo Piuri, Universita' degli Studi di Milano, Italy

Program Vice-Chairs
---
Yu Wang, Deakin University, Australia
Jun Zhang, Deakin University, Australia

Publicity Chairs

Al-Sakib Khan Pathan, Southeast University, Bangladesh
Yi Qian, University of Nebraska-Lincoln, USA
Xin Zhu,The University of Aizu, Japan

Workshop Chairs
---
Md Zakirul Alam Bhuiyan, Temple University, USA
Wenxi Chen, University of Aizu, Japan
Sheng Wen, Deakin University, Australia

Finance Chair
-
Neeraj Sharma, The University of Fiji, Fiji

International Advisory Committee

Mohammed Atiquzzaman, University of Oklahoma, USA
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Hai Jin, Huazhong University of Science and Technology, China
George A. Papadopoulos, University of Cyprus, Cyprus
Wanlei Zhou, Deakin University, Australia

Steering Committee
--
Daming Wei 

[Om-announce] CFP: SocialSec 2016, Shangri-La's Fijian Resort, Fiji, 8-10 December 2016

2016-08-15 Thread Conference Contact

2nd IEEE International Symposium on Security and Privacy in Social Networks
and Big Data
Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016
http://nsclab.org/socialsec2016/



Symposium Outline
=

Social Networks and Big Data have pervaded all aspects of our daily lives.
With their unparalleled popularity, social networks have evolved from the
platforms for social communication and news dissemination, to indispensable
tools for professional networking, social recommendations, marketing, and
online content distribution. Social Networks, together with other
activities, produce Big Data that beyond the ability of commonly used
computer software and hardware tools to capture, manage, and process within
a tolerable elapsed time.

Due to their scale, complexity and heterogeneity, a number of technical and
social challenges in Social Networks and Big Data must be addressed. It has
been widely recognised that security and privacy are the critical issues.
On one hand, Social Networks and Big Data have been an effective platform
for the attackers to launch attacks and distribute malicious information.
On the other hand, privacy leakage through Social Networks and Big Data has
become common exercise. Following the success of the first event, the aim
of the 2nd IEEE International Symposium on Security and Privacy in Social
Networks and Big Data (IEEE SocialSec 2016) is to provide a leading edge
forum to foster interactions between researchers and developers with the
security and privacy communities in Social Networks and Big Data, and to
give attendees an opportunity to interact with experts in academia,
industry, and governments.

IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa,
Yanuca Island, Fiji on 8-10 December 2016. Get ready to enjoy a unique trip
in an wonderful island in this Globe.


Co-located Events
=

- 6th International Symposium on Cloud and Service Computing (SC2-2016)
- 3rd International Conference on Internet of Vehicles (IOV 2016)
- 16th International Conference on Computer and Information Technology (CIT
2016)


Important Dates
===

Paper Submission Due: 7 September 2016
Author Notification: 28 September 2016
Camera-ready Paper due: 5 October 2016
Registration due: 5 October 2016
Symposium Date: 8-10 December 2016


Symposium Topics


The symposium seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
security and privacy in Social Networks and Big Data. Papers describing
case studies, implementation experiences, and lessons learned are also
encouraged. Topics of interest include but are not limited to:

- Attacks in/via social networks
- Information control and detection
- Malicious behaviour modelling in social networks
- Malicious information propagation via social networks
- Phishing problems in social networks
- Privacy protection in social networks
- Big data analytics for threats and attacks prediction
- Spam problems in social networks
- Trust and reputations in social networks
- Big data outsourcing
- Big data forensics
- Security and privacy in big database
- Applied cryptography for big data
- Big data system security
- Mobile social networks security
- Security and privacy in cloud
- Forensics in social networks and big data


Instructions for authors


Submission Website: https://easychair.org/conferences/?conf=socialsec2016

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 8 pages in A4 format, including tables, figures, references and
appendixes, in IEEE Computer Society proceedings format with Portable
Document Format (.pdf). Please refer to
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
for preparing the submission.

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a paper
should be regarded as a commitment that, should the paper be accepted, at
least one of the authors will register and attend the symposium to present
the work.


Conference Organisation
===

General Chairs
--
Shawkat Ali, University of Fiji, Fiji
David Chadwick, University of Kent, UK
Yang Xiang, Deakin University, Australia

Program Committee Chairs

Jun Zhang, Deakin University, Australia
Mirosław Kutyłowski, Wroclaw University of Technology, Porland
Murat Kantarcioglu, University of Texas at Dallas, US

Workshop Chairs
---
Motoki Sakai, Chiba University of Commerce, Japan
Aniello Castiglione, 

[Spam:*****] [Om-announce] CFP: NSS 2016 Taipei - Paper Submission Due 30th April

2016-04-26 Thread Conference Contact
* NSS 2016 CFP *
The 10th International Conference on Network and System Security
Taipei, Taiwan, September 28-30, 2016
http://nsclab.org/nss2016/



Important Dates
===

Paper Submission Deadline: 30th April, 2016
Author Notification: 15th June, 2016
Camera-ready and Registration: 15th July, 2016
Conference Dates: 28-30 September, 2016


Journal Special Issues
==

Selected papers will be invited to the following journal special issues:

1. Future Generation Computer Systems (FGCS, SCI indexed, Impact Factor:
2.786)
2. Journal of Information Security and Applications (JISA, SCIE indexed)
3. Journal of Internet Technology (JIT, SCIE indexed, Impact Factor: 0.44)


INTRODUCTION


While the attack systems have become more easy-to-use, sophisticated, and
powerful, interest has greatly increased in the field of building more
effective, intelligent, adaptive, active and high performance defense
systems which are distributed and networked. The NSS conference will cover
research on all theoretical and practical aspects related to network and
system security, such as authentication, access control, availability,
integrity, privacy, confidentiality, dependability and sustainability of
computer networks and systems. The aim of NSS is to provide a leading edge
forum to foster interaction between researchers and developers with the
network and system security communities, and to give attendees an
opportunity to interact with experts in academia, industry, and
governments.

NSS 2016 is the next event in a series of highly successful events of
Network and System Security. Previous editions were held in: New York City,
USA (2015), Xi'an, China (2014), Madrid, Spain (2013); Wu Yi Shan, China
(2012); Milan, Italy (2011); Melbourne, Australia; (2010); Gold Coast,
Australia (2009); Shanghai, China (2008); and Dalian, China (2007). In this
year, NSS 2016 will be held in The Grand Hotel in Taipei, Taiwan on
September 28-30, 2016.


SCOPE AND TOPICS


Topics of interest include but are not limited to:
- Active Defense Systems
- Adaptive Defense Systems
- Analysis, Benchmark of Security Systems
- Applied Cryptography
- Authentication
- Big Data Security and Privacy
- Biometric Security
- Complex Systems Security
- Database and System Security
- Data Protection
- Data/System Integrity
- Digital Forensics
- Distributed Access Control
- Distributed Attack Systems
- Denial-of-Service
- High Performance Network Virtualization
- High Performance Security Systems
- Hardware Security
- Identity Management
- Intelligent Defense Systems
- Insider Threats
- Intellectual Property Rights Protection
- Internet and Network Forensics
- Intrusion Detection and Prevention
- Key Distribution and Management
- Large-scale Attacks and Defense
- Malware
- Network Resiliency
- Network Security
- RFID/NFC Security and Privacy
- Security Architectures
- Security for Critical Infrastructures
- Security for Cyber Physical Systems
- Security in Cloud and Grid Systems
- Security in Pervasive/Ubiquitous Computing
- Security and Privacy in Smart Grid
- Security and Privacy in Social Networks
- Security and Privacy in Wireless Networks
- Secure Mobile Agents and Mobile Code
- Security Policy
- Security Protocols
- Security Simulation and Tools
- Security Theory and Tools
- Standards and Assurance Methods
- Trusted Computing
- Trust Management
- World Wide Web Security


Submission Guidelines
=

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 14 pages, including tables, figures, references and appendixes, in
Springer LNCS Format with Portable Document Format (.pdf). Please submit
your paper at:

https://www.easychair.org/conferences/?conf=nss2016

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a paper
should be regarded as a commitment that, should the paper be accepted, at
least one of the authors will register and attend the conference to present
the work.


Organization Committee
==

Honorary Chairs
---
D. J. Guan, National Sun Yat-Sen University, Taiwan
Yen-Nun Huang, Academia Sinica, Taiwan
Der-Tsai Lee, Academia Sinica, Taiwan

General Chairs
--
Chun-I Fan, National Sun Yat-Sen University, Taiwan
Nai-Wei Lo, National Taiwan University of Science and Technology, Taiwan
Shiuhpyng (Winston) Shieh, National Chiao Tung University, Taiwan
Tzong-Chen Wu, National Taiwan University of Science and Technology, Taiwan

Program Chairs
--
Jiageng Chen, Central China Normal University, China
Vincenzo Piuri, University of Milan, Italy
Chunhua Su, Japan Advanced 

[Spam:*****] [Om-announce] IEEE DASC 2016 CFP: Paper Submission Deadline Extended to March 31, 2016

2016-03-20 Thread Conference Contact
The 14th IEEE International Conference on Dependable, Autonomic and Secure
Computing
(DASC 2016)
http://cse.stfx.ca/~dasc2016/
Auckland, New Zealand, 8-12 August 2016
Sponsored by
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable
Computing (TCSC)


INTRODUCTION
=

As computer systems become increasingly large and complex, their
Dependability, Security and Autonomy play critical role at supporting
next-generation science, engineering, and commercial applications. These
systems consist of heterogeneous software/hardware/network components of
changing capabilities, availability, and in varied contexts. They provide
computing services to large pools of users and applications, and thus are
exposed to a number of dangers such as accidental/deliberate faults, virus
infections, malicious attacks, illegal intrusions, natural disasters, etc.
As a result, too often computer systems fail, become compromised, or
perform poorly and therefore untrustworthy. Thus, it remains a challenge to
design, analyse, evaluate, and improve the dependability and security for a
trusted computing environment. Trusted computing targets computing and
communication systems as well as services that are autonomous, dependable,
secure, privacy protect-able, predictable, traceable, controllable,
assessable and sustainable.

The scale and complexity of information systems evolve towards overwhelming
the capability of system administrators, programmers, and designers. This
calls for the autonomic computing paradigm, which meets the requirements of
self-management by providing self-optimization, self-healing,
self-configuration, and self-protection. As a promising means to implement
dependable and secure systems in a self-managing manner, autonomic
computing technology needs to be further explored. On the other hand, any
autonomic system must be trustworthy to avoid the risk of losing control
and retain confidence that the system will not fail. Trusted and autonomic
computing and communications need synergistic research efforts covering
many disciplines, ranging from computer science and engineering, to the
natural sciences and the social sciences. It requires scientific and
technological advances in a wide variety of fields, as well as new
software, system architectures, and communication systems that support the
effective and coherent integration of the constituent technologies.

DASC 2016 will be held on 8-12 August 2016 in Auckland, New Zealand,
co-located with CyberSciTech 2016, IEEE DataCom 2016 and IEEE PICom 2016.
It aims to bring together computer scientists, industrial engineers, and
researchers to discuss and exchange experimental and theoretical results,
novel designs, work-in-progress, experience, case studies, and
trend-setting ideas in the areas of dependability, security, trust and/or
autonomic computing systems.


SCOPE AND TOPICS


Topics of particular interests include the following tracks, but are not
limited to:

- Autonomic Computing Theory, Models, Architectures and Communications
- Cloud Computing with Autonomic and Trusted Environment
- Dependable Automatic Control Techniques and Systems
- Dependability Models and Evaluation Algorithms
- Dependable Sensors, Devices, Embedded Systems
- Dependable Electronic-Mechanical Systems, Optic-Electronic Systems
- Self-improvement in Dependable Systems
- Self-healing, Self-protection and Fault-tolerant Systems
- Hardware and Software Reliability, Verification and Testing
- Software Engineering for Dependable Systems
- vSafety-critical Systems in Transportation and Power System
- Security Models and Quantifications
- Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS
- Self-protection and Intrusion-detection in Security
- DRM, Watermarking Technology, IP Protection
- Context-aware Access Control
- Virus Detections and Anti-virus Techniques/Software
- Cyber Attack, Crime and Cyber War
- Human Interaction with Trusted and Autonomic Computing Systems
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- QoS in Communications and Services
- Information and System Security
- Reliable Computing and Trusted Computing
- Wireless Emergency and Security Systems
- Information Technology in Biomedicine
- Multimedia Security Issues over Mobile and Wireless Networks
- Multimedia in Mobile Computing: Issues, System Design, and Performance
Evaluation
- Software Architectures and Design for Emerging Systems
- Software Engineering for Emerging Networks, Systems, and Mobile Systems
- Service Oriented Architectures


IMPORTANT DATES
===

Workshop Proposal Due: 29 February 2016
Paper Submission Due: 31 March 2016
Author Notification: 30 April 2016
Demo/Poster Papers Submission Due: 5 May 2016
Author Notification: 20 May 2016
Camera-ready Paper Due: 31 May 2016
Registration Due: 31 May 2016



PAPER SUBMISSION GUIDELINE
==

Authors are invited to submit their original research work that has not

[Spam:*****] [Om-announce] Call For Papers: DASC 2016, Auckland, New Zealand, 8-12 August 2016

2016-03-02 Thread Conference Contact
Apologies if you receive multiple copies of this message

 IEEE DASC 2016 CFP ***
The 14th IEEE International Conference on Dependable, Autonomic and Secure
Computing
(DASC 2016)
http://cse.stfx.ca/~dasc2016/
Auckland, New Zealand, 8-12 August 2016
Sponsored by
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable
Computing (TCSC)


INTRODUCTION
=

As computer systems become increasingly large and complex, their
Dependability, Security and Autonomy play critical role at supporting
next-generation science, engineering, and commercial applications. These
systems consist of heterogeneous software/hardware/network components of
changing capabilities, availability, and in varied contexts. They provide
computing services to large pools of users and applications, and thus are
exposed to a number of dangers such as accidental/deliberate faults, virus
infections, malicious attacks, illegal intrusions, natural disasters, etc.
As a result, too often computer systems fail, become compromised, or
perform poorly and therefore untrustworthy. Thus, it remains a challenge to
design, analyse, evaluate, and improve the dependability and security for a
trusted computing environment. Trusted computing targets computing and
communication systems as well as services that are autonomous, dependable,
secure, privacy protect-able, predictable, traceable, controllable,
assessable and sustainable.

The scale and complexity of information systems evolve towards overwhelming
the capability of system administrators, programmers, and designers. This
calls for the autonomic computing paradigm, which meets the requirements of
self-management by providing self-optimization, self-healing,
self-configuration, and self-protection. As a promising means to implement
dependable and secure systems in a self-managing manner, autonomic
computing technology needs to be further explored. On the other hand, any
autonomic system must be trustworthy to avoid the risk of losing control
and retain confidence that the system will not fail. Trusted and autonomic
computing and communications need synergistic research efforts covering
many disciplines, ranging from computer science and engineering, to the
natural sciences and the social sciences. It requires scientific and
technological advances in a wide variety of fields, as well as new
software, system architectures, and communication systems that support the
effective and coherent integration of the constituent technologies.

DASC 2016 will be held on 8-12 August 2016 in Auckland, New Zealand,
co-located with CyberSciTech 2016, IEEE DataCom 2016 and IEEE PICom 2016.
It aims to bring together computer scientists, industrial engineers, and
researchers to discuss and exchange experimental and theoretical results,
novel designs, work-in-progress, experience, case studies, and
trend-setting ideas in the areas of dependability, security, trust and/or
autonomic computing systems.


SCOPE AND TOPICS


Topics of particular interests include the following tracks, but are not
limited to:

- Autonomic Computing Theory, Models, Architectures and Communications
- Cloud Computing with Autonomic and Trusted Environment
- Dependable Automatic Control Techniques and Systems
- Dependability Models and Evaluation Algorithms
- Dependable Sensors, Devices, Embedded Systems
- Dependable Electronic-Mechanical Systems, Optic-Electronic Systems
- Self-improvement in Dependable Systems
- Self-healing, Self-protection and Fault-tolerant Systems
- Hardware and Software Reliability, Verification and Testing
- Software Engineering for Dependable Systems
- Safety-critical Systems in Transportation and Power System
- Security Models and Quantifications
- Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS
- Self-protection and Intrusion-detection in Security
- DRM, Watermarking Technology, IP Protection
- Context-aware Access Control
- Virus Detections and Anti-Virus Techniques/Software
- Cyber Attack, Crime and Cyber War
- Human Interaction with Trusted and Autonomic Computing Systems
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- QoS in Communications and Services
- Information and System Security
- Reliable Computing and Trusted Computing
- Wireless Emergency and Security Systems
- Information Technology in Biomedicine
- Multimedia Security Issues over Mobile and Wireless Networks
- Multimedia in Mobile Computing: Issues, System Design and Performance
Evaluation
- Software Architectures and Design for Emerging Systems
- Software Engineering for Emerging Networks, Systems, and Mobile Systems
- Service Oriented Architectures


IMPORTANT DATES
===

Workshop Proposal Due: 29 February 2016
Paper Submission Due: 15 March 2016
Author Notification: 30 April 2016
Camera-ready Paper Due: 31 May 2016
Registration Due: 31 May 2016
Conference Date: 8-12 August 2016


PAPER SUBMISSION GUIDELINE

[Spam:*****] [Om-announce] Submission Deadline Extended: ACISP 2016, Melbourne, Australia, 4-6 July 2016

2016-02-25 Thread Conference Contact

The 21st Australasian Conference on Information Security and Privacy (ACISP)
Melbourne, Australia
4-6 July 2016
http://nsclab.org/acisp2016/


The 21st Australasian Conference on Information Security and Privacy
(ACISP) will be held in Melbourne on 4-6 July 2016, organized by Deakin
University. ACISP was established in 1996 in Wollongong. Now in its 21st
year, the conference is a key forum for international researchers and
industry experts to discuss the latest trends, breakthroughs and challenges
in information security and privacy.

Cyber Security Winter School 2016 (a FREE winter school) will be held in
conjunction with ACISP, on 7-8 July 2016.

http://nsclab.org/csws2016/

Important Dates
---

Paper Submission Due: *Extended to 04 March 2016 (firm deadline)*
Notification of Acceptance: Extended to 13 April 2016
Camera-Ready Paper Due: 20 April 2016
Conference Date: 4-6 July 2016
Cyber Security Winter Schoo: 7-8 July 2016


Conference Topics
-

We invite submissions from academia, government, and industry presenting
novel research on all aspects of information security and privacy
primitives or protocols, which include but are not limited to the areas
listed as below. This year we particularly welcome submissions from areas
in cyber-physical security, mobile security, software security and network
security which are under represented in previous ACISP series.

 - Cryptology
 - Applied cryptography
 - Mobile security
 - Cloud security
 - Access control
 - Privacy enhanced technology
 - Viruses and malware
 - Software security
 - Database security
 - Web security
 - Operating system security
 - Intrusion detection
 - Big data security and privacy
 - Biometric Security
 - Implementation
 - Network security
 - Key management
 - Security and privacy in ubiquitous computing
 - Secure electronic payment system
 - Formal methods for security
 - Digital forensics
 - Security for critical infrastructures
 - Embedded systems security
 - Lightweight security
 - Smart grid security
 - Cyber security for urban transportation
 - Cyber-physical security


Journal Recommendations
---

Selected papers presented at the ACISP 2016 will be invited to consider
submission (after significant extension) for special issues or topical
selections in the following journals:

 - Special Issue for Future Generation Computer Systems (FGCS) (impact
factor: 2.786): Security and Privacy Issues in Fog Computing
 - Topical Selection for Journal of Medical Systems (impact factor: 2.213):
Medical Data Security
 - Special Issue for Computers & Security (impact factor: 1.031): Security
Data Science and Cyber Threat Management
 - Special Issue for Pervasive and Mobile Computing (impact factor: 2.079):
Cybersecurity for Ubiquitous Cities
 - Special Issue for Personal and Ubiquitous Computing (impact factor:
1.518): Security and Privacy for Smart Cities


Author Instructions
---

Authors are invited to submit original papers: they must not substantially
duplicate work that any of the authors have published elsewhere or have
submitted in parallel to any other conferences that have proceedings or any
journal. The submission must be anonymous, with no author names,
affiliations, acknowledgements, or obvious references. Original
contributions are invited up to 12 pages in length (single column)
excluding appendices and bibliography and up to 20 pages in total, using at
least 11-point fonts and with reasonable margins. Submissions not meeting
the submission guidelines risk rejection without consideration of their
merits. Papers should be submitted via easychair (
https://easychair.org/conferences/?conf=acisp2016).

Authors of accepted papers must guarantee that at least one of the authors
will register and attend the conference and present their paper. The
proceeding will be published by Springer as a volume of the Lecture Notes
in Computer Science (LNCS) series.


Keynote Speakers


Professor Elisa Bertino
Purdue University, United States.

Professor Chris Mitchell
Royal Holloway, University of London, United Kingdom


Conference Organization
---

General Chair
Yang Xiang, Deakin University, Australia

Program Co-Chairs
Joseph K. Liu, Monash University, Australia
Ron Steinfeld, Monash University, Australia

Publication Co-Chairs
Dong Seong Kim, University of Canterbury, New Zealand
Kaitai Liang, Aalto University, Finland

Publicity Chair
Nalin Asanka, University of New South Wales, Australia

Web Chair
Yu Wang, Deakin University, Australia

Program Committee
Cristina Alcaraz, University of Malaga, Spain
Myrto Arapinis, University of Edinburgh, UK
Claudio A. Ardagna, Università degli Studi di Milano, Italy
David Aspinall, University of Edinburgh, UK
Giuseppe Ateniese, Sapienza University of Rome, Italy

[Spam:*****] [Om-announce] The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016), Auckland, New Zealand, 8-12 August 2016

2016-02-15 Thread Conference Contact
Apologies if you receive multiple copies of this message

 IEEE DASC 2016 CFP ***
The 14th IEEE International Conference on Dependable, Autonomic and Secure
Computing
(DASC 2016)
http://cse.stfx.ca/~dasc2016/
Auckland, New Zealand, 8-12 August 2016
Sponsored by
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable
Computing (TCSC)


INTRODUCTION
=

As computer systems become increasingly large and complex, their
Dependability, Security and Autonomy play critical role at supporting
next-generation science, engineering, and commercial applications. These
systems consist of heterogeneous software/hardware/network components of
changing capabilities, availability, and in varied contexts. They provide
computing services to large pools of users and applications, and thus are
exposed to a number of dangers such as accidental/deliberate faults, virus
infections, malicious attacks, illegal intrusions, natural disasters, etc.
As a result, too often computer systems fail, become compromised, or
perform poorly and therefore untrustworthy. Thus, it remains a challenge to
design, analyse, evaluate, and improve the dependability and security for a
trusted computing environment. Trusted computing targets computing and
communication systems as well as services that are autonomous, dependable,
secure, privacy protect-able, predictable, traceable, controllable,
assessable and sustainable.

The scale and complexity of information systems evolve towards overwhelming
the capability of system administrators, programmers, and designers. This
calls for the autonomic computing paradigm, which meets the requirements of
self-management by providing self-optimization, self-healing,
self-configuration, and self-protection. As a promising means to implement
dependable and secure systems in a self-managing manner, autonomic
computing technology needs to be further explored. On the other hand, any
autonomic system must be trustworthy to avoid the risk of losing control
and retain confidence that the system will not fail. Trusted and autonomic
computing and communications need synergistic research efforts covering
many disciplines, ranging from computer science and engineering, to the
natural sciences and the social sciences. It requires scientific and
technological advances in a wide variety of fields, as well as new
software, system architectures, and communication systems that support the
effective and coherent integration of the constituent technologies.

DASC 2016 will be held on 8-12 August 2016 in Auckland, New Zealand,
co-located with CyberSciTech 2016, IEEE DataCom 2016 and IEEE PICom 2016.
It aims to bring together computer scientists, industrial engineers, and
researchers to discuss and exchange experimental and theoretical results,
novel designs, work-in-progress, experience, case studies, and
trend-setting ideas in the areas of dependability, security, trust and/or
autonomic computing systems.


SCOPE AND TOPICS


Topics of particular interests include the following tracks, but are not
limited to:

- Autonomic Computing Theory, Models, Architectures and Communications
- Cloud Computing with Autonomic and Trusted Environment
- Dependable Automatic Control Techniques and Systems
- Dependability Models and Evaluation Algorithms
- Dependable Sensors, Devices, Embedded Systems
- Dependable Electronic-Mechanical Systems, Optic-Electronic Systems
- Self-improvement in Dependable Systems
- Self-healing, Self-protection and Fault-tolerant Systems
- Hardware and Software Reliability, Verification and Testing
- Software Engineering for Dependable Systems
- Safety-critical Systems in Transportation and Power System
- Security Models and Quantifications
- Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS
- Self-protection and Intrusion-detection in Security
- DRM, Watermarking Technology, IP Protection
- Context-aware Access Control
- Virus Detections and Anti-Virus Techniques/Software
- Cyber Attack, Crime and Cyber War
- Human Interaction with Trusted and Autonomic Computing Systems
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- QoS in Communications and Services
- Information and System Security
- Reliable Computing and Trusted Computing
- Wireless Emergency and Security Systems
- Information Technology in Biomedicine
- Multimedia Security Issues over Mobile and Wireless Networks
- Multimedia in Mobile Computing: Issues, System Design and Performance
Evaluation
- Software Architectures and Design for Emerging Systems
- Software Engineering for Emerging Networks, Systems, and Mobile Systems
- Service Oriented Architectures


IMPORTANT DATES
===

Workshop Proposal Due: 29 February 2016
Paper Submission Due: 15 March 2016
Author Notification: 30 April 2016
Camera-ready Paper Due: 31 May 2016
Registration Due: 31 May 2016
Conference Date: 8-12 August 2016


PAPER SUBMISSION GUIDELINE

[Spam:*****] [Om-announce] [CFP] 2nd ACM Cyber-Physical System Security Workshop (ACM CPSS’16)

2015-09-15 Thread Conference Contact
*** Apologies for multiple copies ***

C a l l F o r P a p e r s

ACM CPSS’16 CALL FOR PAPERS
2nd ACM Cyber-Physical System Security Workshop

Xi’an, China - May 31, 2016
(in conjunction with ACM AsiaCCS'16)

http://icsd.i2r.a-star.edu.sg/cpss16/
===

Important Dates
---
Submission due:Dec 5, 2015
Notification:  Feb 15, 2016
Camera-ready due:  March 15, 2016


Cyber-Physical Systems (CPS) consist of large-scale interconnected systems
of heterogeneous components interacting with their physical environments.
There are a multitude of CPS devices and applications being deployed to
serve critical functions in our lives. The security of CPS becomes
extremely important. This workshop will provide a platform for
professionals from academia, government, and industry to discuss how to
address the increasing security challenges facing CPS. Besides invited
talks, we also seek novel submissions describing theoretical and practical
security solutions to CPS. Papers that are pertinent to the security of
embedded systems, SCADA, smart grid, and critical infrastructure networks
are all welcome, especially in the domains of energy and transportation.
Topics of interest include, but are not limited to:

- Adaptive attack mitigation for CPS
- Authentication and access control for CPS
- Availability, recovery and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security
- EV charging system security
- Intrusion detection for CPS
- IoT security
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- SCADA security
- Security of industrial control systems
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security


Steering Committee
--
Dieter Gollmann (Hamburg University of Technology, Germany)
Ravishankar Iyer (UIUC, USA)
Douglas Jones (ADSC, Singapore)
Javier Lopez (University of Malaga, Spain)
Jianying Zhou (I2R, Singapore) ñ Chair


Program Chairs
--
Jianying Zhou (I2R, Singapore)
Javier Lopez (University of Malaga, Spain)

Publicity Chair
---
Cristina Alcaraz (University of Malaga, Spain)

Publication Chair
-
Ying Qiu (I2R, Singapore)


Program Committee
-
Cristina Alcaraz (University of Malaga, Spain)
Raheem Beyah (Georgia Tech, USA)
Levente Buttyan (BME, Hungary)
Alvaro Cardenas (UT Dallas, USA)
Aldar Chan (ASTRI, HK)
Binbin Chen (ADSC, Singapore)
Songqing Chen (George Mason University, USA)
Richard Chow (Intel, USA)
Mauro Conti (University of Padua, Italy)
Miguel Correia (University of Lisbon, Portugal)
Roy Dong (UC Berkeley, USA)
Xinshu Dong (ADSC, Singapore)
Aurelien Francillon (EURECOM, France)
Adrian Gheorghe (Old Dominion University, USA)
Dieter Gollmann (Hamburg Uni of Tech, Germany)
Felix Gomez-Marmol (NEC Labs, Germany)
Huaqun Guo (I2R, Singapore)
Adam Hahn (Washington State University, USA)
Bernhard H‰mmerli (HSLU & ACRIS GmbH, Switzerland)
Jin Han (Twitter, USA)
Jinguang Han (NUFE, China)
Feng Hao (Newcastle University, UK)
Ravishankar Iyer (UIUC, USA)
Douglas Jones (ADSC, Singapore)
Zbigniew Kalbarczyk (UIUC, USA)
Frank Kargl (University of Ulm, Germany)
Sokratis Katsikas (Gj¯vik Uni College, Norway)
Shinsaku Kiyomoto (KDDI R Labs, Japan)
Marina Krotofil (Hamburg Uni of Tech, Germany)
Alptekin K¸pÁ¸ (KoÁ University, Turkey)
Miroslaw Kutylowski (Wroclaw Uni of Tech, Poland)
Jason Larson (IOActive, USA)
Xiapu Luo (Hong Kong Polytechnic University, HK)
Ivan Martinovic (University of Oxford, UK)
Weizhi Meng (I2R, Singapore)
Chris Mitchell (RHUL, UK)
Philippe Owezarski (LAAS-CNRS, France)
Michael Papay (Northrop Grumman, USA)
Jonathan Petit (University College Cork, Ireland)
Axel Poschmann (NXP, Germany)
Lillian J. Ratliff (UC Berkeley, USA)
Erich Rome (Fraunhofer-IAIS, Germany)
Roberto Setola (Universit‡ CAMPUS, Italy)
Christoph Schmittner (AIT, Austria)
Martin Strohmeier (University of Oxford, UK)
Nils Kalstad Svendsen (Gjovik Uni College, Norway)
Tsuyoshi Takagi (Kyushu University, Japan)
Juan Tapiador (Uni Carlos III de Madrid, Spain)
Nils Ole Tippenhauer (SUTD, Singapore)
Long Wang (IBM Research, USA)
Jia Xu (I2R, Singapore)
Qiang Yan (Google, Switzerland)
Yanjiang Yang (I2R, Singapore)
David Yau (SUTD, Singapore)
Siu-Ming Yiu (University of Hong Kong, HK)
Ye Zhang (Google, USA)
Peng Zhou (Shanghai University, China)
Wanlei Zhou (Deakin University, Australia)


Submission Instructions
---
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. All submissions should be appropriately anonymized (i.e.,
papers should not contain author names or affiliations, or obvious
citations). Submissions must be in double-column ACM SIG Proceedings
format, and should not exceed 12 pages. Position papers 

[Om-announce] CFP: NSS 2015 New York - NEW SCI-Indexed Journal Special Issues

2015-06-25 Thread Conference Contact
==
NSS 2015 CALL FOR PAPERS
 The 9th International Conference on Network and System Security
November 3-5, 2015, New York City, USA
http://anss.org.au/nss2015/
==

* NEWS *

NSS2015 is now featuring four journal special issues, including IEEE
Transactions on Dependable and Secure Computing, ACM Transactions on
Embeded Computing, Concurrency and Computation: Practice and
Experience, and Future Generation Computer Systems.


*IMPORTANT DATES*

Paper submission: June 30, 2015
Notification of acceptance:   August 1, 2015
Camera-Ready due: August 20, 2015


*SCOPE*

NSS is an annual international conference covering research in network and
system security. The objective of NSS'15 is to provide an opportunity for
researchers from academia, industry, and government to present novel
research on all theoretical and practical aspects of network security,
privacy, applications security, and system security.

Besides the usual presentations at the regular paper track, we are going to
organize a Work-in-Process (WiP) session on cyber security. The WiP session
will be devoted to the presentation of new and on-going research on cyber
security, and we are especially interested in new and creative ideas and
approaches. Contributors to the WiP session will be asked to give a short
presentation of their work and prepare a poster for discussion during the
poster sessions. The scope for this call is similar to that of the CFP for
the papers track.

Topics of interest include, but are not limited to:

- Active Defense Systems
- Adaptive Defense Systems
- Applied Cryptography
- Analysis, Benchmark of Security Systems
- Authentication
- Biometric Security
- Complex Systems Security
- Database and System Security
- Data Protection
- Data/System Integrity
- Distributed Access Control
- Distributed Attack Systems
- Denial-of-Service
- High Performance Network Virtualization
- Hardware Security
- High Performance Security Systems
- Identity Management
- Intelligent Defense Systems
- Insider Threats
- Intellectual Property Rights Protection
- Internet and Network Forensics
- Intrusion Detection and Prevention
- Key Distribution and Management
- Large-scale Attacks and Defense
- Malware
- Network Resiliency
- Network Security
- RFID Security and Privacy
- Security Architectures
- Security for Critical Infrastructures
- Security in P2P systems
- Security in Cloud and Grid Systems
- Security in E-Commerce
- Security in Pervasive/Ubiquitous Computing
- Security and Privacy in Smart Grid
- Security and Privacy in Wireless Networks
- Security Policy
- Secure Mobile Agents and Mobile Code
- Security Theory and Tools
- Standards and Assurance Methods
- Trusted Computing
- Trust Management
- World Wide Web Security


*SUBMISSION INSTRUCTIONS*

Only PDF files will be accepted. If accepted, one of the authors is
expected to present the paper at the conference.

Regular and Short Paper Session
---

Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 14 pages
for regular papers and 8 pages for short papers in LNCS format,
including the bibliography and appendices. Authors are encouraged to
prepare their submissions following Springer's LNCS Author Guidelines.

The submission must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references.

Conference proceedings will be published by Springer-Verlag as a
volume of the Lecture Notes in Computer Science (LNCS) series.

Work-in-Progress Session


WiP submissions should be at most 2 pages in IEEE format, including the
bibliography. All accepted WiP papers will be included in a proceeding
published by IEEE.

Submission Portal
-

Submissions must be made to the submission website at
https://www.easychair.org/conferences/?conf=nss2015.


*JOURNAL SPECIAL ISSUES*

Selected papers of NSS2015 will be invited to the following journal
special issues: IEEE Transactions on Dependable and Secure Computing,
ACM Transactions on Embeded Computing, Concurrency and Computation:
Practice and Experience, and Future Generation Computer Systems.


*CONFERENCE COMMITTEES*

General Chairs
  Meikang Qiu, Pace University, USA
  Elisa Bertino, Purdue University, USA

Program Chair
  Shouhuai Xu, University of Texas at San Antonio, USA
  Moti Yung, Columbia University, USA
  Haibo Zhang, University of Otago, New Zealand

WebPublicity Chair
  Qingji Zheng, Huawei Research, USA

Steering Committees
  Elisa Bertino, Purdue University, USA
  Robert H. Deng, Singapore Management University, Singapore
  Dieter Gollmann, Hamburg University of Technology, Germany
  Xinyi 

[Om-announce] CFP SocialSec 2015 featuring 4 SCI-Indexed Journal Special Issues

2015-06-17 Thread Conference Contact

International Symposium on Security and Privacy in Social Networks and Big
Data
(SocialSec 2015), Hangzhou, China, 16-18 November, 2015
http://anss.org.au/socialsec2015/


Important Dates
===

Submission: 30 June 2015 (Extended)
Author Notification: 10 August 2015
Registration and camera-ready due: 24 August 2015
Conference: 16-18 November 2015


Special Issues
===

Selected papers will be invited to the following journal special issues:

[1] Social Network Security in IEEE Transactions on Dependable and Secure
Computing (Impact Factor: 1.137)

[2] Embedded Device Forensics and Security: State of the Art Advances in
ACM Transactions on Embedded Computing (Impact Factor: 0.68)
http://acmtecs.acm.org/special-issues/15/edfs2015.html

[3] Security and Privacy in Social Networks in Concurrency and
Computation: Practice and Experience (Impact Factor: 0.784)
http://www.cc-pe.net/journalinfo/issues/2015.html#NSS2015

[4] Advance in Secure Data Storage and Computation in Cloud in Security
and Communication Networks (pending, Impact Factor: 0.433)


Keynote Speeches


Keynote 1: Data-Driven Privacy Analysis
Professor Keith W. Ross
Dean of Engineering and Computer Science, NYU Shanghai
 Leonard J. Shustek Professor of Computer Science, CSE Dept, NYU

Keynote 2: Identifying Propagation Sources in Social Networks
Professor Wanlei Zhou
Alfred Deakin Professor, Chair of Information Technology,
School of Information Technology,
Deakin University, Melbourne, Australia


Conference Outline
==
Social Networks and Big Data have pervaded all aspects of our daily lives.
With their unparalleled popularity, social networks have evolved from the
platforms for social communication and news dissemination, to indispensable
tools for professional networking, social recommendations, marketing, and
online content distribution. Social Networks, together with other
activities, produce Big Data that beyond the ability of commonly used
computer software and hardware tools to capture, manage, and process within
a tolerable elapsed time.

Due to their scale, complexity and heterogeneity, a number of technical and
social challenges in Social Networks and Big Data must be addressed. It has
been widely recognized that security and privacy are the critical issues.
On one hand, Social Networks and Big Data have been the effective platform
for the attackers to launch attacks and distribute malicious information.
On the other hand, privacy leakage through Social Networks and Big Data has
become common exercise. The aim of SocialSec 2015 is to provide a leading
edge forum to foster interactions between researchers and developers with
the security and privacy communities in Social Networks and Big Data, and
to give attendees an opportunity to interact with experts in academia,
industry, and governments.


Conference Topics
=

The conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
security and privacy in Social Networks and Big Data. Papers describing
case studies, implementation experiences, and lessons learned are also
encouraged. Topics of interest include but are not limited to:

-Attacks in/via Social Networks
-Information control and detection
-Malicious behaviour modelling in Social Networks
-Malicious information propagation via Social Networks
-Phishing problems in Social Networks
-Privacy protection in Social Networks
-Big Data analytics for threats and attacks prediction
-Spam problems in Social Networks
-Trust and reputations in Social Networks
-Big Data outsourcing
-Big Data forensics
-Big SociaData
-Security and privacy in Big Database
-Applied Cryptography for Big Data
-Big Data system security
-Mobile Social Networks security
-Security and privacy in cloud
-Forensics in Social Networks and Big Data


Instructions for authors


Submission Website: https://easychair.org/conferences/?conf=snab2015

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 8 pages in A4 format, including tables, figures, references and
appendixes, in IEEE Computer Society proceedings format with Portable
Document Format (.pdf). Please refer to
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
for preparing the submission.

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a paper
should be regarded as a commitment that, should the paper be accepted, at
least one of the authors will register and attend the conference to present
the work.


Conference Organisation

[Om-announce] CFP SocialSec 2015, Hangzhou, China, 16-18 November, 2015

2015-05-26 Thread Conference Contact


International Symposium on Security and Privacy in Social Networks and Big
Data
(SocialSec 2015), Hangzhou, China, 16-18 November, 2015
http://anss.org.au/socialsec2015/





Important Dates

===


Submission: 15 June 2015
Author Notification: 10 August 2015
Registration and camera-ready due: 24 August 2015
Conference: 16-18 November 2015



Keynote Speeches

Keynote 1: Data-Driven Privacy Analysis
Professor Keith W. Ross
Dean of Engineering and Computer Science, NYU Shanghai
 Leonard J. Shustek Professor of Computer Science, CSE Dept, NYU

Keynote 2: Identifying Propagation Sources in Social Networks
Professor Wanlei Zhou
Alfred Deakin Professor, Chair of Information Technology,
School of Information Technology,
Deakin University, Melbourne, Australia



Conference Outline

==

Social Networks and Big Data have pervaded all aspects of our daily lives.
With their unparalleled popularity, social networks have evolved from the
platforms for social communication and news dissemination, to indispensable
tools for professional networking, social recommendations, marketing, and
online content distribution. Social Networks, together with other
activities, produce Big Data that beyond the ability of commonly used
computer software and hardware tools to capture, manage, and process within
a tolerable elapsed time.

Due to their scale, complexity and heterogeneity, a number of technical and
social challenges in Social Networks and Big Data must be addressed. It has
been widely recognized that security and privacy are the critical issues.
On one hand, Social Networks and Big Data have been the effective platform
for the attackers to launch attacks and distribute malicious information.
On the other hand, privacy leakage through Social Networks and Big Data has
become common exercise. The aim of SocialSec 2015 is to provide a leading
edge forum to foster interactions between researchers and developers with
the security and privacy communities in Social Networks and Big Data, and
to give attendees an opportunity to interact with experts in academia,
industry, and governments.



Conference Topics

=

The conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
security and privacy in Social Networks and Big Data. Papers describing
case studies, implementation experiences, and lessons learned are also
encouraged. Topics of interest include but are not limited to:




-Attacks in/via Social Networks
-Information control and detection
-Malicious behaviour modelling in Social Networks
-Malicious information propagation via Social Networks
-Phishing problems in Social Networks
-Privacy protection in Social Networks
-Big Data analytics for threats and attacks prediction
-Spam problems in Social Networks
-Trust and reputations in Social Networks
-Big Data outsourcing
-Big Data forensics
-Big SociaData
-Security and privacy in Big Database
-Applied Cryptography for Big Data
-Big Data system security
-Mobile Social Networks security
-Security and privacy in cloud
-Forensics in Social Networks and Big Data



Instructions for authors





Submission Website: https://easychair.org/conferences/?conf=snab2015

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 8 pages in A4 format, including tables, figures, references and
appendixes, in IEEE Computer Society proceedings format with Portable
Document Format (.pdf). Please refer to
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
for preparing the submission.

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a paper
should be regarded as a commitment that, should the paper be accepted, at
least one of the authors will register and attend the conference to present
the work.




Conference Organisation

===



General Chairs

--

Jifeng He, East China Normal University, China
Yang Xiang, Deakin University, Australia



Program Chairs

--

Wenzhi Chen, Zhejiang University, China
Elisa Bertino, Purdue University, USA
Xinyi Huang, Fujian Normal University, China



Program Committee

-

Gail-Joon Ahn, Arizona State University, USA
Cristina Alcaraz, University of Malaga, Spain
Man Ho Au, Hong Kong Polytechnic University
Joonsang Baek, KUSTAR, UAE
Filipe Beato, University of Leuven, Belgium
Ero Balsa, University of Leuven, Belgium
Barbara Carminati, University of Insubria, Italy
David Chadwick, University of Kent, UK
Richard Chbeir, CNRS, France
Xiaofeng Chen, 

[Om-announce] CFP: NSS 2015, New York City, USA, November 3-5, 2015

2015-05-18 Thread Conference Contact
=
NSS 2015 CALL FOR PAPERS
 The 9th International Conference on Network and System Security
November 3-5, 2015, New York City, USA
http://anss.org.au/nss2015/
=


*IMPORTANT DATES*

Paper submission:   May 30, 2015
Notification of acceptance:   August 1, 2015
Camera-Ready due: August 20, 2015


*SCOPE*

NSS is an annual international conference covering research in network and
system security. The objective of NSS'15 is to provide an opportunity for
researchers from academia, industry, and government to present novel
research on all theoretical and practical aspects of network security,
privacy, applications security, and system security.

Besides the usual presentations at the regular paper track, we are going to
organize a Work-in-Process (WiP) session on cyber security. The WiP session
will be devoted to the presentation of new and on-going research on cyber
security, and we are especially interested in new and creative ideas and
approaches. Contributors to the WiP session will be asked to give a short
presentation of their work and prepare a poster for discussion during the
poster sessions. The scope for this call is similar to that of the CFP for
the papers track.

Topics of interest include, but are not limited to:

- Active Defense Systems
- Adaptive Defense Systems
- Applied Cryptography
- Analysis, Benchmark of Security Systems
- Authentication
- Biometric Security
- Complex Systems Security
- Database and System Security
- Data Protection
- Data/System Integrity
- Distributed Access Control
- Distributed Attack Systems
- Denial-of-Service
- High Performance Network Virtualization
- Hardware Security
- High Performance Security Systems
- Identity Management
- Intelligent Defense Systems
- Insider Threats
- Intellectual Property Rights Protection
- Internet and Network Forensics
- Intrusion Detection and Prevention
- Key Distribution and Management
- Large-scale Attacks and Defense
- Malware
- Network Resiliency
- Network Security
- RFID Security and Privacy
- Security Architectures
- Security for Critical Infrastructures
- Security in P2P systems
- Security in Cloud and Grid Systems
- Security in E-Commerce
- Security in Pervasive/Ubiquitous Computing
- Security and Privacy in Smart Grid
- Security and Privacy in Wireless Networks
- Security Policy
- Secure Mobile Agents and Mobile Code
- Security Theory and Tools
- Standards and Assurance Methods
- Trusted Computing
- Trust Management
- World Wide Web Security


*SUBMISSION INSTRUCTIONS*

Only PDF files will be accepted. If accepted, one of the authors is
expected to present the paper at the conference.

Regular and Short Paper Session
---

Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 14 pages
for regular papers and 8 pages for short papers in LNCS format,
including the bibliography and appendices. Authors are encouraged to
prepare their submissions following Springer's LNCS Author Guidelines.

The submission must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references.

Conference proceedings will be published by Springer-Verlag as a
volume of the Lecture Notes in Computer Science (LNCS) series.

Work-in-Progress Session


WiP submissions should be at most 2 pages in IEEE format, including the
bibliography. All accepted WiP papers will be included in a proceeding
published by IEEE.

Submission Portal
-

Submissions must be made to the submission website at
https://www.easychair.org/conferences/?conf=nss2015.


*JOURNAL SPECIAL ISSUES*

Selected papers from the proceedings will be invited to two
SCI-indexed Journal special issues: One is Concurrency and
Computation: Practice and Experience and the other is Future
Generation Computer Systems.


*CONFERENCE COMMITTEES*

General Chairs
  Meikang Qiu, Pace University, USA
  Elisa Bertino, Purdue University, USA

Program Chair
  Shouhuai Xu, University of Texas at San Antonio, USA
  Moti Yung, Columbia University, USA
  Haibo Zhang, University of Otago, New Zealand

WebPublicity Chair
  Qingji Zheng, Huawei Research, USA

Steering Committees
  Elisa Bertino, Purdue University, USA
  Robert H. Deng, Singapore Management University, Singapore
  Dieter Gollmann, Hamburg University of Technology, Germany
  Xinyi Huang, Fujian Normal University, China
  Kui Ren, University at Buffalo,State University of New York, USA
  Ravi Sandhu, University of Texas at San Antonio, USA
  Yang Xiang (Chair), Deakin University, Australia
  Wanlei Zhou, Deakin University, Australia
___
Om-announce mailing list
Om-announce@openmath.org

[Om-announce] CFP: UbiSafe 2015, Helsinki, Finland, 20-22 August, 2015

2015-04-13 Thread Conference Contact
*** Please accept our apologies if you receive multiple copies of this
Final CFP ***

*** IEEE UbiSafe 2015 paper submission deadline has been extended to 1 May,
2015 (Firm Deadline) ***

*** *** *** *** *** Highlight with SCI  EI indexed journal special issues
*** *** *** *** ***

Distinguished papers, after further revisions, will be published in several
SCI  EI indexed special issues:

(1) Future Generation Computer Systems - Elsevier (SCIEI Indexed, Impact
Factor: 2.639)

http://www.journals.elsevier.com/future-generation-computer-systems/

(2) Concurrency  Computation: Practice  Experience - Wiley (SCIEI
Indexed, Impact Factor: 0.784)

http://www.cc-pe.net/journalinfo/

(3) IEICE Transactions on Information and Systems (SCIEI Indexed, Impact
Factor: 0.191)

http://www.ieice.org/eng/index.html

*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** *** *** *** ***

Final Call for Papers for the 7th IEEE International Symposium on UbiSafe
Computing (UbiSafe 2015)
Helsinki, Finland, 20-22 August, 2015
http://trust.csu.edu.cn/conference/UbiSafe2015/

In Conjunction with IEEE TrustCom 2015
The 14th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (TrustCom 2015)
Helsinki, Finland, 20-22 August, 2015
https://research.comnet.aalto.fi/Trustcom2015/

Organizers:
Central South University, China
Aalto University, Finland

Introduction
Computers are now available anytime, anywhere, by different means, and
distributed unobtrusively
throughout everyday environments in which physical objects/artifacts
embedded with invisible
computers are sensible and networked locally and globally. Such any
computers open tremendous
opportunities to provide numerous novel services/applications in both real
world and cyber spaces,
and exist ubiquitously in our daily life, working, learning, traveling,
entertainment, medicine,
etc. Although it is yet unclear what exactly the real-cyber integrated
worlds would be, there is
no doubt that they must be safe.

The 7th IEEE International Symposium on Ubisafe Computing (UbiSafe 2015)
will be held in conjunction
with The 14th IEEE International Conference on Trust, Security and Privacy
in Computing and
Communications (TrustCom 2015). It follows the success of UbiSafe 2014 in
Beijing, China. It aims at
bringing together researchers and practitioners in the world working on
theories and technologies for
ubiquitous artifacts to function safely for different purposes; for
ubiquitous systems to work safely
in various situations; and for ubiquitous environments to behave safely
with all people.

Scope and Interests
UbiSafe 2015 is an international symposium for presenting and discussing
emerging ideas and trends
in aspects of UbiSafe computing, but are not limited to:

(1) Fundamentals
UbiSafe concepts, definitions, basic elements, models, frameworks and
methodologies, human-centric
paradigms, multi-disciplinary/inter-disciplinary/trans-disciplinary
approaches, semantics, ontologies,
UbiSafe requirements and formal specifications and validations, information
assurance, etc.

(2) Technologies
Security and privacy protection, reliability and fault tolerance, risk
analysis, uncertainty and exception
handling, socially intelligent agents, intuitive/natural user interface,
interaction design,
context-awareness, intelligent computing, service-oriented computing,
hardware, software, middleware, etc.

(3) Systems
Embedded systems, wearable systems, augmented systems, context-based
systems, communication systems,
safety-critical systems, survivable systems, persistent systems,
autonomous/autonomic systems, proactive
systems, network infrastructure, sensor networks, etc.

(4) Applications
Smart objects, smart environments, information appliance and artifacts,
everyday gadgets, robots, safety care,
healthcare, medical care and services, working, learning, traveling,
entertainment, case studies, etc.

(5) Measures and Assessments
UbiSafe attributes and measures for safety, trust, faith, amenity,
easiness, comfort, satisfaction and worry,
UbiSafe levels and relations, UbiSafe quality, assessment criteria and
authority, subjective and objective
assessment standards, evaluation methodologies, testing, measuring and
monitoring tools, etc.

(6) Human Factors and Social Issues
Human and social aspects of UbiSafe, UbiSafe sources and factors, social
rules, regulations and laws, human
factors, human behavior analysis, modeling of human feelings, traditional
and cultural issues, ethical issues, etc.

Submission and Publication Information
All presented papers in the conference will be published in the proceedings
of the conference and submitted to
the IEEE Xplore Digital Library. Papers should be written in English
conforming to the IEEE conference proceedings
format (8.5 x 11, Two-Column). Papers should be submitted through the
paper submission system at the symposium
website. Each paper is limited to 6 pages (or 8 pages with the over length

[Om-announce] GPC 2015 Fiji Deadline Approaching: 01 March 2015 - Accepted Papers Published in SCI and EI Journals Directly

2015-03-02 Thread Conference Contact
-
10th International Conference on Green, Pervasive and Cloud Computing (GPC 2015)
Plantation Island, Fiji, 4-6 May 2015http://anss.org.au/gpc2015/
Paper submission deadline: 01 March 2015
-

*** The best selected papers will be published in IEEE Systems Journal
(SCI indexed), and others will be published in IJES (EI, Scopus
indexed), directly. ***


GPC 2015 Call For Papers


GPC 2015 aims to establish a high-standard world forum for researchers
and developers to share their novel ideas and experiences in the areas
of green computing, pervasive computing and cloud computing. GPC 2015
features a special journal publication model: accepted papers will be
directly published in IEEE Systems Journal (SCI indexed), and the
International Journal of Embedded Systems (EI, Scopus indexed).

Important Dates
===
Paper submission due: 01 March 2015 (final extension)
Notification of decisions: 01 April 2015
Camera ready and registration due: 15 April 2015
Conference/Workshop dates: 4-6 May 2015

Overview


Green computing in the context of cloud and pervasive computing is a
newly-emerging research field in computer science and engineering.
Pervasive computing and cloud computing are two promising paradigms in
human's daily life. With the exponential growth in the deployments of
techniques in pervasive computing and cloud computing, both of them
have to face the critical issues on energy consumption, for example,
controlling the energy consumed by the large-scale cloud datacenters,
and prolonging the battery life of mobile devices in pervasive
computing and Internet of Things (IoT). Therefore, new architectures,
systems and related techniques, such as mobile cloud computing (MCC),
software-defined networking (SDN) and hybrid cloud services, are being
developed to make the computing in cloud datacenters and in pervasive
wireless devices more productive and energy efficient, for shaping a
Green world in the future.

GPC 2015 is the next event in a series of highly successful events
focusing on pervasive and environmentally sustainable computing. In
the last nine years, the GPC conference has been successfully held and
organised all over the world: Taichung, Taiwan (2006), Paris, France
(2007), Kunming, China (2008), Geneva, Switzerland (2009), Hualien,
Taiwan (2010), Oulu, Finland (2011), Hong Kong (2012), Seoul, Korea
(2013), and Wuhan, China (2014).

Topics
==

We invite submissions on a wide range of green computing, pervasive
computing and cloud computing topics, including, but not limited to:

* Energy-efficient computing, communication and virtualisation
architectures and protocols
* Monitoring, sensing, control and management of energy-aware systems
* Integration, scheduling and management of renewable energy sources
* Cloud, cluster and grid computing
* Mobile, peer-to-peer and pervasive computing
* Service-oriented computing
* Ubiquitous communications and networks
* Social network and services
* Sensor, ad hoc networks, mobile agents and networking
* Multimedia communications, machine to machine communications
* Multi-core systems, parallel and distributed systems
* Internet of things, and cyber physical systems
* Trade-offs between performance, energy and other resources in cloud
datacenters and pervasive computing
* Energy-aware mobile cloud systems and large-scale applications
* Semantic web, semantic grid, metadata and ontology related to
pervasive and distributed computing
* Programming models, tools and environments for distributed and
pervasive computing
* Modeling and control of variability in demand and supply of green
energy sources
* Economy and business models in cloud computing and pervasive computing
* Incentives and innovative pricing for the management of cloud resources
* Service Level Agreements (SLAs) guarantee for customers in cloud computing
* Data analytics for energy-efficient systems
* Innovative technologies for robustness and reliability of energy-aware systems
* Security and privacy in pervasive and cloud computing
* Grid and pervasive applications, including eScience and eBusiness applications


Submission
==

Authors are invited to submit original research contributions by
following the instructions below.

Step 1 Prepare your paper by using the journal format template as in
the Author Instructions Page
(http://www.ieeesystemsjournal.org/author-instructions/).
Step 2 Prepare the cover letter and explicitly state that the paper is
submitted to the Special Issue on Green Pervasive and Ubiquitous
Systems IMPORTANT!.
Step 3 Submit your paper with the cover letter through the Submission
Page (http://mc.manuscriptcentral.com/ieee-sj).
Step 4 Send a copy of your paper with the cover letter to gpc2...@easychair.org.

Note: all submissions to GPC 2015 shall go through the 

[Om-announce] CFP: PE-WASUN 2015, Cancun, Mexico, November 2nd - 6th, 2015

2015-03-02 Thread Conference Contact
 Apologies if you receive multiple copies of this Call for Papers
**
C a l l F o r P a p e r s ACM* PE-WASUN 2015 12th ACM* International
Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and
Ubiquitous Networks (Jointly with the 18th ACM MSWiM Conference)
http://sertel.upc.es/pe-wasun15/ Cancun, Mexico November 2nd - 6th, 2015
(*ACM sponsorship approval pending)
**
* Scope * Wireless ad hoc, sensor, along with ubiquitous networks
have recently witnessed their fastest growth period ever in history, and
this trend is likely to continue for the foreseeable future. However, as
such networks become increasingly complex, performance modelling and
evaluation will play a crucial part in their design process to ensure their
successful deployment and exploitation in practice. This symposium will
bring together scientists, engineers, and practitioners to share and
exchange their experiences, discuss challenges, and report state-of-the-art
and in-progress research on all aspects of wireless ad hoc, sensor, and
ubiquitous networks with a specific emphasis on their performance
evaluation and analysis. Topics of interest include, but are not limited
to: - Predictive performance models of ad hoc, sensor, and ubiquitous
networks - Probabilistic models for ad hoc, sensor and ubiquitous networks
- Queuing and network information theoretic analysis - Analytical modeling
and simulation methods - Automatic performance analysis - Tracing and trace
analysis - Software tools for network performance and evaluation -
Performance measurement, evaluation and monitoring tools for ad hoc, sensor
and ubiquitous networks - Case studies demonstrating the role of
performance evaluation in the design of ad hoc, sensor and ubiquitous
networks - Network performance improvement through optimization and tuning
- Mobility modeling and management - Traffic models for ad hoc, sensor
networks - Performance evaluation of wireless mesh networks - Performance
evaluation of pervasive and ubiquitous networks - Performance evaluation of
VANETs - Performance of wireless and sensor devices - Performance of
spectrum agile and cognitive wireless sensor networks - Analysis of
multimedia applications over wireless ad-hoc and sensor networks -
Performance of pervasive computing and services - Analysis of mobile cloud
networking and computing - Performance of continuity of service over
heterogeneous networks, seamless connectivity - Analysis of security and
privacy in ad hoc networks and ubiquitous networks General Chair
-- Mónica Aguilar Igartua Universitat Politècnica de Catalunya
(UPC), Spain monica.agui...@entel.upc.edu Program Co-Chairs
-- Carolina Tripp Barba Universidad Autónoma de Sinaloa,
Mexico ctr...@uas.edu.mx Cristina Alcaraz Tello University of Malaga, Spain
alca...@lcc.uma.es Poster/Demo/Tools Chair  Luis
Urquiza Aguiar Universitat Politècnica de Catalunya, Spain
luis.urqu...@entel.upc.edu Publicity Chair  Xinyi Huang
Fujian Normal University, China xyhu...@fjnu.edu.cn Program Committee
Members --
http://sertel.upc.edu/pe-wasun15/committees.html * Paper
Submission * Authors are required to submit their papers
through EasyChair on the following link:
https://www.easychair.org/conferences/?conf=pewasun2015. The length of the
papers should not exceed 8 single-spaced pages (in two-column format), ACM
style including tables and figures. A template for ACM SIG Proceedings
style (LaTeX2e and MS Word) can be found at
http://www.acm.org/sigs/pubs/proceed/template.html. Accepted papers will
appear in the ACM symposium proceedings. The authors of accepted papers
must guarantee that their paper will be presented at the Symposium. At
least one author of each accepted paper must be registered for the
symposium, in order for that paper to appear in the proceedings and to be
scheduled for presentation.  Important Dates
 Full paper due: June 5th, 2015 Acceptance notification:
July 10th, 2015 Camera ready due: TBA Speaker Author Registration: TBA
Symposium: November 2nd - 6th, 2015 - Jointly with MSWiM'15 We hope to see
you in Mexico. Yours sincerely,
--- Mónica
Aguilar Igartua Associate Professor Department of Telematic Engineering
Universitat Politècnica de Catalunya (UPC), Barcelona, Spain Email:
monica.agui...@entel.upc.edu URL: http://sertel.upc.es/users/maguilar
--- Carolina
Tripp Barba Assistant Professor Facultad de Informática Mazatlán
Universidad Autónoma de Sinaloa, Mexico Email: ctr...@uas.edu.mx URL:
https://sites.google.com/site/carotripp
--- 

[Om-announce] CFP 11th Information Security Practice and Experience Conference (ISPEC 2015), 5-8 May 2015, Beijing, China

2014-12-09 Thread Conference Contact
*** Apologies for multiple copies ***

Call For Papers

The 11th Information Security Practice and Experience Conference (ISPEC
2015)

5-8 May 2015, Beijing, China

http://icsd.i2r.a-star.edu.sg/ispec2015/

Conference Outline:

ISPEC is an annual conference that brings together researchers and
practitioners to provide a confluence of new information security
technologies, their applications and their integration with IT systems in
various vertical sectors. The previous ISPEC conference series were
successfully held in Singapore, Hangzhou, Hong Kong, Sydney, Xi’an, Seoul,
Guangzhou, Hangzhou, Lanzhou and Fuzhou. The eleventh ISPEC will be held in
Beijing, China, 5-8 May 2015. ISPEC 2015 will be hosted by Beihang
University, China.

Conference Topics:

• Access control
• Network security
• Applied cryptography
• Privacy and anonymity
• Availability, resilience, and usability
• Risk evaluation and security certification
• Big data and  Cloud security
• Security for cyber-physical systems
• Cryptanalysis
• Security of smart cards and RFID systems
• Embedded system security
• Security policy
• Database security
• Security protocols
• Digital Forensics
• Security systems
• Digital rights management
• Smart Grid Security
• Information security in vertical applications
• Smartphone Security
• Intrusion detection
• Trust model and management
• Multimedia security
• Trusted computing


Instructions for authors:

Authors are invited to submit original papers which are not previously
published nor submitted in parallel for publication to any other
conference, workshop or journal. All submitted papers must be anonymous,
with no author names, affiliations, acknowledgements, or obvious
references. Submissions must be in English and in PDF format. The final
camera ready version of an accepted paper will be at most 15 pages in the
LNCS style. The manuscript submitted should correspond to what the authors
expect to be published without modification. We therefore strongly
recommend that authors check whether their paper will fit within the above
LNCS space constraints. Submitted papers may risk being rejected directly
without consideration of their merits if they do not follow the above
submission instructions.

The proceedings will be published by Springer in their Lecture Notes in
Computer Science series, and will be available at the conference. At least
one author of each accepted paper should register and give presentation at
the conference.

The URL for online submission is available @
http://icsd.i2r.a-star.edu.sg/ispec2015/submission


Important Dates:

Submission Due: 14 December 2014
Notification to Authors:  8 February 2015
Camera-ready Copy Due: 23 February 2015
Conference dates: 5-8 May 2015


Conference Organization:

Honorary Chairs

• Feng Bao (Huawei, Singapore)
• Weifeng LV (Beihang University, China)

General Chairs

• Qinghua Cao (Beihang University, China)
• Robert Deng (Singapore Management Univ., Singapore)

Program Chairs

• Zhoujun Li (Beihang University, China)
• Javier Lopez (University of Malaga, Spain)
• Yongdong Wu (Inst. for Infocomm Research, Singapore)

Publicity Chairs:

• Cristina Alcaraz (University of Malaga, Spain)


Program Committee:

Joonsang Baek, KUSTAR, UAE
Zhenfu Cao, Shanghai Jiao Tong University, China
David Chadwick, University of Kent, UK
Aldar Chun-fai Chan, Applied Science and Technology Research Institute, HK
Binbin Chen, ADSC, Singapore
Liqun Chen, HP Labs, UK
Cheng-Kang Chu, Huawei, Singapore
Xuhua Ding, SMU, Singapore
Roberto Di Pietro, Università di Roma Tre, Italy
Haixin Duan, Tsinghua University, China
Juan Estevez-Tapiador, UC3M, Spain
Sara Foresti, University of Milan, Italy
Dieter Gollmann, Hamburg University of Technology, Germany
Felix Gomez Marmol, NEC Labs, Germany
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of Aegean, Greece
Hua Guo,  Beihang University, China
Xinyi Huang, Fujian Normal University, China
Alejandro Hevia, University of Chile, Chile
Lucas Hui, Hong Kong University, HK
Sokratis Katsikas, University of Piraeus, Greece
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Jiguo Li, Hohai University, China
Jinming Li, Huawei, China
Tieyan Li, Huawei, Singapore
Yingjiu Li, SMU, Singapore
Joseph Kai Sui Liu, I2R, Singapore
Di Ma, University of Michigan-Dearborn, USA
Jianfeng Ma, Xidian University, China
Masahiro Mambo, Kanazawa University, Japan
Kostas Markantonakis, Royal Holloway, UK
Gregorio Martinez, University of Murcia, Spain
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, NRL, USA
David Nacacche, ENS, France
Eiji Okamoto, University of Tsukuba, Japan
Rene Peralta, NIST, USA
Pedro Peris, UC3M, Spain
Raphael C.-W. Phan, Multimedia University, Malaysia
Mark Ryan,  University of Birmingham, UK
Rei Safavi-Naini, University of Calgary
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, University of Milan, Italy
Wenchang Shi, Renmin University of China, China
Miguel  Soriano, UPC, Spain

[Om-announce] CFP: GPC 2015

2014-11-26 Thread Conference Contact
Apologies if you receive multiple copies of the following message

--
10th International Conference on Green, Pervasive and Cloud Computing (GPC 2015)
Plantation Island, Fiji, 4-6 May 2015http://anss.org.au/gpc2015/
--

GPC 2015 Call For Papers


GPC 2015 aims to establish a high-standard world forum for researchers
and developers to share their excellent ideas and experiences in the
areas of green computing and communications in the broad context of
pervasive computing and cloud computing. GPC 2015 features a special
publication model: in addition to the publication in Springer LNCS
proceedings (EI, Scopus indexed), a number of top ranked papers will
be directly published in a Special Issue of IEEE Systems Journal (SCI
indexed).

Important Dates
===
Extended Paper submission due: 30 November 2014
Notification of decisions: 31 January 2015
Camera ready and registration due: 28 February 2015
Conference/Workshop dates: 4-6 May 2015

Overview


Green computing in the context of cloud and pervasive computing is a
newly-emerging research field in computer science and engineering.
Pervasive computing and cloud computing are two promising paradigms in
human's daily life. With the exponential growth in the deployments of
techniques in pervasive computing and cloud computing, both of them
have to face the critical issues on energy consumption, for example,
controlling the energy consumed by the large-scale cloud datacenters,
and prolonging the battery life of mobile devices in pervasive
computing and Internet of Things (IoT). Therefore, new architectures,
systems and related techniques, such as mobile cloud computing (MCC),
software-defined networking (SDN) and hybrid cloud services, are being
developed to make the computing in cloud datacenters and in pervasive
wireless devices more productive and energy efficient, for shaping a
Green world in the future.

GPC 2015 is the next event in a series of highly successful events
focusing on pervasive and environmentally sustainable computing. In
the last nine years, the GPC conference has been successfully held and
organised all over the world: Taichung, Taiwan (2006), Paris, France
(2007), Kunming, China (2008), Geneva, Switzerland (2009), Hualien,
Taiwan (2010), Oulu, Finland (2011), Hong Kong (2012), Seoul, Korea
(2013), and Wuhan, China (2014).

Topics
==

We invite submissions on a wide range of green, pervasive and cloud
computing topics, including, but not limited to:

* Energy-efficient computing, communication and virtualisation
architectures and protocols
* Trade-offs between performance, energy and other resources in cloud
datacenters and pervasive computing
* Energy-aware mobile cloud systems and large-scale applications
* Energy management in multi-core systems, parallel and distributed
systems, machine to machine communications, social networks and
services
* Energy-aware control in the Internet of Things, such as buildings
and electric vehicle systems
* Monitoring, sensing, control and management of energy-aware systems
* Integration, scheduling and management of renewable energy sources
* Modeling and control of variability in demand and supply of green
energy sources
* Instrumentation and measurement studies on energy-efficient systems
* Economy and business models in cloud computing and pervasive computing
* Incentives and innovative pricing for the management of cloud resources
* Service Level Agreements (SLAs) guarantee for customers in cloud computing
* Data analytics for energy-efficient systems
* Innovative technologies for robustness and reliability of energy-aware systems
* Security and privacy in pervasive and cloud computing

Submission
==

Authors are invited to submit original research contributions by
following the detailed instructions given in the Author Instructions
section at IEEE Systems Journal website. In the cover letter, authors
should explicitly state that the paper is submitted to the Special
Issue on Green Pervasive and Ubiquitous Systems. Please follow the
GPC 2015 submission deadlines.

Note: all submissions to GPC 2015 shall go through the review system
of IEEE Systems Journal. The review process will take place in the
specified time frame. A number of top-ranked papers will be selected
to publish in the journal special issue, while other accepted papers
will be published in LNCS proceedings (which shall then follow the
LNCS paper format with a page limit of 12~14 pages). Questions about
the paper submission may be directed to the GPC 2015 TPC Chairs:

* Hai Jiang, Arkansas State University, USA, hji...@astate.edu
* Ruppa K. Thulasiram, University of Manitoba, Canada, tu...@cs.umanitoba.ca
* Yu Wang, Deakin University, Australia, y.w...@deakin.edu.au

Quick Links:
* Author Instructions - 

[Om-announce] Deadline extension - GPC 2015 Conference in Fiji

2014-11-17 Thread Conference Contact
10th International Conference on Green, Pervasive and Cloud Computing (GPC
2015)
Plantation Island, Fiji, 4-6 May 2015
http://anss.org.au/gpc2015/


GPC 2015 Call For Papers


GPC 2015 aims to establish a high-standard world forum for researchers and
developers to share their excellent ideas and experiences in the areas of
green computing and communications in the broad context of pervasive
computing and cloud computing. GPC 2015 features a special publication
model: in addition to the publication in Springer LNCS proceedings (EI,
Scopus indexed), a number of top ranked papers will be directly published
in a Special Issue of IEEE Systems Journal (SCI indexed).

Important Dates
===
Extended Paper submission due: 30 November 2014
Notification of decisions: 31 January 2015
Camera ready and registration due: 28 February 2015
Conference/Workshop dates: 4-6 May 2015

Overview


Green computing in the context of cloud and pervasive computing is a
newly-emerging research field in computer science and engineering.
Pervasive computing and cloud computing are two promising paradigms in
human's daily life. With the exponential growth in the deployments of
techniques in pervasive computing and cloud computing, both of them have to
face the critical issues on energy consumption, for example, controlling
the energy consumed by the large-scale cloud datacenters, and prolonging
the battery life of mobile devices in pervasive computing and Internet of
Things (IoT). Therefore, new architectures, systems and related techniques,
such as mobile cloud computing (MCC), software-defined networking (SDN) and
hybrid cloud services, are being developed to make the computing in cloud
datacenters and in pervasive wireless devices more productive and energy
efficient, for shaping a Green world in the future.

GPC 2015 is the next event in a series of highly successful events focusing
on pervasive and environmentally sustainable computing. In the last nine
years, the GPC conference has been successfully held and organised all over
the world: Taichung, Taiwan (2006), Paris, France (2007), Kunming, China
(2008), Geneva, Switzerland (2009), Hualien, Taiwan (2010), Oulu, Finland
(2011), Hong Kong (2012), Seoul, Korea (2013), and Wuhan, China (2014).

Topics
==

We invite submissions on a wide range of green, pervasive and cloud
computing topics, including, but not limited to:

* Energy-efficient computing, communication and virtualisation
architectures and protocols
* Trade-offs between performance, energy and other resources in cloud
datacenters and pervasive computing
* Energy-aware mobile cloud systems and large-scale applications
* Energy management in multi-core systems, parallel and distributed
systems, machine to machine communications, social networks and services
* Energy-aware control in the Internet of Things, such as buildings and
electric vehicle systems
* Monitoring, sensing, control and management of energy-aware systems
* Integration, scheduling and management of renewable energy sources
* Modeling and control of variability in demand and supply of green energy
sources
* Instrumentation and measurement studies on energy-efficient systems
* Economy and business models in cloud computing and pervasive computing
* Incentives and innovative pricing for the management of cloud resources
* Service Level Agreements (SLAs) guarantee for customers in cloud computing
* Data analytics for energy-efficient systems
* Innovative technologies for robustness and reliability of energy-aware
systems
* Security and privacy in pervasive and cloud computing

Submission
==

Authors are invited to submit original research contributions by following
the detailed instructions given in the Author Instructions section at
IEEE Systems Journal website. In the cover letter, authors should
explicitly state that the paper is submitted to the Special Issue on Green
Pervasive and Ubiquitous Systems. Please follow the GPC 2015 submission
deadlines.

Note: all submissions to GPC 2015 shall go through the review system of
IEEE Systems Journal. The review process will take place in the specified
time frame. A number of top-ranked papers will be selected to publish in
the journal special issue, while other accepted papers will be published in
LNCS proceedings (which shall then follow the LNCS paper format with a page
limit of 12~14 pages). Questions about the paper submission may be directed
to the GPC 2015 TPC Chairs:

* Hai Jiang, Arkansas State University, USA, hji...@astate.edu
* Ruppa K. Thulasiram, University of Manitoba, Canada, tu...@cs.umanitoba.ca
* Yu Wang, Deakin University, Australia, y.w...@deakin.edu.au

Quick Links:
* Author Instructions -
http://www.ieeesystemsjournal.org/author-instructions/
* Submission System - http://mc.manuscriptcentral.com/ieee-sj

Organisation Committee
==

General Chairs
--
A B M Shawkat Ali, The University of Fiji, Fiji
Yang Xiang,