[Om-announce] [CFP]: 2nd Joint Workshop on CPS Security and Privacy (CPSIoTSec 2021)

2021-05-16 Thread Cristina Alcaraz

---
C a l l F o r P a p e r s

2nd Joint Workshop on CPS Security and Privacy (CPSIoTSec 2021)

Seoul, South Korea, November 15 (Monday), 2021

URL: https://cpsiotsec.github.io

co-located with the ACM Conference on Computer and Communications 
Security (ACM CCS 2021)


---

===
CONFERENCE OUTLINE:
===

The Joint Workshop on CPS Security and Privacy invites academia, 
industry, and governmental entities to submit:


 - Original research papers on the security and privacy of CPS
 - Systematization of Knowledge (SoK) papers on the security and privacy 
of CPS
 - Demos (hands-on or videos) of testbeds/experiences of CPS 
security and privacy research


We seek submissions from multiple interdisciplinary backgrounds tackling 
security and privacy issues in CPS,

including but not limited to:

- Mathematical foundations for secure CPS/IoT
- Control-theoretic approaches
- High assurance security architectures
- Security and resilience metrics
- Metrics and risk assessment approaches
- Identity and access management
- Privacy and trust
- Network security
- Game theory applied to CPS/IoT security
- Human factors, humans in the loop, and usable security
- Understanding dependencies among security, reliability and safety in 
CPS/IoT

- Economics of security and privacy
- Intrusion and anomaly detection
- Model-based security systems engineering
- Sensor and actuator attacks
- CPS/IoT malware analysis
- CPS/IoT firmware analysis
- Hardware-assisted CPS/IoT security

Also of interest will be papers that can point the research community to 
new research directions, and those that
can set research agendas and priorities in CPS/IoT security and privacy. 
There will be a best paper award.


=
PAPER SUBMISSION:
=

Submissions include long papers (12 pages), short papers (6 pages), and 
abstracts (1 page):


- Long papers include a) Original research on a CPS/IoT security and 
privacy topic, b) Systematization of Knowledge of CPS/IoT security and 
privacy;
- Short papers include original work-in-progress research on a CPS/IoT 
security and privacy topic; and
- 1-page abstracts include demos/interesting findings/insights on 
CPS/IoT security and privacy, which will be accompanied by a hands-on 
demo during the workshop.


Submitted papers must include appendices and references (except for SoK 
papers where references are excluded).


Submissions must use the ACM SIG Proceedings Templates (see 
https://www.acm.org/publications/proceedings-template,
with a simpler version here: https://github.com/acmccs/format). Only PDF 
files will be accepted.


Accepted papers will be published by the ACM Press and/or the ACM 
Digital Library. Submissions must not substantially overlap
with papers that have been published or that are simultaneously 
submitted to a journal or a conference with proceedings. Each
accepted paper must be presented by a registered author. Submissions not 
meeting these guidelines risk immediate rejection.

For questions about these policies, please contact the chairs.

NEW FOR 2021: The workshop will feature a second paper submission 
deadline for papers that have been submitted but not accepted to the 
main conference. The deadline will be 10 days after the paper 
notification is out.
Authors are not required to upload CCS reviews; verification of CCS 
submission status will be done by informing the program chairs of the 
paper ID of the CCS submission.


Paper submission site: 
https://easychair.org/conferences/?conf=cpsiotsec2021



IMPORTANT DATES:


- Submission deadline: June 25, 2021 (23:59 Anywhere on Earth).
- Submission deadline applicable only to papers rejected from ACM CCS 
2021: July 30, 2021 (23:59 Anywhere on Earth).

- Notification of acceptance/rejection (tentative): August 13, 2021.
- Deadline for submission of camera-ready papers (hard deadline): 
September 6, 2021


=
Program Committee Chairs:
=

- Cristina Alcaraz, University of Malaga, Spain
– Michail Maniatakos, New York University Abu Dhabi, UAE

==
Program Committee:
==

- Magnus Almgren, Chalmers University, Sweden
– Rakesh Bobba, Oregon State University, USA
- Gedare Bloom, University of Colorado Colorado Springs, USA
– Alvaro Cardenas, UC Santa Cruz, USA
– Mauro Conti, University of Padua, Italy
– Yongkai Fan, China University of Petroleum, China
– Vasileios Gkioulos, Norwegian University of Science and Technology, 
Norway

– Dawu Gu, Shanghai Jiao Tong University, China
– Le Guan, University of Georgia, USA
– Gerhard Hancke, City University of Hong Kong
– Monowar Hasan, Wichita State University, USA
– Sokratis Katsikas, Open University

[Om-announce] [CFW - *** deadline approaching *** ]: CALL FOR WORKSHOPS IEEE ATC 2021 - 18th IEEE International Conference on Advanced and Trusted Computing

2021-03-25 Thread Cristina Alcaraz

==
CALL FOR WORKSHOPS IEEE ATC 2021
18th IEEE International Conference on Advanced and Trusted Computing
Atlanta, USA
October 18-21, 2021

Website: http://www.ieeesmartworld.org
==

OVERVIEW:

Advances in technologies and our society will also result in an 
integration

of our real, cyber, and virtual worlds to form smart, and cyber-physical
socially aware and integrated hyper worlds. Underpinning such worlds are 
advanced
computing (AC) infrastructure and trusted computing (TC) applications 
and services.
For example, a robust and resilient AC infrastructure can support TC 
applications
and services, in order to provide secure and/or privacy-preserving 
communications,
as well as ensuring computing and communication systems and services are 
available,
predictable, accountable, controllable, assessable, sustainable, 
dependable,

persistent, and secure.

Proposals are solicited for Workshops to be held in conjunction with 
IEEE ATC 2021.
A Workshop should aim at providing a forum on emerging topics of high 
interest to
the security and privacy community working on advanced and trusted 
technologies.


IMPORTANT DATES:

* Workshop proposals due: March 30, 2021
* Notification of decision: April 15, 2021

==

WORKSHOP CHAIRS AND SUBMISSION:

- Cristina Alcaraz, University of Malaga, Spain
- Reza M. Parizi, Kennesaw State University, USA
- Tianqing Zhu, University of Technology Sydney, Australia

Submission via email to: ieeeatc2021.worksh...@gmail.com

For further details, visit http://www.ieeesmartworld.org/atc/
___
Om-announce mailing list
Om-announce@openmath.org
http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce


[Om-announce] [Deadline Approaching] CFP: 6th ACM Cyber-Physical System Security Workshop (ACM CPSS'20)

2020-02-03 Thread Cristina Alcaraz


*** Apologies for multiple copies ***

C a l l F o r P a p e r s

6th ACM Cyber-Physical System Security Workshop (ACM CPSS 2020) in 
conjunction with ACM AsiaCCS'20


Taipei, Taiwan -- June 1st, 2020

https://www.nics.uma.es/pub/CPSS2020/



Overview
-
Cyber-Physical Systems (CPS) of interest to this workshop consist of 
large-scale interconnected systems of heterogeneous components 
interacting with their physical environments. There exist a multitude of 
CPS devices and applications deployed to serve critical functions in our 
lives thus making security an important non-functional attribute of such 
systems. This workshop will provide a platform for professionals from 
academia, government, and industry to discuss novel ways to address the 
ever-present security challenges facing CPS. We seek submissions 
describing theoretical and practical solutions to security challenges in 
CPS. Submissions pertinent to the security of embedded systems, IoT, 
SCADA, smart grid, and other critical infrastructure are welcome. Topics 
of interest include, but are not limited to:


* Attack detection for CPS
* Authentication and access control for CPS
* Availability of and auditing for CPS
* Blockchain for CPS security
* Data security and privacy for CPS
* Digital twins for CPS
* Embedded systems security
* Formal methods in CPS
* Industrial control systems security
* IoT security
* Lightweight crypto
* Recovery of CPS from cyber attacks
* Security risk assessment for CPS
* Security architectures for CPS
* Security by design for CPS
* Security of autonomous vehicles and vessels
* Security of legacy CPS
* Smart grid security
* Threat modeling for CPS
* Security of transportation systems
* Vulnerability analysis for CPS

Important Dates

* Paper submission deadline: February 10, 2020
* Notification to authors: March 5, 2020
* Camera ready due: March 15, 2020

Paper Submission Guidelines

Submitted papers must not substantially overlap papers that have been 
published or that are simultaneously submitted to a journal or a 
conference with proceedings. All submissions should be appropriately 
anonymized. Submissions must be in double-column ACM SIG Proceedings 
format, and should not exceed 12 pages. Position papers describing work 
in progress are also welcome. Only pdf files will be accepted. Authors 
of accepted papers must guarantee that their papers will be presented at 
the workshop. At least one author of each paper must be registered at 
the appropriate conference rate. Accepted papers will be published in 
the ACM Digital Library. A best paper award will be presented getting 
opportunities for a registration fee discount.


Paper submission site: https://easychair.org/conferences/?conf=cpss20

Organisation Committee
---

Steering Committee:
* Dieter Gollmann (Hamburg University of Technology, Germany)
* Ravishankar Iyer (UIUC, USA)
* Douglas Jones (UIUC, USA)
* Javier Lopez (University of Malaga, Spain)
* Jianying Zhou (SUTD, Singapore) – Chair

Program Committee Chairs:

* Sokratis Katsikas (Open University of Cyprus, Cyprus; and Norwegian 
University of Science and Technology - NTNU, Norway)

* Cristina Alcaraz (University of Malaga, Spain)

Program Committee:

- Chuadhry Mujeeb Ahmed (SUTD, Singapore)
- Alvaro Cardenas (UC Santa Cruz, USA)
- Mauro Conti (University of Padua, Italy)
- Afonso Ferreira (CNRS, France)
- Yanick Fratantonio (EURECOM, France)
- Joaquin Garcia-Alfaro (Telecom SudParis, France)
- Vasileios Gkioulos (NTNU, Norway)
- Eunsuk Kang (Carnegie Mellon University, USA)
- Huy Kang Kim (Korea University, Korea)
- Kandasamy Nandha Kumar (SUTD, Singapore)
- Qi Li (Tsinghua University, China)
- Hoon Wei Lim (SingTel, Singapore)
- Javier Lopez (University of Malaga, Spain)
- Bo Luo (University of Kansas, USA)
- Emil Lupu (Imperial College, UK)
- Michail Maniatakos (NYU-Abu Dhabi, UAE)
- Daisuke Mashima (ADSC, Singapore)
- Weizhi Meng (DTU, Denmark)
- Simin Nadjm-Tehrani (Linköping University, Sweden)
- Martín Ochoa (Universidad del Rosario, Colombia)
- Günther Pernul (Universität Regensburg, Germany)
- Indraskhi Ray (Colorado State University, USA)
- Rodrigo Roman (University of Malaga, Spain)
- Justin Ruths (UT Dallas, USA)
- Savio Sciancalepore (HBKU-CSE, Qatar)
- Martin Strohmeier (University of Oxford, UK)
- Qiang Tang (LIST, Luxembourg)
- Nils Ole Tippenhauer (CISPA, Germany)
- Zheng Yang (SUTD, Singapore)
- Jianying Zhou (SUTD, Singapore)
- Sencun Zhu (Pennsylvania State University, USA)
- Saman Zonouz (Rutgers University, USA)

Publicity Chair:
* Pankaj Pandey (Norwegian University of Science and Technology - NTNU, 
Norway)


Publication Chair:
* Stefanos Gritzalis (University of Piraeus, Greece)

Contact
---
Email:  cps...@easychair.org
CPSS

[Om-announce] [Deadline approaching] CFP: IEEE Internet of Things Journal Special Issue on "Secure Embedded IoT Devices for Resilient Critical Infrastructures"

2018-09-24 Thread Cristina Alcaraz

===

C a l l F o r P a p e r s

IEEE INTERNET OF THINGS JOURNAL

Special Issue: Secure Embedded IoT Devices for Resilient Critical 
Infrastructures


URL: 
http://ieee-iotj.org/wp-content/uploads/2018/07/CFP-SI-Secure-Embedded-IoT-Devices-for-Resilient-CIs.pdf


===

The Internet of Things (IoT) opens the door to new technological 
opportunities for a wide range of applications that cover e-health, 
smart homes and automation, e-commerce, location-based services, smart 
vehicles, fleet management and remote system monitoring. However, at the 
same time as these technological opportunities grow so does the threat 
surface for potential adversaries targeting at various, interconnected 
ICT systems and consequently at ICT-dependent critical systems, such as 
SCADA (Supervisory Control and Data Acquisition Systems) systems. At 
this point, attackers could take advantage from the incorporation of the 
paradigm to exploit new security gaps, probably caused by unforeseen 
interoperability and adaptability problems.


Indeed, the deployment of Internet-enabled embedded devices that are 
distributed over major critical domains, may create indirect and 
non-obvious inter-connections with the underlying Critical 
Infrastructures (CIs). Examples of such inter-connected systems may 
include traffic monitoring and control systems communicating with smart 
vehicles, energy related systems communicating with smart homes and 
smart meters, monitoring systems connected with autonomous sensors in 
nuclear plants, power grids and body area networks. There is a need to 
further explore the security issues related to IoT technologies to 
assure the resilience of CIs against advanced IoT-based attacks. The 
goal of this special issue is therefore to address the diverse security 
challenges and related to IoT-enabled CIs (IoT-CIs) and their resilience 
to advanced threats.


Suggested topics include, but are not limited to, the following:
* Security analysis and requirements in the coupling of IoT-CIs
* Vulnerabilities, threat models and risk management in IoT-CIs
* Reference architectures for the secure coupling of IoT in CI scenarios
* Embedded security for mobile devices and BYOD
* Network-layer attacks and defense mechanisms between IoT devices and 
CIs

* Key management and access control in IoT-CIs
* Resilience models for advanced threats in IoT-CIs
* Advanced and lightweight awareness models for large IoT-CIs
* Privacy and location privacy for IoT-CIs


Important Dates

* Submissions Deadline: October 1, 2018
* First Reviews Due: December 15, 2018
* Revision Due: January 15, 2019
* Second Reviews Due/Notification: Feb. 15, 2019
* Final Manuscript Due: March 15, 2019
* Publication Date: 2019


Paper Submission Guidelines

All original manuscripts or revisions to the IEEE IoT Journal must be 
submitted electronically through IEEE Manuscript Central, 
http://mc.manuscriptcentral.com/iot. Solicited original submissions must 
not be currently under consideration for publication in other venues. 
Author guidelines and submission information can be found at 
http://iot.ieee.org/journal.


Requests for additional information should be addressed to the guest 
editors.


--
Guest Editors
--
* Cristina Alcaraz, University of Malaga, Spain alca...@lcc.uma.es
* Mike Burmester, Florida State University, USA burmes...@cs.fsu.edu
* Jorge Cuellar, Siemens, Germany, jorge.cuel...@siemens.com
* Xinyi Huang, Fujian Normal University, China, xyhuan...@gmail.com
* Panayiotis Kotzanikolaou, University of Piraeus, Greece, 
pkotz...@unipi.gr

* Mihalis Psarakis, University of Piraeus, Greece, mpsa...@unipi.gr
___
Om-announce mailing list
Om-announce@openmath.org
http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce


[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018

2018-04-19 Thread Cristina Alcaraz

--
*** Apologies for multiple copies ***

C a l l F o r P a p e r s

13th International Conference on Critical Information Infrastructures 
Security CRITIS 2018

Kaunas, Lithuania, September 24-26, 2018

Full-text paper submission due: April 30, 2018

CONFERENCE OUTLINE:

CRITIS 2018 continues the tradition of presenting innovative research 
and exploring new challenges in the field of critical (information) 
infrastructures protection (C(I)IP), resilience and fostering the 
dialogue with stakeholders.


CRITIS 2018 aims at bringing together researchers, professionals from 
academia, critical (information) infrastructure operators, industry, 
defence sector and governmental organisations working in the field of 
the security of critical (information) infrastructure systems.


Moreover, CRITIS aims to encourage and inspire early stage and 
open-minded researchers in this demanding multi-disciplinary field of 
research. Outstanding research performance demonstrated by young 
researchers may compete for the Young CRITIS Award (YCA).


The Projects' Dissemination Session will be an opportunity of 
dissemination for ongoing European, multinational, and national 
projects, to share the experiences among scientist and experts working 
on different projects in the C(I)IP domain.


CRITIS 2018 conference has a special focus on current and future energy 
infrastructures within a special session Energy infrastructure operators 
and stakeholders: key challenges and solution directions, chaired by 
Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). 
Invited speakers will be mainly from European electricity and/or gas 
Transmission System Operators (TSO), some representatives from European 
electricity and gas Distributed System Operators (DSO), NATO and 
European policy-makers.


CRITIS 2018 topics (but not limited to): 
http://www.lei.lt/critis2018/call-for-papers.html


Special sessions will be organized by CRITIS 2018 Supporting Chairs:
- “Energy CIP”: Marcelo Masera, European Commission, Joint Research 
Centre, the Netherlands
- “CI Resilience”: Marianthi Theocharidou, European Commission, 
Joint Research Centre, Italy

- “Human Factor and CIP”: Grigore Havarneanu, UIC, France
- “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, 
Sweden
- “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), 
Fraunhofer IAIS, Germany
- “Interconnected Infrastructures and Systems of Systems”: Enrico 
Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France
- “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University 
of Piraeus, Greece


Call for Papers (PDF to download): 
http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf


Accepted papers are to be included to post-proceedings, published by 
Springer-Verlag in their Lecture Notes in Computer Science (LNCS) 
series.


IMPORTANT DATES:


30 April 2018 -- Full-text submission
18 June 2018 -- Notification of acceptance
9 September 2018 -- Camera-ready papers

Programme Chair

- Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands

Steering Committee Chairs
- Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, 
Switzerland

- Javier Lopez, University of Malaga, Spain
- Stephen D. Wolthusen, Royal Holloway, University of London, UK and 
NTNU, Norway


Local Co-Chairs
- Inga Žutautaitė, Lithuanian Energy Institute, Lithuania
- Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania

Publicity Chairs
- Cristina Alcaraz, University of Malaga, Spain
- Rolandas Urbonas, Lithuanian Energy Institute, Lithuania

CRITIS 2018 Secretary Office

Lithuanian Energy Institute
Breslaujos g. 3, Kaunas, Lithuania
Tel. +370 37 401948
 +370 37 401938
E-mail: critis2...@lei.lt

Conference website: www.lei.lt/critis2018
___
Om-announce mailing list
Om-announce@openmath.org
http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce


[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018

2018-04-11 Thread Cristina Alcaraz

--
*** Apologies for multiple copies ***

C a l l F o r P a p e r s

13th International Conference on Critical Information Infrastructures 
Security CRITIS 2018

Kaunas, Lithuania, September 24-26, 2018

Full-text paper submission due: April 30, 2018

CONFERENCE OUTLINE:

CRITIS 2018 continues the tradition of presenting innovative research 
and exploring new challenges in the field of critical (information) 
infrastructures protection (C(I)IP), resilience and fostering the 
dialogue with stakeholders.


CRITIS 2018 aims at bringing together researchers, professionals from 
academia, critical (information) infrastructure operators, industry, 
defence sector and governmental organisations working in the field of 
the security of critical (information) infrastructure systems.


Moreover, CRITIS aims to encourage and inspire early stage and 
open-minded researchers in this demanding multi-disciplinary field of 
research. Outstanding research performance demonstrated by young 
researchers may compete for the Young CRITIS Award (YCA).


The Projects' Dissemination Session will be an opportunity of 
dissemination for ongoing European, multinational, and national 
projects, to share the experiences among scientist and experts working 
on different projects in the C(I)IP domain.


CRITIS 2018 conference has a special focus on current and future energy 
infrastructures within a special session Energy infrastructure operators 
and stakeholders: key challenges and solution directions, chaired by 
Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). 
Invited speakers will be mainly from European electricity and/or gas 
Transmission System Operators (TSO), some representatives from European 
electricity and gas Distributed System Operators (DSO), NATO and 
European policy-makers.


CRITIS 2018 topics (but not limited to): 
http://www.lei.lt/critis2018/call-for-papers.html


Special sessions will be organized by CRITIS 2018 Supporting Chairs:
- “Energy CIP”: Marcelo Masera, European Commission, Joint Research 
Centre, the Netherlands
- “CI Resilience”: Marianthi Theocharidou, European Commission, 
Joint Research Centre, Italy

- “Human Factor and CIP”: Grigore Havarneanu, UIC, France
- “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, 
Sweden
- “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), 
Fraunhofer IAIS, Germany
- “Interconnected Infrastructures and Systems of Systems”: Enrico 
Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France
- “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University 
of Piraeus, Greece


Call for Papers (PDF to download): 
http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf


Accepted papers are to be included to post-proceedings, published by 
Springer-Verlag in their Lecture Notes in Computer Science (LNCS) 
series.


IMPORTANT DATES:


30 April 2018 -- Full-text submission
18 June 2018 -- Notification of acceptance
9 September 2018 -- Camera-ready papers

Programme Chair

- Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands

Steering Committee Chairs
- Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, 
Switzerland

- Javier Lopez, University of Malaga, Spain
- Stephen D. Wolthusen, Royal Holloway, University of London, UK and 
NTNU, Norway


Local Co-Chairs
- Inga Žutautaitė, Lithuanian Energy Institute, Lithuania
- Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania

Publicity Chairs
- Cristina Alcaraz, University of Malaga, Spain
- Rolandas Urbonas, Lithuanian Energy Institute, Lithuania

CRITIS 2018 Secretary Office

Lithuanian Energy Institute
Breslaujos g. 3, Kaunas, Lithuania
Tel. +370 37 401948
 +370 37 401938
E-mail: critis2...@lei.lt

Conference website: www.lei.lt/critis2018
___
Om-announce mailing list
Om-announce@openmath.org
http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce


[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018

2018-04-04 Thread Cristina Alcaraz

--
*** Apologies for multiple copies ***

C a l l F o r P a p e r s

13th International Conference on Critical Information Infrastructures 
Security CRITIS 2018

Kaunas, Lithuania, September 24-26, 2018

Full-text paper submission due: April 30, 2018

CONFERENCE OUTLINE:

CRITIS 2018 continues the tradition of presenting innovative research 
and exploring new challenges in the field of critical (information) 
infrastructures protection (C(I)IP), resilience and fostering the 
dialogue with stakeholders.


CRITIS 2018 aims at bringing together researchers, professionals from 
academia, critical (information) infrastructure operators, industry, 
defence sector and governmental organisations working in the field of 
the security of critical (information) infrastructure systems.


Moreover, CRITIS aims to encourage and inspire early stage and 
open-minded researchers in this demanding multi-disciplinary field of 
research. Outstanding research performance demonstrated by young 
researchers may compete for the Young CRITIS Award (YCA).


The Projects' Dissemination Session will be an opportunity of 
dissemination for ongoing European, multinational, and national 
projects, to share the experiences among scientist and experts working 
on different projects in the C(I)IP domain.


CRITIS 2018 conference has a special focus on current and future energy 
infrastructures within a special session Energy infrastructure operators 
and stakeholders: key challenges and solution directions, chaired by 
Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). 
Invited speakers will be mainly from European electricity and/or gas 
Transmission System Operators (TSO), some representatives from European 
electricity and gas Distributed System Operators (DSO), NATO and 
European policy-makers.


CRITIS 2018 topics (but not limited to): 
http://www.lei.lt/critis2018/call-for-papers.html


Special sessions will be organized by CRITIS 2018 Supporting Chairs:
- “Energy CIP”: Marcelo Masera, European Commission, Joint Research 
Centre, the Netherlands
- “CI Resilience”: Marianthi Theocharidou, European Commission, 
Joint Research Centre, Italy

- “Human Factor and CIP”: Grigore Havarneanu, UIC, France
- “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, 
Sweden
- “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), 
Fraunhofer IAIS, Germany
- “Interconnected Infrastructures and Systems of Systems”: Enrico 
Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France
- “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University 
of Piraeus, Greece


Call for Papers (PDF to download): 
http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf


Accepted papers are to be included to post-proceedings, published by 
Springer-Verlag in their Lecture Notes in Computer Science (LNCS) 
series.


IMPORTANT DATES:


30 April 2018 -- Full-text submission
18 June 2018 -- Notification of acceptance
9 September 2018 -- Camera-ready papers

Programme Chair

- Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands

Steering Committee Chairs
- Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, 
Switzerland

- Javier Lopez, University of Malaga, Spain
- Stephen D. Wolthusen, Royal Holloway, University of London, UK and 
NTNU, Norway


Local Co-Chairs
- Inga Žutautaitė, Lithuanian Energy Institute, Lithuania
- Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania

Publicity Chairs
- Cristina Alcaraz, University of Malaga, Spain
- Rolandas Urbonas, Lithuanian Energy Institute, Lithuania

CRITIS 2018 Secretary Office

Lithuanian Energy Institute
Breslaujos g. 3, Kaunas, Lithuania
Tel. +370 37 401948
 +370 37 401938
E-mail: critis2...@lei.lt

Conference website: www.lei.lt/critis2018
___
Om-announce mailing list
Om-announce@openmath.org
http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce


[Om-announce] [Extended deadline - Call for Papers]: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-03-27 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

E x t e n d e d D e a d l i n e

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Extended Submission due:  March 27, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Extended Submission due:  March 27, 2018 (GMT)
• Notification:  April 25, 2018
• Camera-ready due:  May 10, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce


[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018

2018-03-27 Thread Cristina Alcaraz

--
*** Apologies for multiple copies ***

C a l l F o r P a p e r s

13th International Conference on Critical Information Infrastructures 
Security CRITIS 2018

Kaunas, Lithuania, September 24-26, 2018

Full-text paper submission due: April 30, 2018

CONFERENCE OUTLINE:

CRITIS 2018 continues the tradition of presenting innovative research 
and exploring new challenges in the field of critical (information) 
infrastructures protection (C(I)IP), resilience and fostering the 
dialogue with stakeholders.


CRITIS 2018 aims at bringing together researchers, professionals from 
academia, critical (information) infrastructure operators, industry, 
defence sector and governmental organisations working in the field of 
the security of critical (information) infrastructure systems.


Moreover, CRITIS aims to encourage and inspire early stage and 
open-minded researchers in this demanding multi-disciplinary field of 
research. Outstanding research performance demonstrated by young 
researchers may compete for the Young CRITIS Award (YCA).


The Projects' Dissemination Session will be an opportunity of 
dissemination for ongoing European, multinational, and national 
projects, to share the experiences among scientist and experts working 
on different projects in the C(I)IP domain.


CRITIS 2018 conference has a special focus on current and future energy 
infrastructures within a special session Energy infrastructure operators 
and stakeholders: key challenges and solution directions, chaired by 
Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). 
Invited speakers will be mainly from European electricity and/or gas 
Transmission System Operators (TSO), some representatives from European 
electricity and gas Distributed System Operators (DSO), NATO and 
European policy-makers.


CRITIS 2018 topics (but not limited to): 
http://www.lei.lt/critis2018/call-for-papers.html


Special sessions will be organized by CRITIS 2018 Supporting Chairs:
- “Energy CIP”: Marcelo Masera, European Commission, Joint Research 
Centre, the Netherlands
- “CI Resilience”: Marianthi Theocharidou, European Commission, 
Joint Research Centre, Italy

- “Human Factor and CIP”: Grigore Havarneanu, UIC, France
- “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, 
Sweden
- “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), 
Fraunhofer IAIS, Germany
- “Interconnected Infrastructures and Systems of Systems”: Enrico 
Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France
- “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University 
of Piraeus, Greece


Call for Papers (PDF to download): 
http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf


Accepted papers are to be included to post-proceedings, published by 
Springer-Verlag in their Lecture Notes in Computer Science (LNCS) 
series.


IMPORTANT DATES:


30 April 2018 -- Full-text submission
18 June 2018 -- Notification of acceptance
9 September 2018 -- Camera-ready papers

Programme Chair

- Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands

Steering Committee Chairs
- Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, 
Switzerland

- Javier Lopez, University of Malaga, Spain
- Stephen D. Wolthusen, Royal Holloway, University of London, UK and 
NTNU, Norway


Local Co-Chairs
- Inga Žutautaitė, Lithuanian Energy Institute, Lithuania
- Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania

Publicity Chairs
- Cristina Alcaraz, University of Malaga, Spain
- Rolandas Urbonas, Lithuanian Energy Institute, Lithuania

CRITIS 2018 Secretary Office

Lithuanian Energy Institute
Breslaujos g. 3, Kaunas, Lithuania
Tel. +370 37 401948
 +370 37 401938
E-mail: critis2...@lei.lt

Conference website: www.lei.lt/critis2018
___
Om-announce mailing list
Om-announce@openmath.org
http://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce


[Om-announce] [Extended deadline - Call for Papers]: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-03-12 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

E x t e n d e d D e a d l i n e

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Extended Submission due:  March 27, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Extended Submission due:  March 27, 2018 (GMT)
• Notification:  April 25, 2018
• Camera-ready due:  May 10, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Extended deadline - Call for Papers]: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-03-05 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

E x t e n d e d D e a d l i n e

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Extended Submission due:  March 27, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Extended Submission due:  March 27, 2018 (GMT)
• Notification:  April 25, 2018
• Camera-ready due:  May 10, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [CFP]: 13th International Conference on Critical Information Infrastructures Security CRITIS 2018

2018-02-28 Thread Cristina Alcaraz

--
*** Apologies for multiple copies ***

C a l l F o r P a p e r s

13th International Conference on Critical Information Infrastructures 
Security CRITIS 2018

Kaunas, Lithuania, September 24-26, 2018

Full-text paper submission due: April 30, 2018

CONFERENCE OUTLINE:

CRITIS 2018 continues the tradition of presenting innovative research 
and exploring new challenges in the field of critical (information) 
infrastructures protection (C(I)IP), resilience and fostering the 
dialogue with stakeholders.


CRITIS 2018 aims at bringing together researchers, professionals from 
academia, critical (information) infrastructure operators, industry, 
defence sector and governmental organisations working in the field of 
the security of critical (information) infrastructure systems.


Moreover, CRITIS aims to encourage and inspire early stage and 
open-minded researchers in this demanding multi-disciplinary field of 
research. Outstanding research performance demonstrated by young 
researchers may compete for the Young CRITIS Award (YCA).


The Projects' Dissemination Session will be an opportunity of 
dissemination for ongoing European, multinational, and national 
projects, to share the experiences among scientist and experts working 
on different projects in the C(I)IP domain.


CRITIS 2018 conference has a special focus on current and future energy 
infrastructures within a special session Energy infrastructure operators 
and stakeholders: key challenges and solution directions, chaired by 
Marcelo Masera (EC Joint Research Centre in Petten, The Netherlands). 
Invited speakers will be mainly from European electricity and/or gas 
Transmission System Operators (TSO), some representatives from European 
electricity and gas Distributed System Operators (DSO), NATO and 
European policy-makers.


CRITIS 2018 topics (but not limited to): 
http://www.lei.lt/critis2018/call-for-papers.html


Special sessions will be organized by CRITIS 2018 Supporting Chairs:
- “Energy CIP”: Marcelo Masera, European Commission, Joint Research 
Centre, the Netherlands
- “CI Resilience”: Marianthi Theocharidou, European Commission, 
Joint Research Centre, Italy

- “Human Factor and CIP”: Grigore Havarneanu, UIC, France
- “SCADA Security”: Simin Nadjm-Tehrani, Linköping University, 
Sweden
- “Modelling and Simulation in CIP”: Erich Rome (President 2E!SAC), 
Fraunhofer IAIS, Germany
- “Interconnected Infrastructures and Systems of Systems”: Enrico 
Zio, Politecnico di Milano, Italy and Ecole Centrale Paris, France
- “IoT Security”: Sokratis K. Katsikas, NTNU, Norway and University 
of Piraeus, Greece


Call for Papers (PDF to download): 
http://www.lei.lt/critis2018/assets/critis_2018_call_for_papers.pdf


Accepted papers are to be included to post-proceedings, published by 
Springer-Verlag in their Lecture Notes in Computer Science (LNCS) 
series.


IMPORTANT DATES:


30 April 2018 -- Full-text submission
18 June 2018 -- Notification of acceptance
9 September 2018 -- Camera-ready papers

Programme Chair

- Eric Luiijf, TNO (retired) and Luiijf Consultancy, the Netherlands

Steering Committee Chairs
- Bernhard M. Hämmerli, Technical University Lucerne and ACRIS GmbH, 
Switzerland

- Javier Lopez, University of Malaga, Spain
- Stephen D. Wolthusen, Royal Holloway, University of London, UK and 
NTNU, Norway


Local Co-Chairs
- Inga Žutautaitė, Lithuanian Energy Institute, Lithuania
- Ričardas Krikštolaitis, Vytautas Magnus University, Lithuania

Publicity Chairs
- Cristina Alcaraz, University of Malaga, Spain
- Rolandas Urbonas, Lithuanian Energy Institute, Lithuania

CRITIS 2018 Secretary Office

Lithuanian Energy Institute
Breslaujos g. 3, Kaunas, Lithuania
Tel. +370 37 401948
 +370 37 401938
E-mail: critis2...@lei.lt

Conference website: www.lei.lt/critis2018
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Deadline Approaching: Feb, 28th] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-02-26 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Submission due:  Feb 28, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Submission due:  Feb 28, 2018 (GMT)
• Notification:  Mar 31, 2018
• Camera-ready due:  Apr 30, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Deadline Approaching: Feb, 28th] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-02-19 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Submission due:  Feb 28, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Submission due:  Feb 28, 2018 (GMT)
• Notification:  Mar 31, 2018
• Camera-ready due:  Apr 30, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Deadline Approaching: Feb, 28th] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-02-15 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Submission due:  Feb 28, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Submission due:  Feb 28, 2018 (GMT)
• Notification:  Mar 31, 2018
• Camera-ready due:  Apr 30, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Deadline Approaching] CFP: Workshop on Industrial Internet of Things Security (WIIoTS) 

2018-02-05 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Submission due:  Feb 16, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Submission due:  Feb 16, 2018 (GMT)
• Notification:  Mar 31, 2018
• Camera-ready due:  Apr 30, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Deadline Approaching] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-01-26 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Submission due:  Feb 16, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Submission due:  Feb 16, 2018 (GMT)
• Notification:  Mar 31, 2018
• Camera-ready due:  Apr 30, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Workshop on Industrial Internet of Things Security (WIIoTS)

2018-01-18 Thread Cristina Alcaraz

*** Apologies for multiple copies ***

C a l l F o r P a p e r s

Workshop on Industrial Internet of Things Security (WIIoTS)

Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit 
2018)


http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf

Submission due:  Feb 16, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in 
today’s (control) industry, comprising Internet-enabled cyber-physical 
devices with the ability to couple to the new interconnection 
technologies such as cloud/fog computing. Under this perspective, the 
new industrial cyber-physical “things” can be accessible and 
available from remote locations, the information of which can be 
processed and stored in distributed locations, favouring the 
cooperation, the performance in field, and the achievement of 
operational tasks working at optimal times. However, the incorporation 
of the IIoT in the new scenarios of the fourth industrial revolution, 
also known as Industry 4.0, entails having to consider the new security 
and privacy issues that can threaten the wellbeing of the new IIoT 
ecosystem and its coexistence with the existing industrial technologies, 
with a high risk of impact on the end-users.


Therefore, this workshop will create a collaboration platform for 
experts from academia, governments and industry to address the new IIoT 
security and privacy challenges. Papers related to security and privacy 
of embedded systems working in industrial and control environments, such 
as SCADA, smart grid, smart cities, manufacturing systems, water 
systems, and in critical infrastructures in general, are all welcome at 
WIIoTS 2018. The technical topics of interest for this workshop include, 
but are not limited to:


• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for 
IIoT

• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart 
factory, etc.


Important Dates:

• Submission due:  Feb 16, 2018 (GMT)
• Notification:  Mar 31, 2018
• Camera-ready due:  Apr 30, 2018

Program Chair:
==
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:

• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design 
(ISTD), Singapore)

• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:

• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:

Final submissions must not substantially overlap papers already or 
simultaneously submitted to a journal or a conference with proceedings. 
Their contents should be written in English with a maximum paper length 
of six (6) printed pages see web conference for instructions. Papers 
must be submitted through EDAS.


"IEEE reserves the right to exclude a paper from distribution after the 
conference, including IEEE Xplore® Digital Library, if the paper is not 
presented by the author at the conference."


Contact:

Email: alca...@lcc.uma.es
WIIoTS Home:  http://globaliotsummit.org
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] ESORICS 2017: Call for Participation

2017-08-30 Thread Cristina Alcaraz

==
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
==

WWW: https://www.ntnu.edu/web/esorics2017/

Overview

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.



ESORICS 2017 spans a total of 3 days, featuring:
  * 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
  * 54 paper presentations in 3 days (Sep 11-13)
  * 8 workshops (Sept 14 - 15)


Presentations Program

The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:


* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###
09:30 - 10:30
* Keynote: Cormac Herley
  - Justifying Security Measures - a Position Paper

11:00 - 12:30

* Session 1: Security of embedded things
  - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios

  Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
  - Analyzing the Capabilities of the CAN Attacker
  Sibylle Froeschle and Alexander Stühring
  - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
  Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan 
Katzenbeisser


* Session 2: Cryptographic Application I
  - Per-Session Security: Password-Based Cryptography Revisited
  Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
  - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
  Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
  - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
  Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart


14:00 - 15:30

* Session 3: Documents and Authorship
  - Identifying Multiple Authors in a Binary Program
  Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
  - Verifiable Document Redacting
  Herve Chabanne, Rodolphe Hugel and Julien Keuffer
  - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
  Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt


* Session 4: Analysis of Security Protocols
  - Automated analysis of equivalence properties for security protocols 
using else branches

   Ivan Gazeau and Steve Kremer and Levente Buttyán
  - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
  Cas Cremers, Martin Dehnel-Wild and Kevin Milner
  - Modular Verification of Protocol Equivalence in the Presence of 
Randomness

  Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
  - Preventing Advanced Persistent Threats in Complex Control Networks
  Juan E. Rubio, Cristina Alcaraz and Javier Lopez
  - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach

  - Is my attack tree correct?
  Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
  - On-Demand Time Blurring to Support Side-Channel Defense
   Weijie Liu, Debin Gao and Mike Reiter
  - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
  Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici

  - Practical Keystroke Timing Attacks in Sandboxed JavaScript
  Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, 
Clémentine Maurice and Stefan Mangard


### September 12 - Day 2 ###
09:00 - 10:00
* Keynote: Paul Syverson
  - The Once and Future Onion

10:30 - 12:00

* Session 7: Vulnerabilities and Malware
  - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for 
Android

  Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
  - VuRLE: Automatic Vulnerability Detection and Repair by Learning from 
Examples

  Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
  - Adversarial Examples for Malware

[Om-announce] ESORICS 2017: Call for Participation

2017-08-22 Thread Cristina Alcaraz

==
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
==

WWW: https://www.ntnu.edu/web/esorics2017/

Overview

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.



ESORICS 2017 spans a total of 3 days, featuring:
  * 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
  * 54 paper presentations in 3 days (Sep 11-13)
  * 8 workshops (Sept 14 - 15)


Presentations Program

The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:


* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###
09:30 - 10:30
* Keynote: Cormac Herley
  - Justifying Security Measures - a Position Paper

11:00 - 12:30

* Session 1: Security of embedded things
  - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios

  Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
  - Analyzing the Capabilities of the CAN Attacker
  Sibylle Froeschle and Alexander Stühring
  - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
  Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan 
Katzenbeisser


* Session 2: Cryptographic Application I
  - Per-Session Security: Password-Based Cryptography Revisited
  Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
  - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
  Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
  - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
  Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart


14:00 - 15:30

* Session 3: Documents and Authorship
  - Identifying Multiple Authors in a Binary Program
  Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
  - Verifiable Document Redacting
  Herve Chabanne, Rodolphe Hugel and Julien Keuffer
  - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
  Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt


* Session 4: Analysis of Security Protocols
  - Automated analysis of equivalence properties for security protocols 
using else branches

   Ivan Gazeau and Steve Kremer and Levente Buttyán
  - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
  Cas Cremers, Martin Dehnel-Wild and Kevin Milner
  - Modular Verification of Protocol Equivalence in the Presence of 
Randomness

  Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
  - Preventing Advanced Persistent Threats in Complex Control Networks
  Juan E. Rubio, Cristina Alcaraz and Javier Lopez
  - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach

  - Is my attack tree correct?
  Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
  - On-Demand Time Blurring to Support Side-Channel Defense
   Weijie Liu, Debin Gao and Mike Reiter
  - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
  Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici

  - Practical Keystroke Timing Attacks in Sandboxed JavaScript
  Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, 
Clémentine Maurice and Stefan Mangard


### September 12 - Day 2 ###
09:00 - 10:00
* Keynote: Paul Syverson
  - The Once and Future Onion

10:30 - 12:00

* Session 7: Vulnerabilities and Malware
  - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for 
Android

  Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
  - VuRLE: Automatic Vulnerability Detection and Repair by Learning from 
Examples

  Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
  - Adversarial Examples for Malware

[Om-announce] ESORICS 2017: Call for Participation

2017-08-08 Thread Cristina Alcaraz

==
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
==

WWW: https://www.ntnu.edu/web/esorics2017/

Overview

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.



ESORICS 2017 spans a total of 3 days, featuring:
  * 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
  * 54 paper presentations in 3 days (Sep 11-13)
  * NN workshops (Sept 14 - 15)


Registration

Early Registration for ESORICS+Workshops 2017 is open, but will end 
soon. Early registration deadline is ***August, 15th 2017***


Registration rates:
https://www.ntnu.edu/web/esorics2017/registration

If an invitation letter is needed (e.g. VISA) the letter will be 
provided after the registration. To do this, it is necessary to send an 
email to the organizing committee: mailto:esorics2...@ntnu.edu


Venue page:
https://www.ntnu.edu/web/esorics2017/venue

Travel and accommodation page:
https://www.ntnu.edu/web/esorics2017/travel-accomodation

We hope to see you in Oslo, Norway!


Presentations Program

The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:


* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###
09:30 - 10:30
* Keynote: Cormac Herley

11:00 - 12:30

* Session 1: Security of embedded things
  - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios

  Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
  - Analyzing the Capabilities of the CAN Attacker
  Sibylle Froeschle and Alexander Stühring
  - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
  André Schaller, Florian Kohnhäuser, Steffen Schulz and Stefan 
Katzenbeisser


* Session 2: Cryptographic Application I
  - Per-Session Security: Password-Based Cryptography Revisited
  Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
  - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
  Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
  - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
  Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart


14:00 - 15:30

* Session 3: Documents and Authorship
  - Identifying Multiple Authors in a Binary Program
  Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
  - Verifiable Document Redacting
  Herve Chabanne, Rodolphe Hugel and Julien Keuffer
  - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
  Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt


* Session 4: Analysis of Security Protocols
  - Automated analysis of equivalence properties for security protocols 
using else branches

   Ivan Gazeau and Steve Kremer and Levente Buttyán
  - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
  Cas Cremers, Martin Dehnel-Wild and Kevin Milner
  - Modular Verification of Protocol Equivalence in the Presence of 
Randomness

  Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
  - Preventing Advanced Persistent Threats in Complex Control Networks
  Juan E. Rubio, Cristina Alcaraz and Javier Lopez
  - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach

  - Is my attack tree correct?
  Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
  - On-Demand Time Blurring to Support Side-Channel Defense
   Weijie Liu, Debin Gao and Mike Reiter
  - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
  Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici

  - Practical Keystroke Timing Attacks in Sandboxed JavaScript

[Om-announce] [Extended deadline] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)

2017-07-24 Thread Cristina Alcaraz

*** Apologies for multiple copies ***




+Extended submission deadline:  July 31, 2017+


C a l l F o r P a p e r s

COMPUTER NETWORKS JOURNAL   -   Elsevier (New 2016 JCR Impact Factor: 
2.516)


Special Issue:   Security and Privacy in Cloud-Assisted Cyber-Physical 
Systems




Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling 
between embedded computing devices and their physical environment. CPSes 
can be viewed as the bridge between physical components/processes and 
the cyber space. Specifically, the notion of CPSes is to use computing 
(e.g. sensing, analyzing and predicting), communication (e.g. 
interaction, intervene and interface management), and controlling (e.g. 
inter-operation, evolving and evidence-based certification) to make 
intelligent and autonomous systems. Recent years have seen a dramatic 
rise in the development of CPSes services, including ubiquitous health 
care, smart electricity grid, and smart buildings. However, the 
fast-growing data volume is hard to process. The present CPSes cannot 
support ultra-fast computing, and thus it cannot provide real-time and 
reliable services to meet the requirements, which are essential for 
mission-critical systems. Fortunately, cloud infrastructures and 
platforms can provide flexible and on-demand processing power and 
high-capacity storage for data streams, as well as provisioning of a 
variety of services using telecommunication and networking technologies. 
Thus, the large-scale nature of CPSes can be effectively and efficiently 
supported and assisted by cloud systems, which is referred to as 
cloud-assisted CPSes (Cloud-CPS).


The coupling of cloud systems and CPSes, though advantageous, is subject 
to new forms of risks that have not been considered adequately in the 
traditional computing domain. CPSes often collect sensitive and private 
information about the physical environment. A loss of security for a CPS 
can therefore have significant negative impact including loss of 
privacy, potential physical harm, discrimination, and abuse. Though 
numerous security primitives have been developed in the cyber domain to 
address the very same problems, their applicability to the Cloud-CPSes 
domain is still questionable due to the reason that they are usually 
complex to implement and oblivious to cyber-physical interactions.


The goal of this special issue is to unveil and address the security and 
privacy aspects associated to the Cloud-CPeSs.


Suggested topics include, but are not limited to the following.

* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes

These topics remark the differences between the classical CPSes and 
Cloud-CPSes, and particularly when designing security and privacy 
solutions for specific Cloud-assisted CPSes applied in restricted 
environments with rigorous performance requirements and criticality in 
mind.


-
Important Dates
-
* Extended submission deadline: July 31, 2017
* Notification of acceptance: September 15, 2017
* Final manuscript due: October 15, 2017

-
Paper Submission Guidelines
-
All submitted papers to this special issue must be well written in 
English, and must be original and not be under review in any other 
journal or conference proceedings. When submitting their papers authors 
must select “Security in Cloud CPS” as the article type.


Submitted papers should be presented according to the journal style. For 
more detailed information regarding the requirements for submission, 
please refer to: 
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors.


Requests for additional information should be addressed to the guest 
editors.


-
Guest Editors
-
Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com
Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [CFR]: ESORICS+Workshops 2017 Registration is Open (Early-bird pricing through ***August, 15th 2017***)

2017-07-21 Thread Cristina Alcaraz

Dear colleagues,

We would like to invite you to join us at the 22nd European Symposium on 
Research in Computer Security (ESORICS) 2017 in Oslo, Norway!


ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.


Registration for ESORICS+Workshops 2017 is open, but will end soon. 
Early registration deadline is ***August, 15th 2017***


Registration rates:
https://www.ntnu.edu/web/esorics2017/registration

If an invitation letter is needed (e.g. VISA) the letter will be 
provided after the registration. To do this, it is necessary to send an 
email to the organizing committee: mailto:esorics2...@ntnu.edu


Venu page:
https://www.ntnu.edu/web/esorics2017/venue

Travel and accommodation page:
https://www.ntnu.edu/web/esorics2017/travel-accomodation

We hope to see you in Oslo, Norway!

--
Cristina Alcaraz
ESORICS 2017 Publicity Chair
University of Malaga
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [CFR]: ESORICS+Workshops 2017 Registration is Open (Early-bird pricing through ***August, 15th 2017***)

2017-07-10 Thread Cristina Alcaraz

Dear colleagues,

We would like to invite you to join us at the 22nd European Symposium on 
Research in Computer Security (ESORICS) 2017 in Oslo, Norway!


ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.


Registration for ESORICS+Workshops 2017 is open, but will end soon. 
Early registration deadline is ***August, 15th 2017***


Registration rates:
https://www.ntnu.edu/web/esorics2017/registration

If an invitation letter is needed (e.g. VISA) the letter will be 
provided after the registration. To do this, it is necessary to send an 
email to the organizing committee: mailto:esorics2...@ntnu.edu


Venu page:
https://www.ntnu.edu/web/esorics2017/venue

Travel and accommodation page:
https://www.ntnu.edu/web/esorics2017/travel-accomodation

We hope to see you in Oslo, Norway!

--
Cristina Alcaraz
ESORICS 2017 Publicity Chair
University of Malaga
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Extended deadline] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)

2017-06-30 Thread Cristina Alcaraz

*** Apologies for multiple copies ***




+Extended submission deadline:  July 31, 2017+


C a l l F o r P a p e r s

COMPUTER NETWORKS JOURNAL   -   Elsevier (New 2016 JCR Impact Factor: 
2.516)


Special Issue:   Security and Privacy in Cloud-Assisted Cyber-Physical 
Systems




Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling 
between embedded computing devices and their physical environment. CPSes 
can be viewed as the bridge between physical components/processes and 
the cyber space. Specifically, the notion of CPSes is to use computing 
(e.g. sensing, analyzing and predicting), communication (e.g. 
interaction, intervene and interface management), and controlling (e.g. 
inter-operation, evolving and evidence-based certification) to make 
intelligent and autonomous systems. Recent years have seen a dramatic 
rise in the development of CPSes services, including ubiquitous health 
care, smart electricity grid, and smart buildings. However, the 
fast-growing data volume is hard to process. The present CPSes cannot 
support ultra-fast computing, and thus it cannot provide real-time and 
reliable services to meet the requirements, which are essential for 
mission-critical systems. Fortunately, cloud infrastructures and 
platforms can provide flexible and on-demand processing power and 
high-capacity storage for data streams, as well as provisioning of a 
variety of services using telecommunication and networking technologies. 
Thus, the large-scale nature of CPSes can be effectively and efficiently 
supported and assisted by cloud systems, which is referred to as 
cloud-assisted CPSes (Cloud-CPS).


The coupling of cloud systems and CPSes, though advantageous, is subject 
to new forms of risks that have not been considered adequately in the 
traditional computing domain. CPSes often collect sensitive and private 
information about the physical environment. A loss of security for a CPS 
can therefore have significant negative impact including loss of 
privacy, potential physical harm, discrimination, and abuse. Though 
numerous security primitives have been developed in the cyber domain to 
address the very same problems, their applicability to the Cloud-CPSes 
domain is still questionable due to the reason that they are usually 
complex to implement and oblivious to cyber-physical interactions.


The goal of this special issue is to unveil and address the security and 
privacy aspects associated to the Cloud-CPeSs.


Suggested topics include, but are not limited to the following.

* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes

These topics remark the differences between the classical CPSes and 
Cloud-CPSes, and particularly when designing security and privacy 
solutions for specific Cloud-assisted CPSes applied in restricted 
environments with rigorous performance requirements and criticality in 
mind.


-
Important Dates
-
* Extended submission deadline: July 31, 2017
* Notification of acceptance: September 15, 2017
* Final manuscript due: October 15, 2017

-
Paper Submission Guidelines
-
All submitted papers to this special issue must be well written in 
English, and must be original and not be under review in any other 
journal or conference proceedings. When submitting their papers authors 
must select “Security in Cloud CPS” as the article type.


Submitted papers should be presented according to the journal style. For 
more detailed information regarding the requirements for submission, 
please refer to: 
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors.


Requests for additional information should be addressed to the guest 
editors.


-
Guest Editors
-
Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com
Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [Deadline approaching] CFP: The 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017)

2017-06-19 Thread Cristina Alcaraz

Dear Colleague,

apologies for multiple receptions of this message.

This message is to remind you that the deadline for submissions to 
CRITIS 2017 has been post-poned at June 23-rd.


This year the conference will take place in Lucca, a gorgeous 
Renaissance city in Tuscany, 9-11 October 2017.
A Young Critis Award will be awarded to the best contribution presented 
by a young author. Three finalists

will also receive reduced funds.

The attached Leaflet provides a preview of our invited speakers.

Looking forward to meeting you in Lucca
Best regards

The organizers:

Cristina Alcaraz, Hypatia Nassopoulos,
Grigore Havarneanu
Antonio Scala, Gregorio D’Agostino
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)

2017-06-09 Thread Cristina Alcaraz

*** Apologies for multiple copies ***



C a l l F o r P a p e r s

COMPUTER NETWORKS JOURNAL   -   Elsevier

Special Issue:   Security and Privacy in Cloud-Assisted Cyber-Physical 
Systems




Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling 
between embedded computing devices and their physical environment. CPSes 
can be viewed as the bridge between physical components/processes and 
the cyber space. Specifically, the notion of CPSes is to use computing 
(e.g. sensing, analyzing and predicting), communication (e.g. 
interaction, intervene and interface management), and controlling (e.g. 
inter-operation, evolving and evidence-based certification) to make 
intelligent and autonomous systems. Recent years have seen a dramatic 
rise in the development of CPSes services, including ubiquitous health 
care, smart electricity grid, and smart buildings. However, the 
fast-growing data volume is hard to process. The present CPSes cannot 
support ultra-fast computing, and thus it cannot provide real-time and 
reliable services to meet the requirements, which are essential for 
mission-critical systems. Fortunately, cloud infrastructures and 
platforms can provide flexible and on-demand processing power and 
high-capacity storage for data streams, as well as provisioning of a 
variety of services using telecommunication and networking technologies. 
Thus, the large-scale nature of CPSes can be effectively and efficiently 
supported and assisted by cloud systems, which is referred to as 
cloud-assisted CPSes (Cloud-CPS).


The coupling of cloud systems and CPSes, though advantageous, is subject 
to new forms of risks that have not been considered adequately in the 
traditional computing domain. CPSes often collect sensitive and private 
information about the physical environment. A loss of security for a CPS 
can therefore have significant negative impact including loss of 
privacy, potential physical harm, discrimination, and abuse. Though 
numerous security primitives have been developed in the cyber domain to 
address the very same problems, their applicability to the Cloud-CPSes 
domain is still questionable due to the reason that they are usually 
complex to implement and oblivious to cyber-physical interactions.


The goal of this special issue is to unveil and address the security and 
privacy aspects associated to the Cloud-CPeSs.


Suggested topics include, but are not limited to the following.

* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes

These topics remark the differences between the classical CPSes and 
Cloud-CPSes, and particularly when designing security and privacy 
solutions for specific Cloud-assisted CPSes applied in restricted 
environments with rigorous performance requirements and criticality in 
mind.


-
Important Dates
-
* Submission deadline: June 30, 2017
* Notification of acceptance: August 31, 2017
* Final manuscript due: October 15, 2017

-
Paper Submission Guidelines
-
All submitted papers to this special issue must be well written in 
English, and must be original and not be under review in any other 
journal or conference proceedings. When submitting their papers authors 
must select “Security in Cloud CPS” as the article type.


Submitted papers should be presented according to the journal style. For 
more detailed information regarding the requirements for submission, 
please refer to: 
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors.


Requests for additional information should be addressed to the guest 
editors.


-
Guest Editors
-
Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com
Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)

2017-05-16 Thread Cristina Alcaraz

*** Apologies for multiple copies ***



C a l l F o r P a p e r s

COMPUTER NETWORKS JOURNAL   -   Elsevier

Special Issue:   Security and Privacy in Cloud-Assisted Cyber-Physical 
Systems




Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling 
between embedded computing devices and their physical environment. CPSes 
can be viewed as the bridge between physical components/processes and 
the cyber space. Specifically, the notion of CPSes is to use computing 
(e.g. sensing, analyzing and predicting), communication (e.g. 
interaction, intervene and interface management), and controlling (e.g. 
inter-operation, evolving and evidence-based certification) to make 
intelligent and autonomous systems. Recent years have seen a dramatic 
rise in the development of CPSes services, including ubiquitous health 
care, smart electricity grid, and smart buildings. However, the 
fast-growing data volume is hard to process. The present CPSes cannot 
support ultra-fast computing, and thus it cannot provide real-time and 
reliable services to meet the requirements, which are essential for 
mission-critical systems. Fortunately, cloud infrastructures and 
platforms can provide flexible and on-demand processing power and 
high-capacity storage for data streams, as well as provisioning of a 
variety of services using telecommunication and networking technologies. 
Thus, the large-scale nature of CPSes can be effectively and efficiently 
supported and assisted by cloud systems, which is referred to as 
cloud-assisted CPSes (Cloud-CPS).


The coupling of cloud systems and CPSes, though advantageous, is subject 
to new forms of risks that have not been considered adequately in the 
traditional computing domain. CPSes often collect sensitive and private 
information about the physical environment. A loss of security for a CPS 
can therefore have significant negative impact including loss of 
privacy, potential physical harm, discrimination, and abuse. Though 
numerous security primitives have been developed in the cyber domain to 
address the very same problems, their applicability to the Cloud-CPSes 
domain is still questionable due to the reason that they are usually 
complex to implement and oblivious to cyber-physical interactions.


The goal of this special issue is to unveil and address the security and 
privacy aspects associated to the Cloud-CPeSs.


Suggested topics include, but are not limited to the following.

* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes

These topics remark the differences between the classical CPSes and 
Cloud-CPSes, and particularly when designing security and privacy 
solutions for specific Cloud-assisted CPSes applied in restricted 
environments with rigorous performance requirements and criticality in 
mind.


-
Important Dates
-
* Submission deadline: June 30, 2017
* Notification of acceptance: August 31, 2017
* Final manuscript due: October 15, 2017

-
Paper Submission Guidelines
-
All submitted papers to this special issue must be well written in 
English, and must be original and not be under review in any other 
journal or conference proceedings. When submitting their papers authors 
must select “Security in Cloud CPS” as the article type.


Submitted papers should be presented according to the journal style. For 
more detailed information regarding the requirements for submission, 
please refer to: 
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors.


Requests for additional information should be addressed to the guest 
editors.


-
Guest Editors
-
Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com
Erich Rome, Fraunhofer, erich.r...@iais.fraunhofer.de
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)

2017-05-02 Thread Cristina Alcaraz

*** Apologies for multiple copies ***



C a l l F o r P a p e r s

COMPUTER NETWORKS JOURNAL   -   Elsevier

Special Issue:   Security and Privacy in Cloud-Assisted Cyber-Physical 
Systems




Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling 
between embedded computing devices and their physical environment. CPSes 
can be viewed as the bridge between physical components/processes and 
the cyber space. Specifically, the notion of CPSes is to use computing 
(e.g. sensing, analyzing and predicting), communication (e.g. 
interaction, intervene and interface management), and controlling (e.g. 
inter-operation, evolving and evidence-based certification) to make 
intelligent and autonomous systems. Recent years have seen a dramatic 
rise in the development of CPSes services, including ubiquitous health 
care, smart electricity grid, and smart buildings. However, the 
fast-growing data volume is hard to process. The present CPSes cannot 
support ultra-fast computing, and thus it cannot provide real-time and 
reliable services to meet the requirements, which are essential for 
mission-critical systems. Fortunately, cloud infrastructures and 
platforms can provide flexible and on-demand processing power and 
high-capacity storage for data streams, as well as provisioning of a 
variety of services using telecommunication and networking technologies. 
Thus, the large-scale nature of CPSes can be effectively and efficiently 
supported and assisted by cloud systems, which is referred to as 
cloud-assisted CPSes (Cloud-CPS).


The coupling of cloud systems and CPSes, though advantageous, is subject 
to new forms of risks that have not been considered adequately in the 
traditional computing domain. CPSes often collect sensitive and private 
information about the physical environment. A loss of security for a CPS 
can therefore have significant negative impact including loss of 
privacy, potential physical harm, discrimination, and abuse. Though 
numerous security primitives have been developed in the cyber domain to 
address the very same problems, their applicability to the Cloud-CPSes 
domain is still questionable due to the reason that they are usually 
complex to implement and oblivious to cyber-physical interactions.


The goal of this special issue is to unveil and address the security and 
privacy aspects associated to the Cloud-CPeSs.


Suggested topics include, but are not limited to the following.

* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes

These topics remark the differences between the classical CPSes and 
Cloud-CPSes, and particularly when designing security and privacy 
solutions for specific Cloud-assisted CPSes applied in restricted 
environments with rigorous performance requirements and criticality in 
mind.


-
Important Dates
-
* Submission deadline: June 30, 2017
* Notification of acceptance: August 31, 2017
* Final manuscript due: October 15, 2017

-
Paper Submission Guidelines
-
All submitted papers to this special issue must be well written in 
English, and must be original and not be under review in any other 
journal or conference proceedings. When submitting their papers authors 
must select “Security in Cloud CPS” as the article type.


Submitted papers should be presented according to the journal style. For 
more detailed information regarding the requirements for submission, 
please refer to: 
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors.


Requests for additional information should be addressed to the guest 
editors.


-
Guest Editors
-
Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com
Eric Rome, Fraunhofer, erich.r...@iais.fraunhofer.de
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)

2017-05-01 Thread Cristina Alcaraz

*** Apologies for multiple copies ***



C a l l F o r P a p e r s

COMPUTER NETWORKS JOURNAL   -   Elsevier

Special Issue:   Security and Privacy in Cloud-Assisted Cyber-Physical 
Systems




Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling 
between embedded computing devices and their physical environment. CPSes 
can be viewed as the bridge between physical components/processes and 
the cyber space. Specifically, the notion of CPSes is to use computing 
(e.g. sensing, analyzing and predicting), communication (e.g. 
interaction, intervene and interface management), and controlling (e.g. 
inter-operation, evolving and evidence-based certification) to make 
intelligent and autonomous systems. Recent years have seen a dramatic 
rise in the development of CPSes services, including ubiquitous health 
care, smart electricity grid, and smart buildings. However, the 
fast-growing data volume is hard to process. The present CPSes cannot 
support ultra-fast computing, and thus it cannot provide real-time and 
reliable services to meet the requirements, which are essential for 
mission-critical systems. Fortunately, cloud infrastructures and 
platforms can provide flexible and on-demand processing power and 
high-capacity storage for data streams, as well as provisioning of a 
variety of services using telecommunication and networking technologies. 
Thus, the large-scale nature of CPSes can be effectively and efficiently 
supported and assisted by cloud systems, which is referred to as 
cloud-assisted CPSes (Cloud-CPS).


The coupling of cloud systems and CPSes, though advantageous, is subject 
to new forms of risks that have not been considered adequately in the 
traditional computing domain. CPSes often collect sensitive and private 
information about the physical environment. A loss of security for a CPS 
can therefore have significant negative impact including loss of 
privacy, potential physical harm, discrimination, and abuse. Though 
numerous security primitives have been developed in the cyber domain to 
address the very same problems, their applicability to the Cloud-CPSes 
domain is still questionable due to the reason that they are usually 
complex to implement and oblivious to cyber-physical interactions.


The goal of this special issue is to unveil and address the security and 
privacy aspects associated to the Cloud-CPeSs.


Suggested topics include, but are not limited to the following.

* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes

These topics remark the differences between the classical CPSes and 
Cloud-CPSes, and particularly when designing security and privacy 
solutions for specific Cloud-assisted CPSes applied in restricted 
environments with rigorous performance requirements and criticality in 
mind.


-
Important Dates
-
* Submission deadline: June 30, 2017
* Notification of acceptance: August 31, 2017
* Final manuscript due: October 15, 2017

-
Paper Submission Guidelines
-
All submitted papers to this special issue must be well written in 
English, and must be original and not be under review in any other 
journal or conference proceedings. When submitting their papers authors 
must select “Security in Cloud CPS” as the article type.


Submitted papers should be presented according to the journal style. For 
more detailed information regarding the requirements for submission, 
please refer to: 
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors.


Requests for additional information should be addressed to the guest 
editors.


-
Guest Editors
-
Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com
Eric Rome, Fraunhofer, erich.r...@iais.fraunhofer.de
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)

2017-04-18 Thread Cristina Alcaraz
ity, Greece
Vijay Varadharajan, Macquarie University, Australia
Luca Viganò, King's College London, UK
Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Ben Smyth, Huawei, France
Edgar Weippl, SBA Research, Austria
Stephen Wolthusen, Royal Holloway university, UK
Christos Xenakis, University of Piraeus, Greece
Jeff Yan, Lancaster University, UK
Meng Yu, University of Texas at San Antonio, USA
Ben Zhao, University of California at Santa Barbara, USA
Jianying Zhou, Singapore University of Technology and Design, Singapore
Jörg Schwenk, Ruhr-Universität, Bochum

Publicity Chair

* Cristina Alcaraz, University of Malaga, Spain
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)

2017-04-03 Thread Cristina Alcaraz
ity, Greece
Vijay Varadharajan, Macquarie University, Australia
Luca Viganò, King's College London, UK
Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Ben Smyth, Huawei, France
Edgar Weippl, SBA Research, Austria
Stephen Wolthusen, Royal Holloway university, UK
Christos Xenakis, University of Piraeus, Greece
Jeff Yan, Lancaster University, UK
Meng Yu, University of Texas at San Antonio, USA
Ben Zhao, University of California at Santa Barbara, USA
Jianying Zhou, Singapore University of Technology and Design, Singapore
Jörg Schwenk, Ruhr-Universität, Bochum

Publicity Chair

* Cristina Alcaraz, University of Malaga, Spain
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)

2017-03-21 Thread Cristina Alcaraz
ity, Greece
Vijay Varadharajan, Macquarie University, Australia
Luca Viganò, King's College London, UK
Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Ben Smyth, Huawei, France
Edgar Weippl, SBA Research, Austria
Stephen Wolthusen, Royal Holloway university, UK
Christos Xenakis, University of Piraeus, Greece
Jeff Yan, Lancaster University, UK
Meng Yu, University of Texas at San Antonio, USA
Ben Zhao, University of California at Santa Barbara, USA
Jianying Zhou, Singapore University of Technology and Design, Singapore
Jörg Schwenk, Ruhr-Universität, Bochum

Publicity Chair

* Cristina Alcaraz, University of Malaga, Spain
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017)

2017-03-16 Thread Cristina Alcaraz
ity, Greece
Vijay Varadharajan, Macquarie University, Australia
Luca Viganò, King's College London, UK
Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Ben Smyth, Huawei, France
Edgar Weippl, SBA Research, Austria
Stephen Wolthusen, Royal Holloway university, UK
Christos Xenakis, University of Piraeus, Greece
Jeff Yan, Lancaster University, UK
Meng Yu, University of Texas at San Antonio, USA
Ben Zhao, University of California at Santa Barbara, USA
Jianying Zhou, Singapore University of Technology and Design, Singapore
Jörg Schwenk, Ruhr-Universität, Bochum

Publicity Chair

* Cristina Alcaraz, University of Malaga, Spain
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] The International Conference on Critical Information Infrastructures Security (CRITIS 2017)

2017-02-14 Thread Cristina Alcaraz

Dear CRITIS Community and CI(I)P Community in general,

The International Conference on Critical Information Infrastructures 
Security (CRITIS 2017) reaches its 12th anniversary this year. After 
several successful editions in the past, CRITIS continues the tradition 
of presenting innovative research and exploring new challenges in the 
field of critical (information) infrastructures protection (C(I)IP) and 
fostering the dialogue with stakeholders.


The event will take place in Lucca from Oct 9th to 11th with the 
following thematic sessions:


CS  Cyber Security
HF  Human Factors
TR  Transport
EM  Emergency Management
UR  Urban Resilience
IS  Trust and Information Sharing

Together with CRITIS, and in the line with the tradition, Satellite 
Workshops with take place just after the main conference, from Oct 12th 
to 13th.  Moreover, apart from the traditional sessions where original 
works and significant improvements will be presented, there will be 
other sessions devoted to Ongoing Projects and Operators.


Given this, we invite to participate in where the event will serve to 
meet and exchange ideas and concerns with experts in the field.


For any other information of the event, do not hesitate to check the 
official website at: http://www.critis2017.org


Looking forward to seeing you at CRITIS 2017!

Yours sincerely,

Programme Chairs
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce