[Om-announce] [CFP-ESORICS 2022]: 27th European Symposium on Research in Computer Security (ESORICS) 2022
[Apologies for cross-posting] -- C a l l F o r P a p e r s 27th European Symposium on Research in Computer Security (ESORICS) 2022 26-30 September 2022, Copenhagen, Denmark URL: https://esorics2022.compute.dtu.dk/# -- === CONFERENCE OUTLINE: === We are looking for papers with high quality, original and unpublished research contributions. The Symposium will start on September 26, 2022 with an exciting technical program, including vetted papers, invited talks, poster and panel discussions as well as collocated workshops. Important Dates: - This year’s symposium will have two review cycles. All submissions must be received by 11:59 p.m. any where on earth Time on the day of the corresponding deadline. Winter cycle ■ Title and abstract: January 25, 2022 (hard) ■ Full paper submission: January 31, 2022 (hard) ■ Early reject notification: March 15, 2022 ■ Notification to authors: March 30, 2022 ■ Camera ready due: August 10, 2022 Spring cycle ■ Title and abstract: May 15, 2022 ■ Full paper submission: May 22, 2022 ■ Early reject notification: June 22, 2022 ■ Notification to authors: July 15, 2022 ■ Camera ready due: August 10, 2022 Abstract submissions: -- You will need to submit your title and abstract by 11:59 pm, any where on earth, on the day of the corresponding deadline through the Symposium‘s EasyChair websites by following instructions on how to make a submission ( https://easychair.org/help/how_to_submit). Paper submissions: --- Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference / workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). In addition, the Journal of Computer Security will publish a special issue containing selected papers from the ESORICS 2022 proceedings. As in previous years, ESORICS will present a Best Paper Award chosen by the Program Committee. This award is generously sponsored by Springer. How to submit your paper: - Submitted papers must follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions must be uploaded to the following EasyChair website: https://easychair.org/conferences/?conf=esorics2022 Only pdf files will be accepted. Submissions are not anonymous. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Review Process - Revised Submissions: -- This year’s symposium will have two review cycles. Within 1.5 month of submission, author notifications of Accept/Revise/Reject decisions will be sent out. For each submission, one of the following decisions will be made: ■ Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd. ■ Revise: A limited number of papers will be invited to submit a revision; such papers are considered to be promising but need additional work (e.g., new experiments, proofs, or implementations). Authors will receive a specific set of expectations to be met by their revisions. Authors can resubmit such papers, with appropriate revisions, to the spring submission deadline. In revised submissions, the authors should clearly explain in a well-marked appendix how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected. ■ Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle. A paper will be judged to be a resubmit (as opposed to a new submission) if the paper is from the same or similar authors, and there is more than 40% overlap between the original submission and the new paper, it will be considered a resubmission. Topics of Interests: -- Submissions are solicited in all areas relating to computer security, including but not limited to: ■ Access control ■ Anonymity and censorship resistance ■ Applied cryptography ■ Artificial intelligence for security ■ Security and privacy of systems based on machine learning and AI ■ Audit
[Om-announce] [Extended CFP]: IEEE/ACM International Symposium on Quality of Service (IWQoS 2022) *** Paper Registration Deadline: 7 February 2022; Paper Submission Deadline: 16 February 2022 ***
[Apologies for cross-posting] - C a l l F o r P a p e r s IEEE/ACM International Symposium on Quality of Service (IWQoS 2022) 10-12 June 2022, Oslo, Norway // virtual conference URL: https://iwqos2022.ieee-iwqos.org/ - === CONFERENCE OUTLINE: === Quality of Service (QoS) has long been the focus of communications and networking researchers worldwide. While traditional QoS research areas continue attracting much interest, recent exploration of Internet of things, data centers, virtualization, cloud and fog computing, green computing, and AI has motivated a new wave of research interest in service guarantees with QoS, and its related metrics of Quality of Experience (QoE), Quality of Protection (QoP), Software Quality, Data Quality, or, more broadly, Quality of Information Technology. For more than two decades, IWQoS has established itself as a highly reputable forum to present novel ideas on all QoS-related subjects. The 30th International Symposium on Quality of Service (IEEE/ACM IWQoS 2022) sets the goal to continuing to be a premier symposium and an international forum for presentation and discussion of cutting-edge research in the field. The scope of IEEE/ACM IWQoS 2022 covers both newest theoretical and experimental research papers. Topics of interest include (but not limited to) the following areas: ● Artificial Intelligence for QoS ● Data analytics for QoS ● QoS for data analytics and machine learning ● QoS in Internet of Things (IoT), cyber-physical networks ● QoS in cloud computing, fog computing and edge computing ● Blockchain for QoS ● Security, privacy, system dependability, resilience and robustness ● QoS in software-defined networking ● QoS in information-centric networking ● QoS in mobile and next generation cellular networks ● System dependability, availability, resilience and robustness to faults and security attacks ● Robustness against security vulnerabilities in critical infrastructures ● QoS-aware scheduling, resource management, queue management, admission control ● Traffic engineering approaches and tools for QoS provisioning and evaluation ● QoS evaluation metrics and methodologies ● Quality of software ● QoE in multimedia networks ● Measurement, evaluation, adaptation, and verification ● Network operations, network economics, pricing and billing ● Architectures and protocols for QoS, QoP or QoE support ● Energy awareness in communication and computing systems ● Design for future networks and computing systems with integrated QoS Paper Submission Guidelines: IEEE/ACM IWQoS invites submission of manuscripts with original research results that have not been previously published or that are not currently under review by another conference or journal. Submissions will be rigorously judged based on originality, significance, interest, clarity, relevance, and correctness. IWQoS aims at the rapid dissemination of research results. Regular paper submissions should be no longer than 10 single-spaced, double-column pages (including references) with a font-size of 10. Reviewing will be double-blind. Submissions must not reveal the authors’ names and their affiliations and avoid obvious self-references. Submissions not meeting these guidelines will be rejected without consideration of their merits. Papers must be submitted electronically as PDF files. Please follow the submission link on https://edas.info/newPaper.php?c=29190 to submit your paper. Important Dates: Paper Registration Deadline: 7 February 2022 Paper Submission Deadline: 16 February 2022 Notification of Acceptance: 7 April 2022 Camera-ready Deadline: 1 May 2022 ___ Om-announce mailing list Om-announce@openmath.org https://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [CFP-ESORICS 2022]: 27th European Symposium on Research in Computer Security (ESORICS) 2022
[Apologies for cross-posting] -- C a l l F o r P a p e r s I27th European Symposium on Research in Computer Security (ESORICS) 2022 26-30 September 2022, Copenhagen, Denmark URL: https://esorics2022.compute.dtu.dk/# -- === CONFERENCE OUTLINE: === We are looking for papers with high quality, original and unpublished research contributions. The Symposium will start on September 26, 2022 with an exciting technical program, including vetted papers, invited talks, poster and panel discussions as well as collocated workshops. Important Dates: - This year’s symposium will have two review cycles. All submissions must be received by 11:59 p.m. any where on earth Time on the day of the corresponding deadline. Winter cycle ■ Title and abstract: January 25, 2022 (hard) ■ Full paper submission: January 31, 2022 (hard) ■ Early reject notification: March 15, 2022 ■ Notification to authors: March 30, 2022 ■ Camera ready due: August 10, 2022 Spring cycle ■ Title and abstract: May 15, 2022 ■ Full paper submission: May 22, 2022 ■ Early reject notification: June 22, 2022 ■ Notification to authors: July 15, 2022 ■ Camera ready due: August 10, 2022 Abstract submissions: -- You will need to submit your title and abstract by 11:59 pm, any where on earth, on the day of the corresponding deadline through the Symposium‘s EasyChair websites by following instructions on how to make a submission ( https://easychair.org/help/how_to_submit). Paper submissions: --- Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference / workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). In addition, the Journal of Computer Security will publish a special issue containing selected papers from the ESORICS 2022 proceedings. As in previous years, ESORICS will present a Best Paper Award chosen by the Program Committee. This award is generously sponsored by Springer. How to submit your paper: - Submitted papers must follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions must be uploaded to the following EasyChair website: https://easychair.org/conferences/?conf=esorics2022 Only pdf files will be accepted. Submissions are not anonymous. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Review Process - Revised Submissions: -- This year’s symposium will have two review cycles. Within 1.5 month of submission, author notifications of Accept/Revise/Reject decisions will be sent out. For each submission, one of the following decisions will be made: ■ Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd. ■ Revise: A limited number of papers will be invited to submit a revision; such papers are considered to be promising but need additional work (e.g., new experiments, proofs, or implementations). Authors will receive a specific set of expectations to be met by their revisions. Authors can resubmit such papers, with appropriate revisions, to the spring submission deadline. In revised submissions, the authors should clearly explain in a well-marked appendix how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected. ■ Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle. A paper will be judged to be a resubmit (as opposed to a new submission) if the paper is from the same or similar authors, and there is more than 40% overlap between the original submission and the new paper, it will be considered a resubmission. Topics of Interests: -- Submissions are solicited in all areas relating to computer security, including but not limited to: ■ Access control ■ Anonymity and censorship resistance ■ Applied cryptography ■ Artificial intelligence for security ■ Security and privacy of systems based on machine learning and AI ■
[Om-announce] [Approaching deadline]: IEEE/ACM International Symposium on Quality of Service (IWQoS 2022)
[Apologies for cross-posting] - C a l l F o r P a p e r s IEEE/ACM International Symposium on Quality of Service (IWQoS 2022) 10-12 June 2022, Oslo, Norway // virtual conference URL: https://iwqos2022.ieee-iwqos.org/ - === CONFERENCE OUTLINE: === Quality of Service (QoS) has long been the focus of communications and networking researchers worldwide. While traditional QoS research areas continue attracting much interest, recent exploration of Internet of things, data centers, virtualization, cloud and fog computing, green computing, and AI has motivated a new wave of research interest in service guarantees with QoS, and its related metrics of Quality of Experience (QoE), Quality of Protection (QoP), Software Quality, Data Quality, or, more broadly, Quality of Information Technology. For more than two decades, IWQoS has established itself as a highly reputable forum to present novel ideas on all QoS-related subjects. The 30th International Symposium on Quality of Service (IEEE/ACM IWQoS 2022) sets the goal to continuing to be a premier symposium and an international forum for presentation and discussion of cutting-edge research in the field. The scope of IEEE/ACM IWQoS 2022 covers both newest theoretical and experimental research papers. Topics of interest include (but not limited to) the following areas: ● Artificial Intelligence for QoS ● Data analytics for QoS ● QoS for data analytics and machine learning ● QoS in Internet of Things (IoT), cyber-physical networks ● QoS in cloud computing, fog computing and edge computing ● Blockchain for QoS ● Security, privacy, system dependability, resilience and robustness ● QoS in software-defined networking ● QoS in information-centric networking ● QoS in mobile and next generation cellular networks ● System dependability, availability, resilience and robustness to faults and security attacks ● Robustness against security vulnerabilities in critical infrastructures ● QoS-aware scheduling, resource management, queue management, admission control ● Traffic engineering approaches and tools for QoS provisioning and evaluation ● QoS evaluation metrics and methodologies ● Quality of software ● QoE in multimedia networks ● Measurement, evaluation, adaptation, and verification ● Network operations, network economics, pricing and billing ● Architectures and protocols for QoS, QoP or QoE support ● Energy awareness in communication and computing systems ● Design for future networks and computing systems with integrated QoS Paper Submission Guidelines: IEEE/ACM IWQoS invites submission of manuscripts with original research results that have not been previously published or that are not currently under review by another conference or journal. Submissions will be rigorously judged based on originality, significance, interest, clarity, relevance, and correctness. IWQoS aims at the rapid dissemination of research results. Regular paper submissions should be no longer than 10 single-spaced, double-column pages (including references) with a font-size of 10. Reviewing will be double-blind. Submissions must not reveal the authors’ names and their affiliations and avoid obvious self-references. Submissions not meeting these guidelines will be rejected without consideration of their merits. Papers must be submitted electronically as PDF files. Please follow the submission link on https://edas.info/newPaper.php?c=29190 to submit your paper. Important Dates: Paper Registration Deadline: 1 February 2022 Paper Submission Deadline: 7 February 2022 Notification of Acceptance: 7 April 2022 Camera-ready Deadline: 1 May 2022 ___ Om-announce mailing list Om-announce@openmath.org https://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] IEEE/ACM International Symposium on Quality of Service (IWQoS 2022)
[Apologies for cross-posting] - C a l l F o r P a p e r s IEEE/ACM International Symposium on Quality of Service (IWQoS 2022) 10-12 June 2022, Oslo, Norway // virtual conference URL: https://iwqos2022.ieee-iwqos.org/ - === CONFERENCE OUTLINE: === Quality of Service (QoS) has long been the focus of communications and networking researchers worldwide. While traditional QoS research areas continue attracting much interest, recent exploration of Internet of things, data centers, virtualization, cloud and fog computing, green computing, and AI has motivated a new wave of research interest in service guarantees with QoS, and its related metrics of Quality of Experience (QoE), Quality of Protection (QoP), Software Quality, Data Quality, or, more broadly, Quality of Information Technology. For more than two decades, IWQoS has established itself as a highly reputable forum to present novel ideas on all QoS-related subjects. The 30th International Symposium on Quality of Service (IEEE/ACM IWQoS 2022) sets the goal to continuing to be a premier symposium and an international forum for presentation and discussion of cutting-edge research in the field. The scope of IEEE/ACM IWQoS 2022 covers both newest theoretical and experimental research papers. Topics of interest include (but not limited to) the following areas: ● Artificial Intelligence for QoS ● Data analytics for QoS ● QoS for data analytics and machine learning ● QoS in Internet of Things (IoT), cyber-physical networks ● QoS in cloud computing, fog computing and edge computing ● Blockchain for QoS ● Security, privacy, system dependability, resilience and robustness ● QoS in software-defined networking ● QoS in information-centric networking ● QoS in mobile and next generation cellular networks ● System dependability, availability, resilience and robustness to faults and security attacks ● Robustness against security vulnerabilities in critical infrastructures ● QoS-aware scheduling, resource management, queue management, admission control ● Traffic engineering approaches and tools for QoS provisioning and evaluation ● QoS evaluation metrics and methodologies ● Quality of software ● QoE in multimedia networks ● Measurement, evaluation, adaptation, and verification ● Network operations, network economics, pricing and billing ● Architectures and protocols for QoS, QoP or QoE support ● Energy awareness in communication and computing systems ● Design for future networks and computing systems with integrated QoS Paper Submission Guidelines: IEEE/ACM IWQoS invites submission of manuscripts with original research results that have not been previously published or that are not currently under review by another conference or journal. Submissions will be rigorously judged based on originality, significance, interest, clarity, relevance, and correctness. IWQoS aims at the rapid dissemination of research results. Regular paper submissions should be no longer than 10 single-spaced, double-column pages (including references) with a font-size of 10. Reviewing will be double-blind. Submissions must not reveal the authors’ names and their affiliations and avoid obvious self-references. Submissions not meeting these guidelines will be rejected without consideration of their merits. Papers must be submitted electronically as PDF files. Please follow the submission link on https://edas.info/newPaper.php?c=29190 to submit your paper. Important Dates: Paper Registration Deadline: 1 February 2022 Paper Submission Deadline: 7 February 2022 Notification of Acceptance: 7 April 2022 Camera-ready Deadline: 1 May 2022 ___ Om-announce mailing list Om-announce@openmath.org https://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] IEEE/ACM International Symposium on Quality of Service (IWQoS 2022)
[Apologies for cross-posting] - C a l l F o r P a p e r s IEEE/ACM International Symposium on Quality of Service (IWQoS 2022) 10-12 June 2022, Oslo, Norway // virtual conference URL: https://iwqos2022.ieee-iwqos.org/ - === CONFERENCE OUTLINE: === Quality of Service (QoS) has long been the focus of communications and networking researchers worldwide. While traditional QoS research areas continue attracting much interest, recent exploration of Internet of things, data centers, virtualization, cloud and fog computing, green computing, and AI has motivated a new wave of research interest in service guarantees with QoS, and its related metrics of Quality of Experience (QoE), Quality of Protection (QoP), Software Quality, Data Quality, or, more broadly, Quality of Information Technology. For more than two decades, IWQoS has established itself as a highly reputable forum to present novel ideas on all QoS-related subjects. The 30th International Symposium on Quality of Service (IEEE/ACM IWQoS 2022) sets the goal to continuing to be a premier symposium and an international forum for presentation and discussion of cutting-edge research in the field. The scope of IEEE/ACM IWQoS 2022 covers both newest theoretical and experimental research papers. Topics of interest include (but not limited to) the following areas: ● Artificial Intelligence for QoS ● Data analytics for QoS ● QoS for data analytics and machine learning ● QoS in Internet of Things (IoT), cyber-physical networks ● QoS in cloud computing, fog computing and edge computing ● Blockchain for QoS ● Security, privacy, system dependability, resilience and robustness ● QoS in software-defined networking ● QoS in information-centric networking ● QoS in mobile and next generation cellular networks ● System dependability, availability, resilience and robustness to faults and security attacks ● Robustness against security vulnerabilities in critical infrastructures ● QoS-aware scheduling, resource management, queue management, admission control ● Traffic engineering approaches and tools for QoS provisioning and evaluation ● QoS evaluation metrics and methodologies ● Quality of software ● QoE in multimedia networks ● Measurement, evaluation, adaptation, and verification ● Network operations, network economics, pricing and billing ● Architectures and protocols for QoS, QoP or QoE support ● Energy awareness in communication and computing systems ● Design for future networks and computing systems with integrated QoS Paper Submission Guidelines: IEEE/ACM IWQoS invites submission of manuscripts with original research results that have not been previously published or that are not currently under review by another conference or journal. Submissions will be rigorously judged based on originality, significance, interest, clarity, relevance, and correctness. IWQoS aims at the rapid dissemination of research results. Regular paper submissions should be no longer than 10 single-spaced, double-column pages (including references) with a font-size of 10. Reviewing will be double-blind. Submissions must not reveal the authors’ names and their affiliations and avoid obvious self-references. Submissions not meeting these guidelines will be rejected without consideration of their merits. Papers must be submitted electronically as PDF files. Please follow the submission link on https://edas.info/newPaper.php?c=29190 to submit your paper. Important Dates: Paper Registration Deadline: 1 February 2022 Paper Submission Deadline: 7 February 2022 Notification of Acceptance: 7 April 2022 Camera-ready Deadline: 1 May 2022 ___ Om-announce mailing list Om-announce@openmath.org https://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [IWQoS 2022] CFP: IEEE/ACM International Symposium on Quality of Service (IWQoS 2022)
[Apologies for cross-posting] - C a l l F o r P a p e r s IEEE/ACM International Symposium on Quality of Service (IWQoS 2022) 10-12 June 2022, Oslo, Norway // virtual conference URL: https://iwqos2022.ieee-iwqos.org/ - === CONFERENCE OUTLINE: === Quality of Service (QoS) has long been the focus of communications and networking researchers worldwide. While traditional QoS research areas continue attracting much interest, recent exploration of Internet of things, data centers, virtualization, cloud and fog computing, green computing, and AI has motivated a new wave of research interest in service guarantees with QoS, and its related metrics of Quality of Experience (QoE), Quality of Protection (QoP), Software Quality, Data Quality, or, more broadly, Quality of Information Technology. For more than two decades, IWQoS has established itself as a highly reputable forum to present novel ideas on all QoS-related subjects. The 30th International Symposium on Quality of Service (IEEE/ACM IWQoS 2022) sets the goal to continuing to be a premier symposium and an international forum for presentation and discussion of cutting-edge research in the field. The scope of IEEE/ACM IWQoS 2022 covers both newest theoretical and experimental research papers. Topics of interest include (but not limited to) the following areas: ● Artificial Intelligence for QoS ● Data analytics for QoS ● QoS for data analytics and machine learning ● QoS in Internet of Things (IoT), cyber-physical networks ● QoS in cloud computing, fog computing and edge computing ● Blockchain for QoS ● Security, privacy, system dependability, resilience and robustness ● QoS in software-defined networking ● QoS in information-centric networking ● QoS in mobile and next generation cellular networks ● System dependability, availability, resilience and robustness to faults and security attacks ● Robustness against security vulnerabilities in critical infrastructures ● QoS-aware scheduling, resource management, queue management, admission control ● Traffic engineering approaches and tools for QoS provisioning and evaluation ● QoS evaluation metrics and methodologies ● Quality of software ● QoE in multimedia networks ● Measurement, evaluation, adaptation, and verification ● Network operations, network economics, pricing and billing ● Architectures and protocols for QoS, QoP or QoE support ● Energy awareness in communication and computing systems ● Design for future networks and computing systems with integrated QoS Paper Submission Guidelines: IEEE/ACM IWQoS invites submission of manuscripts with original research results that have not been previously published or that are not currently under review by another conference or journal. Submissions will be rigorously judged based on originality, significance, interest, clarity, relevance, and correctness. IWQoS aims at the rapid dissemination of research results. Regular paper submissions should be no longer than 10 single-spaced, double-column pages (including references) with a font-size of 10. Reviewing will be double-blind. Submissions must not reveal the authors’ names and their affiliations and avoid obvious self-references. Submissions not meeting these guidelines will be rejected without consideration of their merits. Papers must be submitted electronically as PDF files. Please follow the submission link on https://edas.info/newPaper.php?c=29190 to submit your paper. Important Dates: Paper Registration Deadline: 1 February 2022 Paper Submission Deadline: 7 February 2022 Notification of Acceptance: 7 April 2022 Camera-ready Deadline: 1 May 2022 ___ Om-announce mailing list Om-announce@openmath.org https://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [CPSS 2020 postponement and new submission extension] CFP: 6th ACM Cyber-Physical System Security Workshop (ACM CPSS'20) - "firm"submission deadline: ****March 25, 2020****
rohmeier (University of Oxford, UK) - Qiang Tang (LIST, Luxembourg) - Nils Ole Tippenhauer (CISPA, Germany) - Zheng Yang (SUTD, Singapore) - Jianying Zhou (SUTD, Singapore) - Sencun Zhu (Pennsylvania State University, USA) - Saman Zonouz (Rutgers University, USA) Publicity Chair: * Pankaj Pandey (Norwegian University of Science and Technology - NTNU, Norway) Publication Chair: * Stefanos Gritzalis (University of Piraeus, Greece) Contact --- Email: cps...@easychair.org CPSS'20 Home: https://www.nics.uma.es/pub/CPSS2020/ ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] [Extended submission] CFP: 6th ACM Cyber-Physical System Security Workshop (ACM CPSS'20) - submission: ****February 24, 2020****
*** Apologies for multiple copies *** C a l l F o r P a p e r s 6th ACM Cyber-Physical System Security Workshop (ACM CPSS 2020) in conjunction with ACM AsiaCCS'20 Taipei, Taiwan -- June 1st, 2020 https://www.nics.uma.es/pub/CPSS2020/ Overview - Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our lives thus making security an important non-functional attribute of such systems. This workshop will provide a platform for professionals from academia, government, and industry to discuss novel ways to address the ever-present security challenges facing CPS. We seek submissions describing theoretical and practical solutions to security challenges in CPS. Submissions pertinent to the security of embedded systems, IoT, SCADA, smart grid, and other critical infrastructure are welcome. Topics of interest include, but are not limited to: * Attack detection for CPS * Authentication and access control for CPS * Availability of and auditing for CPS * Blockchain for CPS security * Data security and privacy for CPS * Digital twins for CPS * Embedded systems security * Formal methods in CPS * Industrial control systems security * IoT security * Lightweight crypto * Recovery of CPS from cyber attacks * Security risk assessment for CPS * Security architectures for CPS * Security by design for CPS * Security of autonomous vehicles and vessels * Security of legacy CPS * Smart grid security * Threat modeling for CPS * Security of transportation systems * Vulnerability analysis for CPS Important Dates * Paper submission deadline: February 24, 2020 * Notification to authors: March 5, 2020 * Camera ready due: March 15, 2020 Paper Submission Guidelines Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized. Submissions must be in double-column ACM SIG Proceedings format, and should not exceed 12 pages. Position papers describing work in progress are also welcome. Only pdf files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each paper must be registered at the appropriate conference rate. Accepted papers will be published in the ACM Digital Library. A best paper award will be presented getting opportunities for a registration fee discount. Paper submission site: https://easychair.org/conferences/?conf=cpss20 Organisation Committee --- Steering Committee: * Dieter Gollmann (Hamburg University of Technology, Germany) * Ravishankar Iyer (UIUC, USA) * Douglas Jones (UIUC, USA) * Javier Lopez (University of Malaga, Spain) * Jianying Zhou (SUTD, Singapore) – Chair Program Committee Chairs: * Sokratis Katsikas (Open University of Cyprus, Cyprus; and Norwegian University of Science and Technology - NTNU, Norway) * Cristina Alcaraz (University of Malaga, Spain) Program Committee: - Chuadhry Mujeeb Ahmed (SUTD, Singapore) - Alvaro Cardenas (UC Santa Cruz, USA) - Mauro Conti (University of Padua, Italy) - Afonso Ferreira (CNRS, France) - Yanick Fratantonio (EURECOM, France) - Joaquin Garcia-Alfaro (Telecom SudParis, France) - Vasileios Gkioulos (NTNU, Norway) - Eunsuk Kang (Carnegie Mellon University, USA) - Huy Kang Kim (Korea University, Korea) - Kandasamy Nandha Kumar (SUTD, Singapore) - Qi Li (Tsinghua University, China) - Hoon Wei Lim (SingTel, Singapore) - Javier Lopez (University of Malaga, Spain) - Bo Luo (University of Kansas, USA) - Emil Lupu (Imperial College, UK) - Michail Maniatakos (NYU-Abu Dhabi, UAE) - Daisuke Mashima (ADSC, Singapore) - Weizhi Meng (DTU, Denmark) - Simin Nadjm-Tehrani (Linköping University, Sweden) - Martín Ochoa (Universidad del Rosario, Colombia) - Günther Pernul (Universität Regensburg, Germany) - Indraskhi Ray (Colorado State University, USA) - Rodrigo Roman (University of Malaga, Spain) - Justin Ruths (UT Dallas, USA) - Savio Sciancalepore (HBKU-CSE, Qatar) - Martin Strohmeier (University of Oxford, UK) - Qiang Tang (LIST, Luxembourg) - Nils Ole Tippenhauer (CISPA, Germany) - Zheng Yang (SUTD, Singapore) - Jianying Zhou (SUTD, Singapore) - Sencun Zhu (Pennsylvania State University, USA) - Saman Zonouz (Rutgers University, USA) Publicity Chair: * Pankaj Pandey (Norwegian University of Science and Technology - NTNU, Norway) Publication Chair: * Stefanos Gritzalis (University of Piraeus, Greece) Contact --- Email: cps...@easychair.org CPSS Home: https://nics.uma.es/pub
[Om-announce] [Deadline Approaching] CFP: 6th ACM Cyber-Physical System Security Workshop (ACM CPSS'20)
*** Apologies for multiple copies *** C a l l F o r P a p e r s 6th ACM Cyber-Physical System Security Workshop (ACM CPSS 2020) in conjunction with ACM AsiaCCS'20 Taipei, Taiwan -- June 1st, 2020 https://www.nics.uma.es/pub/CPSS2020/ Overview - Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our lives thus making security an important non-functional attribute of such systems. This workshop will provide a platform for professionals from academia, government, and industry to discuss novel ways to address the ever-present security challenges facing CPS. We seek submissions describing theoretical and practical solutions to security challenges in CPS. Submissions pertinent to the security of embedded systems, IoT, SCADA, smart grid, and other critical infrastructure are welcome. Topics of interest include, but are not limited to: * Attack detection for CPS * Authentication and access control for CPS * Availability of and auditing for CPS * Blockchain for CPS security * Data security and privacy for CPS * Digital twins for CPS * Embedded systems security * Formal methods in CPS * Industrial control systems security * IoT security * Lightweight crypto * Recovery of CPS from cyber attacks * Security risk assessment for CPS * Security architectures for CPS * Security by design for CPS * Security of autonomous vehicles and vessels * Security of legacy CPS * Smart grid security * Threat modeling for CPS * Security of transportation systems * Vulnerability analysis for CPS Important Dates * Paper submission deadline: February 10, 2020 * Notification to authors: March 5, 2020 * Camera ready due: March 15, 2020 Paper Submission Guidelines Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized. Submissions must be in double-column ACM SIG Proceedings format, and should not exceed 12 pages. Position papers describing work in progress are also welcome. Only pdf files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each paper must be registered at the appropriate conference rate. Accepted papers will be published in the ACM Digital Library. A best paper award will be presented getting opportunities for a registration fee discount. Paper submission site: https://easychair.org/conferences/?conf=cpss20 Organisation Committee --- Steering Committee: * Dieter Gollmann (Hamburg University of Technology, Germany) * Ravishankar Iyer (UIUC, USA) * Douglas Jones (UIUC, USA) * Javier Lopez (University of Malaga, Spain) * Jianying Zhou (SUTD, Singapore) – Chair Program Committee Chairs: * Sokratis Katsikas (Open University of Cyprus, Cyprus; and Norwegian University of Science and Technology - NTNU, Norway) * Cristina Alcaraz (University of Malaga, Spain) Program Committee: - Chuadhry Mujeeb Ahmed (SUTD, Singapore) - Alvaro Cardenas (UC Santa Cruz, USA) - Mauro Conti (University of Padua, Italy) - Afonso Ferreira (CNRS, France) - Yanick Fratantonio (EURECOM, France) - Joaquin Garcia-Alfaro (Telecom SudParis, France) - Vasileios Gkioulos (NTNU, Norway) - Eunsuk Kang (Carnegie Mellon University, USA) - Huy Kang Kim (Korea University, Korea) - Kandasamy Nandha Kumar (SUTD, Singapore) - Qi Li (Tsinghua University, China) - Hoon Wei Lim (SingTel, Singapore) - Javier Lopez (University of Malaga, Spain) - Bo Luo (University of Kansas, USA) - Emil Lupu (Imperial College, UK) - Michail Maniatakos (NYU-Abu Dhabi, UAE) - Daisuke Mashima (ADSC, Singapore) - Weizhi Meng (DTU, Denmark) - Simin Nadjm-Tehrani (Linköping University, Sweden) - Martín Ochoa (Universidad del Rosario, Colombia) - Günther Pernul (Universität Regensburg, Germany) - Indraskhi Ray (Colorado State University, USA) - Rodrigo Roman (University of Malaga, Spain) - Justin Ruths (UT Dallas, USA) - Savio Sciancalepore (HBKU-CSE, Qatar) - Martin Strohmeier (University of Oxford, UK) - Qiang Tang (LIST, Luxembourg) - Nils Ole Tippenhauer (CISPA, Germany) - Zheng Yang (SUTD, Singapore) - Jianying Zhou (SUTD, Singapore) - Sencun Zhu (Pennsylvania State University, USA) - Saman Zonouz (Rutgers University, USA) Publicity Chair: * Pankaj Pandey (Norwegian University of Science and Technology - NTNU, Norway) Publication Chair: * Stefanos Gritzalis (University of Piraeus, Greece) Contact --- Email: cps...@easychair.org CPSS Home: https://nics.uma.es/pub/CPSS2020
[Om-announce] Subject: ESORICS 2019: Call for Participation
== ESORICS 2019: CALL FOR PARTICIPATION Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 == WWW: https://esorics2019.uni.lu Overview: - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. ESORICS 2019 spans a total of 3 days, featuring: * 3 keynote speeches Véronique Cortier, INRIA Nancy Bart Preneel, KU Leuven Adi Shamir, Weissmann, * ESORICS main conference over three days (Sept 23-25) * workshops (Sept 26 - 27) Registration: Early Registration for ESORICS 2019 only and ESORICS+Workshops 2019 are open now, but will end soon. Early registration deadline for ESORICS only is ***July, 19th 2019*** and ESORICS+Workshops is ***August, 14th 2019***. Registration rates: https://esorics2019.uni.lu/registration/ If an invitation letter is needed (e.g. VISA) the letter will be provided after the registration. To do this, it is necessary to fill the form at: https://esorics2019.uni.lu/visa-invitation-letter/, or send an email to the organizing committee: mailto: registration-esorics2...@uni.lu. Also, a student travel grant is also available at: https://esorics2019.uni.lu/student-travel-grants/. Accommodation and travel information: https://esorics2019.uni.lu/location/#accommodation https://esorics2019.uni.lu/location/#travel We hope to see you in Luxembourg! ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] ESORICS 2019: Call for Posters
ESORICS 2019 - CALL FOR POSTERS The European Symposium on Research in Computer Security - Poster Session https://esorics2019.uni.lu/poster-session/ 23 September 2019 Luxembourg The European Symposium on Research in Computer Security (ESORICS) 2019 will be held in Luxembourg from 23 to 25 September. For the first time, this year ESORICS will include a poster session on the evening of September 23. The poster session is ideal to share preliminary or established research and to spark discussion. Poster presenters will enjoy a multi-hour session to describe their work and get feedback from attendees. IMPORTANT DATES: Submission deadline: August 1 Author notification: August 15 SUBMISSION: Authors are asked to submit a 2-page abstract in LNCS format that describes the main contributions of the poster. Proposals should emphasize the motivation for the work and summarize the results being presented. The abstracts must not be anonymous, and must contain the authors' names, affiliations, and contact information. The title must begin with the keyword “POSTER:”. Submissions that are not formatted as described above risk rejection without review. At least one presenter per accepted poster must attend the conference. The poster should be submitted by email to posters-esorics2019 [at] uni [dot] lu The participants will have to print and bring the posters themselves and these will not appear in the proceedings. PROGRAM COMMITTEE Gunes Acar, Princeton University Josep Balasch, KU Leuven Cecilia Boschini, IBM Research – Zurich Kovila Coopamootoo, Newcastle University Constantin Catalin Dragan, University of Surrey Chloe R. Martindale, Eindhoven University of Technology Mustafa A. Mustafa, University of Manchester Alfredo Rial, University of Luxembourg Daniele Sgandurra, Royal Holloway - University of London PROGRAM CHAIR Alfredo Rial, University of Luxembourg CONTACT posters-esorics2019 [at] uni [dot] lu TOPICS Topics of interest include, but are not limited to Access control Accountability Ad hoc networks Anonymity Applied cryptography Authentication Biometrics Blockchain and finance security Data and computation integrity Database security Data protection Deep learning for attack and defense Digital content protection Digital forensics Distributed systems security Embedded systems security Inference control Information hiding Identity management Information flow control Information security governance and management Intrusion detection Formal security methods Language-based security Network security Phishing and spam prevention Privacy Privacy preserving data mining Risk analysis and management Secure electronic voting Security architectures Security economics Security metrics Security models Security and privacy for big data Security and privacy in cloud scenarios Security and privacy in complex systems Security and privacy in content centric networking Security and privacy in crowdsourcing Security and privacy in the IoT Security and privacy in location services Security and privacy for mobile code Security and privacy in pervasive / ubiquitous computing Security and privacy policies Security and privacy in social networks Security and privacy in web services Security and privacy in cyber-physical systems Security, privacy and resilience in critical infrastructures Security verification Software security Systems security Trust models and management Trustworthy user devices Usable security and privacy Web security Wireless security ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] ESORICS 2019: Call for Posters
ESORICS 2019 - CALL FOR POSTERS The European Symposium on Research in Computer Security - Poster Session https://esorics2019.uni.lu/poster-session/ 23 September 2019 Luxembourg The European Symposium on Research in Computer Security (ESORICS) 2019 will be held in Luxembourg from 23 to 25 September. For the first time, this year ESORICS will include a poster session on the evening of September 23. The poster session is ideal to share preliminary or established research and to spark discussion. Poster presenters will enjoy a multi-hour session to describe their work and get feedback from attendees. IMPORTANT DATES: Submission deadline: August 1 Author notification: August 15 SUBMISSION: Authors are asked to submit a 2-page abstract in LNCS format that describes the main contributions of the poster. Proposals should emphasize the motivation for the work and summarize the results being presented. The abstracts must not be anonymous, and must contain the authors' names, affiliations, and contact information. The title must begin with the keyword “POSTER:”. Submissions that are not formatted as described above risk rejection without review. At least one presenter per accepted poster must attend the conference. The poster should be submitted by email to posters-esorics2019 [at] uni [dot] lu The participants will have to print and bring the posters themselves and these will not appear in the proceedings. PROGRAM COMMITTEE Gunes Acar, Princeton University Josep Balasch, KU Leuven Cecilia Boschini, IBM Research – Zurich Kovila Coopamootoo, Newcastle University Constantin Catalin Dragan, University of Surrey Chloe R. Martindale, Eindhoven University of Technology Mustafa A. Mustafa, University of Manchester Alfredo Rial, University of Luxembourg Daniele Sgandurra, Royal Holloway - University of London PROGRAM CHAIR Alfredo Rial, University of Luxembourg CONTACT posters-esorics2019 [at] uni [dot] lu TOPICS Topics of interest include, but are not limited to Access control Accountability Ad hoc networks Anonymity Applied cryptography Authentication Biometrics Blockchain and finance security Data and computation integrity Database security Data protection Deep learning for attack and defense Digital content protection Digital forensics Distributed systems security Embedded systems security Inference control Information hiding Identity management Information flow control Information security governance and management Intrusion detection Formal security methods Language-based security Network security Phishing and spam prevention Privacy Privacy preserving data mining Risk analysis and management Secure electronic voting Security architectures Security economics Security metrics Security models Security and privacy for big data Security and privacy in cloud scenarios Security and privacy in complex systems Security and privacy in content centric networking Security and privacy in crowdsourcing Security and privacy in the IoT Security and privacy in location services Security and privacy for mobile code Security and privacy in pervasive / ubiquitous computing Security and privacy policies Security and privacy in social networks Security and privacy in web services Security and privacy in cyber-physical systems Security, privacy and resilience in critical infrastructures Security verification Software security Systems security Trust models and management Trustworthy user devices Usable security and privacy Web security Wireless security ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] ESORICS 2019: Call for Participation
== ESORICS 2019: CALL FOR PARTICIPATION Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 == WWW: https://esorics2019.uni.lu Overview: - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. ESORICS 2019 spans a total of 3 days, featuring: * 3 keynote speeches Véronique Cortier, INRIA Nancy Bart Preneel, KU Leuven Adi Shamir, Weissmann, * ESORICS main conference over three days (Sept 23-25) * workshops (Sept 26 - 27) Registration: Early Registration for ESORICS 2019 only and ESORICS+Workshops 2019 are open now, but will end soon. Early registration deadline for ESORICS only is ***July, 19th 2019*** and ESORICS+Workshops is ***August, 14th 2019***. Registration rates: https://esorics2019.uni.lu/registration/ If an invitation letter is needed (e.g. VISA) the letter will be provided after the registration. To do this, it is necessary to fill the form at: https://esorics2019.uni.lu/visa-invitation-letter/, or send an email to the organizing committee: mailto: registration-esorics2...@uni.lu. Also, a student travel grant is also available at: https://esorics2019.uni.lu/student-travel-grants/. Accommodation and travel information: https://esorics2019.uni.lu/location/#accommodation https://esorics2019.uni.lu/location/#travel We hope to see you in Luxembourg! ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] ESORICS 2019: Call for Participation
== ESORICS 2019: CALL FOR PARTICIPATION Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 == WWW: https://esorics2019.uni.lu Overview: - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. ESORICS 2019 spans a total of 3 days, featuring: * 3 keynote speeches (Véronique Cortier, Bart Preneel, Adi Shamir) * ESORICS in 3 days (Sept 23-25) * workshops (Sept 26 - 27) Registration: Early Registration for ESORICS 2019 only and ESORICS+Workshops 2019 are open now, but will end soon. Early registration deadline for ESORICS only is ***July, 19th 2019*** and ESORICS+Workshops is ***August, 14th 2019***. Registration rates: https://esorics2019.uni.lu/registration/ If an invitation letter is needed (e.g. VISA) the letter will be provided after the registration. To do this, it is necessary to fill the form at: https://esorics2019.uni.lu/visa-invitation-letter/, or send an email to the organizing committee: mailto: registration-esorics2...@uni.lu. Also, a student travel grant is also available at: https://esorics2019.uni.lu/student-travel-grants/. Accommodation and travel information: https://esorics2019.uni.lu/location/#accommodation https://esorics2019.uni.lu/location/#travel We hope to see you in Luxembourg! ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] ESORICS 2019: Call for Posters
ESORICS 2019 - CALL FOR POSTERS The European Symposium on Research in Computer Security - Poster Session https://esorics2019.uni.lu/posters/ 23 September 2019 Luxembourg The European Symposium on Research in Computer Security (ESORICS) 2019 will be held in Luxembourg from 23 to 25 September. For the first time, this year ESORICS will include a poster session on the evening of September 23. The poster session is ideal to share preliminary or established research and to spark discussion. Poster presenters will enjoy a multi-hour session to describe their work and get feedback from attendees. IMPORTANT DATES: Submission deadline: August 1 Author notification: August 15 SUBMISSION: Authors are asked to submit a 2-page abstract in LNCS format that describes the main contributions of the poster. Proposals should emphasize the motivation for the work and summarize the results being presented. The abstracts must not be anonymous, and must contain the authors' names, affiliations, and contact information. The title must begin with the keyword “POSTER:”. Submissions that are not formatted as described above risk rejection without review. At least one presenter per accepted poster must attend the conference. The poster should be submitted by email to posters-esorics2019 [at] uni [dot] lu The participants will have to print and bring the posters themselves and these will not appear in the proceedings. PROGRAM COMMITTEE Gunes Acar, Princeton University Josep Balasch, KU Leuven Cecilia Boschini, IBM Research – Zurich Kovila Coopamootoo, Newcastle University Constantin Catalin Dragan, University of Surrey Chloe R. Martindale, Eindhoven University of Technology Mustafa A. Mustafa, University of Manchester Alfredo Rial, University of Luxembourg Daniele Sgandurra, Royal Holloway - University of London PROGRAM CHAIR Alfredo Rial, University of Luxembourg CONTACT posters-esorics2019 [at] uni [dot] lu TOPICS Topics of interest include, but are not limited to Access control Accountability Ad hoc networks Anonymity Applied cryptography Authentication Biometrics Blockchain and finance security Data and computation integrity Database security Data protection Deep learning for attack and defense Digital content protection Digital forensics Distributed systems security Embedded systems security Inference control Information hiding Identity management Information flow control Information security governance and management Intrusion detection Formal security methods Language-based security Network security Phishing and spam prevention Privacy Privacy preserving data mining Risk analysis and management Secure electronic voting Security architectures Security economics Security metrics Security models Security and privacy for big data Security and privacy in cloud scenarios Security and privacy in complex systems Security and privacy in content centric networking Security and privacy in crowdsourcing Security and privacy in the IoT Security and privacy in location services Security and privacy for mobile code Security and privacy in pervasive / ubiquitous computing Security and privacy policies Security and privacy in social networks Security and privacy in web services Security and privacy in cyber-physical systems Security, privacy and resilience in critical infrastructures Security verification Software security Systems security Trust models and management Trustworthy user devices Usable security and privacy Web security Wireless security ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] (no subject)
ESORICS 2019 - CALL FOR POSTERS The European Symposium on Research in Computer Security - Poster Session https://esorics2019.uni.lu/posters/ 23 September 2019 Luxembourg The European Symposium on Research in Computer Security (ESORICS) 2019 will be held in Luxembourg from 23 to 25 September. For the first time, this year ESORICS will include a poster session on the evening of September 23. The poster session is ideal to share preliminary or established research and to spark discussion. Poster presenters will enjoy a multi-hour session to describe their work and get feedback from attendees. IMPORTANT DATES: Submission deadline: August 1 Author notification: August 15 SUBMISSION: Authors are asked to submit a 2-page abstract in LNCS format that describes the main contributions of the poster. Proposals should emphasize the motivation for the work and summarize the results being presented. The abstracts must not be anonymous, and must contain the authors' names, affiliations, and contact information. The title must begin with the keyword “POSTER:”. Submissions that are not formatted as described above risk rejection without review. At least one presenter per accepted poster must attend the conference. The poster should be submitted by email to posters-esorics2019 [at] uni [dot] lu The participants will have to print and bring the posters themselves and these will not appear in the proceedings. PROGRAM COMMITTEE Gunes Acar, Princeton University Josep Balasch, KU Leuven Kovila Coopamootoo, Newcastle University Constantin Catalin Dragan, University of Surrey Chloe R. Martindale, Eindhoven University of Technology Mustafa A. Mustafa, University of Manchester Alfredo Rial, University of Luxembourg Daniele Sgandurra, Royal Holloway - University of London PROGRAM CHAIR Alfredo Rial, University of Luxembourg CONTACT posters-esorics2019 [at] uni [dot] lu TOPICS Topics of interest include, but are not limited to Access control Accountability Ad hoc networks Anonymity Applied cryptography Authentication Biometrics Blockchain and finance security Data and computation integrity Database security Data protection Deep learning for attack and defense Digital content protection Digital forensics Distributed systems security Embedded systems security Inference control Information hiding Identity management Information flow control Information security governance and management Intrusion detection Formal security methods Language-based security Network security Phishing and spam prevention Privacy Privacy preserving data mining Risk analysis and management Secure electronic voting Security architectures Security economics Security metrics Security models Security and privacy for big data Security and privacy in cloud scenarios Security and privacy in complex systems Security and privacy in content centric networking Security and privacy in crowdsourcing Security and privacy in the IoT Security and privacy in location services Security and privacy for mobile code Security and privacy in pervasive / ubiquitous computing Security and privacy policies Security and privacy in social networks Security and privacy in web services Security and privacy in cyber-physical systems Security, privacy and resilience in critical infrastructures Security verification Software security Systems security Trust models and management Trustworthy user devices Usable security and privacy Web security Wireless security ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] CFP: IEEE Transactions on Industrial Informatics Special Section on "Security and Privacy in Industry 4.0"
*** Apologies for multiple copies *** C a l l F o r P a p e r s IEEE TRANSACTION ON INDUSTRIAL INFORMATICS Special Section: Security and Privacy in Industry 4.0 URL: http://www.ieee-ies.org/images/files/tii/ss/2019/Security_and_Privacy_in_Industry_40__2019-2-19.pdf Industries, governments and scientific communities are increasingly drawing a special attention to competitive advantages that Industry 4.0 can bring about business sustainability and economy of a country. The tendency to couple the Information Technologies (ITs) with the existing Operational Technologies (OTs) adds new opportunities to improve and optimize operational processes, products and services in which multiple stakeholders [4], among them, end-users, can interact with the new industrial ecosystems to speed up and customize processes. In this sense, Industry 4.0 constitutes a relevant investment source composed of a complex technological showcase in which multiple connections and accesses can arise, seriously impacting on the well performance of the different production and distribution chains associated with smart factories and manufacturing, smart grid systems, smart vehicles or smart health environments. This way of connecting entities with the “smart world” and the interconnection of different Industry 4.0 domains based on the new paradigms and heterogeneous technologies such as Cyber-Physical Systems (CPS), Industrial Internet of Things (IIoT) or edge computing infrastructures (cloud/fog computing systems), certainly, opens the door to coexistence problems and novel exploitations. Diverse vulnerabilities and risks may significantly grow according to the new adaptations and the participation of stakeholders, generating a need to further research protection issues required to safeguard the operational processes and ensure a secure and resilient and dependable cohesion between IT and OT systems, including physical entities. For this reason, industries, governments and scientific communities are increasingly drawing a special attention to competitive advantages that Industry 4.0 can bring about business sustainability and economy of a country. The tendency to couple the ITs with the existing Operational Technologies (OTs) adds new opportunities to improve and optimize operational processes, products and services in which multiple stakeholders [4], among them, end-users, can interact with the new industrial ecosystems to speed up and customize processes. In this sense, Industry 4.0 constitutes a relevant investment source composed of a complex technological showcase in which multiple connections and accesses can arise, seriously impacting on the well performance of the different production and distribution chains associated with smart factories and manufacturing, smart grid systems, smart vehicles or smart health environments. The aim of this special issue is therefore to bring together researchers from diverse interdisciplinary areas of computing and security to cover, from a holistic point of view, the topics related to secure coupling of the new ITs with operational networks, without discarding aspects on privacy. This special section will focus on (but not limited to) the following topics: • Security and privacy analysis and requirements in Industry 4.0 • Secure management and governance of Industry 4.0 operational services and systems • Vulnerabilities and risk assessment in manufacturing and automation systems • Advanced threat models, cyber-crime or cyber-espionage for Industry 4.0 • Dependable and secure Industry 4.0 architectures by design • Lightweight cryptography and key management in Industry 4.0 • Identity management and access control for Industry 4.0 domains • Secure interoperability, mobility and coexistence between systems, including users • Prevention, awareness and resilience models for Industry 4.0 advanced threats • Secure context management and accountability for Industry 4.0 domains • Data preservation and privacy models for Industry 4.0 • Trust management and trusted computing models for Industry 4.0. • Secure cloud/fog-assisted manufacturing and predictive maintenance services Important Dates * Deadline for manuscript submissions June 30, 2019 * Expected publication date (tentative) November 2019 Paper Submission Guidelines Follow the guidelines in “Information for Authors” in the IEEE Transaction on Industrial Informatics http://www.ieee-ies.org/pubs/transactions-on-industrial-informatics . Please submit your manuscript in electronic form through Manuscript Central web site: https://mc.manuscriptcentral.com/tii . On the submitting page #1 in popup menu of manuscript type, select: SS on Security and Privacy in Industry 4.0 Submissions to
[Om-announce] [Deadline Approaching]: The 24th European Symposium on Research in Computer Security (ESORICS 2019)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 WWW: https://esorics2019.uni.lu Overview - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates * Title and Abstract deadline: April 22, 2019 (11:59 p.m. American Samoa time, UTC-11) * Paper submission deadline: April 29, 2019 (11:59 p.m. American Samoa time, UTC-11) * Notification to authors: June 21, 2019 * Camera ready due: July 9, 2019 Topics of Interest --- Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * blockchain and finance security * data and computation integrity * database security * data protection * deep learning for attack and defense * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics19 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template ( available from http://www.springer.de/comp/lncs/authors.html ) from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee --- General Chair: * Peter Y A Ryan, University of Luxembourg, Luxembourg Organization Chair: * Peter B Roenne, University of Luxembourg, Luxembourg Workshop Chair: * Joaquin Garcia-Alfaro,Telecom SudParis, France Program Committee Chairs: * Kazue Sako, NEC Japan * Steve Schneider, University of Surrey, UK Program Committee: Cristina Alcaraz, University of Malaga, Spain Elli Androulaki, IBM, Switzerland Frederik Armknecht, University of Mannheim, Germany Vijay Atluri, Rutgers University, USA Marina Blanton, University at Buffalo, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Christian Cachin, University of Bern, Switzerland Alvaro Cardenas,
[Om-announce] [Deadline Approaching]: The 24th European Symposium on Research in Computer Security (ESORICS 2019)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 WWW: https://esorics2019.uni.lu Overview - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates * Title and Abstract deadline: April 22, 2019 (11:59 p.m. American Samoa time, UTC-11) * Paper submission deadline: April 29, 2019 (11:59 p.m. American Samoa time, UTC-11) * Notification to authors: June 21, 2019 * Camera ready due: July 9, 2019 Topics of Interest --- Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * blockchain and finance security * data and computation integrity * database security * data protection * deep learning for attack and defense * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics19 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template ( available from http://www.springer.de/comp/lncs/authors.html ) from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee --- General Chair: * Peter Y A Ryan, University of Luxembourg, Luxembourg Organization Chair: * Peter B Roenne, University of Luxembourg, Luxembourg Workshop Chair: * Joaquin Garcia-Alfaro,Telecom SudParis, France Program Committee Chairs: * Kazue Sako, NEC Japan * Steve Schneider, University of Surrey, UK Program Committee: Cristina Alcaraz, University of Malaga, Spain Elli Androulaki, IBM, Switzerland Frederik Armknecht, University of Mannheim, Germany Vijay Atluri, Rutgers University, USA Marina Blanton, University at Buffalo, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Christian Cachin, University of Bern, Switzerland Alvaro Cardenas,
[Om-announce] CFP: The 24th European Symposium on Research in Computer Security (ESORICS 2019)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 WWW: https://esorics2019.uni.lu Overview - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates * Title and Abstract deadline: April 22, 2019 (11:59 p.m. American Samoa time, UTC-11) * Paper submission deadline: April 29, 2019 (11:59 p.m. American Samoa time, UTC-11) * Notification to authors: June 21, 2019 * Camera ready due: July 9, 2019 Topics of Interest --- Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * blockchain and finance security * data and computation integrity * database security * data protection * deep learning for attack and defense * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics19 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template ( available from http://www.springer.de/comp/lncs/authors.html ) from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee --- General Chair: * Peter Y A Ryan, University of Luxembourg, Luxembourg Organization Chair: * Peter B Roenne, University of Luxembourg, Luxembourg Workshop Chair: * Joaquin Garcia-Alfaro,Telecom SudParis, France Program Committee Chairs: * Kazue Sako, NEC Japan * Steve Schneider, University of Surrey, UK Program Committee: Cristina Alcaraz, University of Malaga, Spain Elli Androulaki, IBM, Switzerland Frederik Armknecht, University of Mannheim, Germany Vijay Atluri, Rutgers University, USA Marina Blanton, University of Notre Dame, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Christian Cachin, University of Bern, Switzerland Alvaro Cardenas,
[Om-announce] CFP: The 24th European Symposium on Research in Computer Security (ESORICS 2019)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 WWW: https://esorics2019.uni.lu Overview - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates * Title and Abstract deadline: April 22, 2019 (11:59 p.m. American Samoa time, UTC-11) * Paper submission deadline: April 29, 2019 (11:59 p.m. American Samoa time, UTC-11) * Notification to authors: June 21, 2019 * Camera ready due: July 9, 2019 Topics of Interest --- Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * blockchain and finance security * data and computation integrity * database security * data protection * deep learning for attack and defense * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics19 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template ( available from http://www.springer.de/comp/lncs/authors.html ) from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee --- General Chair: * Peter Y A Ryan, University of Luxembourg, Luxembourg Organization Chair: * Peter B Roenne, University of Luxembourg, Luxembourg Workshop Chair: * Joaquin Garcia-Alfaro,Telecom SudParis, France Program Committee Chairs: * Kazue Sako, NEC Japan * Steve Schneider, University of Surrey, UK Program Committee: Cristina Alcaraz, University of Malaga, Spain Elli Androulaki, IBM, Switzerland Frederik Armknecht, University of Mannheim, Germany Vijay Atluri, Rutgers University, USA Marina Blanton, University of Notre Dame, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Christian Cachin, University of Bern, Switzerland Alvaro Cardenas,
[Om-announce] CFP: The 24th European Symposium on Research in Computer Security (ESORICS 2019)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 WWW: https://esorics2019.uni.lu Overview - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates * Title and Abstract deadline: April 22, 2019 (11:59 p.m. American Samoa time, UTC-11) * Paper submission deadline: April 29, 2019 (11:59 p.m. American Samoa time, UTC-11) * Notification to authors: June 21, 2019 * Camera ready due: July 9, 2019 Topics of Interest --- Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * blockchain and finance security * data and computation integrity * database security * data protection * deep learning for attack and defense * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics19 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template ( available from http://www.springer.de/comp/lncs/authors.html ) from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee --- General Chair: * Peter Y A Ryan, University of Luxembourg, Luxembourg Organization Chair: * Peter B Roenne, University of Luxembourg, Luxembourg Workshop Chair: * Joaquin Garcia-Alfaro,Telecom SudParis, France Program Committee Chairs: * Kazue Sako, NEC Japan * Steve Schneider, University of Surrey, UK Program Committee: Cristina Alcaraz, University of Malaga, Spain Elli Androulaki, IBM, Switzerland Frederik Armknecht, University of Mannheim, Germany Vijay Atluri, Rutgers University, USA Marina Blanton, University of Notre Dame, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Christian Cachin, University of Bern, Switzerland Alvaro Cardenas,
[Om-announce] CFP: The 24th European Symposium on Research in Computer Security (ESORICS 2019)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 WWW: https://esorics2019.uni.lu Overview - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates * Title and Abstract deadline: April 22, 2019 (11:59 p.m. American Samoa time, UTC-11) * Paper submission deadline: April 29, 2019 (11:59 p.m. American Samoa time, UTC-11) * Notification to authors: June 21, 2019 * Camera ready due: July 9, 2019 Topics of Interest --- Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * blockchain and finance security * data and computation integrity * database security * data protection * deep learning for attack and defense * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics19 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template ( available from http://www.springer.de/comp/lncs/authors.html ) from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee --- General Chair: * Peter Y A Ryan, University of Luxembourg, Luxembourg Organization Chair: * Peter B Roenne, University of Luxembourg, Luxembourg Workshop Chair: * Joaquin Garcia-Alfaro,Telecom SudParis, France Program Committee Chairs: * Kazue Sako, NEC Japan * Steve Schneider, University of Surrey, UK Program Committee: Cristina Alcaraz, University of Malaga, Spain Elli Androulaki, IBM, Switzerland Frederik Armknecht, University of Mannheim, Germany Vijay Atluri, Rutgers University, USA Marina Blanton, University of Notre Dame, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Christian Cachin, University of Bern, Switzerland Alvaro Cardenas,
[Om-announce] [Call for Workshop Proposals]: 24th European Symposium on Research in Computer Security (ESORICS 2019)
[apologies for cross-posting] == CALL for WORKSHOP PROPOSALS: ESORICS 2019 24th European Symposium on Research in Computer Security University of Luxembourg, Luxembourg, September 23-27, 2019 Website: https://esorics2019.uni.lu/workshops/ == Overview ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Proposals are solicited for Workshops to be held in conjunction with ESORICS 2019. A Workshop should aim at providing a forum on emerging topics of high interest to the security and privacy community. In the Workshop selection, particular consideration will be paid to: * Its potential interest for the security and privacy community * Its novelty with respect to other forums, especially with respect to other ESORICS workshops. * Its likely impact on the target community, including likely high participation. A workshop can be either one day or two days in length. Important Dates * Workshop proposals due: February 8, 2019 * Notification of decision: March 15, 2019 Submitting a Workshop Proposal To submit a proposal send an email to the Workshop Chair with with the information requested in the application form: * Joaquin Garcia-Alfaro (jgalf...@ieee.org) The following application form should be used. (also available in Word format at http://j.mp/ESORICS19wsh) == ESORICS 2019 - WORKSHOP APPLICATION FORM: - Title of the Workshop: - Duration (maximum 2 days): - Draft "Call for Papers", articulating the workshop's scope and topics: - Brief summary and justification for the workshop, including anticipated benefits to the ESORICS community: - Planned activities: - Expected number of participants: - Workshop organizers: * PC Chair(s): * General Chair(s): - Workshop deadlines: * Submission deadline: * Notification to authors: * Camera-ready versions: - Planned publication of Workshop proceedings: - Data of last three years for the workshop (if applicable): * Number of submissions: * Number of accepted papers: * Number of participants: * Publication of proceedings: * Venue (co-location): == ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] CFP: The 24th European Symposium on Research in Computer Security (ESORICS 2019)
*** Apologies for multiple copies *** C a l l F o r P a p e r s Twenty-fourth European Symposium on Research in Computer Security (ESORICS 2019) Luxembourg -- September 23-27, 2019 WWW: https://esorics2019.uni.lu Overview - ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates * Title and Abstract deadline: April 22, 2019 (11:59 p.m. American Samoa time, UTC-11) * Paper submission deadline: April 29, 2019 (11:59 p.m. American Samoa time, UTC-11) * Notification to authors: June 21, 2019 * Camera ready due: July 9, 2019 Topics of Interest --- Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * blockchain and finance security * data and computation integrity * database security * data protection * deep learning for attack and defense * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics19 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template ( available form http://www.springer.de/comp/lncs/authors.html ) from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee --- General Chair: * Peter Y A Ryan, University of Luxembourg, Luxembourg Organization Chair: * Peter B Roenne, University of Luxembourg, Luxembourg Workshop Chair: * Joaquin Garcia-Alfaro,Telecom SudParis, France Program Committee Chairs: * Kazue Sako, NEC Japan * Steve Schneider, University of Surrey, UK Program Committee: Cristina Alcaraz, University of Malaga, Spain Elli Androulaki, IBM, Switzerland Frederik Armknecht, University of Mannheim, Germany Vijay Atluri, Rutgers University, USA Marina Blanton, University of Notre Dame, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Christian Cachin, University of Bern, Switzerland Alvaro Cardenas,
[Om-announce] SEFM 2019 - First Call for Papers
First Call for Papers SEFM 2019 17th International Conference on Software Engineering and Formal Methods Oslo, Norway, September 16-20, 2019 http://sefm2019.inria.fr Twitter: @SEFM_conf - IMPORTANT DATES Abstract submission deadline: May 3, 2019 (AoE) Paper submission deadline: May 10, 2019 (AoE) Notification: June 25, 2019 Conference: September 16-20, 2019 OVERVIEW AND SCOPE SEFM aims to bring together leading researchers and practitioners from academia, industry, and government, to advance the state of the art in formal methods, to facilitate their uptake in the software industry, and to encourage their integration within practical software engineering methods and tools. Topics of interest include, but are not limited to, the following aspects of software engineering and formal methods: # Software Development Methods - Formal modeling, specification, and design - Software evolution, maintenance, re-engineering, and reuse # Design Principles - Programming languages - Domain-specific languages - Type theory - Abstraction and refinement # Software Testing, Validation, and Verification - Model checking, theorem proving, and decision procedures - Testing and runtime verification - Statistical and probabilistic analysis - Synthesis - Performance estimation and analysis of other non-functional properties - Other light-weight and scalable formal methods # Security and Safety - Security, privacy, and trust - Safety-critical, fault-tolerant, and secure systems - Software certification # Applications and Technology Transfer - Service-oriented and cloud computing systems, Internet of Things - Component, object, multi-agent and self-adaptive systems - Real-time, hybrid, and cyber-physical systems - Intelligent systems and machine learning - HCI, interactive systems, and human error analysis - Education # Case studies, best practices, and experience reports PAPER SUBMISSION We solicit two categories of papers: - Regular papers describing original research results, case studies, or surveys. Regular papers should not exceed 15 pages, excluding bibliography. - Tool papers that describe an operational tool and its contributions. Tool papers should not exceed 6 pages (including bibliography) and should include the URL of the tool. All submissions must be original, unpublished, and not submitted concurrently for publication elsewhere. Paper submission is done via EasyChair at https://easychair.org/conferences/?conf=sefm2019 Papers must be formatted according to the guidelines for Springer LNCS papers (see http://www.springer.com/lncs). PUBLICATION All accepted papers will appear in the proceedings of the conference that will be published as a volume in Springer's LNCS series. The authors of a selected subset of accepted papers will be invited to submit extended versions of their papers to special issues of the journals "Software and Systems Modeling" and "Formal Methods in System Design." PROGRAM CHAIRS Peter Csaba Ölveczky (University of Oslo, Norway) Gwen Salaün (Université Grenoble Alpes, France) PROGRAM COMMITTEE Erika Abraham (RWTH Aachen University, Germany) Cyrille Artho (KTH Royal Institute of Technology, Sweden) Kyungmin Bae (Pohang University of Science and Technology, South Korea) Olivier Barais (University of Rennes, France) Luis Barbosa (University of Minho, Portugal) Dirk Beyer (LMU Munich, Germany) Roberto Bruni (University of Pisa, Italy) Ana Cavalcanti (University of York, UK) Alessandro Cimatti (FBK-irst, Italy) Robert Clariso (Open University of Catalonia, Spain) Rocco De Nicola (IMT School for Advanced Studies Lucca, Italy) John Derrick (Unversity of Sheffield, UK) José Luiz Fiadeiro (Royal Holloway, University of London, UK) Osman Hasan (National University of Sciences & Technology, Pakistan) Klaus Havelund (Jet Propulsion Laboratory, US) Reiko Heckel (University of Leicester, UK) Marieke Huisman (University of Twente, The Netherlands) Alexander Knapp (Augsburg University, Germany) Nikolai Kosmatov (CEA LIST, France) Frederic Mallet (Université Nice Sophia Antipolis, France) Tiziana Margaria (Lero, Ireland) Hernan Melgratti (University of Buenos Aires, Argentina) Madhavan Mukund (Chennai Mathematical Institute, India) Marc Pantel (IRIT/INPT, Université de Toulouse, France) Anna Philippou (University of Cyprus) Grigore Rosu (University of Illinois, US) Augusto Sampaio (Federal university of Pernambuco, Brazil) Cesar Sanchez (IMDEA Software Institute, Spain) Ina Schaefer (Technische Universität Braunschweig, Germany) Graeme Smith (The University of Queensland, Australia) Jun Sun (Singapore University of Technology and Design) Maurice H. Ter Beek
[Om-announce] 14th International Workshop on Security and Trust Management (STM 2018)
C a l l F o r P a p e r s 14th International Workshop on Security and Trust Management (STM 2018) Barcelona, Spain, September 6-7, 2018 co-located with the 23rd European Symposium On Research in Computer Security (ESORICS 2018) Full-text paper submission due: June 16, 2018 --- CONFERENCE OUTLINE: = STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2018 is the fourteenth workshop in this series and will be held in Barcelona, Spain, in conjunction with the 23rd European Symposium On Research in Computer Security (ESORICS 2018). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs. Topics of interest include, but are not limited to: - Access control - Anonymity - Applied cryptography - Authentication - Complex systems security - Data and application security - Data protection - Data/system integrity - Digital rights management - Economics of security and privacy - Formal methods for security and trust - Identity management - Legal and ethical issues - Mobile security - Networked systems security - Operating systems security - Privacy - Security and trust metrics - Security and trust policies - Security and trust management architectures - Security and trust for big data - Security and trust in cloud environments - Security and trust in content delivery networks - Security and trust in crowdsourcing - Security and trust in grid computing - Security and trust in the Internet of Things - Security and trust in pervasive computing - Security and trust in services - Security and trust in social networks - Social implications of security and trust - Trust assessment and negotiation - Trust in mobile code - Trust models - Trust management policies - Trust and reputation systems - Trusted platforms - Trustworthy systems and user devices PAPER SUBMISSION: == All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages in the LNCS format, including the bibliography and well-marked appendices. All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers). The final version of an accepted paper must be in the format required for publication in the LNCS series. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submissions are to be made to the submission web site at: https://easychair.org/conferences/?conf=stm2018. Papers must be received by the deadline of June 16, 2018 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. As in previous years, the proceedings are planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series. A paper submitted to STM 2018 cannot be under review for any other conference or journal during the time it is being considered for STM 2018. Furthermore, after you submit to STM 2018, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before/after submission of the paper to STM 2018, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers. IMPORTANT DATES: = Paper submission due: June 16, 2018 Notification to authors: July 16, 2018 Camera-ready due: July 23, 2018 Program Chairs: = - Sokratis Katsikas, Open University of Cyprus and Norwegian University of Science and Technology - NTNU - Cristina Alcaraz, University of Malaga, Spain Program Committee: TBD Publicity Chairs: TBD = ___ Om-announce mailing list Om-announce@openmath.org http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce
[Om-announce] 3rd IEEE NCCA 2014 - SUBMISSION DEADLINE EXTENDED TO DECEMBER 20 2013 (FIRM)
[Apologies if you got multiple copies of this email.] 3rd IEEE NCCA 2014 - Call for Papers SUBMISSION DEADLINE EXTENDED TO DECEMBER 20 2013 (FIRM) Call For Papers The Third IEEE Symposium on Network Cloud Computing and Applications (NCCA14) February 5th-7th, 2014, Rome, Italy Web Site: https://sites.google.com/a/dis.uniroma1.it/ncca-2014/ Sponsored by: The IEEE Computer Society Technical Committee on Distributed Processing Patron: International Research Institute for Autonomic Network Computing --- Cloud Computing is defined as a pool of virtualized computer resources. Based on this virtualization the Cloud Computing paradigm allows workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines. A Cloud Computing platform is expected to support redundant, self-recovering, highly scalable programming models that allow workloads to recover from many inevitable hardware/software failures and monitoring resource usage in real-time for provisioning purposes and run time optimization of the hosted applications. A Cloud Computing platform is more than a collection of computer resources because it provides a mechanism to manage those resources. In a Cloud Computing platform software is migrating from the desktop into the clouds of the Internet, promising users anytime, anywhere access to their programs and data. What challenges does it presents to users, programmers, and telecommunications providers? The goal of this Cloud Computing Sympos! ium series is to provide a forum for researchers and practitioners to discuss all aspects of Cloud Computing. All topics of design, theory and realization are of interest. -- TOPICS OF INTEREST ARE: -- Cloud Computing Infrastructure: - Operating systems; - Control services; - Distributed infrastructures; - Distributed composite services; - Kernel-exchange modules; - Application exchange modules; - Basic services; - Network Functions Virtualization (NFV) for Cloud Computing. Scalable, Self-managing and Autonomic Cloud Computing platforms: - Dynamic instantiation; - Vertically scaling platforms; - Dynamic composition; - Self-managing platforms; - Dynamic configuration; - Dynamic reconfiguration of services; - Horizontally scaling platforms; - Self-Healing Cloud computing platforms; - Software Defined Networks (SDN) for Cloud Computing. Security of Cloud Computing Platforms: - Authentication; - Self-protecting platforms; - Increasing resilience against Cyber attacks of Software as a Service (SaaS); - Increasing resilience against Cyber attacks of Platforms as a Service (PaaS); - Increasing resilience against Cyber attacks of Infrastructure as a Service (IaaS). Cloud Computing Applications: - E-Commerce, Media processing and Streaming search engines, Development and testing, Web hosting, Application hosting, Collaboration tools, Store and share, Social networking for businesses and web applications, Bio-informatics, Biomedical applications, Scientific computing. Submission categories All manuscripts must be written in English. Several categories of papers are considered: Traditional Categories full papers, which must not exceed 8 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) - up to 2 additional pages can be purchased in the conference proceedings short papers, which must not exceed 4 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) - up to 2 additional pages can be purchased in the conference proceeding Full papers are expected to present research results which are demonstrated to be robust in terms of their theoretical foundation and/or via experimental analysis. Short papers are expected to provide research results at their early stage, which have however already reached a level of maturity leading them to be of interest for the community. NEW Categories fast abstracts, which must not exceed 1 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) - no additional page can be purchased in the proceedings position papers, stating results from challenging research projects (e.g. FP7 EU projects) in the area of Cloud Computing, these must not exceed 8 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) workshop papers, these submissions will be considered as part of a special track of the NCCA conference on topics related to Future Internet and Cloud Computing, these must not exceed 8 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) posters, which can be formatted in a truly poster-style (e.g. sequence of
[Om-announce] 3rd IEEE NCCA 2014 - SUBMISSION DEADLINE EXTENDED TO DECEMBER 20 2013 (FIRM)
[Apologies if you got multiple copies of this email.] 3rd IEEE NCCA 2014 - Call for Papers SUBMISSION DEADLINE EXTENDED TO DECEMBER 20 2013 (FIRM) Call For Papers The Third IEEE Symposium on Network Cloud Computing and Applications (NCCA14) February 5th-7th, 2014, Rome, Italy Web Site: https://sites.google.com/a/dis.uniroma1.it/ncca-2014/ Sponsored by: The IEEE Computer Society Technical Committee on Distributed Processing Patron: International Research Institute for Autonomic Network Computing --- Cloud Computing is defined as a pool of virtualized computer resources. Based on this virtualization the Cloud Computing paradigm allows workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines. A Cloud Computing platform is expected to support redundant, self-recovering, highly scalable programming models that allow workloads to recover from many inevitable hardware/software failures and monitoring resource usage in real-time for provisioning purposes and run time optimization of the hosted applications. A Cloud Computing platform is more than a collection of computer resources because it provides a mechanism to manage those resources. In a Cloud Computing platform software is migrating from the desktop into the clouds of the Internet, promising users anytime, anywhere access to their programs and data. What challenges does it presents to users, programmers, and telecommunications providers? The goal of this Cloud Computing Sympos ium series is to provide a forum for researchers and practitioners to discuss all aspects of Cloud Computing. All topics of design, theory and realization are of interest. -- TOPICS OF INTEREST ARE: -- Cloud Computing Infrastructure: - Operating systems; - Control services; - Distributed infrastructures; - Distributed composite services; - Kernel-exchange modules; - Application exchange modules; - Basic services; - Network Functions Virtualization (NFV) for Cloud Computing. Scalable, Self-managing and Autonomic Cloud Computing platforms: - Dynamic instantiation; - Vertically scaling platforms; - Dynamic composition; - Self-managing platforms; - Dynamic configuration; - Dynamic reconfiguration of services; - Horizontally scaling platforms; - Self-Healing Cloud computing platforms; - Software Defined Networks (SDN) for Cloud Computing. Security of Cloud Computing Platforms: - Authentication; - Self-protecting platforms; - Increasing resilience against Cyber attacks of Software as a Service (SaaS); - Increasing resilience against Cyber attacks of Platforms as a Service (PaaS); - Increasing resilience against Cyber attacks of Infrastructure as a Service (IaaS). Cloud Computing Applications: - E-Commerce, Media processing and Streaming search engines, Development and testing, Web hosting, Application hosting, Collaboration tools, Store and share, Social networking for businesses and web applications, Bio-informatics, Biomedical applications, Scientific computing. Submission categories All manuscripts must be written in English. Several categories of papers are considered: Traditional Categories full papers, which must not exceed 8 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) - up to 2 additional pages can be purchased in the conference proceedings short papers, which must not exceed 4 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) - up to 2 additional pages can be purchased in the conference proceeding Full papers are expected to present research results which are demonstrated to be robust in terms of their theoretical foundation and/or via experimental analysis. Short papers are expected to provide research results at their early stage, which have however already reached a level of maturity leading them to be of interest for the community. NEW Categories fast abstracts, which must not exceed 1 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) - no additional page can be purchased in the proceedings position papers, stating results from challenging research projects (e.g. FP7 EU projects) in the area of Cloud Computing, these must not exceed 8 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) workshop papers, these submissions will be considered as part of a special track of the NCCA conference on topics related to Future Internet and Cloud Computing, these must not exceed 8 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) posters, which can be formatted in a truly poster-style (e.g.
[Om-announce] IEEE NCCA 2014 - Rome 5-7 February - Second Call For Papers
[Apologies if you got multiple copies of this email.] 2nd Call For Papers The Third IEEE Symposium on Network Cloud Computing and Applications (NCCA14) February 5th-7th, 2014, Rome, Italy Web Site: https://sites.google.com/a/dis.uniroma1.it/ncca-2014/ Sponsored by: The IEEE Computer Society Technical Committee on Distributed Processing Patron: International Research Institute for Autonomic Network Computing --- Cloud Computing is defined as a pool of virtualized computer resources. Based on this virtualization the Cloud Computing paradigm allows workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines. A Cloud Computing platform is expected to support redundant, self-recovering, highly scalable programming models that allow workloads to recover from many inevitable hardware/software failures and monitoring resource usage in real-time for provisioning purposes and run time optimization of the hosted applications. A Cloud Computing platform is more than a collection of computer resources because it provides a mechanism to manage those resources. In a Cloud Computing platform software is migrating from the desktop into the clouds of the Internet, promising users anytime, anywhere access to their programs and data. What challenges does it presents to users, programmers, and telecommunications providers? The goal of this Cloud Computing Symposium series is to provide a forum for researchers and practitioners to discuss all aspects of Cloud Computing. All topics of design, theory and realization are of interest. -- TOPICS OF INTEREST ARE: -- Cloud Computing Infrastructure: - Operating systems; - Control services; - Distributed infrastructures; - Distributed composite services; - Kernel-exchange modules; - Application exchange modules; - Basic services; - Network Functions Virtualization (NFV) for Cloud Computing. Scalable, Self-managing and Autonomic Cloud Computing platforms: - Dynamic instantiation; - Vertically scaling platforms; - Dynamic composition; - Self-managing platforms; - Dynamic configuration; - Dynamic reconfiguration of services; - Horizontally scaling platforms; - Self-Healing Cloud computing platforms; - Software Defined Networks (SDN) for Cloud Computing. Security of Cloud Computing Platforms: - Authentication; - Self-protecting platforms; - Increasing resilience against Cyber attacks of Software as a Service (SaaS); - Increasing resilience against Cyber attacks of Platforms as a Service (PaaS); - Increasing resilience against Cyber attacks of Infrastructure as a Service (IaaS). Cloud Computing Applications: - E-Commerce, Media processing and Streaming search engines, Development and testing, Web hosting, Application hosting, Collaboration tools, Store and share, Social networking for businesses and web applications, Bio-informatics, Biomedical applications, Scientific computing. All manuscripts must be written in English. Two categories of papers are considered: - full papers, which must not exceed 8 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references) - short papers, which must not exceed 4 double-column single-spaced pages IEEE conference style (inclusive of figures, tables and references). Full papers are expected to present research results which are demonstrated to be robust in terms of their theoretical foundation and/or via experimental analysis. Short papers are expected to provide research results at their early stage, which have however already reached a level of maturity leading them to be of interest for the community. All the submissions must describe original unpublished research. All accepted papers (either full or short) will be published by the IEEE Computer Society Press. The papers must be submitted in PDF format electronically via the EasyChair system. -- *** IMPORTANT DATES *** -- paper submission deadline: November 25, 2013 acceptance notification: December 20, 2013 camera ready and author registration: December 30, 2013 -- ORGANIZING COMMITTEE -- Steering Committee: D. R. Avresky (Chair), IRIANC, Munich, Germany M. Diaz, CNRS (Chair), LAAS, Toulouse, France E. Gelenbe, Imperial College, London, UK General Chair: B. Ciciani, Sapienza University of Rome, Italy General Co-Chair: D. R. Avresky, IRIANC, Munich, Germany Program Chair: F. Quaglia, Sapienza University of Rome, Italy Publication Chair: S. Distefano, Politecnico di Milano, Italy Publicity Chairs: M. Couceiro, INESC-ID, Lisbon, Portugal R. Palmieri, Virginia Tech, USA ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] IEEE Symposium on Network Cloud Computing and Applications (NCCA12)
; - Dynamic reconfiguration of services; - Horizontally scaling platforms; - Self-Healing Cloud computing platforms. Security of Cloud Computing Platforms: - Authentication; - Self-protecting platforms; - Increasing resilience against Cyber attacks of Software as a Service (SaaS); - Increasing resilience against Cyber attacks of Platforms as a Service (PaaS); - Increasing resilience against Cyber attacks of Infrastructure as a Service (IaaS). Cloud Computing Applications: - E-Commerce, Media processing and Streaming search engines, Development and testing, Web hosting, Application hosting, Collaboration tools, Store and share, Social networking for businesses and web applications, Bio-informatics, Biomedical applications. -- ORGANIZING COMMITTEE -- Steering Committee Chairs: D. R. Avresky, IRIANC, Munich, Germany Michel Diaz, CNRS, LAAS, Toulouse, France Steering Committee Member: E. Gelenbe, Imperial College, UK General Chair Financial Chair: E. Gelenbe, Imperial College, UK General Co-Chair: D. R. Avresky, International Research Institute on Autonomic Network Computing (IRIANC), Germany Publication Chair J. Alonso, Duke University, USA Program Co-Chair's: P. Senac, ISAE (DMIA), CNRS LAAS, France R. Lent, Imperial College, UK B. Ciciani, Sapienza University of Rome, Italy Publicity Chair: Roberto Palmieri, Sapienza University of Rome, Italy -- PROGRAM COMMITTEE: -- E. Alata, CNRS, LAAS, Toulouse, France J. Alonso, Duke University, USA P. D. Amer, University of Delaware, USA O. Brun, CNRS LAAS, France T. Braun, University of Bern, Switzerland F. Cappello, INRIA, France, UIUC, USA B. Ciciani, University of Roma, Italy M. Colajanni, University of Modena, Italy E. Dekel , IBM Reasearch , Haifa M. Dias de Amorim LIP6, France C. Elks , Universty of Virginia , USA S. Fdida, University of Paris 6, France I. Gashi, City Univeristy, London, UK B. Johnson, University of Virginia, USA G. Malewicz , Google, USA L. Mathy, University of Lancaster, UK E. Maehle, University of Luebeck, Germany E. Monteiro, University of Coimbra, Portugal E. Net , University of Magdeburg, Germany S. Papavassiliou, NTUA, Greece A. Puliafito, University of Messina, Italy F. Quaglia, University of Roma, ITALY M. Roy, CNRS, LAAS, Toulouse, France R. Roman, Institute Infoocomm Research, Singapore H. Schwefel, FTW Vienna, Austria, Aalborg University, Denmark L. Silva, University of Coimbra, Portugal K. Tutschku, Technical University of Vienna, Austria J. Torres, Technical University of Catalonia - BSC, Spain O. Thonnard, Symantec Corporation, Europe, C. Trinitis, Technical University of Munich, Germany M. Wodczak --Ericson, Europe M. Vouk, North Carolina State University, USA ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CfP - IEEE Symposium on Network Cloud Computing and Applications (NCCA12)
*** Our apologies if you receive multiple copies of this CFP *** -- Call For Papers The Second IEEE Symposium on Network Cloud Computing and Applications (NCCA12) December 3th-5th, 2012, London, UK Web Site: https://sites.google.com/site/ieeencca2012/ Sponsored by: The IEEE Computer Society Technical Committee on Distributed Processing Sponsored by: International Research Institute Autonomic Network Computing --- Cloud Computing is defined as a pool of virtualized computer resources. Based on this virtualization the Cloud Computing paradigm allows workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines or physical machines. A Cloud Computing platform supports redundant, self-recovering, highly scalable programming models that allow workloads to recover from many inevitable hardware/software failures and monitoring resource use in real time for providing physical and virtual servers on which the applications can run. A Cloud Computing platform is more than a collection of computer resources because it provides a mechanism to manage those resources. In a Cloud Computing platform software is migrating from the desktop into the clouds of the Internet, promising users anytime, anywhere access to their programs and data. What challenges does it presents to users, programmers, and telecommunications providers? The goal of this Cloud Computing Symposium series is to provide a forum for researchers and practitioners to discuss all aspects of Cloud Computing. All topics of design, theory and realization are of interest. -- CLOUD COMPUTING SYMPOSIUM TRACKS: -- Cloud Computing Infrastructure: - Operating systems; - Control services; - Distributed infrastructure; - Distributed composite services; - Kernel-exchange modules; - Application exchange modules; - Basic services. Scalable, Self-managing and Autonomic Cloud Computing platforms: - Dynamic instantiation; - Vertically scaling platforms; - Dynamic composition; - Self-managing platforms; - Dynamic configuration; - Dynamic reconfiguration of services; - Horizontally scaling platforms; - Self-Healing Cloud computing platforms. Security of Cloud Computing Platforms: - Authentication; - Self-protecting platforms; - Increasing resilience against Cyber attacks of Software as a Service (SaaS); - Increasing resilience against Cyber attacks of Platforms as a Service (PaaS); - Increasing resilience against Cyber attacks of Infrastructure as a Service (IaaS). Cloud Computing Applications: - E-Commerce, Media processing and Streaming search engines, Development and testing, Web hosting, Application hosting, Collaboration tools, Store and share, Social networking for businesses and web applications, Bio-informatics, Biomedical applications. All manuscripts must be written in English and must not exceed 20 single column double-spaced pages (inclusive of figures and tables using a font size of at least 12 points) describing original unpublished research. All accepted papers will be published by the IEEE Computer Society Press. Prepare the final version of the manuscript using the paper templates here.The papers must be submitted in PDF format electronically via the Symposium webpage (TBA) All papers will be reviewed. Furthermore, work in progress papers, industrial papers and student papers are also allowed. -- *** IMPORTANT DATES *** -- Paper Submission firm deadline: October 28th, 2012 Authors Notification: November 4th, 2012 Camera Ready Paper : November 11th, 2012 -- ORGANIZING COMMITTEE -- Steering Committee Chairs: D. R. Avresky, IRIANC, Munich, Germany Michel Diaz, CNRS, LAAS, Toulouse, France Steering Committee Member: E. Gelenbe, Imperial College, UK General Chair Financial Chair: E. Gelenbe, Imperial College, UK General Co-Chair: D. R. Avresky, International Research Institute on Autonomic Network Computing (IRIANC), Germany Publication Chair J. Alonso, Duke University, USA Program Co-Chair's: P. Senac, ISAE (DMIA), CNRS LAAS, France R. Lent, Imperial College, UK B. Ciciani, Sapienza University of Rome, Italy Publicity Chair: Roberto Palmieri, Sapienza University of Rome, Italy -- PROGRAM COMMITTEE: -- E. Alata, CNRS, LAAS, Toulouse, France J. Alonso, Duke University, USA P. D. Amer, University of Delaware, USA O. Brun, CNRS LAAS, France T. Braun, University of Bern, Switzerland F. Cappello, INRIA, France, UIUC, USA B. Ciciani, University of Roma, Italy M. Colajanni, University of Modena, Italy E. Dekel , IBM Reasearch , Haifa M. Dias de Amorim LIP6, France C. Elks , Universty of Virginia , USA S. Fdida
[Om-announce] CfP - IEEE Symposium on Network Cloud Computing and Applications (NCCA12)
*** Our apologies if you receive multiple copies of this CFP *** -- Call For Papers The Second IEEE Symposium on Network Cloud Computing and Applications (NCCA12) December 3th-5th, 2012, London, UK Web Site: https://sites.google.com/site/ieeencca2012/ Sponsored by: The IEEE Computer Society Technical Committee on Distributed Processing Sponsored by: International Research Institute Autonomic Network Computing --- Cloud Computing is defined as a pool of virtualized computer resources. Based on this virtualization the Cloud Computing paradigm allows workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines or physical machines. A Cloud Computing platform supports redundant, self-recovering, highly scalable programming models that allow workloads to recover from many inevitable hardware/software failures and monitoring resource use in real time for providing physical and virtual servers on which the applications can run. A Cloud Computing platform is more than a collection of computer resources because it provides a mechanism to manage those resources. In a Cloud Computing platform software is migrating from the desktop into the clouds of the Internet, promising users anytime, anywhere access to their programs and data. What challenges does it presents to users, programmers, and telecommunications providers? The goal of this Cloud Computing Symposium series is to provide a forum for researchers and practitioners to discuss all aspects of Cloud Computing. All topics of design, theory and realization are of interest. -- CLOUD COMPUTING SYMPOSIUM TRACKS: -- Cloud Computing Infrastructure: - Operating systems; - Control services; - Distributed infrastructure; - Distributed composite services; - Kernel-exchange modules; - Application exchange modules; - Basic services. Scalable, Self-managing and Autonomic Cloud Computing platforms: - Dynamic instantiation; - Vertically scaling platforms; - Dynamic composition; - Self-managing platforms; - Dynamic configuration; - Dynamic reconfiguration of services; - Horizontally scaling platforms; - Self-Healing Cloud computing platforms. Security of Cloud Computing Platforms: - Authentication; - Self-protecting platforms; - Increasing resilience against Cyber attacks of Software as a Service (SaaS); - Increasing resilience against Cyber attacks of Platforms as a Service (PaaS); - Increasing resilience against Cyber attacks of Infrastructure as a Service (IaaS). Cloud Computing Applications: - E-Commerce, Media processing and Streaming search engines, Development and testing, Web hosting, Application hosting, Collaboration tools, Store and share, Social networking for businesses and web applications, Bio-informatics, Biomedical applications. All manuscripts must be written in English and must not exceed 20 single column double-spaced pages (inclusive of figures and tables using a font size of at least 12 points) describing original unpublished research. All accepted papers will be published by the IEEE Computer Society Press. Prepare the final version of the manuscript using the paper templates here.The papers must be submitted in PDF format electronically via the Symposium webpage (TBA) All papers will be reviewed. Furthermore, work in progress papers, industrial papers and student papers are also allowed. -- *** IMPORTANT DATES *** -- Paper Submission firm deadline (no extensions): October 20th, 2012 Authors Notification: November 4th, 2012 Camera Ready Paper : November 11th, 2012 -- ORGANIZING COMMITTEE -- Steering Committee Chairs: D. R. Avresky, IRIANC, Munich, Germany Michel Diaz, CNRS, LAAS, Toulouse, France Steering Committee Member: E. Gelenbe, Imperial College, UK General Chair Financial Chair: E. Gelenbe, Imperial College, UK General Co-Chair: D. R. Avresky, International Research Institute on Autonomic Network Computing (IRIANC), Germany Publication Chair J. Alonso, Duke University, USA Program Co-Chair's: P. Senac, ISAE (DMIA), CNRS LAAS, France R. Lent, Imperial College, UK B. Ciciani, Sapienza University of Rome, Italy Publicity Chair: Roberto Palmieri, Sapienza University of Rome, Italy -- PROGRAM COMMITTEE: -- E. Alata, CNRS, LAAS, Toulouse, France J. Alonso, Duke University, USA P. D. Amer, University of Delaware, USA O. Brun, CNRS LAAS, France T. Braun, University of Bern, Switzerland F. Cappello, INRIA, France, UIUC, USA B. Ciciani, University of Roma, Italy M. Colajanni, University of Modena, Italy E. Dekel , IBM Reasearch , Haifa M. Dias de Amorim LIP6, France C. Elks , Universty of Virginia
[Om-announce] CfP - IEEE Symposium on Network Cloud Computing and Applications (NCCA12)
*** Our apologies if you receive multiple copies of this CFP *** -- Call For Papers The Second IEEE Symposium on Network Cloud Computing and Applications (NCCA12) December 3th-5th, 2012, London, UK Web Site: https://sites.google.com/site/ieeencca2012/ Sponsored by: The IEEE Computer Society Technical Committee on Distributed Processing Sponsored by: International Research Institute Autonomic Network Computing --- Cloud Computing is defined as a pool of virtualized computer resources. Based on this virtualization the Cloud Computing paradigm allows workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines or physical machines. A Cloud Computing platform supports redundant, self-recovering, highly scalable programming models that allow workloads to recover from many inevitable hardware/software failures and monitoring resource use in real time for providing physical and virtual servers on which the applications can run. A Cloud Computing platform is more than a collection of computer resources because it provides a mechanism to manage those resources. In a Cloud Computing platform software is migrating from the desktop into the clouds of the Internet, promising users anytime, anywhere access to their programs and data. What challenges does it presents to users, programmers, and telecommunications providers? The goal of this Cloud Computing Symposium series is to provide a forum for researchers and practitioners to discuss all aspects of Cloud Computing. All topics of design, theory and realization are of interest. -- CLOUD COMPUTING SYMPOSIUM TRACKS: -- Cloud Computing Infrastructure: - Operating systems; - Control services; - Distributed infrastructure; - Distributed composite services; - Kernel-exchange modules; - Application exchange modules; - Basic services. Scalable, Self-managing and Autonomic Cloud Computing platforms: - Dynamic instantiation; - Vertically scaling platforms; - Dynamic composition; - Self-managing platforms; - Dynamic configuration; - Dynamic reconfiguration of services; - Horizontally scaling platforms; - Self-Healing Cloud computing platforms. Security of Cloud Computing Platforms: - Authentication; - Self-protecting platforms; - Increasing resilience against Cyber attacks of Software as a Service (SaaS); - Increasing resilience against Cyber attacks of Platforms as a Service (PaaS); - Increasing resilience against Cyber attacks of Infrastructure as a Service (IaaS). Cloud Computing Applications: - E-Commerce, Media processing and Streaming search engines, Development and testing, Web hosting, Application hosting, Collaboration tools, Store and share, Social networking for businesses and web applications, Bio-informatics, Biomedical applications. All manuscripts must be written in English and must not exceed 20 single column double-spaced pages (inclusive of figures and tables using a font size of at least 12 points) describing original unpublished research. All accepted papers will be published by the IEEE Computer Society Press. Prepare the final version of the manuscript using the paper templates here.The papers must be submitted in PDF format electronically via the Symposium webpage (TBA) All papers will be reviewed. Furthermore, work in progress papers, industrial papers and student papers are also allowed. -- *** IMPORTANT DATES *** -- Paper Submission Dead line : September 24th, 2012 Authors Notification: October 15th, 2012 Camera Ready Paper : October 25th, 2012 -- ORGANIZING COMMITTEE -- Steering Committee Chairs: D. R. Avresky, IRIANC, Munich, Germany Michel Diaz, CNRS, LAAS, Toulouse, France Steering Committee Member: E. Gelenbe, Imperial College, UK General Chair Financial Chair: E. Gelenbe, Imperial College, UK General Co-Chair: D. R. Avresky, International Research Institute on Autonomic Network Computing (IRIANC), Germany Publication Chair J. Alonso, Duke University, USA Program Co-Chair's: P. Senac, ISAE (DMIA), CNRS LAAS, France R. Lent, Imperial College, UK B. Ciciani, Sapienza University of Rome, Italy Publicity Chair: Roberto Palmieri, Sapienza University of Rome, Italy -- PROGRAM COMMITTEE: -- E. Alata, CNRS, LAAS, Toulouse, France J. Alonso, Duke University, USA P. D. Amer, University of Delaware, USA O. Brun, CNRS LAAS, France T. Braun, University of Bern, Switzerland F. Cappello, INRIA, France, UIUC, USA B. Ciciani, University of Roma, Italy M. Colajanni, University of Modena, Italy E. Dekel , IBM Reasearch , Haifa M. Dias de Amorim LIP6, France C. Elks , Universty of Virginia , USA S. Fdida
[Om-announce] RDP 2011: Call for Participation
[We apologise for multiple copies.] *** Federated Conference on Rewriting, Deduction, and Programming*** ***RDP 2011 *** ***May 29 - June 3, 2011 *** *** Novi Sad, Serbia *** *** http://www.rdp2011.uns.ac.rs *** *** *** *** FIRST CALL FOR PARTICIPATION *** *** *** - -- REGISTRATION -- - For online registration visit: http://www.rdp2011.uns.ac.rs/practical/registration.html Early registration closes on April 10. - -- ABOUT RDP -- - RDP'11 is the sixth edition of the biannual Federated Conference on Rewriting, Deduction, and Programming, consisting of two main conferences and related events. - -- RDP MAIN CONFERENCES -- - RTA 2011 The 22nd International Conference on Rewriting Techniques and Applications May 30 - June 1, 2011 TLCA 2011 The Tenth International Conference on Typed Lambda Calculi and Applications June 1 - 3, 2011 - -- RDP 2011 INVITED SPEAKERS -- - Alexandre Miquel (Ecole Normale Superieure de Lyon, France) Sophie Tison (Universite Lille and LIFL, France) Ashish Tiwari (SRI, USA) Vladimir Voevodsky (Institute of Advanced Study, USA) Stephanie Weirich (University of Pennsylvania, USA) (in alphabetical order) - -- WORKSHOPS -- - COBRA 2011 Compilers by Rewriting, Automated HDTT 2011 Higher Dimensional Type Theory TPDC 2011 Theory and Practice of Delimited Continuations (TPDC) 2FC 2011 Two Faces of Complexity (2FC) WRS 2011 Reduction Strategies in Rewriting and Programming IFIP WG 1.6Working Group 1.6 Term Rewriting - -- ASSOCIATED EVENTS -- - IFCoLogStudent session organized by The International Federation for Computational Logic - -- HOST CITY: NOVI SAD, SERBIA -- - Novi Sad is capital of Vojvodina, the northern region of Serbia. Situated on the Danube river, 80km from the capital city Belgrade, it is treasured regional and cultural center. With the population of about 300,000, Novi Sad is a modern and pleasant city with wide boulevards, modern buildings and the historical Central Square surrounded by the Old Town Hall, the Roman catholic church and similar buildings dating mainly from the early nineteenth century. The city, as well as whole of Vojvodina is well-known multicultural, multinational and multiconfesional region. Among the cultural-historical monuments, the best known is the Petrovaradin fortress with its underground corridors, promenades, museums, restaurants and art studios. There are also many churches, monasteries and other cultural monuments. Novi Sad is also known by the longest and the most beautiful sandy beach on the Danube, as well as by nearby Fruska Gora mountain. As a university town, Novi Sad is known for a lively night life, with lots of nice restaurants, bars, cafes and clubs. Several international theater and music festivals take place here. For travel and accommodation information, please consult the RDP 2011 website: http://www.rdp2011.uns.ac.rs RDP 2011 is organized by the University of Novi Sad, Faculty of Technical Sciences, and Mathematical Institute SASA and will take place in the University Campus, at the Faculty of Technical Sciences. - -- REGISTRATION (again) -- - For online registration visit: http://www.rdp2011.uns.ac.rs/practical/registration.html Early registration closes on April 10. - --
[Om-announce] RTA 2011: 2nd call for papers
* * * RTA 2011 * * Rewriting Techniques and Applications* *22nd International Conference * * * * Monday, May 30 - Wednesday, June 1, 2011, * * Novi Sad, Serbia* * http://www.rdp2011.uns.ac.rs/ * * * *Call for Papers * * * The 22nd International Conference on Rewriting Techniques and Applications (RTA 2011) is organized as part of the Federated Conference on Rewriting, Deduction, and Programming (RDP 2011), together with the International Conference on Typed Lambda Calculi and Applications (TLCA 2011), and several workshops. RDP 2011 will be held at the University of Novi Sad, Serbia. IMPORTANT DATES: Abstract Submission: January 7, 2011 (Friday) Paper Submission: January 14, 2011 (Friday) Notification: March 4, 2011 (Friday) Final version:April 3, 2011 (Sunday) ConferenceMay 30, 2011 (Monday) RTA is the major forum for the presentation of research on all aspects of rewriting. Typical areas of interest include (but are not limited to): * Applications: case studies; analysis of cryptographic protocols; rule-based (functional and logic) programming; symbolic and algebraic computation; theorem proving; system synthesis and verification; proof checking; reasoning about programming languages and logics; program transformation; XML queries and transformations * Foundations: matching and unification; narrowing; completion techniques; strategies; rewriting calculi; constraint solving; tree automata; termination; complexity; combination; * Frameworks: string, term, and graph rewriting; lambda-calculus and higher-order rewriting; constrained rewriting/deduction; categorical and infinitary rewriting; integration of decision procedures; net rewriting; binding techniques; * Implementation: implementation techniques; parallel execution; rewrite tools; termination checking; abstract machines; explicit substitutions; * Semantics: equational logic; rewriting logic; rewriting models of programs. INVITED SPEAKERS: Ashish Tiwari (SRI,USA) and Sophie Tison (Univ. Lille and LIFL, France) will be invited speakers at RTA. Stephanie Weirich, Univ. Pennsylvania will be the invited RDP speaker. BEST PAPER AWARD: A prize of 500 Euro will be given to the best paper as judged by the program committee. The program committee may decline to make the award or may split it among several papers. PROGRAMME CHAIR: * Manfred Schmidt-Schauss (Goethe-Universitaet Frankfurt, Germany) PROGRAM COMMITTEE: Franz Baader (TU Dresden, Germany) Frederic Blanqui (INRIA, China) Veronique Cortier (CNRS, Loria, France) Dan Dougherty (Worcester Polytechnic Institute, United States) Maribel Fernandez (King's College London, United Kingdom) Juergen Giesl (RWTH Aachen, Germany) Florent Jacquemard(INRIA Saclay, France) Fairouz Kamareddine (Heriot-Watt University, United Kingdom) Salvador Lucas(Universidad Politecnica de Valencia, Spain) Narciso Marti-Oliet (Universidad Complutense de Madrid, Spain) Aart Middeldorp (University of Innsbruck, Austria) Georg Moser (University of Innsbruck, Austria) Paliath Narendran (University at Albany--SUNY, United States) Joachim Niehren (INRIA Lille, France) Hitoshi Ohsaki(AIST Osaka, Japan) Vincent van Oostrom (Universiteit Utrecht, The Netherlands) Femke van Raamsdonk (Vrije Universiteit Amsterdam, The Netherlands) Grigore Rosu (University of Illinois at Urbana-Champaign, USA) Manfred Schmidt-Schauss (Goethe-Universitaet Frankfurt, Germany) (Chair) Aleksy Schubert (The University of Warsaw,Poland) Jakob Grue Simonsen (University of Copenhagen, Danmark) Rene Thiemann (University of Innsbruck, Austria) Christian Urban (TU München, Germany) Johannes Waldmann (HTWK Leipzig, Germany) Hans Zantema (Technische Universiteit Eindhoven, The Netherlands) CONFERENCE CHAIR Silvia Ghilezan, Univ. Novi Sad, Serbia PUBLICATION: RTA proceedings will be published by LIPIcs (Leibniz International Proceedings in Informatics). LIPIcs is open access, meaning that publications will be available online and free of charge, and authors keep the copyright for their papers. LIPIcs publications are indexed in DBLP. STACS, FSTTCS and ICLP proceedings also appear in LIPIcs. See http://www.dagstuhl.de/en/publications/lipics for more information about LIPIcs. Printed
[Om-announce] RTA 2011: Call for Papers
* * * RTA 2011 * * Rewriting Techniques and Applications* *22nd International Conference * * * * Monday, May 30 - Wednesday, June 1, 2011, * * Novi Sad, Serbia* * http://www.rdp2011.uns.ac.rs/ * * * *Call for Papers * * * The 22nd International Conference on Rewriting Techniques and Applications (RTA 2011) is organized as part of the Federated Conference on Rewriting, Deduction, and Programming (RDP 2011), together with the International Conference on Typed Lambda Calculi and Applications (TLCA 2011), and several workshops. RDP 2011 will be held at the University of Novi Sad, Serbia. IMPORTANT DATES: Abstract Submission: January 7, 2011 (Friday) Paper Submission: January 14, 2011 (Friday) Notification: March 4, 2011 (Friday) Final version:April 3, 2011 (Sunday) Conference: May 30, 2011 (Monday) RTA is the major forum for the presentation of research on all aspects of rewriting. Typical areas of interest include (but are not limited to): * Applications: case studies; analysis of cryptographic protocols; rule-based (functional and logic) programming; symbolic and algebraic computation; theorem proving; system synthesis and verification; proof checking; reasoning about programming languages and logics; program transformation; XML queries and transformations * Foundations: matching and unification; narrowing; completion techniques; strategies; rewriting calculi; constraint solving; tree automata; termination; complexity; combination; * Frameworks: string, term, and graph rewriting; lambda-calculus and higher-order rewriting; constrained rewriting/deduction; categorical and infinitary rewriting; integration of decision procedures; net rewriting; binding techniques; * Implementation: implementation techniques; parallel execution; rewrite tools; termination checking; abstract machines; explicit substitutions; * Semantics: equational logic; rewriting logic; rewriting models of programs. INVITED SPEAKERS: Ashish Tiwari (SRI,USA) and Sophie Tison (Univ. Lille and LIFL, France) will be invited speakers at RTA. BEST PAPER AWARD: A prize of 500 Euro will be given to the best paper as judged by the program committee. The program committee may decline to make the award or may split it among several papers. PROGRAMME CHAIR: * Manfred Schmidt-Schauss (Goethe-Universität Frankfurt, Germany) PROGRAM COMMITTEE: Franz Baader (TU Dresden, Germany) Frederic Blanqui (INRIA, China) Veronique Cortier (CNRS, Loria, France) Dan Dougherty (Worcester Polytechnic Institute, United States) Maribel Fernandez (King's College London, United Kingdom) Juergen Giesl (RWTH Aachen, Germany) Florent Jacquemard(INRIA Saclay, France) Fairouz Kamareddine (Heriot-Watt University, United Kingdom) Salvador Lucas(Universidad Politécnica de Valencia, Spain) Narciso Marti-Oliet (Universidad Complutense de Madrid, Spain) Aart Middeldorp (University of Innsbruck, Austria) Georg Moser (University of Innsbruck, Austria) Paliath Narendran (University at Albany--SUNY, United States) Joachim Niehren (INRIA Lille, France) Hitoshi Ohsaki(AIST Osaka, Japan) Vincent van Oostrom (Universiteit Utrecht, The Netherlands) Femke van Raamsdonk (Vrije Universiteit Amsterdam, The Netherlands) Grigore Rosu (University of Illinois at Urbana-Champaign, USA) Manfred Schmidt-Schauss (Goethe-Universität Frankfurt, Germany) (Chair) Aleksy Schubert (The University of Warsaw,Poland) Jakob Grue Simonsen (University of Copenhagen, Danmark) Rene Thiemann (University of Innsbruck, Austria) Christian Urban (TU München, Germany) Johannes Waldmann (HTWK Leipzig, Germany) Hans Zantema (Technische Universiteit Eindhoven, The Netherlands) CONFERENCE CHAIR Silvia Ghilezan, U Novis Sad, Serbia PUBLICATION: RTA proceedings will be published by LIPIcs (Leibniz International Proceedings in Informatics). LIPIcs is open access, meaning that publications will be available online and free of charge, and authors keep the copyright for their papers. LIPIcs publications are indexed in DBLP. STACS, FSTTCS and ICLP proceedings also appear in LIPIcs. See http://www.dagstuhl.de/en/publications/lipics for more information about LIPIcs. Printed proceedings of RTA will be provided to the participants at the conference. SUBMISSIONS: