Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:12/22/08

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 2008

ICISS 2008 4th International Conference on Information Systems Security, Hyderabad, India, December 16-20, 2008. [posted here 4/7/08]
The ICISS 2008 encourages submissions from academia, industry and government addressing theoretical and practical problems in information and systems security and related areas. Topics of interest include but are not limited to:
- Application Security
- Authentication and Access Control
- Biometric Security
- Data Security
- Digital Forensics and Diagnostics
- Digital Rights Management
- Distributed System Security
- Formal Methods in Security
- Intrusion Detection, Prevention and Response
- Intrusion Tolerance and Recovery
- Key Management and Cryptographic Protocols
- Language-based Security
- Malware Analysis and Mitigation
- Network Security
- Operating System Security
- Privacy and Anonymity
- Security in P2P, Sensor and Ad Hoc Networks
- Software Security
- Vulnerability Detection and Mitigation
- Web Security

For more information, please see http://www.seclab.cs.sunysb.edu/iciss08/.

Inscrypt 2008 4th International Conferences on Information Security and Cryptology, Beijing, China, December 14-17, 2008. [posted here 7/14/08]
Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:
- Access Control
- Authentication and Authorization
- Biometric Security
- Distributed System Security
- Database Security
- Electronic Commerce Security
- Intrusion Detection
- Information Hiding and Watermarking
- Key Management and Key Recovery
- Network Security
- Security Protocols and Their Analysis
- Security Modeling and Architectures
- Provable Security
- Secure Multiparty Computation
- Foundations of Cryptography
- Secret Key and Public Key Cryptosystems
- Implementation of Cryptosystems
- Hash Functions and MACs
- Block Cipher Modes of Operation
- Intellectual Property Protection
- Mobile System Security
- Operating System Security
- Risk Evaluation and Security Certification
- Prevention and Detection of Malicious Codes

For more information, please see http://www.inscrypt.cn/inscrypt/.

DSSC 2008 1st International Workshop on Dependable and Secure Services Computing, Held in conjunction with IEEE APSCC 2008, Yilan, Taiwan, December 9-12, 2008. [posted here 6/9/08]
Service-Oriented Computing (SOC) is an emerging paradigm that puts Technology, Business, and People altogether. Since SOC is reshaping the modern business model and services industry, security and dependability are becoming crucial issues. The prime goal of DSSC lies in associating Services Computing with higher level of dependability and security. More specifically, we aim to provide a platform for researchers in the dependability and security communities to interact with researchers in the SOC community, so that efficacious cross pollination of ideas could occur between these areas. We encourage submissions from both industry and academia. The topics of interest of ISC include, but are not limited to, the following:
System and Service Dependability
- Architectural and Operating System Support for Services Computing
- Self-Reconfiguration Systems for Services Computing
- Architectural and System-Level Synthesis
- System Dependability Modeling and Prediction
- Scalable Techniques for Providing High Availability and Reliability
- Verification and Validation Methodology for Services Computing
- Time-Critical Services
- Safety-Critical Services
- Resource Management for Services Computing
- Automated Failure Management
- Middleware for Services Computing
Security Issues and Concerns
- Service Authentication
- Service Authorization
- Privacy And Anonymity in Services Computing
- Intrusion Detection in Services Computing
- Specification And Querying of Security Constraints
- Cryptographic Protocols for Services Computing
- Role Based Access Control for Services Computing
- Identity Assertion and Service Auditing
- Services and XML Based Security Standards
- Access Control for Services Computing
- Formal Methods for Security Deployment
- Secure Service Deployment
- Credential and Role Mapping for Services Computing
Quality of Service
- Performance Analysis, Evaluation, and Prediction
- Benchmarking of Management Technologies
- Service Auditing
- Service Resource Provisioning
- QoS Negotiation and Cost of Services (CoS)
- Empirical Studies and Benchmarking of QoS
- Autonomic Management of Service Levels
- Monitoring for (Composed) Services
- Return on Investment (ROI) Analysis
- Validation of Service and Quality Claims
- SLA and Policy Specification and Enactment
- QoS-Aware Selection Model for Semantic Web Services
- Real-Time Supply Chain Integration Applications of Dependable and Secure Services
- E-Commerce Dependability
- Firewall Technologies
- Open/Dynamic Grid Service Architectures
- Grid Service Deployment and Service Registries
- Grid Computing and Services On-Demand
- Peer-to-Peer Virtual Repository
- Mobile, Ad-Hoc, and Peer-To-Peer Services
- Secure Web Services

For more information, please see http://6book.niu.edu.tw/DSSC08.

ACSAC 2008 24th Annual Computer Security Applications Conference, Anaheim, California, December 8-12, 2008. [posted here 4/21/08]
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. Papers offering novel contributions in any aspect of computer and application security are solicited. Papers may present technique, applications, or practical experience, or theory that has a clear practical impact. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application. Topics of interest include, but are not limited to:
- access control
- applied cryptography
- audit and audit reduction
- biometrics
- boundary control devices
- certification and accreditation
- database security
- defensive information warfare
- denial of service protection
- electronic commerce security
- enterprise security
- forensics
- identification and authentication
- identity management
- incident response planning
- information survivability
- insider threat protection
- integrity
- intellectual property rights protection
- intrusion detection
- malware
- multimedia security
- operating systems security
- peer-to-peer security
- privacy and anonymity
- product evaluation criteria and compliance
- risk/vulnerability assessment
- secure location services
- security engineering and management
- security in IT outsourcing
- service oriented architectures
- software assurance
- trust management
- virtualization security
- voip security

For more information, please see http://www.acsac.org.

NSP 2008 1st International Workshop on Network Security and Privacy, Held in conjunction with the IEEE IPCCC 2008, Austin, Texas, USA, December 7-9, 2008. [posted here 9/15/08]
This workshop provides a forum for academia, industry, and government agencies to discuss the challenges involved in network security and privacy. The workshop will identify and define new network security vulnerabilities, fundamental privacy issues and potential solutions. Contributions of all types including case studies and research, addressing the main focus or one of following non-exclusive list of topics are equally welcome:
- Anonymous communications
- BGP security
- Botnets and counter-measures
- Covert Channels
- Denial of service attacks
- DNS security
- Email spam
- Firewall and traffic monitoring
- Honeypot/honeynet
- Internet Worms and Virus
- On-line Frauds
- Malware and Spyware
- Network forensic
- Network intrusion detection and prevention
- Network security policy
- Phishing attacks
- P2P security
- RFID security
- Security Testbeds, benchmarks, prototypes and experimental studies
- Security and privacy in wireless and sensor networks
- Social network privacy and security
- User authentication and authorization
- Web security

For more information, please see http://www.ipccc.org/ipccc2008/main.php?page=6#workshop4.

MidSec 2008 1st International Workshop on Middleware Security, Held in conjunction with the 9th ACM International Middleware Conference (MIDDLEWARE 2008), Leuven, Belgium, December 2, 2008. [posted here 6/2/08]
Modern applications are more and more predominantly built around distributed programming paradigms. Event-based systems, mobile agent frameworks, peer-to-peer networks, grid computing, and Web service applications are examples of architectures that are used by a large share of the present software base. These paradigms expose applications to new, ever-growing security threats. For this reason, middleware platforms have always been mindful about offering out-of-the-box security services like communication encryption, user authentication, and access control. Such features are now considered commodities in many middleware platforms, e.g., CORBA, Java EE, and .NET. However, focused research is still necessary to address advanced areas of security. Examples are identity management, privacy and anonymity, accountability, application protection, and so on. The goal of this workshop is to provide a venue for the security and the middleware communities to collaborate and create new momentum for the topic area. Original submissions are welcome from both academic and industry experts. The topics of interest include, but are not limited to:
- Middleware security: middleware software is an asset on its own and has to be protected.
- Security co-design: trade-off and co-design between application-based and middleware-based security.
- Context-sensitive security middleware: advanced security services and features offered by the middleware layer to pervasive and situated systems.
- Policy-based management: innovative support for policy-based definition and enforcement of security concerns.
- Security features: interaction between security-specific and other middleware features, e.g., context-awareness.
- Advanced identification and authentication mechanisms: e.g., means to capture application-specific constraints in defining and enforcing access control rules.
- Availability: protection of availability of middleware services.
- Security in agent-based platforms: protection for mobile code and platforms.
- Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects.
- Middleware-oriented security patterns: identification of patterns for sound, reusable security.
- Middleware-level security monitoring and measurement: metrics and mechanisms for quantification and evaluation of security enforced by the middleware.

For more information, please see http://www.cs.kuleuven.be/conference/MidSec2008/.

Globecom-CCNS 2008 Computer and Communications Network Security Symposium, Held in conjunction with the IEEE Global Communications Conference (GLOBECOM 2008), New Orleans, LA, USA, November 30 - December 4, 2008. [posted here 1/7/08]
The Computer and Communications Network Security Symposium will address all aspects of the modelling, design, implementation,deployment, and management of computer/network security algorithms, protocols,architectures, and systems. Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security mechanisms for current technologies as well as devising efficient security and privacy solutions for emerging technologies are solicited. Topics of interest include:
- Secure PHY, MAC, Routing and Upper Layer Protocols
- Secure Cross Layer Design
- Authentication Protocols and Services Authorization
- Confidentiality
- Data and System Integrity
- Availability of Secure Services
- Key Distribution and Management
- PKI and Security Management
- Trust Models and Trust Establishment
- Identity Management and Access Control
- Deployment and Management of Computer/Network Security Policies
- Monitoring Design for Security
- Distributed Intrusion Detection Systems and Countermeasures
- Traffic Filtering and Firewalling
- IPv6 security, IPSec
- Virtual Private Networks (VPNs)
- Prevention, Detection and Reaction Design
- Revocation of Malicious Parties
- Light-Weight Cryptography
- Quantum Cryptography and QKD
- Applications of Cryptography and Cryptanalysis in communications security
- Security and Mobility
- Mobile Code Security
- Network traffic Analysis Techniques
- Secure Naming and Addressing (Privacy and Anonymity)
- Application/Network Penetration Testing
- Advanced Cryptographic Testbeds
- Network Security Metrics and Performance Evaluation
- Operating System(OS) Security and Log Analysis Tools
- Security Modelling and Protocol Design
- Security Specification Techniques
- Self-Healing Networks
- Smart Cards and Secure Hardware
- Biometric Security: Technologies, Risks and Vulnerabilities
- Information Hiding and Watermarking
- Vulnerability, Exploitation Tools, and Virus/Worm Analysis
- Distributed Denial-Of-Service (DDOS) Attacks and Countermeasures
- DNS Spoofing and Security
- Critical infrastructure Security
- Single- and Multi-Source Intrusion Detection and Response (Automation)
- Web, E-commerce, M-commerce, and E-mail Security
- New Design for Unknown Attacks Detection

For more information, please see http://www.comsoc.org/confs/globecom/2008/symposium/compcom.html.

IWSEC 2008 3rd International Workshop on Security, Kagawa, Japan, November 25-27, 2008. [posted here 1/17/08]
The aim of IWSEC2008 is to contribute to security research and development addressing the topics from traditional theory and tools on security to other up-to-date issues. Topics include but are not limited to:
- Cryptography
- Authorization and Access Control
- Biometrics
- Information Hiding
- Quantum Security
- Network and Distributed Systems Security
- Privacy Enhancing Technology
- Security Issues in Ubiquitous/Pervasive Computing
- Security Management
- Software and System Security
- Protection of Critical Infrastructure
- Digital Forensics
- Economics and Other Scientific Approaches for Security

For more information, please see http://www.iwsec.org.

ALICS 2008 Workshop on Applications of Logic in Computer Security, Held in conjunction with the 15th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR 2008), Doha, Qatar, November 22, 2008. [posted here 8/11/08]
ALICS is intended to be an informal workshop devoted to the applications of logic in computer security. This workshop is intended for presentation and discussion of work in progress and the discussion of emerging and foundational ideas. We are interested in all aspects of the application of logic to computer security. Applications of interest include security policy, access control, security protocols, information flow, but we are also interested in new and as yet untried applications of logic to different areas of computer security. We are also interested in discussion papers that raise fundamental questions and/or suggest new lines of research in this area. Work that has already appeared or is under consideration by other venues is welcome.

For more information, please see http://chacs.nrl.navy.mil/projects/ALICS08/.

TrustCom 2008 The 2008 International Symposium on Trusted Computing, Central South University, Zhang Jia Jie, China, November 18-20, 2008. [posted here 4/28/08]
This symposium, held in conjunction with The 9th International Conference for Young Computer Scientists (ICYCS 2008), brings together researchers and engineers from academia, government and industry working on topics of trusted computing with regard to security, safety, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks. The aim is to provide a forum for them to present and discuss emerging ideas and trends in this highly challenging research field. Main topics of interest include, but are not limited to:
- Semantics, metrics and models of trust
- Trust establishment, propagation, and management
- Trusted computing platform
- Trusted network computing
- Trusted operating system
- Trusted software
- Trusted database
- Trusted services and applications
- Trust in e-commerce and e-government
- Trust in mobile and wireless networks
- Cryptography and security protocols
- Reliable and fault-tolerant computer systems/networks
- Survivable computer systems/networks
- Authentication in computer systems/networks
- Access control in computer systems/networks
- Key management in computer systems/networks

For more information, please see http://trust.csu.edu.cn/conference/trustcom2008/.

SERENE 2008 RISE/EFTS Joint International Workshop on Software Engineering for REsilieNt systEms, Newcastle upon Tyne, UK, November 17-19, 2008. [posted here 4/21/08]
The SERENE 2008 workshop is an international forum for researchers and practitioners interested in the advances in Software Engineering for Resilient Systems. SERENE 2008 views resilient systems as open distributed systems that have capabilities to dynamically adapt, in a predictable way, to unexpected and harmful events, including faults and errors. Engineering such systems is a challenging issue which needs urgent attention from and combined efforts by people working in various domains. Achieving this objective is a very complex task, since it implies reasoning explicitly and in a consistent way about systems functional and non-functional characteristics. SERENE advocates the idea that resilience should be explicitly included into traditional software engineering theories and practices and should become an integral part of all steps of software development. As current software engineering practices tend to either capture only normal behaviour, or to deal with all abnormal situations only at the late development phases, new software engineering methods and tools need to be developed to support explicit handling of abnormal situations through the whole software life cycle. Moreover, every phase of the software development process needs to be enriched with the phase-specific resilience means. The following constitutes a list of the key software engineering domains that the SERENE workshop will focus on. This list should not, however, be considered as closed or technically restrictive:
- Formal and semi-formal modelling of resilience properties
- Re-engineering for resilience
- Software development processes for resilience
- Requirement engineering processes for resilience
- Model Driven Engineering of resilient systems
- Verification and validation of resilient systems
- Error and fault handling in the software life-cycle
- Resilience through exception handling in the software life-cycle
- Frameworks and design patterns for resilience
- Software architectures for resilience
- Component-based development and resilience
- System structuring for resilience
- Atomic actions
- Dynamic resilience mechanisms
- Resilience prediction
- Resilience metadata
- Reasoning and adaptation services for improving and ensuring resilience
- Intelligent and adaptive approaches to engineering resilient systems
- Engineering of self-healing autonomic systems
- Dynamic reconfiguration for resilience
- Run-time management of resilience requirements
- CASE tools for developing resilient systems

For more information, please see http://serene2008.uni.lu.

STM 2008 4th International Workshop on Security and Trust Management, Held in conjunction with the IFIP TM 2008, Trondheim, Norway, November 16-17, 2008. [posted here 4/14/08]
STM08 is the fourth international workshop under the auspices of the Security and Trust Management working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2008 has at least the following aims: (1) To investigate the foundations and applications of security and trust in ICT; (2) To study the deep interplay between trust management and common security issues such as confidentiality, integrity and availability; (3) To identify and promote new areas of research connected with security management, e.g. dynamic and mobile coalition management (e.g., P2P, MANETs, Web/GRID services); (4) To identify and promote new areas of research connected with trust management, e.g. reputation, recommendation, collaboration etc.; and (5)To provide a platform for presenting and discussing emerging ideas and trends. Topics of interest include but are not limited to:
- Semantics and computational models for security and trust
- Security and trust management architectures, mechanisms and policies
- Software engineering for security, trust and privacy
- Networked systems security
- Privacy and anonymity
- Identity management
- ICT for securing digital as well as physical assets
- Cryptography

For more information, please see http://www.isac.uma.es/stm08.

TrustCol 2008 3rd International Workshop on Trusted Collaboration, Held in conjunction with IEEE CollaborateCom, The Regal Sun Resort, Orlando, Florida, USA, November 13-16, 2008. [posted here 9/8/08]
The ongoing, rapid developments in information systems technologies and networking have enabled significant opportunities for streamlining decision making processes and maximizing productivity through distributed collaborations that facilitate unprecedented levels of sharing of information and computational resources. Emerging collaborative environments need to provide efficient support for seamless integration of heterogeneous technologies such as mobile devices and infrastructures, web services, grid computing systems, online social networks, various operating environments, and diverse COTS products. Such heterogeneity introduces, however, significant security and privacy challenges for distributed collaborative applications. Balancing the competing goals of collaboration and security is difficult because interaction in collaborative systems is targeted towards making people, information, and resources available to all who need it whereas information security seeks to ensure the availability, confidentiality, and integrity of these elements while providing it only to those with proper trustworthiness. The key goal of this workshop is to foster active interactions among diverse researchers and practitioners, and generate added momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative systems and infrastructures. We solicit unpublished research papers that address theoretical issues and practical implementations/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are not limited to:
- Secure dynamic coalition environments
- Secure distributed multimedia collaboration
- Privacy control in collaborative environments
- Secure workflows for collaborative computing
- Policy-based management of collaborative workspace
- Secure middleware for large scale collaborative infrastructures
- Security and privacy issues in mobile collaborative applications
- Security frameworks and architectures for trusted collaboration
- Secure interoperation in multidomain collaborative environments
- Identity management for large scale collaborative infrastructures
- Semantic web technologies for secure collaborative infrastructure
- Trust models, trust negotiation/management for collaborative systems
- Access control models and mechanisms for collaboration environments
- Protection models and mechanisms for peer-to-peer collaborative environments
- Delegation, accountability, and information flow control in collaborative applications
- Intrusion detection, recovery and survivability of collaborative systems/infrastructures
- Security of web services and grid technologies for supporting multidomain collaborative applications

For more information, please see http://www.sis.uncc.edu/~mshehab/trustcol08/.

IWDW 2008 7th International Workshop on Digital Watermarking, Busan, Korea, November 10-12, 2008. [posted here 6/16/08]
IWDW 2008 is the seventh of a series of international work-shops focusing on digital watermarking and relevant techniques. It will provide an excellent opportunity for researchers and practitioners to present as well as to keep abreast with the latest developments in watermarking technologies. IWDW 2008 aims to provide a high quality forum for dissemination of research results. Areas of interest include, but are not limited to:
- Mathematical modeling of embedding and detection
- Information theoretic, stochastic aspects of data hiding
- Security issues, including attacks and counter-attacks
- Combination of data hiding and cryptography
- Optimum watermark detection and reliable recovery
- Estimation of watermark capacity
- Channel coding techniques for watermarking
- Large-scale experimental tests and benchmarking
- New statistical and perceptual models of content
- Reversible data hiding
- Data hiding in special media
- Data hiding and authentication
- Steganography and steganalysis
- Data forensics
- Copyright protection, DRM, and forensic watermarking
- Visual cryptography

For more information, please see http://multimedia.korea.ac.kr/iwdw2008.

IS 2008 3rd International Symposium on Information Security, Monterrey, Mexico, November 10-11, 2008. [posted here 4/21/08]
The goal of this symposium is to bring together researchers from the academia and practitioners from the industry in order to address information security issues. The symposium will provide a forum where researchers shall be able to present recent research results and describe emerging technologies and new research problems and directions related to them. The symposium seeks contributions presenting novel research in all aspects of information security. Topics of interest may include one or more of the following (but are not limited to) themes:
- Access Control and Authentication
- Accounting and Audit
- Biometrics for Security
- Buffer Overflows
- Computer Forensics
- Cryptographic Algorithms and Protocols
- Databases and Data Warehouses Security
- Honey Nets
- Identity and Trust Management
- Intrusion Detection and Prevention
- Information Filtering and Content Management
- Information Hiding and Watermarking
- Mobile Code Security
- Multimedia Security
- Network Security
- Privacy and Confidentiality
- Public-Key Infrastructure
- Privilege Management Infrastructure
- Risk Assessment
- Security Issues in E-Activities
- Security and Privacy Economics
- Security in RFID Systems
- Security and Trustiness in P2P Systems and Grid Computing
- Security in Web Services
- Smart Card Technology
- Software Security
- Usability of Security Systems and Services
- Vulnerability Assessment

For more information, please see http://www.cs.rmit.edu.au/fedconf/index.html?page=is2008cfp.

SKM 2008 Workshop on Secure Knowledge Management, Richardson, Texas, USA, November 3-4, 2008. [posted here 5/5/08]
Knowledge management is the methodology for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively capture and share data as well as use the knowledge of individuals within an organization. Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important. Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications. The proposed workshop in Secure Knowledge Management will help in raising the awareness of academics and practitioners in this critical area of research and develop important questions that need to be tackled by the research community. Topics of interest include, and are not limited to:
- Secure Languages (Secure Knowledge Query Manipulation Language, Security Assertion Markup Language, B2B Circles of Trust)
- Return of Investment on Secure Knowledge Systems
- Digital Rights Management (Digital Policy Management)
- Secure Content Management (Secure Content Management in Authorized Domains, Secure Content Delivery, Content Trust Index)
- Knowledge Management for National Security (Securing and Sharing What We Know: Privacy, Trust and Knowledge Management, Identity Security Guarantee, Building Trust and Security in the B2B Marketplace)
- Security and Privacy in Knowledge Management
- Wireless security in the context of Knowledge Management

For more information, please see http://cs.utdallas.edu/skm2008/call_for_papers.htm.

CSAW 2008 2nd Computer Security Architecture Workshop, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Fairfax, VA, USA, October 31, 2008. [posted here 6/2/08]
The design and evaluation of Security Architectures is of fundamental importance to security. And yet, many of our fundamental architectures were created when security was less appreciated and less well understood. Since it is notoriously difficult to add security after the fact, our systems are far too susceptible to attack. Moreover, architectures, because they are broad based, are difficult to understand and this is a specialized workshop in which Security Architecture experts will gather. As far as we know, this workshop is unique in its focus on Security Architectures. The workshop topics include, but are not limited to:
- Authorization
- Authentication
- Network security
- Distributed systems
- Operating systems
- Privacy
- Applications and security frameworks
- Specialized applications such as voting systems
- Hardware/software co-design for security
- Analysis of architectures
- System composability (properties, pitfalls, analysis & reasoning
- Assurance techniques
- Case studies
- Usability issues

For more information, please see http://www.rites.uic.edu/csaw/.

STC 2008 3rd ACM Workshop on Scalable Trusted Computing, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Fairfax, VA, USA, October 31, 2008. [posted here 3/31/08]
Built on the continuous success of ACM STC'06 and STC'07, this workshop focuses on fundamental technologies of trusted computing and its applications in large-scale systems -- those involving large number of users and parties with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. Topics of interests include but not limited to:
- security policies and models of trusted computing
- architecture and implementation technologies for trusted platform
- limitations, alternatives and tradeoffs regarding trusted computing
- trust in authentications, users and computing services
- hardware based trusted computing
- software based trusted computing
- pros and cons of hardware based approach
- remote attestation of trusted devices
- censorship-freeness in trusted computing
- cryptographic support in trusted computing
- case study in trusted computing
- applications of trusted computing
- intrusion resilience in trusted computing
- access control for trusted computing
- principles for handling scales
- scalable trust supports and services
- trusted embedded computing and systems
- trusted computing in networks and distributed systems
- virtualization and trusted computing

For more information, please see http://www.sisa.samsung.com/innovation/stc08.

VMSec 2008 1st ACM Workshop on Virtual Machine Security, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Fairfax, VA, USA, October 31, 2008. [posted here 4/21/08]
This workshop, the first of its kind to deal exclusively with virtual machine security, will tackle the important research topics in virtualization security. Virtualization has seen an explosion in growth in deployment, implementations, and applications. Virtualization holds unique properties that make it attractive for security including isolation, compartmentalization, live state capture, and replay. Virtualization has been used to study malicious software as well as to prevent malicious software infection. In addition, virtualization itself is now the subject of attack. This workshop aims to bring together leading researchers in the fields of virtualization and security to present the latest work on these topics. Scope and topics include:
- Applications of virtualization for security
- Security and integrity of virtual machines
- Detecting virtualization
- Evading virtualization
- Trapping malicious code via virtualization
- Economic implications of virtualization
- Attacks and vulnerabilities against virtualization environments
- Honey Nets and Honey Client architectures, systems, and results
- Management and control of virtual machine farms for security
- Forensics using virtualization
- Enhancing privacy and anonymity using virtualization
- Measuring security and performance of virtualization
- Instrumentation and control of virtualization
- Performance optimization of virtual machines
- Performance and security analysis of lightweight virtualization
- Virtualization for mobile devices
- Vulnerabilities in virtualization environments

For more information, please see http://csis.gmu.edu/VMSec/.

DIM 2008 4th ACM Workshop on Digital Identity Management, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Fairfax, VA, USA, October 31, 2008. [posted here 3/3/08]
As the competitive edge of the global economy is shifting to "services" delivered over the Internet, we need a way of making identity available on-demand to the services in an open, scalable, and secure manner. Identity for services is a holistic concern that must satisfy technology, regulatory and business needs for existing and emerging markets, such as Software as a Service (SaaS) and Service Oriented Architectures (SOA). Identity services should introduce consistency, efficiency and scalability in IT infrastructures built on the Internet to form the new "identity layer". Also, it should be easy for developers to incorporate identity services as part of distributed application logic. To fully achieve the potential benefits of identity managed as a set of services, such as cost-effectiveness and shorter deployment times, several security and privacy challenges must be addressed. Such challenges arise because of the complex and distributed systems across different organizations involved in identity service offerings. The goal of the workshop is to lay the foundation and agenda for further research and development in this area. Under the broad umbrella of "Services and Identity", we encourage both researchers and practitioners to participate and submit papers on topics including, but not limited to the following:
- Identity management for SaaS
- SOA for identity
- Scalability issues in identity management
- Resilient identity service provisioning
- Dynamic mutual trust negotiation
- SLA for identity services
- Identity based access control
- Migration to identity services
- Identity service discovery
- Virtual directories
- Identity management process assurance
- Identity life-cycle
- Externalization of identity
- Risk management for identity
- Identity oracles
- Translation and resolution of namespaces
- Network transport as a service
- Privacy and hosted services
- Mobile identities
- Balance between de-centralization of identity and centralization of controls
- Privacy preservation during orchestration of services in multiple domains

For more information, please see http://www2.pflab.ecl.ntt.co.jp/dim2008.

CRiSIS 2008 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008. [posted here 2/18/08]
The topics addressed by CRiSIS’2008 range from the analysis of faults, risks, attacks and vulnerabilities to system survivability and adaptability, passing through security policies and models, security and dependability mechanisms and privacy enhancing technologies. Topics include but are not limited to:
Models for specification, design and validation of security and dependability
- Security and trust models
- Models for security policies
- Formal methods, verification and certification
- UML and MDA for dependable systems
- Architectures for secure and dependable systems
- Self-protecting models and architectures
- Designing business models with security management
Management of security and dependability
- Management of risks, attacks and vulnerabilities
- Risk analysis, security and quality assurance
- Awareness of risks, attacks and vulnerabilities
- Metrology and security management
- Key management Infrastructure (PKI) and trust management
- Monitoring and management of faults
- Planning and executing of repair actions
- Adaptability management
Security and dependability techniques and mechanisms
- Authentication, authorization and audit
- Privacy protection and anonymization
- Intrusion detection and fraud detection
- Traceability and forensics
- Biometrics, watermarking, cryptography and security protocols
- Access and information flow controls
- Use of smartcards and personal devices
- Firewalls and intrusion detection systems
- Viruses, worms and malicious codes
- Attack data acquisition (honeypots) and network monitoring
- Adaptation of security policies
Secure and dependable systems
- Security and dependability of operating systems and network components
- Security of services oriented applications
- Security dependability of distributed and grid applications
- Fault tolerance of Internet applications
- Reflective middleware
- Security and safety of critical infrastructures
- Security and privacy of peer-to-peer system, wireless networks, VPN and embedded systems
- Security of new generation networks, security of Voice-over-IP and multimedia
- Self-protecting, self-stabilizing and self-healing systems
Secure and dependable applications
- Security in Electronic payment
- Security of electronic voting
- Security in e-health
- Dependability in e-learning

For more information, please see http://www.redcad.org/crisis2008/.

AISec 2008 1st ACM Workshop on AISec, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Alexandria, VA, USA, October 27, 2008. [posted here 3/3/08]
The ubiquitous nature of information and communication today is often cited as the cause of many security and privacy problems including identity and reputation management, viruses/worms and phishing/pharming. There is strong evidence, however, that this abundance of information and communication has at least as many security and privacy benefits as costs. Consider for example, the use of machine learning algorithms to detect network intrusions, crowd-based approaches to anonymous communication and the use of data mining algorithms to determine content sanitization. All of these efforts benefit from recent advances in AI, which have often been driven by increases in the amount of available data. To fully realize the security and privacy benefits of today's ubiquitous information, the security community needs expertise in the tools and techniques for managing that information, namely, artificial intelligence technology, and the AI community needs an understanding of security and privacy problems. To facilitate an exchange of ideas between these two communities, we are holding the first workshop in "AISec" in conjunction with the 15th ACM Conference on Computer and Communications Security (CCS), the new field of security and privacy solutions that leverage AI technologies. The topics of interest include but are not limited to:
- Spam detection
- Fraud detection
- Botnet detection
- Intrusion detection
- Malware identification
- Insider threat detection
- Privacy-preserving data mining
- Inference detection and control
- Phishing detection and prevention
- Design and analysis of CAPTCHAs
- AI approaches to trust and reputation
- Machine learning techniques for optimizing user experience
- Vulnerability testing through intelligent probing (e.g. fuzzing)
- Content-driven security policy management & access control
- Techniques and methods for generating training and test set

For more information, please see http://www.aisec.info.

StorageSS 2008 4th International Workshop on Storage Security and Survivability, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Alexandria, VA, USA, October 27, 2008. [posted here 5/5/08]
The 4th ACM International Workshop on Storage Security and Survivability (StorageSS 2008) will bring together researchers in storage systems, computer and network security, and cryptography. We encourage paper submissions from both research and industry presenting novel ideas on all theoretical and practical aspects of protecting data in storage and file systems. TOPICS OF INTEREST include, but aren't limited to:
- storage protection tradeoffs
- storage protection deployment (including case studies)
- smart storage for security and/or survivability
- analysis of covert storage channels and leaks
- mobile storage protection
- novel backup protection techniques
- protection using versioning
- storage encryption techniques (modes of operation, fast software/hardware encryption)
- key management techniques
- encrypted keyword search and database query
- security analysis of deployed file/volume encryptor, encrypted disc
- tamper-evident storage protection techniques
- immutable storage protection techniques, provenance
- storage threat models
- storage intrusion detection systems
- security for long-term / archival storage
- privacy and trust issues in (untrusted) remote/hosted storage
- TPM and storage security

For more information, please see http://storagess.org/2008/.

DRM 2008 8th ACM Workshop on Digital Rights Management, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Alexandria, VA, USA, October 27, 2008. [posted here 3/10/08]
The ACM Workshop on Digital Rights Management is an international forum that serves as an interdisplinary bridge between areas that can be applied to solving the problem of Intellectual Property protection of digital content. These include: cryptography, software and computer systems design, trusted computing, information and signal processing, intellectual property law, policy-making, as well as business analysis and economics. Its purpose is to bring together researchers from the above fields for a full day of formal talks and informal discussions, covering new results that will spur new investigations regarding the foundations and practices of DRM.

For more information, please see http://www.ece.unm.edu/DRM2008/.

QOP 2008 4th International Workshop on Quality of Protection, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Alexandria, VA, USA, October 27, 2008. [posted here 3/3/08]
In the last few decades, Information Security has gained numerous standards, industrial certifications, and risk analysis methodologies. However, the field still lacks the strong, quantitative, measurement-based assurance that we find in other fields. For example, Networking researchers have created and utilize Quality of Service (QoS), Service Level Agreements (SLAs), and performance evaluation measures. Empirical Software Engineering has made similar advances with software measures: processes to measure the quality and reliability of software exist and are appreciated in industry. Security looks different. Even a fairly sophisticated standard such as ISO17799 has an intrinsically qualitative nature. Notions such as Security Metrics, Quality of Protection (QoP) or Protection Level Agreement (PLA) have surfaced in the literature, but they still have a qualitative flavor. Furthermore, many recorded security incidents have a non-IT cause. As a result, security requires a much wider notion of "system" than do most other fields in computer science. In addition to the IT infrastructure, the "system" in security includes users, work processes, and organizational structures. The goal of the QoP Workshop is to help security research progress towards a notion of Quality of Protection in Security comparable to the notion of Quality of Service in Networking, Software Reliability, or measures in Empirical Software Engineering. The topics of interest include but are not limited to:
- Industrial experience
- Security risk analysis
- Security measures
- Reliability analysis
- Security quality assurance
- Measurement-based decision making and risk management
- Empirical assessment of security architectures and solutions
- Mining data from attack and vulnerability repositories
- Measurement theory
- Formal theories of security measures
- Security measurement and monitoring
- Experimental validation of models
- Simulation and statistical analysis
- Stochastic modeling

For more information, please see http://qop-workshop.org.

WPES 2008 7th ACM Workshop on Privacy in the Electronic Society, Held in conjunction with the 15th ACM Conference on Computer and Communication Security (CCS 2008), Alexandria, VA, USA, October 27, 2008. [posted here 4/21/08]
The need to consider privacy has been widely recognized in society at large, with resulting impact on government, commerce, education, health care, entertainment, and other sectors. This workshop discusses the problems related to privacy in the global interconnected society and their possible solutions. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to:
- anonymity, pseudonymity, and unlinkability
- privacy and confidentiality management
- business models with privacy requirements
- privacy in electronic records
- protection from correlation, inference, and linking attacks
- privacy in health care and public administration
- electronic communication privacy
- public records and personal privacy
- information dissemination control
- privacy and virtual identity
- privacy-aware access control
- personally identifiable information
- privacy in the digital business
- privacy policy enforcement
- privacy enhancing technologies
- privacy and data mining
- privacy policies and their enforcement
- relationships between privacy and security
- privacy and anonymity in Web transactions
- user profiling
- privacy in social networks
- wireless privacy
- privacy threats
- economics of privacy
- privacy and human rights
- RFIDs and privacy
- privacy in mobile computing
- privacy in outsourced computing
- privacy in electronic voting

For more information, please see http://dais.cs.uiuc.edu/wpes08.

CCS 2008 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, October 27-31, 2008. [posted here 3/24/08]
The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer security, as well as case studies and implementation experiences.

The conference seeks submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and communications security, as well as case studies and implementation experiences. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topics related to computer and communications security are of interest. Authors interested in submitting but unsure if their topic is in scope should assume that it probably is in scope but should contact the program chairs if further guidance is desired.

For more information, please see http://www.sigsac.org/ccs/CCS2008/.

SIS 2008 3rd International Workshop on Secure Information Systems, Wisla, Poland, October 20-22, 2008. [posted here 4/21/08]
The SIS workshop is envisioned as a forum to promote the exchange of ideas and results addressing complex security issues that arise in modern information systems. We aim at bringing together a community of security researchers and practitioners working in such divers areas as networking security, antivirus protection, intrusion detection, cryptography, security protocols, and others. We would like to promote an integrated view at the security of information systems. Covered topics include (but are not limited to):
- Access control
- Adaptive security
- Cryptography
- Copyright protection
- Cyberforensics
- Honeypots
- Information hiding
- Intrusion detection
- Network security
- Privacy
- Secure commerce
- Security exploits
- Security policies
- Security protocols
- Security services
- Security evaluation and prediction
- Software protection
- Trusted computing
- Threat modeling
- Usability and security
- Viruses and worms
- Zero-configuration security mechanisms

For more information, please see http://www.sis.imcsit.org/.

ICICS 2008 10th International Conference on Information and Communications Security, Birmingham, UK, October 20-22, 2008. [posted here 3/24/08]
The event, which started in 1997, brings together individuals involved in multiple disciplines of Information and Communications Security, in order to foster the exchange of ideas. ICICS 2008 will be organised by the School of Computer Science, University of Birmingham, in co-operation with HP Laboratories (Bristol, UK) and the International Communications and Information Security Association (ICISA). Original papers on all aspects of information and communications security are solicited for submission to ICICS 2008. Areas of interest include, but are not limited to:
- Access control
- Anti-malware
- Anonymity
- Applied cryptography
- Authentication and authorization
- Biometric security
- Data and system integrity
- Database security
- Distributed systems security
- Electronic commerce
- Fraud control
- Grid security
- Information hiding and watermarking
- Intellectual property protection
- Intrusion detection
- Key management and key recovery
- Language-based security
- Operating system security
- Network security
- Risk evaluation and security certification
- Security for mobile computing
- Security models
- Security protocols
- Trusted computing

For more information, please see http://events.cs.bham.ac.uk/icics08/.

NPSec 2008 4th workshop on Secure Network Protocols, Held in conjunction with the 16th IEEE International Conference on Network Protocols (ICNP 2008), Orlando, Florida, USA, October 19, 2008. [posted here 5/5/08]
NPSec focuses on two general areas. The first focus is on the development and analysis of secure or hardened protocols for the operation (establishment and maintenance) of network infrastructure, including such targets as secure multidomain, ad hoc, sensor or overlay networks, or other related target areas. This can include new protocols, enhancements to existing protocols, protocol analysis, and new attacks on existing protocols. The second focus is on employing such secure network protocols to create or enhance network applications. Examples include collaborative firewalls, incentive strategies for multiparty networks, and deployment strategies to enable secure applications. NPSec 2008 particularly welcomes new ideas on security in the context of future Internet design, such as architectural considerations for future Internet security and new primitives for supporting secure network protocol and application design. Topics of interest include but are not limited to:
- security in future Internet architectures
- secure and/or resilient network protocols, e.g. (internetworking/routing, MANETs, LANs and WLANs, mobile/cellular data networks, p2p and other overlay networks, federated trust systems, sensor networks)
- vulnerabilities of existing protocols and applications (both theoretical and case studies), including attacks
- key distribution/management
- intrusion detection and response
- incentive systems for p2p systems and MANETs routing
- secure protocol configuration and deployment

For more information, please see http://www.netsec.colostate.edu/npsec08/.

NSS 2008 IFIP International Workshop on Network and System Security, Shanghai, China, October 18-19, 2008. [posted here 3/24/08]
While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. We will focus our program on issues related to Network and System Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of this workshop is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry and governments. NSS 2008 will feature new results, challenging research questions, novel approaches and innovative directions in network and system security. Contributions are solicited in all areas of network and system security research and applications. Topics include, but not limited to:
- Active Defense Systems
- Adaptive Defense Systems
- Benchmark, Analysis and Evaluation of Security Systems
- Distributed Access Control and Trust Management
- Distributed Attack Systems and Mechanisms
- Distributed Intrusion Detection/Prevention Systems
- Denial-of-Service Attacks and Countermeasures
- High Performance Security Systems
- Identity Management and Authentication
- Implementation, Deployment and Management of Security Systems
- Intelligent Defense Systems
- Internet and Network Forensics
- Large-scale Attacks and Defense
- RFID Security and Privacy
- Security Architectures in Distributed Network Systems
- Security for Critical Infrastructures
- Security for P2P systems and Grid Systems
- Security in E-Commerce
- Security and Privacy in Wireless Networks
- Secure Mobile Agents and Mobile Code
- Security Simulation and Tools
- Security Theory and Tools in Network Systems
- Viruses, Worms, and Other Malicious Code
- World Wide Web Security

For more information, please see http://nss.cqu.edu.au.

eCrime 2008 3rd APWG eCrime Researchers Summit, Atlanta, GA, USA, October 15-16, 2008. [posted here 5/12/08]
Original papers on all aspects of electronic crime are solicited for submission to eCrime '08. Topics of relevance include but are not limited to:
- Phishing, pharming, click-fraud, crimeware, extortion and emerging attacks.
- Technical, legal, political, social and psychological aspects of fraud and fraud prevention.
- Techniques to assess the risks and yields of attacks and the success rates of countermeasures.
- Delivery techniques, including spam, voice mail and rank manipulation; and countermeasures.
- Spoofing of different types, and applications to fraud.
- Techniques to avoid detection, tracking and takedown; and ways to block such techniques.
- Honeypot design, data mining, and forensic aspects of fraud prevention.
- Design and evaluation of user interfaces in the context of fraud and network security.
- Best practices related to digital forensics tools and techniques, investigative procedures, and evidence acquisition, handling and preservation.

For more information, please see http://www.ecrimeresearch.org/.

SecPri-WiMob 2008 1st International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, Held in conjunction with the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2008), Avignon, France, October 12, 2008. [posted here 4/14/08]
Wireless and Mobile communication networks offer organizations and users several benefits, such as portability, mobility and flexibility, while increasing everyday business productivity, and reducing installation cost. However, although Wireless and Mobile communication environments eliminate many of the problems associated with traditional wired networks, the new security and privacy risks introduced by such environments need to be reduced by exploiting appropriate security measures and safeguards, ensuring an acceptable level of overall residual hazard. The objectives of the SecPri-WiMob 2008 Workshop are to bring together researchers from research communities in Wireless and Mobile Computing, Networking and Communications, Security and Privacy, with the goal of fostering interaction. We welcome the submission of papers from the full spectrum of issues related with Security and Privacy in Wireless and Mobile Computing, Networking and Communications. Papers may focus on protocols, architectures, methods, technologies, applications, practical experiences, simulation results and analysis, theory and validation on topics include, but not limited to:
- Cryptographic Protocols for Mobile and Wireless Networks
- Key Management in Mobile and Wireless Computing
- Reasoning about Security and Privacy
- Privacy and Anonymity in Mobile and Wireless Computing
- Public Key Infrastructure in Mobile and Wireless Environments
- Economics of Security and Privacy in Wireless and Mobile environments
- Security Architectures and Protocols in Wireless LANs
- Security Architectures and Protocols in B3G/4G Mobile Networks
- Security and Privacy features into Mobile and Wearable devices
- Location Privacy
- Ad hoc Networks Security
- Sensor Networks Security
- Wireless Ad Hoc Networks Security
- Role of Sensors to Enable Security
- Security and Privacy in Pervasive Computing
- Trust Establishment, Negotiation, and Management
- Secure PHY/MAC/routing protocols
- Security under Resource Constraints (bandwidth, computation constraints, energy)

For more information, please see http://www.aegean.gr/SecPri_WiMob_2008.

PiLBA 2008 International Workshop on Privacy in Location-Based Applications, Held in conjunction with the the 13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga, Spain, October 10, 2008. [posted here 4/7/08]
Although data security and privacy issues have been extensively investigated in several domains, the current available techniques are not readily applicable for privacy protection in location based applications (LBA). An example application is a Location Based Service, which is typically invoked through mobile devices that can include location and movement information in service requests. Other location based applications use similar data, possibly stored in a moving object database, to solve various kinds of optimization problems, to perform statistical analysis of specific phenomena, as well as to predict potentially critical situations. While location data can be very effective for better services and can enable new kind of services, it poses serious threats to the privacy of users. LBA in travel, logistics, health care, and other industries already exist and are poised to proliferate. Examples include the identification of resources close to the user (e.g., the closest pharmacy), and the identification of the optimal route to reach a destination from the user's position considering traffic conditions and possibly other constraints. One of the critical issues for a wide-spread deployment of these applications is how to conciliate the effectiveness and quality of these services with privacy concerns. They bring unique challenges mostly due to the richness of location and time information that is necessarily connected to location based applications. The research in this field involves aspects of spatio-temporal reasoning, query processing, system security, statistical inference, and anonymization techniques. Several research groups have been working in the recent years to identify privacy attacks and defense techniques in this domain. Topics of interest include everything involving privacy aspects arising in the design, development and deployment of location-based applications. Examples are the following:
- Formal models of attacks and defenses in LBA
- Anonymization/Pseudonymization in LBA
- Sensitive data obfuscation in LBA
- Authorization and Access Control involving spatio-temporal data
- Publication of micro-data acquired through LBA
- Privacy preserving data mining on geographically referenced data
- Statistical approaches to privacy preservation in LBA
- Trust Management in LBA
- Applied Cryptography for LBA

For more information, please see http://pilba.dico.unimi.it.

NordSec 2008 13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark, October 9-10, 2008. [posted here 4/28/08]
The NordSec workshops are focused on applied computer security and are intended to encourage interchange and cooperation between research and industry. NordSec 2008 is organized by the Technical University of Denmark. NordSec 2008 has a special focus on "Security for the Citizens"; papers and extended abstracts on this topic are especially welcome. Topics include, but are not limited to, the following areas of computer security:
- Applied Cryptography
- Commercial Security Policies and Enforcement
- Communication and Network Security
- Computer Crime and Information Warfare
- Hardware and Smart Card Applications
- Internet and Web Security
- Intrusion Detection
- Language-based Techniques for Security
- New Ideas and Paradigms in Security
- Operating System Security
- PKI Systems and Key Escrow
- Privacy and Anonymity
- Security Education and Training
- Security Evaluations and Measurements
- Security Management and Audit
- Security Models
- Security Protocols
- Social-Engineering and Phishing
- Software Security, Attacks, and Defenses
- Trust and Trust Management

For more information, please see http://lbt.imm.dtu.dk/nsd08/nordsec08/.

FAST 2008 5th International Workshop on Formal Aspects in Security & Trust, Held in conjunction with the 13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga, Spain, October 9-10, 2008. [posted here 5/12/08]
The fifth International Workshop on Formal Aspects in Security and Trust (FAST2008) aims at continuing the successful efforts of the previous FAST workshops, fostering the cooperation among researchers in the areas of security and trust. As computing and network infrastructures become increasingly pervasive, and as they carry increasing economic activity, society needs well matched security and trust mechanisms. These interactions increasingly span several enterprises and involve loosely structured communities of individuals. Participants in these activities must control interactions with their partners based on trust policies and business logic. Trust-based decisions effectively determine the security goals for shared information and for access to sensitive or valuable resources. FAST focuses on the formal models of security and trust that are needed to state goals and policies for these interactions. We also seek new and innovative techniques for establishing consequences of these formal models. Implementation approaches for such techniques are also welcome. Suggested submission topics include, but are not limited to:
- Formal models for security, trust and reputation
- Security protocol design and analysis
- Logics for security and trust
- Trust-based reasoning
- Distributed Trust Management Systems
- Digital Assets Protection
- Data protection
- Privacy and ID management issues
- Information flow analysis
- Language-based security
- Security and Trust aspects in ubiquitous computing
- Validation/Analysis tools and techniques
- Web/Grid Services Security/Trust/Privacy
- Security and Risk Assessment
- Resource and Access Control
- Case studies

For more information, please see http://www.iit.cnr.it/FAST2008/.

WDFIA 2008 3rd International Annual Workshop on Digital Forensics and Incident Analysis, Held in conjunction with the 13th European Symposium on Research in Computer Security (ESORICS 2008), University of Malaga, Malaga, Spain, October 9, 2008. [posted here 2/18/08]
The field of digital forensics is rapidly evolving and continues to gain significance in both the law enforcement and the scientific community. Being intrinsically interdisciplinary, it draws upon a wide range of subject areas such as information & communication technologies, law, social sciences and business administration. The workshop aims to provide a forum for researchers and practitioners to present original, unpublished research results and innovative ideas. We welcome the submission of papers from the full spectrum of issues relating to the theory and practice of digital forensics and incident analysis. Areas of special interest include, but are not limited to:
- Digital forensics tools and applications
- Incident response and investigation
- Forensic standards and procedures
- Portable electronic device forensics
- Network forensics
- Data hiding and recovery
- Network traffic analysis, traceback and attribution
- Data mining and e-discovery and their corporate use
- Legal, ethical and policy issues related to digital forensics
- Digital evidence visualisation and presentation
- Integrity of digital evidence and live investigations
- Digital evidence chain of custody, storage and preservation
- Multimedia analysis
- Digital forensics case studies
- The Trojan defence
- Forensics issues of malicious code
- Best practices and case studies
- Anti-forensics

For more information, please see http://www.aegean.gr/wdfia08.

ESORICS 2008 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. [posted here 1/18/08]
Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Thirteenth European Symposium on Research in Computer Security (ESORICS 2008). Organized in a series of European countries, ESORICS is confirmed as the European research event in computer security. The symposium started in 1990 and has been held on alternate years in different European countries and attracts an international audience from both the academic and industrial communities. From 2002 it has been held yearly. The Symposium has established itself as one of the premiere, international gatherings on Information Assurance. Papers may present theory, technique, applications, or practical experience on topics including:
- Access control
- Anonymity
- Authentication
- Authorization and delegation
- Cryptographic protocols
- Data integrity
- Dependability
- Information flow control
- Smartcards
- System security
- Digital right management
- Accountability
- Applied cryptography
- Covert channels
- Cybercrime
- Denial of service attacks
- Formal methods in security
- Inference control
- Information warfare
- Steganography
- Transaction management
- Data and application security
- Intellectual property protection
- Intrusion tolerance
- Peer-to-peer security
- Language-based security
- Network security
- Non-interference
- Privacy-enhancing technology
- Pseudonymity
- Subliminal channels
- Trustworthy user devices
- Identity management
- Security as quality of service
- Secure electronic commerce
- Security administration
- Security evaluation
- Security management
- Security models
- Security requirements engineering
- Security verification
- Survivability
- Information dissemination control
- Trust models and trust management policies

For more information, please see http://www.isac.uma.es/esorics08.

NSPW 2008 New Security Paradigm Workshop, Olympic Valley, CA, USA, September 22-25, 2008. [posted here 1/14/08]
The computers of the world are under siege. Denial of service attacks plague commercial sites, large and small. Major companies are hacked for consumer credit card numbers. Phishing attacks for personal information are commonplace, and million-machine botnets are a reality. Our tools for combating these threats--cryptography, firewalls, access controls, vulnerability scanners, malware and intrusion detectors--are insufficient. We need radical new solutions, but most security researchers propose only incremental improvements. Since 1992, the New Security Paradigm Workshop (NSPW) has been a home for research that addresses the fundamental limitations of current work in information security. NSPW welcomes papers that present a significant shift in thinking about difficult security issues, build on such a recent shift, offer a contrarian view of accepted practice or policy, or address non-technological aspects of security. Our program committee particularly looks for new approaches to information security, early thinking on new topics, innovative solutions to long-time problems, and controversial issues which might not be accepted at other conferences but merit a hearing. We discourage papers that represent completed or established works, or offer incremental improvements to well-established models. NSPW expects a high level of scholarship from contributors, including awareness of prior work produced before the World Wide Web.

For more information, please see http://www.nspw.org.

SecureComm 2008 4th International Conference on Security and Privacy for Communication Networks, Istanbul, Turkey, September 22-25, 2008. [posted here 3/3/08]
Securecomm seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. Topics of interest include, but are not limited to, the following:
- Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Malware and botnets
- Communication Privacy and Anonymity
- Distributed denial of service
- Public Key Infrastructures, key management, credentials
- Web security
- Secure Routing, Naming/Addressing, Network Management
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems, Web 2.0

For more information, please see http://www.securecomm.org.

SOSOC 2008 International Workshop on Security in Opportunistic and SOCial Networks, Held in conjunction SecureComm 2008, Istanbul, Turkey, September 22, 2008. [posted here 6/2/08]
Opportunistic Networks are considered as an evolution of the Mobile Ad-hoc Networking paradigm, in which the assumption of an existing end-to-end connectivity is relaxed. The evolving topologies are expected to resemble the actual social networks of the communicating users and information on their characteristics can be a powerful aid for any network operation. Online services that assist social networks (facebook, linkedin, xing, etc.) in consequence are able to provide additional information on contacts and their relations. The lack of end-to-end connectivity and the use of personal information for the networking operations raise entirely new privacy concerns and require new reflections on security problems. The aim of this workshop is to encompass research advances in all areas of security, trust and privacy in Opportunistic and Social Networks. Topics of interest include but are not limited to:
- new aspects of trust
- privacy concerns
- availability and resilience
- community based secure communication
- data confidentiality, data integrity
- anonymity, pseudonymity
- key management
- secure bootstrapping
- security issues in forwarding, routing
- security aspects regarding cooperation
- reputation systems for opportunistic/social networks
- new security issues, new attack paradigms
- new requirements for software security
- malware analysis in opportunistic/social networks

For more information, please see http://www.sosoc.org.

SECOVAL 2008 4th International Workshop on the Value of Security through Collaboration, Held in conjunction SecureComm 2008, Istanbul, Turkey, September 22, 2008. [posted here 6/2/08]
Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes) to make security-related decisions. For example, in reputation-based schemes, the reputation of a given node (and hence its security access rights) can be determined based on the recommendations of peer nodes. As systems are being deployed on ever-greater scale without direct connection to their distant home base, the need for self management is rapidly increasing. Interaction after interaction, as the nodes collaborate, there is the emergence of a digital ecosystem. By guiding the local decisions of the nodes, for example, with whom the nodes collaborate, global properties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depending on which local collaboration is preferred, a more trustworthy ecosystem may emerge. While papers will be considered that address any of the topics of security through collaboration from previous years (e.g., benefits from collaboration, methods of creating or measuring trust, self-organizing coalitions and risk analysis), the focus of the workshop will be around mobile application domains. Topics of interest to the workshop include, but are not limited to:
- Mobile collaborative security
- Data sharing and anonymization case studies
- Metrics of utility, anonymization strength and information loss
- Identification of data sources and types useful to share for collaborative computer security
- Context-aware trust and reputation management
- Insights from industry and case studies

For more information, please see http://www.secoval.org/.

WIFISEC 2008 1st International workshop on Wireless and Mobile Security, Held in conjunction with the 2nd IEEE International Conference and Exhibition on Next Generation Mobile Applications, Services, and Technologies (NGMAST 2008), Cardiff, Wales, UK, September 16-19, 2008. [posted here 3/10/08]
As Mobile and Wireless networks are becoming increasingly prevalent, the problem of ensuring that those networks are secure is an increasingly important issue. The issue of securing the different types of mobile and wireless networks, their operation and use is the focus of this workshop. Mobile and Wireless Networking environments eliminate many of the problems associated with traditional wired networks. However, the security and privacy risks introduced by such environments need to be addressed by exploiting appropriate security measures and techniques. Topics include but are not limited to:
- Key Management in wireless/mobile environments
- Intrusion detection, detection of malicious behaviour
- Denial of service
- User privacy, location privacy
- Authentication and Access control
- Anonymity, prevention of traffic analysis
- Dependable wireless networking
- Identity theft and phising in mobile networks
- Charging in wireless networks
- Security in vehicular networks
- Cross-layer design for security
- Monitoring and surveillance
- Identity theft and ciphering in mobile networks
- Vulnerability and attacker modelling
- Incentive-aware secure protocol design
- Routing Path Security in Ad-Hoc Networks
- Public Cryptography in Wireless Networks

For more information, please see http://www.comp.glam.ac.uk/wifisec/.

ISC 2008 Information Security Conference, Taipei, Taiwan, September 15-18, 2008. [posted here 1/7/08]
ISC aims to attract high quality papers in all technical aspects of information security. The topics of interest of ISC include, but are not limited to, the following:
- Access Control
- Accounting and Audit
- Anonymity and Pseudonymity
- Applied Cryptography
- Attacks and Prevention of Online Fraud
- Authentication and Non-repudiation
- Biometrics
- Cryptographic Protocols and Functions
- Database and System Security
- Design and Analysis of Cryptographic Algorithms
- Digital Rights Management
- Economics of Security and Privacy
- Formal Methods in Security
- Foundations of Computer Security
- Identity and Trust Management
- Information Hiding and Watermarking
- Infrastructure Security
- Intrusion Detection, Tolerance and Prevention
- Mobile, Ad Hoc and Sensor Network Security
- Network and Wireless Network Security
- Peer-to-Peer Network Security
- PKI and PMI
- Private Searches
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security in Information Flow
- Security for Mobile Code
- Security of Grid Computing
- Security of eCommerce, eBusiness and eGovernment
- Security Modeling and Architectures
- Security Models for Ambient Intelligence environments
- Trusted Computing
- Usable Security
- Special Session on AES

For more information, please see http://isc08.twisc.org/.

RAID 2008 11th International Symposium on Recent Advances in Intrusion Detection, Cambridge, Massachusetts, USA, September 15-17, 2008. [posted here 1/7/08]
This symposium, the 11th in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. The Recent Advances in Intrusion Detection (RAID) International Symposium series furthers advances in intrusion defense by promoting the exchange of ideas in a broad range of topics. As in previous years, all topics related to intrusion detection, prevention and defense systems and technologies are within scope, including but not limited to the following:
- Network and host intrusion detection and prevention
- Anomaly and specification-based approaches
- IDS cooperation and event correlation
- Malware prevention, detection, analysis and containment
- Web application security
- Insider attack detection
- Intrusion response, tolerance, and self protection
- Operational experience and limitations of current approaches
- Intrusion detection assessment and benchmarking
- Attacks against IDS including DoS, evasion, and IDS discovery
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis, risk assessment, and forensics
- Adversarial machine learning for security
- Visualization techniques
- Special environments, including mobile and sensor networks
- High-performance intrusion detection
- Legal, social, and privacy issues
- Network exfiltration detection
- Botnet analysis, detection, and mitigation

For more information, please see http://www.ll.mit.edu/IST/RAID2008/.

VizSEC 2008 5th Workshop on Visualization for Cyber Security, Held in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, MA USA, September 15, 2008. [posted here 3/24/08]
As a result of previous VizSec workshops, we have seen both the application of existing visualization techniques to security problems and the development of novel security visualization approaches. However, VizSec research has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense. Other communities, led by researchers from the RAID Symposia, have researched automated methods for detecting anomalies and malicious activity. The theme for this year's workshop will be on bridging the gap between visualization and automation, such as leveraging the power of visualization to create rules for intrusion detection and defense systems. We also solicit papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including:
- Visualization of Internet routing
- Visualization of packet traces and network flows
- Visualization of intrusion detection alerts
- Visualization of attack tracks
- Visualization of security vulnerabilities
- Visualization of attack paths
- Visualization of application processes
- Visualization for forensic analysis
- Visualization for correlating events
- Visualization for computer network defense training
- Visualization for offensive information operations
- Visualization for building rules
- Visualization for feature selection
- Visualization for cryptology
- Visualization for detecting anomalous activity
- Deployment and field testing of VizSec systems
- Evaluation and user testing of VizSec systems
- User and design requirements for VizSec systems
- Lessons learned from development and deployment of VizSec systems

For more information, please see http://vizsec.org/workshop2008/.

InSPEC 2008 International Workshop on Security and Privacy in Enterprise Computing, Held in conjunction with the 12th IEEE International EDOC Conference (EDOC 2008), Munich, Germany, September 15, 2008. [posted here 4/7/08]
Several technologies have emerged for enterprise computing. Today, services are becoming the new building blocks of enterprise systems and service-oriented architectures are combining them in a flexible and novel way. These technological trends are accompanied by new business trends due to globalization that involve innovative forms of collaborations. All of these trends bring with them new challenges to the security and privacy of enterprise computing. New concepts for solving these challenges require the combination of many disciplines from computer science and information systems, such as cryptography, networking, distributed systems, process modeling and design, access control, privacy etc. It is the goal of this workshop to provide a forum for exchange of novel research in these areas among the experts from academia and industry. Topics include:
Security and privacy in workflow systems
- Access control architectures
- Modeling of security and privacy constraints
- Automatic security augmentation
- Secure/Trusted virtual domains
Security and privacy in service-oriented architectures
- Secure composition of services
- Semantic aware security
- Security services
- Trustworthy computation
Identity Management
- Security and Privacy
- Applications to compliance
- Effective use in business IT systems
Data sharing
- Cryptographic protection during data sharing
- Privacy-preserving distributed applications
- Efficient multi-party computations
- Privacy and data sharing policies
Security and privacy in management information systems
- Novel secure applications
- Secure and private data analytics
- Flexible and seamless security architectures
- Secure operating system design
Collaborations
- Secure and private supply chains
- Security and privacy in virtual organizations
- Private social network and Web 2.0 applications
- Security and privacy in outsourcing

For more information, please see http://ra.crema.unimi.it/inspec2008/.

SCN 2008 6th Conference on Security and Cryptography for Networks, Amalfi, Italy, September 10-12, 2008. [posted here 3/31/08]
Security and privacy are increasing concerns in computer networks such as the Internet. The availability of fast, reliable, and cheap electronic communication offers the opportunity to perform electronically and in a distributed way a wide range of transactions of a most diverse nature. SCN 2008 aims at bringing together researchers in the field of cryptography and security in communication networks to foster cooperation and exchange of ideas. Original papers on all technical aspects of cryptography and security are solicited for submission to SCN 2008. Topics of interest are (but not limited to):
- Anonymity
- Implementations
- Authentication
- Symmetric-Key Cryptography
- Complexity-based Cryptography
- Privacy
- Cryptanalysis
- Cryptographic Protocols
- Digital Signatures
- Public-Key Cryptography
- Hash Functions
- Survey and state of the art
- Identification

For more information, please see http://scn.dia.unisa.it/.

CARDIS 2008 8th Smart Card Research and Advanced Application Conference, Royal Holloway, University of London, Egham, Surrey, UK, September 8-11, 2008. [posted here 11/26/07]
Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Submissions across a broad range of smart card development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of smart card technology. As a response to the growing development of contactless applications and RFID systems, a special interest is also devoted to low cost cryptographic mechanisms and physical security of constrained devices. Topics of interest include, but are not limited to:
- From smart cards to smart devices (hardware, form factor, display)
- Software environments for smart cards and devices (OS, VM, API)
- Smart cards and devices networking and high-level data models
- Smart cards and devices applications, development and deployment
- Person representation and biometrics using smart technologies
- Identity, privacy and trust issues for smart technologies
- High-speed, small-footprint implementations of cryptographic algorithms
- Attacks and countermeasures in hardware and software
- Cryptographic protocols for smart cards and devices
- Biometrics and smart cards
- Formal modeling of environments and applications
- Interplay of TPMs and smart cards
- Security of RFID systems

For more information, please see http://www.scc.rhul.ac.uk/CARDIS/.

SEC 2008 23rd International Information Security Conference, Co-located with IFIP World Computer Congress 2008, Milan, Italy, September 8-10, 2008. [posted here 9/27/07]
The conference seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of computer security, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make convincing argument for the practical significance of the results. Topics of interest include, but are not limited to:
- access control
- accounting and audit
- anonymity
- applied cryptography
- authentication
- computer forensics
- cryptographic protocols
- database security
- data protection
- data/system integrity
- digital rights management
- electronic frauds
- identity management
- information warfare
- intrusion detection
- key management
- law and ethics
- peer-to-peer security
- privacy-enhancing technology
- secure location services
- secure networking
- security education
- security management
- smartcards
- commercial and industry security
- data and application security
- inference/controlled disclosure
- risk analysis and risk management
- intellectual property protection
- security in IT outsourcing
- security for mobile code
- trust management
- trust models

For more information, please see http://sec2008.dti.unimi.it.

OSSCoNF 2008 1st Workshop on Open Source Software for Computer and Network Forensics, Held in conjunction with the 4th International Conference on Open Source Systems (OSS 2008), Milan, Italy, September 7-10, 2008. [posted here 2/25/08]
OSSCoNF aims at creating an informal, but selected academic venue to discuss the benefits (and drawbacks, if any) of using Free, Libre, and Open Source Software (FLOSS) for computer and network forensics, incident management and digital investigations. The main topics of interest for the workshop are:
- FLOSS tools for Evidence Management
- Tools for acquisition, collection, and storage of digital evidence
- Tools for identification, authentication, integrity preservation of digital evidence
- FLOSS tools for Analysis and Identification of Evidence
- Tools for the analysis and search of digital evidence
- Tools for cybercrime scenarios reconstruction, correlation and data mining applied to digital forensics
- Tools for analysis of embedded or non-traditional devices such as cellphones, cameras...
- FLOSS tools for analysis of cybercrime
- Data mining systems for cyber-crime strategy analysis and modeling
- Systems for data collection and monitoring of attack trends
- FLOSS tools validation and test cases, or FLOSS validation approaches for proprietary tools
- FLOSS tools for the automation of the forensic process and case management

For more information, please see http://conferenze.dei.polimi.it/ossconf.

Pairing 2008 2nd International Conference on Pairing-based Cryptography, Egham, UK, September 1-3, 2008. [posted here 11/12/07]
Pairing-based cryptography is an extremely active area of research which has allowed elegant solutions to a number of long-standing open problems in cryptography (such as efficient identity-based encryption). New developments continue to be made at a rapid pace. The aim of "Pairing" conference is thus to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. Authors are invited to submit papers describing their original research on all aspects of pairing-based cryptography, including, but not limited to the following topics:
Area I: Novel cryptographic protocols
- ID-based and certificateless cryptosystems
- Broadcast encryption, signcryption etc
- Short/multi/aggregate/group/ring/threshold/blind signatures
- Designed confirmer or undeniable signatures
- Identification/authentication schemes
- Key agreement
Area II: Mathematical foundations
- Weil, Tate, Eta, and Ate pairings
- Security consideration of pairings
- Other pairings and applications of pairings in mathematics
- Generation of pairing friendly curves
- (Hyper-) Elliptic curve cryptosystems
- Number theoretic algorithms
- Addition algorithms in divisor groups
Area III: SW/HW implementation
- Secure operating systems
- Efficient software implementation
- FPGA or ASIC implementation
- Smart card implementation
- RFID security
- Middleware security
- Side channel and fault attacks
Area IV: Applied security
- Novel security applications
- Secure ubiquitous computing
- Security management
- PKI models
- Application to network security
- Grid computing
- Internet and web security
- E-business or E-commerce security

For more information, please see http://www.pairing-conference.org/.

SecCo 2008 6th International Workshop on Security Issues in Concurrency, Toronto, Canada, August 23, 2008. [posted here 4/21/08]
Emerging trends in concurrency theory require the definition of models and languages adequate for the design and management of new classes of applications, mainly to program either WANs (like Internet) or smaller networks of mobile and portable devices (which support applications based on a dynamically reconfigurable communication structure). Due to the openness of these systems, new critical aspects come into play, such as the need to deal with malicious components or with a hostile environment. Current research on network security issues (e.g. secrecy, authentication, etc.) usually focuses on opening cryptographic point-to-point tunnels. Therefore, the proposed solutions in this area are not always exploitable to support the end-to-end secure interaction between entities whose availability or location is not known beforehand. The aim of the workshop is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on common interests and stimulating discussions on central research questions. In particular, we look for papers dealing with security issues (such as authentication, integrity, privacy, confidentiality, access control, denial of service, service availability, safety aspects, fault tolerance, trust, language-based security) in emerging fields like web services, mobile ad-hoc networks, agent-based infrastructures, peer-to-peer systems, context-aware computing, global/ubiquitous/pervasive computing.

For more information, please see http://www.lsv.ens-cachan.fr/SecCo08/.

PODC 2008 27th Annual ACM SIGACT-SIGOPS Symposium on the Principles of Distributed Computing, Toronto, Canada, August 18-21, 2008. [posted here 11/26/07]
PODC solicits papers on all areas of distributed systems. We encourage submissions dealing with any aspect of distributed computing from the theoretical or experimental viewpoints. The common goal is to improve understanding of principles underlying distributed computing. Topics of interest include the following subjects in distributed systems:
- distributed algorithms: design and analysis
- communication networks: architectures, services, protocols, applications
- multiprocessor and multi-core architectures and algorithms
- shared and transactional memory, synchronization protocols, concurrent programming
- fault-tolerance, reliability, availability, self organization
- Internet applications, social networks, recommender systems
- distributed operating systems, middleware platforms, databases
- distributed computing with selfish agents
- peer-to-peer systems, overlay networks, distributed data management
- high-performance, cluster, and grid computing
- mobile computing, autonomous agents, location- and context-aware distributed systems
- security in distributed computing, cryptographic protocols
- sensor, mesh, and ad hoc networks
- specification, semantics, verification, and testing of distributed systems

For more information, please see http://www.podc.org/podc2008.

DFRWS 2008 8th Annual Digital Forensic Research Workshop, Baltimore, MD, USA, August 11-13, 2008. [posted here 12/17/07]
DFRWS brings together leading researchers, developers, practitioners, and educators interested in advancing the state of the art in digital forensics from around the world. As the most established venue in the field, DFRWS is the preferred place to present both cutting-edge research and perspectives on best practices for all aspects of digital forensics. As an independent organization, we promote open community discussions and disseminate the results of our work to the widest audience. We invite original contributions as research papers, panel proposals, Work-in-Progress talks, and demo proposals. All papers are evaluated through a double-blind peer-review process, and those accepted will be published in printed proceedings by Elsevier. Topics of Interest include:
- Incident response and live analysis
- Network-based forensics, including network traffic analysis, traceback and attribution
- Event reconstruction methods and tools
- File system and memory analysis
- Application analysis
- Embedded systems
- Small scale and mobile devices
- Large-scale investigations
- Digital evidence storage and preservation
- Data mining and information discovery
- Data hiding and recovery
- File extraction from data blocks (“file carving”)
- Multimedia analysis
- Tool testing and development
- Digital evidence and the law
- Anti-forensics and anti-anti-forensics
- Case studies and trend reports
- Non-traditional approaches to forensic analysis

For more information, please see http://www.dfrws.org/2008/.

ICITS 2008 International Conference on Information Theoretic Security, Calgary, Canada, August 10-13, 2008. [posted here 11/26/07]
This is the second conference in a series of conferences that is aimed to bring together the leading researchers in the area of information and quantum theoretic security. This series of conferences is a successor to the 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005). The first ICITS conference was held in Madrid, after Eurocrypt 2007. Conference proceedings will be published by Springer Verlag in the Lecture Notes in Computer Science. The topics of interest are on work on any aspect of information theoretical security, this means security based on information theory. This includes, but is not limited to the following topics:
- Information theoretic analysis of security
- Private and Reliable Networks
- Anonymity
- Public Key Cryptosystems using Codes
- Authentication Codes
- Quantum Cryptography
- Conventional Cryptography using Codes
- Quantum Information Theory
- Fingerprinting
- Randomness extraction
- Ideal Ciphers
- Secret Sharing
- Information Hiding
- Secure Multiparty Computation
- Key Distribution
- Traitor Tracing
- Oblivious Transfer
- Data hiding and Watermarking

For more information, please see http://iqis.org/events/icits2008.

IWSSE 2008 2nd International Workshop on Security in Software Engineering, Held in conjunction with the IEEE COMPSAC 2008, Turku, July 28 – August 1, 2008. [posted here 1/15/08]
Secure software engineering has become an emerging interdisciplinary area across software engineering, programming languages, and security engineering. Secure software engineering focuses on developing secure software and understanding the security risks and managing these risks throughout the life-cycle of software. The purpose of the workshop is to bring together researchers and practitioners who work closely in this area to create a forum for reporting and discussing recent advances in improving security in software engineering and inspiring collaborations and innovations on new methods and techniques to advance software security in our practices. Researchers and practitioners worldwide are invited to present their research expertise and experience, and discuss the issues and challenges in security from software engineering perspective. Submissions of quality papers in the following non-exhaustive list of topics are invited:
- Management of software security in industrial practice
- Security requirements and policies
- Abuse cases and threat modeling
- Architecture and design for security
- Model-based security
- Language-based security
- Malicious code prevention and code safety
- Security risk analysis
- Security taxonomy and metrics
- Testing for security
- Application security: detection and protection
- Software piracy and protection

For more information, please see http://www.sis.pitt.edu/%7Elersais/IWSSE/IWSSE08.html.

USENIX-Security 2008 17th USENIX Security Symposium, San Jose, California, USA, July 28-August 1, 2008. [posted here 10/1/07]
On behalf of the 17th USENIX Security Symposium (USENIX Security '08) program committee, we are inviting you to submit high-quality papers in all areas relating to systems and network security. Please note that the USENIX Security Symposium is primarily a systems security conference. Papers whose contributions are primarily new cryptographic algorithms or protocols, cryptanalysis, electronic commerce primitives, etc., may not be appropriate for this conference. Refereed paper submissions are solicited in all areas relating to systems and network security, including:
- Adaptive security and system management
- Analysis of network and security protocols
- Applications of cryptographic techniques
- Attacks against networks and machines
- Authentication and authorization of users, systems, and applications
- Automated tools for source code analysis
- Botnets
- Cryptographic implementation analysis and construction
- Denial-of-service attacks and countermeasures
- File and filesystem security
- Firewall technologies
- Forensics and diagnostics for security
- Intrusion and anomaly detection and prevention
- Malicious code analysis, anti-virus, anti-spyware
- Network infrastructure security
- Operating system security
- Privacy-preserving (and -compromising) systems
- Public key infrastructure
- Rights management and copyright protection
- Security architectures
- Security in heterogeneous and large-scale environments
- Security policy
- Self-protecting and healing systems
- Techniques for developing secure systems
- Technologies for trustworthy computing
- Usability and security
- Voting systems analysis and security
- Wireless and pervasive/ubiquitous computing security
- Web security

For more information, please see http://www.usenix.org/sec08/cfpa/.

EVT 2008 USENIX/ACCURATE Electronic Voting Technology Workshop, Held in conjunction with the 17th USENIX Security Symposium, San Jose, CA, USA, July 28-29, 2008. [posted here 2/11/08]
EVT '08 seeks to bring together researchers from a variety of disciplines, ranging from computer science and human-computer interaction experts through political scientists, legal experts, election administrators, and voting equipment vendors. EVT seeks to publish original research on important problems in all aspects of electronic voting. We welcome papers on voting topics including but not limited to:
- Voter registration and pre-voting
- Vote collection
- Vote tabulation
- Post-election auditing
- Design, implementation, and evaluation of new voting technologies and protocols
- Scientific evaluations of existing voting technologies
- System testing methodologies
- Deployment and lifecycle issues
- Threat mitigation
- Usability
- Accessibility
- Legal issues, including ADA, HAVA, intellectual property, and nondisclosure agreements on voting system evaluations
- Issues with and evolution of voting technology standards

For more information, please see http://www.usenix.org/evt08/cfpa.

CSET 2008 Workshop on Cyber Security Experimentation and Test, Held in conjunction with the USENIX Security Symposium 2008, San Jose, CA, USA, July 28, 2008. [posted here 5/12/08]
The workshop aims to gather both researchers who use testbeds for security experimentation and testbed developers, to share their ideas and results, and to discuss open problems in this area. While we particularly invite papers that deal with security experimentation, we are also interested in papers that address general testbed/ experiment issues that have implications on security experimentation such as: traffic and topology generation, large-scale experiment support, experiment automation, etc. We are further interested in educational efforts that involve security experimentation. Please see workshop URL for a more detailed listing of topics.

For more information, please see http://www.usenix.org/event/cset08/.

SOUPS 2008 Symposium On Usable Privacy and Security, Carnegie Mellon University, Pittsburgh, PA, USA, July 23-25, 2008. [posted here 10/15/07]
The 2008 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, discussion sessions, and in-depth sessions (workshops and tutorials). We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. Topics include, but are not limited to:
- innovative security or privacy functionality and design
- new applications of existing models or technology
- field studies of security or privacy technology
- usability evaluations of security or privacy features or security testing of usability features
- lessons learned from deploying and using usable privacy and security features

For more information, please see http://cups.cs.cmu.edu/SOUPS/.

SMPE 2008 2nd International Symposium on Security and Multimodality in Pervasive Environments, Held in conjunction with the 5th ACM Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS 2008), Trinity College Dublin, Ireland, July 21-25, 2008. [posted here 2/4/08]
Pervasive computing environments present specific peculiarities with respect to aspects like security and multimodality. As a matter of fact, the accessibility level of a virtual environment can definitively be improved by natural interfaces and multimodal interaction systems, which offer users the freedom to select from multiple modes of interaction with services and permit to break down barriers about human-computer interaction making communication intuitive and spontaneous. On the other hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to protect itself from malicious attacks and/or from wrong actions performed by inexpert users. Topics include:
- Trust and reputation management in UE
- Security applications and services in pervasive
- Security model for pervasive computing
- Intelligent multimedia security services in pervasive computing
- Key management and authentication in pervasive computing
- Network security issues and protocols in pervasive computing
- Access control and privacy protection in pervasive computing
- Security Standard for next pervasive computing
- Security in Human Centred Environments
- Natural interfaces security issues
- Advanced multimodal interfaces
- Human oriented interfaces
- Multimodal mobile and ubiquitous services
- Methods for multimodal integration
- Middleware services for multimodal and pervasive applications
- Context-Awareness in multimodal applications
- Multimodal analysis and recognition of contex
- Next ubiquitous and immersive environments
- Virtual reality and ubiquitous computing
- Usability and accessibility in ubiquitous applications
- Applications and scenarios
- Others: Commercial or Industrial Issue in pervasive computing

For more information, please see http://www.na.icar.cnr.it/smpe08/.

DEON 2008 9th International Conference on Deontic Logic in Computer Science, Luxembourg, July 15-18, 2008. [posted here 12/10/07]
The biennial DEON conferences are designed to promote interdisciplinary cooperation amongst scholars interested in linking the formal-logical study of normative concepts and normative systems with computer science, artificial intelligence, philosophy, organization theory and law. DEON2008 has a special focus on logical approaches to deontic notions in computer science in security and trust, encompassing applications in e-commerce as well as traditional areas of computer security. Topics of interest in this special theme include, but are not limited to:
- digital rights management
- electronic contracts, including service level agreements and digital media licenses
- authorization
- access control
- security
- privacy policies
- business processes
- regulatory compliance

For more information, please see http://deon2008.uni.lu.

ACISP 2008 13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, July 14-16, 2008. [posted here 9/10/07]
ACISP 2008 is the main computer security and cryptography conference organized in Australia that provides an avenue for discussion and exchange of ideas for researchers from academia and industry. Original papers pertaining to all aspects of information security and privacy are solicited for submission to the ACISP 2008. Papers may present theory, techniques, applications and practical experiences on a variety of topics. Topics of interest include, but are not limited to:
- access control
- authentication and identi?cation
- authorization
- biometrics
- computer forensics
- copyright protection
- cryptography
- database security
- electronic surveillance
- evaluation and certification
- intrusion detection
- key management
- key establishment protocols
- legal and privacy issues
- mobile system security
- network and communication security
- secure electronic commerce
- secure operating systems
- secure protocols
- smart cards
- malware and viruses

For more information, please see http://www.uow.edu.au/conferences/acisp%202008/index.html.

IFIP-DAS 2008 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008. [posted here 12/10/07]
The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security. Papers and panel proposals are also solicited. Proceedings will be published by Springer as the next volume in the Research Advances in Database and Information Systems Security series. Papers may present theory, techniques, applications, or practical experience on topics of relevance to IFIP WG 11.3:
- Access Control
- Applied cryptography in data security
- Identity theft and countermeasures
- Integrity maintenance
- Intrusion detection
- Knowledge discovery and privacy
- Organizational security
- Privacy and privacy-preserving data management
- Secure transaction processing
- Secure information integration
- Secure Semantic Web
- Secure sensor monitoring
- Secure Web Services
- Threats, vulnerabilities, and risk management
- Trust management

For more information, please see http://seclab.dti.unimi.it/~ifip113/2008/.

DIMVA 2008 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Paris, France, July 10-11, 2008. [posted here 11/19/07]
The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security - Intrusion Detection and Response of the German Informatics Society (GI). DIMVA's scope includes, but is not restricted to the following areas:
Intrusion Detection
- Approaches
- Implementations
- Prevention and response
- Result correlation
- Evaluation
- Potentials and limitations
- Operational experiences
- Evasion and other attacks
- Legal and social aspects
Malware
- Techniques
- Detection
- Prevention and containment
- Evaluation
- Trends and upcoming risks
- Forensics and recovery
Vulnerability Assessment
- Vulnerabilities
- Vulnerability detection
- Vulnerability prevention
- Classification and evaluation

For more information, please see http://www.dimva.org/dimva2008/.

ACSF 2008 3rd Conference on Advances in Computer Security and Forensics, Liverpool, UK, July 10-11, 2008. [posted here 3/3/08]
The purpose of this conference is to bring together academics, researchers, IT managers, system administrators, security specialists, forensic practitioners and other interested parties to share the latest developments in research and applications from both fields. The conference affords academics, researchers and practitioners the opportunity to share views and experiences in these fields. The topics below are for guidance only and not as an exhaustive list:
- Incident Response and Management
- Legal issues in computer forensics
- Mobile phone and PDA forensics
- Collecting digital evidence
- Network forensics
- Computer forensics case studies
- Storage media and file forensic techniques
- Multimedia source identification
- Data carving and data mining
- Fraud investigation techniques
- Intrusion Detection Systems
- Wireless and ad hoc network security
- Mobile agents for secure systems
- Mobile device and mobile phone security
- Network Security
- Viruses, hostile code and Denial of Service
- Trusted computing
- Trust and resilience
- Privacy and anonymity
- Access control, auditing and accountability

For more information, please see http://www.cms.livjm.ac.uk/acsf3/.

HAISA 2008 2nd International Conference on Human Aspects of Information Security & Assurance, Plymouth, United Kingdom, July 8-10, 2008. [posted here 9/17/07]
The symposium welcomes papers addressing research and case studies in relation to any aspect of information security that pertains to the attitudes, perceptions and behaviour of people, and how human characteristics or technologies may be positively modified to improve the level of protection. Indicative themes include:
- Information security culture
- Awareness and education methods
- Enhancing risk perception
- Public understanding of security
- Usable security
- Psychological models of security software usage
- User acceptance of security policies and technologies
- User-friendly authentication methods
- Biometric technologies and impacts
- Automating security functionality
- Non-intrusive security
- Assisting security administration
- Impacts of standards, policies, compliance requirements
- Organizational governance for information assurance
- Simplifying risk and threat assessment
- Understanding motivations for misuse
- Social engineering and other human-related risks
- Privacy attitudes and practices
- Computer ethics and security

For more information, please see http://www.haisa.org.

ICIMP 2008 3rd International Conference on Internet Monitoring and Protection, Bucharest, Romania, June 29 - July 5, 2008. [posted here 12/10/07]
The International Conference on Internet Monitoring and Protection (ICIMP 2008) initiates a series of special events targeting security, performance, vulnerabilities in Internet, as well as disaster prevention and recovery. Dedicated events focus on measurement, monitoring and lessons learnt in protecting the user. ICIMP 2008 Tracks include:
- TRASI: Internet traffic surveillance and interception
- IPERF: Internet performance
- RTSEC: Security for Internet-based real-time systems
- DISAS: Disaster prevention and recovery
- EMERG: Networks and applications emergency services
- MONIT: End-to-end sampling, measurement, and monitoring
- REPORT: Experiences & lessons learnt in securing networks and applications
- USSAF: User safety, privacy, and protection over Internet
- SYVUL: Systems vulnerabilities
- SYDIA: Systems diagnosis
- CYBER-FRAUD: Cyber fraud
- BUSINESS: Business continuity
- RISK: Risk assessment
- TRUST: Privacy and trust in pervasive communications
- RIGHT: Digital rights management
- BIOTEC: Biometric techniques

For more information, please see http://www.iaria.org/conferences2008/ICIMP08.html.

FCC 2008 4th Workshop on Formal and Computational Cryptography, Carnegie Mellon University, Pittsburgh, PA, USA, June 26, 2008. [posted here 4/28/08]
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches is based on a computational model that considers issues of computational complexity and probability. Messages are modeled as bitstrings and security properties are defined in a strong form, in essence guaranteeing security with high probability against all probabilistic polynomial-time attacks. However, it is difficult to prove security of large, complex protocols in this model. The other approach relies on a symbolic model of protocol execution in which messages are modelled using a term algebra and cryptographic primitives are treated as perfect black-boxes, e.g. the only way to decrypt a ciphertext is to use the corresponding decryption key. This abstraction enables significantly simpler and often automated analysis of complex protocols. Since this model places strong constraints on the attacker, a fundamental question is whether such an analysis implies the strong security properties defined in the computational model. This workshop focuses on approaches that combine and relate symbolic and computational protocol analysis. Over the last few years, there has been a spate of research results in this area. One set of results establish correspondence theorems between the two models, in effect showing that for a certain class of protocols and properties, security in the symbolic model implies security in the computational model. In other work, researchers use language-based techniques such as process calculi and protocol logics to reason directly about the computational model. Several projects are investigating ways of mechanizing computationally sound proofs of protocols. T he workshop seeks results in this area of computationally sound protocol analysis: foundations and tools.

For more information, please see http://www.di.ens.fr/~blanchet/fcc08/.

WEIS 2008 Workshop on the Economics of Information Security, Hanover, New Hampshire, USA, June 25-27, 2008. [posted here 2/18/08]
The 2008 Workshop on the Economics of Information Security invites original research papers focused on the economics of information security and the economics of privacy. We encourage economists, computer scientists, business school researchers, law scholars, security and privacy specialists, as well as industry experts to submit their research and attend the Workshop. Suggested topics include (but are not limited to) empirical and theoretical economic studies of:
- Optimal investment in information security
- Privacy, confidentiality and anonymity
- Cybertrust and reputation systems
- Intellectual property protection
- Information access and provisioning
- Risk management and cyberinsurance
- Security standards and regulation
- Behavioral security and privacy
- Cyberterrorism policy
- Organizational security and metrics
- Psychology of risk and security
- Phishing, spam, and cybercrime
- Vulnerability discovery, disclosure, and patching

For more information, please see http://weis2008.econinfosec.org.

ATC 2008 5th International Conference on Autonomic and Trusted Computing, Oslo, Norway, June 23-25, 2008. [posted here 10/29/07]
Computing systems including hardware, software, communication and networks are growing dramatically in both scale and heterogeneity, becoming overly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, Autonomic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-x operations to the maximum extent possible without human intervention or guidance. Organic Computing (OC) additionally emphasizes natural-analogue concepts like self-organization and controlled emergence. Trusted/Trustworthy Computing (TC) aims at making computing and communication systems as well as services available, predictable, traceable, controllable, assessable, sustainable, dependable, persist-able, security/privacy protect-able, etc. ATC-08 addresses the most innovative research and development in these challenging areas and includes all technical aspects related to autonomic/organic computing (AC/OC) and trusted computing (TC). Topics of interest include, but are not limited to:
- AC/OC Theory and Models ( Nervous/organic models, negotiation, cooperation, competition, self-organization, emergence, etc.)
- AC/OC Architectures and Systems (Autonomic elements & their relationship, frameworks, middleware, observer/controller architectures, etc.)
- AC/OC Components and Modules (Memory, storage, database, device, server, proxy, software, OS, I/O, etc.)
- AC/OC Communication and Services (Networks, self-organized net, web service, grid, P2P, semantics, agent, transaction, etc.)
- AC/OC Tools and Interfaces (Tools/interfaces for AC/OC system development, test, monitoring, assessment, supervision, etc.)
- Trust Models and Specifications (Models and semantics of trust, distrust, mistrust, over-trust, cheat, risk, reputation, reliability, etc.)
- Trust-related Security and Privacy (Trust-related secure architecture, framework, policy, intrusion detection/awareness, protocols, etc.)
- Trusted Reliable and Dependable Systems (Fault-tolerant systems, hardware redundancy, robustness, survivable systems, failure recovery, etc.)
- Trustworthy Services and Applications (Trustworthy Internet/web/grid/P2P e-services, secured mobile services, novel applications, etc.)
- Trust Standards and Non-Technical Issues (Trust standards and issues related to personality, ethics, sociology, culture, psychology, economy, etc.)

For more information, please see http://www.ux.uis.no/atc08/.

CSF 2008 21st IEEE Computer Security Foundations Symposium, Pittsburgh, PA, USA, June 23-25, 2008. [posted here 10/22/07]
The IEEE Computer Security Foundations (CSF) series brings together researchers in computer science to examine foundational issues in computer security. Over the past two decades, many seminal papers and techniques have been presented first at CSF. The CiteSeer Impact page (http://citeseer.ist.psu.edu/impact.html ) lists CSF as 38th out of more than 1200 computer science venues, top 3.11% in impact based on citation frequency. New theoretical results in computer security are welcome. Also welcome are more exploratory presentations, which may examine open questions and raise fundamental concerns about existing theories. Panel proposals are sought as well as papers. Possible topics include, but are not limited to:
- Access control
- Anonymity and Privacy
- Authentication
- Data and system integrity
- Database security
- Decidability and complexity
- Distributed systems security
- Electronic voting
- Executable content
- Formal methods for security
- Information flow
- Intrusion detection
- Language-based security
- Network security
- Resource usage control
- Security for mobile computing
- Security models
- Security protocols
- Trust and trust management

For more information, please see http://www.cylab.cmu.edu/CSF2008/.

USENIX 2008 2008 USENIX Annual Technical Conference, Boston, MA, USA, June 22-27, 2008. [posted here 12/24/07]
Authors are invited to submit original and innovative papers to the Refereed Papers Track of the 2008 USENIX Annual Technical Conference. We seek high-quality submissions that further the knowledge and understanding of modern computing systems, with an emphasis on implementations and experimental results. We encourage papers that break new ground or present insightful results based on practical experience. The USENIX conference has a broad scope; specific topics of interest include but are not limited to:
- Architectural interaction
- Deployment experience
- Distributed and parallel systems
- Embedded systems
- Energy/power management
- File and storage systems
- Networking and network services
- Operating systems
- Reliability, availability, and scalability
- Security, privacy, and trust
- System and network management and troubleshooting
- Usage studies and workload characterization
- Virtualization
- Web technology
- Wireless, sensor, and mobile systems

For more information, please see http://www.usenix.org/events/usenix08/.

W2Trust 2008 Web 2.0 Trust Workshop (No Proceedings), Held in conjunction with the IFIP-TM 2008, Trondheim, Norway, June 21, 2008. [posted here 3/31/08]
Web 2.0 has emerged as the adopted suite of technologies by developers, users and business. The new web 2.0 paradigm provides the technology that enables government, businesses and users to interact and integrate services and data and benefit The Wisdom of the Crowds. Because of strong collaborative nature of Web 2.0 applications, mechanisms for trust management are crucial for its healthy development. Trust in Web 2.0 opens several new vistas for researchers and practitioners. In particular, approaches to trust management designed for Web 1.0 need to be revisited. In Web 1.0 Trust was mostly related to e-commerce and security of the portal. The main trust issues were related to the website content, and authenticity of the source which posted data. With the advent of the Web 2.0 the issue of trust has shifted from the people or companies that run a site to focus more on the people that populate it. This new technology in fact enables users to interact and collaborate seamlessly. For example, using social networks users are engaging with each other at a one to one level in several ways, for business, pleasure, for knowledge sharing and so forth. The predominant issue is now whether one can trust the people on a site, since the content is being generated by anyone and then being rated by anyone. How to ensure that what other users write is true, authentic and will not misused is an open challenge. Trust evaluations are however fundamental to help users making the best decisions when sharing resources and data. Thus, the success of Web 2.0 strongly depends on the development of efficient, adequate and scalable trust models. We solicit papers, case studies, and participation from researchers, systems architects, vendor engineers, and users. Suggested topics include but are not limited to:
- Secure Mashup Technologies
- Trust in Data Aggregation and Integration
- Trust in Service Oriented Architecture
- Security in Social Networks
- Trust in New Technologies Such as AJAX
- Trust models in Social Networks
- Web Services Security
- Trust in Grid Environments

For more information, please see http://www.sis.uncc.edu/~mshehab/W2Trust/index.html.

IFIP-TM 2008 Joint iTrust and PST conferences on Privacy, Trust Management and Security, Trondheim, Norway, June 18-20, 2008. [posted here 10/15/07]
The mission of the IFIPTM 2008 conference is to share research solutions to problems of Trust, Security and Privacy and to identify new issues and directions for future research and development work. IFIPTM 2008 invites research submissions on all topics related to Trust, Security and Privacy, including but not limited to those listed below:
- Security and trust for composite applications
- Trust models, formalization, specification, analysis and reasoning
- Engineering of trustworthy and secure software
- The ethics, sociology and psychology of trust
- Security management and usability issues including security configuration
- Trust management frameworks for secure collaborations
- Language security
- Security and privacy for software as a service (SaaS)
- Security and trust for Web 2.0 mashups
- Legal issues related to the management of trust
- Semantically-aware security management
- Adaptive security policy management
- Security, trust and privacy for service oriented architectures
- Mobile security
- Anonymity and privacy vs. accountability
- Critical infrastructure protection, public safety and emergency management
- Intrusion detection systems and technologies
- Operating systems security
- Network security (anti-virus, anti-DoS-tools, firewalls etc.)
- Privacy and identity management in e-services
- Biometrics, national ID cards, identity theft
- Distributed trust and reputation management systems
- Human computer interaction and privacy, security & trust
- Applications of trust and reputation management in e-services

For more information, please see http://www.ntnu.no/videre/konferanse/IFIPTM08/.

ICDCS 2008 28th International Conference on Distributed Computing Systems, Beijing, China, June 17-20, 2008. [posted here 8/13/07]
ICDCS is an IEEE Computer Society sponsored premier conference with a wide coverage of topics in Distributed Computing. It has a long history of significant achievements and worldwide visibility. The conference provides a forum for engineers and scientists in academia, industry and government to present their latest research findings in any aspects of distributed and parallel computing. Topics of particular interest include, but are not limited to:
- Theoretical Foundations
- Data Management and Data Centers
- Distributed Cyber-Physical Systems
- Reliability and Dependability
- Security and Privacy
- Network Architectures and Protocols
- Operating Systems and Middleware
- Cyber-Infrastructure for Distributed Computing
- Sensor Networks and Applications
- Wireless and Mobile Computing
- Multimedia Systems
- Web-Based Distributed Computing

For more information, please see http://www.engin.umd.umich.edu/icdcs/.

PLAS 2008 3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Tucson, Arizona, USA, June 8, 2008. [posted here 2/25/08]
PLAS aims to provide a forum for exploring and evaluating ideas on the use of programming language and program analysis techniques to improve the security of software systems. Strongly encouraged are proposals of new, speculative ideas; evaluations of new or known techniques in practical settings; and discussions of emerging threats and important problems. The scope of PLAS includes, but is not limited to:
- Language-based techniques for security
- Verification of security properties in software
- Automated introduction and/or verification of security enforcement mechanisms
- Program analysis techniques for discovering security vulnerabilities
- Compiler-based security mechanisms, such as host-based intrusion detection and in-line reference monitors
- Specifying and enforcing security policies for information flow and access control
- Model-driven approaches to security
- Applications, examples, and implementations of these techniques

For more information, please see http://research.ihost.com/plas2008/.

NYS-IA 2008 3rd Annual Symposium on Information Assurance, Albany, NY, USA, June 4-5, 2008. [posted here 1/7/08]
Authors are invited to submit original and unpublished papers to the 3rd Annual Symposium on Information Assurance, which will be jointly held with the 11th Annual NYS Cyber Security Conference. This two day event attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. The conference program will be organized into topics not limited to:
- Security Policy Implementation & Compliance
- Computer & Network Forensics
- Information Security Risk Management
- Network Security and Intrusion Detection
- Economics of Information Security
- Reverse Engineering of Viruses and Worms
- Security Metrics for Evaluating Security
- Botnet Detection and Prevention
- Computer Crime Data Analytics
- Security in Wireless and Ad hoc Networks
- Internet-based Terrorism and Espionage
- Adaptive & Resilient Security Models
- Digital Rights Management
- Biological Models of Security
- Privacy & Security
- Distributed Systems Security
- Security Glossaries and Ontologies
- Database Security and Data Integrity
- Trust Modeling and Management
- Curriculum Development in Information Security

For more information, please see http://www.albany.edu/iasymposium.

SHPCS 2008 Workshop on Security and High Performance Computing Systems, Held in conjunction with the 2008 International Conference on High Performance Computing & Simulation (HPCS 2008) and the 22nd European Conference on Modelling and Simulation (ECMS 2008), Nicosia, Cyprus, June 3-6, 2008. [posted here 12/10/07]
This workshop addresses relationships between security and high performance systems in three directions. First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems. Second, it covers how to use high performance computing systems to solve security problems. Third, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In all these directions, various performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure. This workshop covers (but is not limited to) the following topics:
- Access Control
- Accounting and Audit
- Anonymity
- Applied Cryptography
- Authentication
- Commercial and Industry Security
- Cryptographic Protocols
- Data and Application Security
- Data/System Integrity
- Database Security
- Digital Rights Management
- Formal Verification of Secure Systems
- Identity Management
- Inference/Controlled Disclosure
- Information Warfare
- Intellectual Property Protection
- Intrusion and Attack Detection
- Intrusion and Attack Response
- Key Management
- Privacy-Enhancing Technology
- Secure Networking
- Secure System Design
- Security Management
- Security for Mobile Code
- Security for Specific Domains (e.g., E-Government, E-Business, P2P)
- Security in IT Outsourcing
- Security in Mobile and Wireless Networks
- Security in Operating Systems
- Security Location Services
- Security of Grid and Cluster Architectures
- Smartcards
- Trust Management Policies
- Trust Models

For more information, please see http://www.diiga.univpm.it/~spalazzi/nicosia/.

ACNS 2008 6th International Conference on Applied Cryptography and Network Security, New York, New York, USA, June 3-6, 2008. [posted here 8/13/07]
ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. Original papers on all aspects of applied cryptography and network security are solicited for submission to ACNS'08. Topics of relevance include but are not limited to:
- Applied cryptography and provably-secure cryptographic protocols
- Design and analysis of efficient cryptographic primitives: public-key and symmetric-key cryptosystems, block ciphers, and hash functions
- Network security protocols
- Techniques for anonymity; trade-offs between anonymity and utility
- Integrating security into the next-generation Internet: DNS security, routing, naming, denial-of-service attacks, TCP/IP, secure multicast
- Economic fraud on the Internet: phishing, pharming, spam, and click fraud
- Email and web security
- Public key infrastructure, key management, certification, and revocation
- Security and privacy for emerging technologies: sensor networks, mobile (ad hoc) networks, peer-to-peer networks, bluetooth, 802.11, RFID
- Trust metrics and robust trust inference in distributed systems
- Security and usability
- Intellectual property protection: metering, watermarking, and digital rights management
- Modeling and protocol design for rational and malicious adversaries
- Automated analysis of protocols

For more information, please see http://acns2008.cs.columbia.edu/.

SSDU 2008 2nd International Symposium on Service, Security and its Data management technologies in Ubi-comp, Held in conjunction with the 3rd International Conference on Grid and Pervasive Computing (GPC 2008), Kunming, China, May 25-28, 2008. [posted here 1/14/08]
Ubiquitous Computing (Ubi-comp) is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services at any time and anywhere. In order to realize their advantages, it requires integrating security, services and data management to be suitable for Ubi-com. However, there are still many problems and major challenges awaiting for us to solve such as the security risks in ubiquitous resource sharing, which could be occurred when data resources are connected and accessed by anyone in Ubi-com. Therefore, it will be needed to explore more secure and intelligent mechanism in Ubi-com. Topics include:
- Context-Awareness and its Data mining for Ubi-com service
- Human-Computer Interface and Interaction for Ubi-com
- Smart Homes and its business model for Ubi-com service
- Intelligent Multimedia Service and its Data management for Ubi-com
- USN / RF-ID for Ubi-com service
- Network security issues, protocols, data security in Ubi-com
- Database protection for Ubi-com
- Privacy Protection and Forensic in Ubi-com
- Multimedia Security in Ubi-com
- Authentication and Access control for data protection in Ubi-com
- Service, Security and its Data management for U-commerce
- New novel mechanism and Applications for Ubi-com

For more information, please see http://grid.hust.edu.cn/gpc2008/.

Oakland 2008 29th IEEE Symposium on Security and Privacy, The Claremont Resort, Berkeley/Oakland, California, USA, May 18-21, 2008. [posted here 8/13/07]
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Previously unpublished papers offering novel research contributions in any aspect of computer security or electronic privacy are solicited for submission to the 2008 symposium. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains. The Symposium is also open to the submission of co-located half-day or one-day workshops. Topics of particular interest include, but are not limited to:
- Access control and audit
- Anonymity and pseudonymity
- Application-level security
- Biometrics
- Cryptographic protocols
- Database security
- Denial of service
- Distributed systems security
- Formal methods for security
- Information flow
- Intrusion detection and prevention
- Language-based security
- Malicious code prevention
- Network security
- Operating system security
- Peer-to-peer security
- Privacy
- Risk analysis
- Secure hardware and smartcards
- Security engineering
- Security policy
- User authentication

For more information, please see http://www.ieee-security.org/TC/SP2008/oakland08.html.

SADFE 2008 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, Held in conjunction with the 2008 IEEE Symposium on Security and Privacy (SP 2008), The Claremont Resort, Oakland, CA, USA, May 22, 2008. [posted here 1/14/08]
The SADFE (Systematic Approaches to Digital Forensic Engineering) International Workshop promotes systematic approaches to cyber crime investigation, by furthering the advancement of digital forensic engineering as a disciplined practice. Digital forensic engineering is characterized by the application of scientific and mathematical principles to the investigation and establishment of facts or evidence, either for use within a court of law or to aid understanding of cyber crimes or cyber-enabled crimes. To advance the state of the art, SADFE 2008 solicits broad-based, innovative digital forensic engineering technology, techno-legal and practice-related submissions in the following four areas:
- Digital Data and Evidence Management: advanced digital evidence discovery, collection, and storage.
- Principle-based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds.
- Digital Evidence Analytics: advanced digital evidence analysis, correlation, and presentation.
- Forensic-support technologies: forensic-enabled and proactive monitoring/response.

For more information, please see http://conf.ncku.edu.tw/sadfe/sadfe08/.

W2SP 2008 2nd Workshop on Web 2.0 Security and Privacy, Held in conjunction with the 2008 IEEE Symposium on Security and Privacy (SP 2008), The Claremont Resort, Oakland, CA, USA, May 22, 2008. [posted here 1/14/08]
The goal of this one day workshop is to bring together researchers and practitioners from academia and industry to focus on understanding Web 2.0 security and privacy issues, and establishing new collaborations in these areas. Web 2.0 is about connecting people and amplifying the power of working together. The mixing of technology and social interaction is occurring in the context of a wave of technologies supporting rapid development of these interpersonal and business interactions. Many of the new web technologies rely on the composition of content and services from multiple sources, resulting in complex technology compositions (mash-ups). The content composition trend is likely to continue. The lure of these technologies is the promise of simpler ways to compose software service and content, at lower cost. However, there are issues with respect to management of identities, reputation, privacy, anonymity, transient and long term relationships, and composition of function and content, both on the server side and at the client (web browser). While the security and privacy issues are not new, these issues are increasingly becoming acute as the technologies are adopted and adapted to appeal to wider audiences. Some of these technologies deliberately bypass existing security mechanisms. This workshop is intended to discuss the limitations of the current technologies and explore alternatives. The scope of W2SP 2008 includes, but is not limited to:
- Identity, privacy, reputation and anonymity
- End-to-end security architectures
- Security of content composition
- Security and privacy policy definition and modeling of content composition
- Provenance and governance
- Usable security and privacy models
- Static and dynamic analysis for security
- Security as a service
- Click fraud
- Software as a service
- Web services/feeds/mashups
- Next generation browser technology

For more information, please see http://www.ieee-security.org/TC/SP2008/oakland08.html.

WISTP 2008 Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation Networks, Sevilla, Spain, May 13-16, 2008. [posted here 12/17/07]
With the rapid technological development of information technologies and with the transition from the common to the next generation networks, computer systems and especially embedded systems are becoming more mobile and ubiquitous, increasingly interfacing with the physical world. Ensuring the security of these complex and yet, resource constraint systems has emerged as one of the most pressing challenges. Another important challenge is related to the convergence of these new technologies. The aim of this second workshop is to bring together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. Topics of interest include, but are not limited to:
Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- New Applications for Secure RFID Systems
- RFID Systems Security
- Smart Card Security
- Smart Devices Applications
- Wireless Sensor Node Security
Convergence: Security Architectures, Protocols, Policies and Management for Mobility
- Critical Infrastructure (e.g. for Medical or Military Applications) Security
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing Security
- Industrial and Multimedia Applications
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Localization Systems Security (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human) Security
- Mobile Commerce Security
- Public Administration and Governmental Services
- Privacy Enhancing Technologies
- Security Models and Architecture
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity)
- Security Measurements
Next Generation Networks
- Ad Hoc Networks Security
- Delay-Tolerant Network Security
- Domestic Network Security
- Peer-to-Peer Networks Security
- Security Issues in Mobile and Ubiquitous Networks
- Security of GSM/GPRS/UMTS Systems
- Sensor Networks Security
- Vehicular Network Security
- Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others

For more information, please see http://wistp2008.xlim.fr/.

ISPEC 2008 4th Information Security Practice and Experience Conference, Sydney, Australia, April 21-23, 2008. [posted here 8/21/07]
As applications of information security technologies become pervasive, issues pertaining to their deployment and operation are becoming increasingly important. ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. Topics of interest include, but are not limited to:
- Applications of cryptography
- Critical infrastructure protection
- Digital rights management
- Information security in vertical applications
- Legal and regulatory issues
- Network security
- Privacy and anonymity
- Privacy issues in the use of smart cards and RFID systems
- Risk evaluation and security certification
- Resilience and availability
- Secure system architectures
- Security in e-commerce and e-business and other applications
- Security policy
- Security standards activities
- Trusted Computing
- Trust model and management
- Usability aspects of information security systems

For more information, please see http://www.uow.edu.au/conferences/ISPEC%202008/index.html/.

UPSEC 2008 Workshop on Usability, Psychology, and Security, Co-located with the 5th USENIX Symposium on Networked Systems Design & Implementation (NSDI 2008), San Francisco, California, USA, April 14, 2008. [posted here 11/19/07]
Information security involves both technology and people. To design and deploy secure systems, we require an understanding of how users of those systems perceive, understand, and act on security risks and threats. This one-day workshop will bring together an interdisciplinary group of researchers, systems designers, and developers to discuss how the fields of human computer interaction, applied psychology, and computer security can be brought together to inform innovations in secure systems design. We seek to deepen the conversation about usable security to go beyond the user interface, toward developing useful and usable systems of humans and technology. Topics include but are not limited to:
- Error detection and recovery
- Human perception and cognitive information processing
- Identity and impression management
- Individual and cultural differences
- Information seeking and evaluation
- Judgment and decision-making
- Learning, training, and experience
- Mental models
- Models of privacy, sharing, and trust
- Organizational, group, and individual behavior
- Risk perception, risk analysis, and risk communication
- Security behavior study methodology
- Social engineering
- Social influence and persuasion
- System proposals and design approaches
- Threat evaluation
- Usability
- User motivation and incentives for secure behavior

For more information, please see http://www.usenix.org/upsec08/cfp.

CT-RSA 2008 RSA Conference 2008: Cryptographers' Track, San Francisco, California, USA, April 8-11, 2008. [posted here 8/13/07]
The RSA Conference is the largest, regularly-staged computer security event, with over 350 vendors, and thousands of attendees. The Cryptographers' Track (CT-RSA) is a research conference within the RSA Conference. CT-RSA has begun in 2002, and has become an established venue for presenting cryptographic research papers. The conference proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series and should be available at the conference. Special academic discount for registration will be available, as well as a waiver for speakers presenting papers accepted to CT-RSA 08. Original research papers pertaining to all aspects of cryptography are solicited. Submissions may present applications, techniques, theory, and practical experience on topics including, but not limited to:
- public-key encryption
- symmetric-key encryption
- digital signatures
- hash functions
- cryptographic protocols
- tamper-resistance
- fast implementations
- elliptic-curve cryptography
- quantum cryptography
- formal security models
- network security
- e-commerce

For more information, please see http://ct-rsa08.cs.columbia.edu/.

WiSec 2008 1st ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, March 31 - April 2, 2008. [posted here 6/6/07]
As wireless communications are becoming ubiquitous, their security is gaining in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. Topics of interest include, but are not limited to:
- Naming and addressing vulnerabilities
- Key management in wireless/mobile environments
- Secure neighbor discovery
- Secure PHY and MAC protocols
- Trust establishment
- Intrusion detection, detection of malicious behavior
- Revocation of malicious parties
- Denial of service
- User privacy, location privacy
- Anonymity, prevention of traffic analysis
- Identity theft and phishing in mobile networks
- Charging
- Cooperation and prevention of non-cooperative behavior
- Economics of wireless security
- Vulnerability and attacker modeling
- Incentive-aware secure protocol design
- Jamming
- Cross-layer design for security
- Monitoring and surveillance
- Computationally efficient cryptographic primitives

For more information, please see http://discovery.csc.ncsu.edu/WiSec08/.

EUROSEC 2008 European Workshop on System Security, Held in conjunction with the Annual ACM SIGOPS EuroSys conference (EUROSYS 2008), Glasgow, Scotland, March 31, 2008. [posted here 1/14/08]
The workshop aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The focus of the workshop is on novel, practical, systems-oriented work. EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to):
- new attacks, evasion techniques, and defenses
- operating system security
- hardware architectures
- "trusted computing" and its applications
- identity management, anonymity
- small trusted computing bases
- mobile systems security
- measuring security
- malicious code analysis and detection
- web security
- systems-based forensics
- systems work on fighting spam/phishing

For more information, please see http://www.cs.vu.nl/eurosec08/.

SAC-TRECK 2008 23rd ACM Symposium on Applied Computing, Track: Trust, Recommendations, Evidence and other Collaboration Know-how, Fortaleza, Ceará, Brazil, March 16-20, 2008. [posted here 6/6/07]
Computational models of trust and online reputation mechanisms have been gaining momentum. The goal of the ACM SAC 2008 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust applications, especially those used in real-world applications. The topics of interest include, but are not limited to:
- Recommender and reputation systems
- Trust-enhanced collaborative applications
- Trust and identity management
- Combined computational trust and trusted computing
- Tangible guarantees given by formal models of trust and risk
- Trust metrics assessment and threat analysis
- Pervasive computational trust and use of context-awareness
- Autonomic and adaptive trust
- Trade-off between privacy and trust
- Trust/risk-based security frameworks
- Automated collaboration and trust negotiation
- Trust in peer-to-peer and open source systems
- Technical trust evaluation and certification
- Impacts of social networks on computational trust
- Evidence gathering and management
- Real-world applications, running prototypes and advanced simulations
- Applicability in large-scale, open and decentralised environments
- Legal and economic aspects related to the use of trust engines
- User-studies and user interfaces of computational trust applications

For more information, please see http://www.trustcomp.org/treck/.

IFIP-CIP 2008 2nd Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Arlington, Virginia, USA, March 16–19, 2008. [posted here 10/9/07]
The IFIP Working Group 11.10 on Critical Infrastructure Protection is an active international community of researchers, infrastructure operators and policy-makers dedicated to applying scientific principles, engineering techniques and public policy to address current and future problems in information infrastructure protection. Following the success of the inaugural conference in March 2007, the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection will again provide a forum for presenting original, unpublished research results and innovative ideas related to all aspects of critical infrastructure protection. The conference will be limited to eighty participants to facilitate interactions among researchers and intense discussions of research and implementation issues. Areas of interest include, but are not limited to:
- Infrastructure vulnerabilities, threats and risks
- Security challenges, solutions and implementation issues
- Infrastructure sector interdependencies and security implications
- Risk analysis and risk assessment methodologies
- Modeling and simulation of critical infrastructures
- Legal, economic and policy issues related to critical infrastructure protection
- Secure information sharing
- Infrastructure protection case studies
- Distributed control systems/SCADA security
- Telecommunications network security

For more information, please see http://www.ifip1110.org/.

APE 2008 1st International Workshop on Advances in Policy Enforcement, Held in conjunction with the 3rd International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Catalonia, Spain, March 4-7, 2008. [posted here 10/8/07]
The problem of complying with increasingly complex requirements is gaining importance in organizations of all sizes. Such requirements stipulate how organizations must perform a number of accountable actions with regard to, e.g., accounting -- Basel II and SOX -- and the treatment of personal information -- HIPAA, Fair Information Practices and negotiated privacy preferences. From a technical standpoint, these requirements are mere policies whose modeling (expression), adherence (enforcement), and verification (audit) dictate the workflow of organizations. The goal of this workshop is to bring together researchers and practitioners working on innovative methods for policy enforcement and its a posteriori audit. The focus of the workshop is primarily technological, yet it encourages papers with a multidisciplinary character, encompassing for instance economic, legal, and sociological aspects, as well as papers more purely focused on information technology. Submission topics include, but are not limited to:
- A posteriori policy enforcement
- Complementing a priori and a posteriori approaches to enforcement
- Usage control
- Audit strategies
- Forensics and legal issues
- Provable enforcement
- Accountability and liability
- Secure logging mechanisms
- Expression of security and privacy requirements
- Monitoring techniques
- Implementation experiences

For more information, please see http://www.telematik.uni-freiburg.de/ape/.

PSAI 2008 Workshop on Privacy and Security by means of Artificial Intelligence, Held in conjunction with the third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, March 4–7, 2008. [posted here 9/27/07]
In this workshop, we aim to convene researchers in the areas of Security, Data Privacy and Artificial Intelligence. We seek to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. Topics of interest include, but are not limited to:
- Statistical Disclosure Control
- Location-based services
- Statistical databases
- Homeland security
- Robotics
- Cryptography and security protocols
- Intrusion detection systems
- Denial of service attacks

by means of
- Pattern recognition
- Image analysis
- Evolutionary computation
- Neural networks
- Multi-agent systems
- Clustering
- Case-based reasoning
- Fuzzy logic

For more information, please see http://crises-deim.urv.cat/psai/.

DAWAM 2008 3rd International Workshop on Dependability Aspects on Data WArehousing and Mining applications, Held in conjunction with the third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, March 4–7, 2008. [posted here 9/17/07]
The goals of this workshop are to bring together users, engineers and researchers (from industry and academy) alike to present their recent work, discuss and identify problems, synergize different views of techniques and policies, and brainstorm future research directions on various dependability aspects of data warehousing and data mining applications. Topics related to any of dependability aspects in data warehousing and mining, theory, systems and applications are of interest. These include, but are not limited to the following areas:
- Dependability and fault tolerance
- High Availability and Disaster Recovery
- Survivability of evaluative systems
- Reliability and Robustness Issues
- Accuracy and reliability of responses
- Reliable and Failure Tolerant Business Process Integration
- Reliable Event Management and Data Stream Processing
- Failure Tolerant and trustworthy Sensor Networks
- Highly available data warehouses for business processes integration
- Handling different or incompatible formats, and erroneous data
- Privacy and security policies and social impact of data mining
- Privacy preserving data integration
- Access control techniques and secure data models
- Encryption & Authentication
- Pseudonymization and Encryption
- Anonymization and pseudonymization
- Trust management, and security
- Security in Aggregation and Generalization
- User Profile Based Security
- Secure multi-party computation
- Secondary use of personal data, clinic data, credit record
- Fraud and misuse detection
- Intrusion detection and tolerance
- Data mining applications for terrorist detection
- Private queries by a (semi-trusted) third party
- Query authentication, logging, auditing, access control and authorization policies

For more information, please see http://www.ares-conference.eu/conf/index.php?option=com_content&task=view&id=35.

SecSE 2008 2nd International Workshop on Secure Software Engineering, Held in conjunction with the 3rd International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Catalonia, Spain, March 4-7, 2008. [posted here 9/12/07]
In our modern society, software is an integral part of everyday life, and we expect and depend upon software systems to perform correctly. Software security is about ensuring that systems continue to function correctly also under malicious attack. As most systems now are web-enabled, the number of attackers with access to the system increases dramatically and thus the threat scenario changes. The traditional approach to secure a system includes putting up defence mechanisms like IDS and firewalls, but such measures are no longer sufficient by themselves. We need to be able to build better, more robust and more secure systems. Even more importantly, however, we should strive to achieve these qualities in all software systems, not just the ones that need special protection. This workshop will focus on techniques, experiences and lessons learned for engineering secure and dependable software. Suggested topics include, but are not limited to:
- Secure architecture and design
- Security in agile software development
- Aspect-oriented software development for secure software
- Security requirements
- Risk management in software projects
- Secure implementation
- Secure deployment
- Testing for security
- Quantitative measurement of security properties
- Static and dynamic analysis for security
- Verification and assurance techniques for security properties
- Lessons learned
- Security and usability
- Teaching secure software development
- Experience reports on successfully attuning developers to secure software engineering

For more information, please see http://www.ares-conference.eu/conf/index.php?option=com_content&task=view&id=10&Itemid=11.

ARES 2008 3rd International Conference on Availability, Reliability and Security, Barcelona, Catalonia, Spain, March 4-7, 2008. [posted here 9/12/07]
The Third International Conference on Availability, Reliability and Security (“ARES – The International Security and Dependability Conference”) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. Topics of interest include, but are not limited to:
- Process based Security Models and Methods
- Authorization and Authentication
- Availability and Reliability
- Common Criteria Protocol
- Cost/Benefit Analysis
- Cryptographic protocols
- Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
- Dependability Aspects of Electronic Government (e-Government)
- Dependability administration
- Dependability in Open Source Software
- Designing Business Models with security requirements
- Digital Forensics
- E-Commerce Dependability
- Failure Prevention
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Internet Dependability
- Interoperability aspects
- Intrusion Detection and Fraud Detection
- Legal issues
- Mobile Security
- Network Security
- Privacy-enhancing technologies
- RFID Security and Privacy
- Risk planning, analysis & awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security Issues for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and privacy issues for sensor networks, wireless/mobile devices and applications
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Standards, Guidelines and Certification
- Survivability of Computing Systems
- Temporal Aspects of Dependability
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- VOIP/Wireless Security

For more information, please see http://www.ares-conference.eu/conf/.

IDtrust 2008 7th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, Mar 4-6, 2008. [posted here 8/27/07]
This symposium brings together academia, government, and industry to explore all aspects of identity and trust. Previously known as the PKI R&D Workshop (2002-2007), our new name reflects interest in a broader set of tools and the goal of an identity layer for the Internet. We aim to get practitioners in different sectors together to apply the lessons of real-world deployments to the latest research and ideas on the horizon. In addition to peer-reviewed papers, we facilitate discussions among panels of invited experts and symposium participants. We solicit technical papers and panel proposals from researchers, systems architects, vendor engineers, and users. Suggested topics include but are not limited to:
- Reports of real-world experience
- Identity management protocols
- Identity metasystems, frameworks, and systems
- User-centric identity, delegation, reputation
- Identity and Web 2.0, secure mash-ups, social networking, trust fabric and mechanisms of “invited networks”
- Identity management of devices
- Federated approaches to trust
- Trust management across security domains
- Standards related to identity and trust
- Policy
- Attribute management, attribute-based access control
- Trust path building and certificate validation
- Improved usability of identity and trust systems
- Identity and privacy
- Levels of trust and assurance
- Trust infrastructure issues of scalability, performance, etc.
- Use of PKI in emerging technologies (e.g., sensor networks)
- Application domain requirements

For more information, please see http://middleware.internet2.edu/idtrust/2008/.

NDSS 2008 15th Annual Network & Distributed System Security Symposium, San Diego, California, USA, February 10 - 13, 2008. [posted here 8/13/07]
The symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. This year’s symposium continues our theme of “theory meets practice” so we encourage submission both from traditional academic researchers as well as industrial practitioners of applied security with innovative insights. Submissions are solicited in, but not limited to, the following areas:
- Integrating security in Internet protocols: routing, naming, TCP/IP, multicast, network management, and the Web.
- Intrusion prevention, detection, and response: systems, experiences and architectures.
- Privacy and anonymity technologies.
- Network perimeter controls: firewalls, packet filters, application gateways.
- Virtual private networks.
- Security for emerging technologies: sensor networks, specialized testbeds, wireless/mobile (and ad hoc) networks, personal communication systems.
- ID systems, peer-to-peer and overlay network systems.
- Secure electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing.
- Supporting security mechanisms and APIs; audit trails; accountability.
- Implementation, deployment and management of network security policies.
- Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management.
- Fundamental services on network and distributed systems: authentication, data integrity, confidentiality, authorization, non-repudiation, and availability.
- Integrating security services with system and application security facilities and protocols: e.g., message handling, file transport/access, directories, time synchronization, data base management, boot services, mobile computing.
- Public key infrastructure, key management, certification, and revocation.
- Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost.
- Security for collaborative applications: teleconferencing and video-conferencing, electronic voting, groupwork, etc.
- Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
- Security for large-scale systems and critical infrastructures.
- Security of Web-based applications and services.

For more information, please see http://www.isoc.org/isoc/conferences/ndss/08/cfp.shtml.

FC 2008 12th International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, January 28-31, 2008. [posted here 6/25/07]
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of finance and commerce. The conference covers all aspects of securing transactions and systems. Submissions focusing on both theoretical (fundamental) and applied real-world deployments are solicited. The goal of the conference is to bring security/cryptography researchers and practitioners together with economists, bankers, implementers, and policy-makers. Topics include (but are not limited to):
- Anonymity and Privacy
- Auctions and Audits
- Authentication and Identification
- Biometrics
- Certification and Authorization
- Commercial Applications
- Transactions and Contracts
- E-Cash and Payment Systems
- Incentive and Loyalty Systems
- Digital Rights Management
- Regulation and Reporting
- Fraud Detection
- Game Theoretic Security
- Identity Theft
- Spam, Phishing
- Social Engineering
- Infrastructure Design
- Legal and Regulatory Issues
- Microfinance and Micro-payments
- Monitoring, Management and Operations
- Reputation Systems
- RFID/Contact-less Payment Systems
- Risk Assessment and Management
- Secure Banking, Financial Web Services
- Securing New Computation Paradigms
- Security and Risk Perceptions
- Security Economics
- Smartcards and Secure Tokens
- Trust Management
- Underground-Market Economics
- Virtual Economies
- Voting systems

For more information, please see http://fc08.ifca.ai.

IFIP-DF 2008 4th Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan, January 27-30, 2008. [posted here 6/18/07]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging field of digital forensics. The Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Network forensics
- Portable electronic device forensics
- Digital forensic proceses and workflow models
- Digital forensic case studies
- Legal, ethical and policy isues related to digital forensics

For more information, please see http://www.ifip119-kyoto.org.

SeMIC 2008 1st International Workshop on Security for Mobile Wireless Communications, Held in conjunction with the 3rd International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), Bangalore, India, January 6, 2008. [posted here 9/3/07]
Mobile Wireless Communications enable the exchange of information in a real, or near real-time manner, without the constraint of a fixed point of access. Reliable and secure communications combined with constant and universal network availability, are key elements for the successful commercialization of the applications that utilize the wireless technology. However, new security challenges emerge due to the dynamic network topology, the open nature of the wireless medium, the resource constraints of the mobile devices and, possibly, the lack of a pre-deployed infrastructure. The workshop seeks submissions from the academia and industry, that present novel approaches on addressing security issues for mobile wireless communications. Topics of interest include, but are not limited to:
- Authentication and access control
- Secure MAC/PHY protocols for mobile networks
- Cooperation, fairness and incentive -based security
- Key management for wireless/mobile environments
- Trust establishment
- Intrusion detection in mobile networks
- Accountability for malicious behavior and resource misuse
- Revocation of malicious parties
- Secure location services
- Privacy, anonymity and prevention of traffic analysis
- Security in cognitive radios
- Security in vehicular networks
- Anti-Jamming techniques, and DoS Countermeasures
- Vulnerability modeling and threat analysis
- Security & privacy in RFID systems
- Secure routing

For more information, please see http://www.comsware.org/workshop_SeMIC08.htm.