|
|
Commentary and Opinion
Richard Austin's review of Endpoint Security by Mark S. Kadrich
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
Conference and Workshop Announcements
Cipher calls-for-papers and calendar
VizSEC 2007 4th Workshop on Visualization for Computer Security, Held in conjunction with IEEE Vis 2007 and IEEE InfoVis 2007, Sacramento, California, USA, October 29, 2007. (Submissions due 14 September 2007)
The VizSEC 2007 Workshop on Visualization for Computer Security will provide a forum for new research in visualization for computer security. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems. However, while security visualization research has addressed the development of applications, there has only been limited coverage of user needs and designing visualization to support those needs. To address this shortcoming, the theme of this year's workshop will be on applying user-centered design to VizSEC research, focusing on integrating users' needs, visualization design, and evaluation. We solicit papers that report results on visualization techniques and systems in solving all aspects of cyber security problems. Topics include, but are not limited to:
WiSec 2008 1st ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, March 31 - April 2, 2008. (Submissions due 15 September 2007)
As wireless communications are becoming ubiquitous, their security is gaining in importance.
The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless
networks as well as techniques to thwart them. Topics of interest include,
but are not limited to:
IFIP-DF 2008 4th Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan, January 27-30, 2008. (Submissions due 15 September 2007)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international
community of scientists, engineers and practitioners dedicated to advancing the state of the
art of research and practice in the emerging field of digital forensics. The Fourth Annual
IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting
original, unpublished research results and innovative ideas related to the extraction, analysis
and preservation of all forms of electronic evidence. Technical papers are solicited in all
areas related to the theory and practice of digital forensics. Areas of special interest
include, but are not limited to:
CT-RSA 2008 RSA Conference 2008: Cryptographers' Track, San Francisco, California, USA, April 8-11, 2008. (Submissions due 18 September 2007)
The RSA Conference is the largest, regularly-staged computer security event, with over 350 vendors, and thousands of attendees. The Cryptographers' Track (CT-RSA) is a research conference within the RSA Conference. CT-RSA has begun in 2002, and has become an established venue for presenting cryptographic research papers. The conference proceedings will be published in Springer's Lecture Notes in Computer Science (LNCS) series and should be available at the conference. Special academic discount for registration will be available, as well as a waiver for speakers presenting papers accepted to CT-RSA 08. Original research papers pertaining to all aspects of cryptography are solicited. Submissions may present applications, techniques, theory, and practical experience on topics including, but not limited to:
NDSS 2008 15th Annual Network & Distributed System Security Symposium, San Diego, California, USA, February 10 - 13, 2008. (Submissions due 21 September 2007)
The symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. This year's symposium continues our theme of "theory meets practice" so we encourage submission both from traditional academic researchers as well as industrial practitioners of applied security with innovative insights. Submissions are solicited in, but not limited to, the following areas:
SeMIC 2008 1st International Workshop on Security for Mobile Wireless Communications, Held in conjunction with the 3rd International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), Bangalore, India, January 6, 2008. (Submissions due 21 September 2007)
Mobile Wireless Communications enable the exchange of information in a real, or near real-time manner, without the constraint of a fixed point of access. Reliable and secure communications combined with constant and universal network availability, are key elements for the successful commercialization of the applications that utilize the wireless technology. However, new security challenges emerge due to the dynamic network topology, the open nature of the wireless medium, the resource constraints of the mobile devices and, possibly, the lack of a pre-deployed infrastructure. The workshop seeks submissions from the academia and industry, that present novel approaches on addressing security issues for mobile wireless communications. Topics of interest include, but are not limited to:
FC 2008 12th International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, January 28-31, 2008. (Submissions due 10 October 2007)
Financial Cryptography and Data Security is a major international forum for research,
advanced development, education, exploration, and debate regarding information assurance
in the context of finance and commerce. The conference covers all aspects of securing
transactions and systems. Submissions focusing on both theoretical (fundamental) and
applied real-world deployments are solicited. The goal of the conference is to bring
security/cryptography researchers and practitioners together with economists, bankers,
implementers, and policy-makers. Topics include (but are not limited to):
ARES 2008 3rd International Conference on Availability, Reliability and Security, Barcelona, Catalonia, Spain, March 4-7, 2008. (Submissions due 10 October 2007)
The Third International Conference on Availability, Reliability and Security ("ARES - The International Security and Dependability Conference") will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security - with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. Topics of interest include, but are not limited to:
SecSE 2008 2nd International Workshop on Secure Software Engineering, Held in conjunction with the 3rd International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Catalonia, Spain, March 4-7, 2008. (Submissions due 10 October 2007)
In our modern society, software is an integral part of everyday life, and we expect and depend upon software systems to perform correctly. Software security is about ensuring that systems continue to function correctly also under malicious attack. As most systems now are web-enabled, the number of attackers with access to the system increases dramatically and thus the threat scenario changes. The traditional approach to secure a system includes putting up defence mechanisms like IDS and firewalls, but such measures are no longer sufficient by themselves. We need to be able to build better, more robust and more secure systems. Even more importantly, however, we should strive to achieve these qualities in all software systems, not just the ones that need special protection. This workshop will focus on techniques, experiences and lessons learned for engineering secure and dependable software. Suggested topics include, but are not limited to:
Oakland 2008 29th IEEE Symposium on Security and Privacy, The Claremont Resort, Berkeley/Oakland, California, USA, May 18-21, 2008. (Submissions due 9 November 2007)
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Previously unpublished papers offering novel research contributions in any aspect of computer security or electronic privacy are solicited for submission to the 2008 symposium. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains. The Symposium is also open to the submission of co-located half-day or one-day workshops. Topics of particular interest include, but are not limited to:
ICDCS 2008 28th International Conference on Distributed Computing Systems, Beijing, China, June 17-20, 2008. (Submissions due 15 November 2007)
ICDCS is an IEEE Computer Society sponsored premier conference with a wide coverage of topics in Distributed Computing. It has a long history of significant achievements and worldwide visibility. The conference provides a forum for engineers and scientists in academia, industry and government to present their latest research findings in any aspects of distributed and parallel computing. Topics of particular interest include, but are not limited to:
IDtrust 2008 7th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, Mar 4-6, 2008. (Submissions due 17 November 2007)
This symposium brings together academia, government, and industry to explore all aspects of identity and trust. Previously known as the PKI R&D Workshop (2002-2007), our new name reflects interest in a broader set of tools and the goal of an identity layer for the Internet. We aim to get practitioners in different sectors together to apply the lessons of real-world deployments to the latest research and ideas on the horizon. In addition to peer-reviewed papers, we facilitate discussions among panels of invited experts and symposium participants. We solicit technical papers and panel proposals from researchers, systems architects, vendor engineers, and users. Suggested topics include but are not limited to:
ISPEC 2008 4th Information Security Practice and Experience Conference, Sydney, Australia, April 21-23, 2008. (Submissions due 23 November 2007)
As applications of information security technologies become pervasive, issues pertaining to their deployment and operation are becoming increasingly important. ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. Topics of interest include, but are not limited to:
ACNS 2008 6th International Conference on Applied Cryptography and Network Security, New York, New York, USA, June 3-6, 2008. (Submissions due 14 January 2008)
ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. Original papers on all aspects of applied cryptography and network security are solicited for submission to ACNS'08. Topics of relevance include but are not limited to:
Elsevier Computer Standards and Interfaces, Special issue on Information and Communications Security, Privacy and Trust: Standards and Regulations, Summer 2008. (Submission Due 30 January 2008)
Guest editors: Bhavani Thuraisingham (University of Texas at Dallas, USA) and Stefanos Gritzalis (niversity of the Aegean, Greece)
Most of the research and development work carried out by universities, research centers and
private companies today, is based, in some way or another, on international standards or
pre-standards that have been produced under the auspices of recognized standardization
bodies. On top of that, many market sectors have recognized standardization as a prerequisite
for the provision of high quality services and products, thus triggering a large number of
multi-sectoral voluntary standards. For many years the Security field was somehow isolated
in the Information and Communications Technology arena. Inevitably this isolation has been
inherited to the standards governing the security, privacy, and trust techniques and
mechanisms that are currently employed. It is therefore important to inform the scientific
community about these problems and facilitate better collaboration on the security,
privacy, and trust aspects of international standards and regulations.
We welcome the submission of papers that: provide information about activities and progress
of security, privacy, and trust standardization work; focus on critical comments on
standards and standardization activities; discuss actual projects results;
disseminate experiences and case studies in the application and exploitation of
established and emerging standards, methods and interfaces. The areas of interest
may include, but not limited, to:
ACISP 2008 13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, July 14-16, 2008. (Submissions due 11 February 2008)
ACISP 2008 is the main computer security and cryptography conference organized in Australia that provides an avenue for discussion and exchange of ideas for researchers from academia and industry. Original papers pertaining to all aspects of information security and privacy are solicited for submission to the ACISP 2008. Papers may present theory, techniques, applications and practical experiences on a variety of topics. Topics of interest include, but are not limited to:
Listing of academic positions available by
Cynthia Irvine
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |