Category Archives: Announcements - Page 2

Second call for papers for the 15th European Conference on Cyber Warfare and Security ECCWS-2016

This is the Second call for papers for the 15th European Conference on Cyber Warfare and Security ECCWS-2016, being hosted by Bundeswehr University, Munich, Germany on the 7-8 July 2016.

This call will close on the 3rd of December 2015.

The 15th European Conference on Cyber Warfare and Security (ECCWS) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat cyber warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.

For more information please go to: http://academic-conferences.org/eccws/eccws2016/eccws16-call-papers.htm

3rd International Conference on Cloud Security and Management ICCSM-2015

Preparations for the 3rd International Conference on Cloud Security and Management ICCSM-2015 are now well underway.

 You can see the latest programme at: http://academic-conferences.org/iccsm/iccsm2015/iccsm15-timetable.htm

Please note that the timetable is subject to change and will be updated as necessary until  mid October 2015.

There are a number of registration options available, details of which can be found at: http://academic-conferences.org/iccsm/iccsm2015/iccsm15-registration.htm

Follow the conference on LinkedIn   Facebook and Twitter

Call for Papers – CFP CLOSER 2016 – Int’l Conf. on Cloud Computing and Services Science (Rome/Italy)

The 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, focuses on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current IT-driven collaborations. The conference is nevertheless not about the union of these two (already broad) fields, but about Cloud Computing where we are also interested in how Services Science can provide theory, methods and techniques to design, analyze, manage, market and study various aspects of Cloud Computing.

We would like to highlight the presence of the following keynote speakers:
– Pierangela Samarati, Università degli Studi di Milano, Italy
– Frank Leymann, University of Stuttgart, Germany

CLOSER is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 126 submissions, 14% were presented as full papers.

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

CLOSER 2016 will be held in conjunction with CSEDU (8th International Conference on Computer Supported Education – http://www.csedu.org), SMARTGREENS (5th International Conference on Smart Cities and Green ICT Systems – http://www.smartgreens.org/), WEBIST (12th International Conference on Web Information Systems and Technologies – http://www.webist.org), VEHITS (2nd International Conference on Vehicle Technology and Intelligent Transport Systems –http://www.vehits.org) and IoTBD (International Conference on Internet of Things and Big Data) in Rome, Italy. Registration to CLOSER will enable free attendance to any sessions of CSEDU, SMARTGREENS, WEBIST, VEHITS and IoTBD conferences  as a non-speaker.
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

CONFERENCE CHAIR:
Markus Helfert, Dublin City University, Ireland

PROGRAM CO-CHAIRS:
Jorge Cardoso, University of Coimbra, Portugal and Huawei European Research Center, Germany
Donald Ferguson, Dell, United States
Víctor Méndez Muñoz, Universitat Autònoma de Barcelona, UAB, Spain

PROGRAM COMMITTEE:
Please check the program committee members at http://closer.scitevents.org/ProgramCommittee.aspx

CONFERENCE AREAS:

Area 1: Cloud Computing Fundamentals
– Cloud Application Portability
– Cloud Computing Architecture
– Cloud Delivery Models
– Cloud Deployment Models: Public/Private/Hybrid Cloud
– Cloud Education
– Cloud Interoperability
– Cloud Risk, Challenges, and Governance
– Cloud Scenarios
– Cloud Standards
– QoS for Applications on Clouds
– Energy Management
– Resource Management
– Privacy, Security and Trust
– Federated Cloud

Area 2: Services Science
– Business Process Management and Web Services
– Business Services Realized by IT Services
– Cloud Brokering
– Cloud Cost Analysis
– Data and Service Analytics
– Enterprise Architectures and Services
– Cloud Workflow Management Systems
– Industrial Applications of Services Science
– Information and Service Economy
– Internet of Services
– Model-driven Web Service Engineering
– Semantic and Service Web
– Microservices: Atomation Deployment and Management
– Microservices: Resource Allocation Elasticity
– Microservices: Service State and Resilience
– Service Discovery
– Service Innovation
– Service Lifecycle Management
– Service Modeling and Specification
– Service Monitoring and Control
– Service-oriented Architecture
– Services Security and Reliability
– Web Services
– Service Society
– Service Management
– Service Platforms

Area 3: Cloud Computing Platforms and Applications
– Access Control
– Cloud Solution Design Patterns
– Cloud for Enterprise Business Transformation
– Cloud Application Architectures
– Cloud Application Scalability and Availability
– Cloud Applications Performance and Monitoring
– Cloud Economics
– Cloud Middleware Frameworks
– Engineering Mobile Clouds and Mobile-based Systems
– Development Methods for Cloud Applications
– XaaS
– Cloud Services
– Mobile Cloud Computing Models, Infrastructures, and Approaches

Area 4: Cloud Computing Enabling Technology
– API Management
– Multi-Cloud Solutions Enablement
– Cloud Quality and Performance
– Cloud Optimization and Automation
– Cloud Resource Virtualization and Composition
– Cloud Management and Operations
– Green and Energy Management
– High Performance Cloud Computing
– Cloud Migration
– Monitoring of Services, Quality of Service, Service Level Agreements
– Performance Development and Management
– Security, Privacy, and Compliance Management
– Virtualization Technologies
– Container schedulers
– Application containers

Area 5: Data as a Service
– On-Line Transaction Processing (OLTP) services
– On-Line Analytical Processing (OLAP) services
– Big Data Cloud Services
– NOSQL services: store, visualization, processing
– Time Series Services: Databases, dashboards

Securing Email Communications from Facebook

To enhance the privacy of  email content, Facebook is gradually rolling out an experimental new feature that enables people to add OpenPGP public keys to their profile; these keys can be used to “end-to-end” encrypt notification emails sent from Facebook to email accounts. People may also choose to share OpenPGP keys from their profile, with or without enabling encrypted notifications.

Users will be able to update their own public key, using a desktop browser, at:

Screenshot

Where encrypted notifications are enabled, Facebook will sign outbound messages using their own key to provide greater assurance that the contents of inbound emails are genuine. The Facebook key can be checked at keyservers such as SKS and MIT.

Screenshot-1
More info:

https://www.facebook.com/notes/protect-the-graph/securing-email-communications-from-facebook/1611941762379302

(Greek) Πρόσκληση Συμμετοχής στο ICT Security World – Τετάρτη 4 Μαρτίου 2015

Sorry, this entry is only available in Greek.

CALL FOR PAPERS – TrustBus’2015

CALL FOR PAPERS

TrustBus’2015: The 12th International Conference on

TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS

http://www.ds.unipi.gr/trustbus15/

in conjunction with the 26th International Conference on Database

and Expert Systems Applications (DEXA 2015)

to be held in Valencia, Spain, 1-2 September 2015

PROCEEDINGS by Springer in the LNCS series.

TrustBus’2015 will bring together researchers from different disciplines,

developers, and users all interested in the critical success factors of

digital business systems. We are interested in papers, work-in-progress reports,

and industrial experiences describing advances in all areas of digital business

applications related to trust and privacy, including, but not limited to:

* Anonymity and pseudonymity in business transactions

* Business architectures and underlying infrastructures

* Common practice, legal and regulatory issues

* Cryptographic protocols

* Delivery technologies and scheduling protocols

* Design of businesses models with security requirements

* Economics of Information Systems Security

* Electronic cash, wallets and pay-per-view systems

* Enterprise management and consumer protection

* Identity and Trust Management

* Intellectual property and digital rights management

* Intrusion detection and information filtering

* Languages for description of services and contracts

* Management of privacy & confidentiality

* Models for access control and authentication

* Multimedia web services

* New cryptographic building-blocks for e-business applications

* Online transaction processing

* PKI & PMI

* Public administration, governmental services

* P2P transactions and scenarios

* Real-time Internet E-Services

* Reliability and security of content and data

* Reliable auction, e-procurement and negotiation technology

* Reputation in services provision

* Secure process integration and management

* Security and Privacy models for Pervasive Information Systems

* Security Policies

* Shopping, trading, and contract management tools

* Smartcard technology

* Transactional Models

* Trust and privacy issues in mobile commerce environments

* Usability of security technologies and services

Authors are invited to submit original papers not previously published nor

submitted in parallel for publication to any other conference, workshop

or journal. Papers should be limited to 12 pages of 11pt type including

title page, figures and bibliography.

To submit a paper to TrustBus’2015 please go to

https://confdriver.ifs.tuwien.ac.at/dexa2015

Accepted papers will be included in the Conference proceedings,

to be published by Springer in their LNCS series.

Camera-ready versions of the papers should not exceed 12 pages and

must comply with the “Authors Instructions” that can be found at:

http://www.springer.de/comp/lncs/authors.html

For further inquiries, please contact one of the program committee chairs

at simone.fischer-huebner@kau.se or clam@unipi.gr.

Important dates

===============

Submission deadline:                     March 22, 2015

Notification to authors:                 May 10, 2015

Camera-ready version:                  May 31, 2015

General Chair

Lopez, Javier                      —University of Malaga (Spain)

Program Committee co-Chairs

Fischer-Huebner, Simone —Karlstad University (Sweden)

Lambrinoudakis, Costas     —University of Piraeus (Greece)

Program Committee Members

**Please visit the conference web site (http://www.ds.unipi.gr/trustbus15/)

=====================================

Costas Lambrinoudakis

Associate Professor

Department of Digital Systems

University of Piraeus

150 Androutsou St., Piraeus

18532 Greece

Tel: +30-210-414-2720

Fax: +30-210-414-2753

Email: clam@unipi.gr

(Greek) Enterprise IT Security Conference

Sorry, this entry is only available in Greek.

(Greek) Ομιλία Δρ. Δημήτρη Μιχαλόπουλου στο Ελ. Κολέγιο την 29/01/2015

Sorry, this entry is only available in Greek.

ARES 2015 – CALL FOR PAPERS

ARES 2015 – CALL FOR PAPERS

******************************************************************************************
The Tenth International Conference on Availability, Reliability and Security (ARES 2015)
August 24th – 28th, 2015, Toulouse, France
http://www.ares-conference.eu
******************************************************************************************

***********
ARES CONFERENCE
************
The 10th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security – with special focus on the crucial linkage between availability, reliability and security.

ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals. The acceptance rate of the ARES 2014 conference was 16%. The ARES conferences have been published by IEEE CPS.

************
CONFERENCE OFFICERS
************
General Chair
Abdelmalek Benzekri, Université Paul Sabatier, France

Program Committee Chair
Stefan Katzenbeisser, TU Darmstadt, Germany

************
IMPORTANT DATES
************
Submission Deadline: March 2, 2015
Author Notification: May 11, 2015
Proceedings Version: June 8, 2015
Conference: August 24-28, 2015

************
SUBMISSION
************
The proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS) of IEEE. Authors of selected papers that are accepted by and presented at the ARES Conference (including workshops) will be invited to submit an extended version to special issues of international journals.

Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.

For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:

full paper (10 pages)
short paper (6 pages)
workshop paper (8 pages, a maximum of 10 pages is tolerated)
extended abstracts (2 pages, only possible in the ARES Industrial track)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.

Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.

************
PROGRAM COMMITTEE
************
Jon A. Solworth, University of Illinois at Chicago, US
Isaac Agudo, University of Malaga, Spain
Philipp Amann, University College Dublin, Europol, Ireland
Amin Anjomshoaa, Vienna University of Technology, Austria
Aslan Askarov, Aarhus University, Denmark
Ravishankar Borgaonkar, Technische Universität Berlin, Germany
Stephane Bressan, National University of Singapore, Singapore
Luanne Burns Goldrich, The Johns Hopkins University Applied Physics Laboratory, US
Mario Cagalj, University of Split, Croatia
Lasaro Camargos, Federal University of Uberlandia, Brazil
Jordi Castellà-Roca, Rovira i Virgili University of Tarragona, Spain
Lorenzo Cavallaro, Royal Holloway, University of London, UK
David Chadwick, University of Kent, UK
Soon Ae Chun, City University of New York, US
Nathan Clarke, University of Plymouth, UK
Marijke Coetzee, University of Johannesburg, South Africa
Vincenzo De Florio, PATS / Universiteit Antwerpen and PATS / iMinds, Belgium
Steven Demurjian, University of Connecticut, US
Mark Dillon, International Criminal Court, Netherlands
Adam Doupé, Arizona State University, US
Pavlos Efraimidis, Democritus University of Thrace, Greece
Manuel Egele, Carnegie Mellon University, US
Christian Engelmann, Oak Ridge National Laboratory, US
Aristide Fattori, Università degli Studi di Milano, Italy
Hannes Federrath, University of Hamburg, Germany
Christophe Feltus, Luxembourg Institute of Science and Technology (LIST), Luxembourg
Simone Fischer-Huebner, Karlstad University, Sweden
Francesco Flammini, Ansaldo STS, Italy
Steven Furnell, Plymouth University, UK
Nico Golde, Qualcomm Research Germany
Marcin Gorawski, Wroclaw University of Technology and Silesian University of Technology, Poland
Bogdan Groza, Politehnica University of Timisoara, Romania
Marit Hansen, Independent Centre for Privacy Protection, Kiel
Dominik Herrmann, University Hamburg, Germany
Martin Gilje Jaatun, SINTEF, Norway
Hai Jin, Huazhong University of Science and Technology, China
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany
Sokratis K. Katsikas, University of Piraeus, Greece
Vasilis Katos, University of Thrace, Greece
Peter Kieseberg, SBA Research, Austria
Ezzat Kirmani, St. Cloud State University, US
Thorsten Kramp, IBM Research Zurich, Switzerland
Ralf Kuesters, University of Trier, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Corrado Leita, Symantec Research Labs, France
Shujun Li, University of Surrey, UK
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Keith Martin, Royal Holloway, University of London, UK
Ioannis Mavridis, University of Macedonia, Greece
Todd McDonald, University of South Alabama, US
Katerina Mitrokotsa, Chalmers University of Technology, Sweden
Mattia Monga, Universita` degli Studi di Milano, Italy
Haris Mouratidis, University of Brighton, UK
Thomas Moyer, MIT Lincoln Laboratory
Thomas Nowey, Krones AG, Germany
Christoforos Ntantogian, University of Piraeus, Greece
Rolf Oppliger, eSecurity Technologies, Switzerland
Jaehong Park, University of Texas at San Antonio
Günther Pernul, University of Regensburg, Germany
Andreas Peter, University of Twente, Netherlands
Todd R. Andel, University of South Alabama, US
Stefanie Rinderle-Ma, University of Vienna, Austria
Domenico Rosaci, University “Mediterranea” of Reggio Calabria, Italy
Volker Roth, Freie Universitaet Berlin, Germany
Giovanni Russello, University of Auckland, New Zealand
Luis Enrique Sánchez Crespo, University of Armed Forced, University of Castilla-la Mancha, Spain
Mark Scanlon, University College Dublin, Ireland
Sebastian Schinzel, Münster University of Applied Sciences, Germany
Jörn-Marc Schmidt, secunet, Germany
Max Schuchard, University of Minnesota, US
Stefan Schulte, Vienna University of Technology, Austria
Dimitris Simos, SBA Research, Austria
Mark Strembeck, Vienna University of Economics and Business, Austria
Gianluca Stringhini, Univerity College London, UK
Thorsten Strufe, TU Dresden, Germany
Jakub Szefer, Yale School of Engineering & Applied Science, US
Laurence T. Yang, St Francis Xavier University, Canada
Tsuyoshi Takagi, Kyushu University, Japan
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany
Umberto Villano, Universita’ del Sannio, Italy
Cong Wang, City University of Hong Kong, Hong Kong
Lenx Wei, Peking University, China
Jinpeng Wei, Florida International University, US
Erich Wenger, IAIK TU Graz, Austria
Christos Xenakis, University of Piraeus, Greece
Fabian Yamaguchi, University of Göttingen, Germany
Alec Yasinsac, University of South Alabama, US
Nicola Zannone, Eindhoven University of Technology, The Netherlands

************
TOPCIS of interest include, but are not limited to:
************
Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security

ARES Conference Team

SBA Research
Office: Sommerpalais Harrach / Favoritenstr. 16 / 1040 Wien
Mobil: +43 699 100 41 066
E: office@ares-conference.eu
http://www.ares-conference.eu

Follow us on Twitter (http://twitter.com/#!/ARES_Conference/)
Find us on Facebook (https://www.facebook.com/AresConference)