Category Archives: News Feed - Page 2

Android Security Symposium in Vienna (March 08-10, 2017)

The second Android Security Symposium will take place in Vienna, Austria, from 8-10 March 2017.
The Android Security Symposium brings together people from different backgrounds (academic, industry, rooting/exploiting community) who are interested in and actively working on Android device security. The event will feature exciting expert talks on various topics around Android and mobile device security and privacy. The symposium is an ideal platform to discuss current and upcoming security developments in Android and provides various networking opportunities.

The Android Security Symposium is organized by the Josef Ressel Center u’smile at the University of Applied Sciences Upper Austria in cooperation with SBA Research and the Institute of Networks and Security (INS) at Johannes Kepler University Linz.

More info: https://usmile.at/symposium

CALL FOR PAPERS – CFP CLOSER 2017

7th International Conference on Cloud Computing and Services Science
CLOSER website: http://closer.scitevents.org

April 24 – 26, 2017
Porto, Portugal

In Cooperation with: ACM SIGMIS
Sponsored by: INSTICC
INSTICC is Member of: WfMC and OMG
Technically Co-sponsored by: EGI
Logistics Partner: SCITEVENTS

IMPORTANT DATES:
Regular Paper Submission: November 21, 2016
Authors Notification (regular papers): January 23, 2017
Final Regular Paper Submission and Registration: February 6, 2017

CONFERENCE CO-CHAIRS:
Markus Helfert, Dublin City University, Ireland
Claus Pahl, Free University of Bozen-Bolzano, Italy

PROGRAM CO-CHAIRS:
Donald Ferguson, Columbia University, United States
Víctor Méndez Muñoz, Universitat Autònoma de Barcelona, UAB, Spain
Jorge Cardoso, University of Coimbra, Portugal and Huawei European Research Center, Germany

LOCAL CHAIR
Ricardo J. Machado, Universidade do Minho, Portugal

PROGRAM COMMITTEE:
Please check the program committee members at http://closer.scitevents.org/ProgramCommittee.aspx

CONFERENCE AREAS:

AREA 1: SERVICES SCIENCE

– Business Process Management and Web Services
– Business Services Realized by IT Services
– Cloud Brokering
– Enterprise Architectures and Services
– Cloud Workflow Management Systems
– Industrial Applications of Services Science
– Information and Service Economy
– Internet of Services
– Model-driven Web Service Engineering
– Semantic and Service Web
– Microservices: Atomation Deployment and Management, Resource Allocation Elasticity, Service State and Resilience
– Service Innovation
– Service Lifecycle Management
– Service-oriented Architecture
– Web Services
– Service Society
– Service Management
– Service Platforms
– Big Data Cloud Services

AREA 2: DATA AS A SERVICE

– On-Line Transaction Processing (OLTP) services
– NOSQL Services: Store, Visualization, Processing
– Time Series Services: Databases, Dashboards

AREA 3: CLOUD OPERATIONS AND ANALYTICS

– Cloud Management Platforms
– Cloud Analytics
– Cloud Reliability and Resilience
– Cloud Automation
– Hybrid Clouds and their Integration
– Compliance Management in the Cloud
– Cloud Configuration and Capacity Management
– Cloud Workload Profiling and Migration
– Cloud Metering and Billing
– Large-scale Monitoring
– Operations Excellence
– Cloud Performance Analytics

AREA 4: MOBILE CLOUD COMPUTING

– Mobile and Energy-efficient use of Clouds
– Mobile and Wearable Computing Systems and Services
– Mobile Cloud Architectures and Models
– Mobile Cloud Networking
– Mobile Commerce, Handheld Commerce and e-markets on Cloud
– High Performance Computing as a Service

AREA 5: EDGE CLOUD AND FOG COMPUTING

– Edge Cloud Orchestration
– Cluster Management
– Edge Cloud Network Management
– Edge Cloud Data Management
– IoT-Cloud Integration

AREA 6: SERVICE MODELLING AND ANALYTICS

– Cloud Cost Analysis
– Data and Service Analytics
–  Service Discovery
– Service Modeling and Specification
– Service Monitoring and Control
– Services Security and Reliability
– Service Ecosystems
– Service Simulation
– Service Performance Analytics
– Analytics and Services

AREA 7: CLOUD COMPUTING FUNDAMENTALS

– Cloud Application Portability
– Cloud Computing Architecture
– Cloud Delivery Models
– Cloud Deployment Models: Public/Private/Hybrid Cloud
– Cloud Education
– Cloud Interoperability
– Cloud Risk, Challenges and Governance
– Cloud Scenarios
– Cloud Standards
– QoS for Applications on Clouds
– Energy Management
– Resource Management
– Privacy, Security and Trust
– Federated Cloud

AREA 8: CLOUD COMPUTING PLATFORMS AND APPLICATIONS

– Access Control
– Cloud Solution Design Patterns
– Cloud for Enterprise Business Transformation
– Cloud Application Architectures
– Cloud Application Scalability and Availability
– Cloud Applications Performance and Monitoring
– Cloud Economics
– Cloud Middleware Frameworks
– Engineering Mobile Clouds and Mobile-based Systems
– Development Methods for Cloud Applications
– XaaS
– Cloud Services
– Mobile Cloud Computing Models, Infrastructures and Approaches
– Cloud Data Centers, Storage and Networking Technologies
– Mobile-aware Cloud Data Management and Data Retrieval
– High Performance Computing Cloud Applications ; Use cases , Experiences with HPC Clouds
– Hybrid Cloud Integration

AREA 9: CLOUD COMPUTING ENABLING TECHNOLOGY

– API Management
– Multi-Cloud Solutions Enablement
– Cloud Quality and Performance
– Cloud Optimization and Automation
– Cloud Resource Virtualization and Composition
– Cloud Management and Operations
– Green and Energy Management
– High Performance Cloud Computing
– Cloud Migration
– Monitoring of Services, Quality of Service, Service Level Agreements
– Performance Development and Management
– Security, Privacy and Compliance Management
– Virtualization Technologies
– Container Schedulers
– Application Containers
– Cloud-assisted Human-centered Applications based on Wearable Computing Devices
– Energy-saving Mobile Cloud Protocols
– Distributed and Cloud Networking
– Energy Management in Cloud Centers

CFP CLOSER 2017 – Int’l Conf. on Cloud Computing and Services Science (Porto/Portugal)

The 7th International Conference on Cloud Computing and Services Science (CLOSER 2017 – http://closer.scitevents.org) has an open call for papers, whose deadline is scheduled for November 21, 2016. We hope you can participate in this conference by submitting a paper reflecting your current research in any of the following areas:
– Services Science
– Data as a Service
– Cloud Operations and Analytics
– Mobile  Cloud  Computing
– Edge Cloud and Fog Computing
– Service Modelling and Analytics
– Cloud Computing Fundamentals
– Cloud Computing Platforms and Applications
– Cloud Computing Enabling Technology

CLOSER 2017 will be held in Porto, Portugal, April 24 – 26, 2017.

The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) and held in cooperation with the ACM Special Interest Group on Management Information Systems (ACM SIGMIS) and technically co-sponsored by the EGI. INSTICC is Member of the Workflow Management Coalition (WfMC) and Object Management Group (OMG). The conference logistics partner is the Science and Technology Events (SCITEVENTS).

The 7th International Conference on Cloud Computing and Services Science, CLOSER 2017, focuses on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current IT-driven collaborations. The conference is nevertheless not about the union of these two (already broad) fields, but about Cloud Computing where we are also interested in how Services Science can provide theory, methods and techniques to design, analyze, manage, market and study various aspects of Cloud Computing.

We would like to highlight the presence of the following keynote speakers:
– Stefan Tai, TU Berlin, Germany
– Jin Li, Guangzhou University, China
– Francisco Herrera, University of Granada, Spain

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book (final approval pending).
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).

We also would like to highlight the possibility to submit to the following Workshop, whose deadline is scheduled for January 17, 2017:
– Workshop on Tools for an Energy Efficient Cloud (TEEC)

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.
We would like to highlight the Doctoral Consortium on Cloud Computing and Services Science that will take place in conjunction with CLOSER and aims to provide an opportunity for graduate students to explore their research interests in an interdisciplinary workshop, under the guidance of a panel of distinguished experts in the field (http://closer.scitevents.org/DoctoralConsortium.aspx).

CLOSER 2017 will be held in conjunction with COMPLEXIS (International Conference on Complexity, Future Information Systems and Risk –http://www.complexis.org/), IoTBDS (2nd International Conference on Internet of Things, Big Data and Security – http://iotbds.org), SMARTGREENS (6th International Conference on Smart Cities and Green ICT Systems – http://www.smartgreens.org),  VEHITS (3rd International Conference on Vehicle Technology and Intelligent Transport Systems – http://www.vehits.org)  in Porto, Portugal. Registration to CLOSER will enable free attendance to any sessions of COMPLEXIS, IoTBDS, SMARTGREENS and VEHITS conferences as a non-speaker.

Please check further details at the CLOSER conference website (http://closer.scitevents.org).
Should you have any question please don’t hesitate contacting me.

ARES 2016 – CALL FOR PAPERS

ARES 2016 – CALL FOR PAPERS

***************************************************************************************
The 11th International Conference on Availability, Reliability and Security (ARES 2016)
August 31 – September 2, 2016, Salzburg, Austria
http://www.ares-conference.eu/
****************************************************************************************

***********
ARES CONFERENCE
************
The 11th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security – with special focus on the crucial linkage between availability, reliability and security.
ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals. The acceptance rate of the ARES 2015 conference was 29% (full papers only). The ARES conferences have been published by Conference Publishing Services (CPS).

************
CONFERENCE OFFICERS
************
General Chair
Dominik Engel, Salzburg University of Applied Sciences, Austria

Program Committee Chairs
Stephen B. Wicker, Cornell University, USA
Dominik Engel, Salzburg University of Applied Sciences, Austria

************
IMPORTANT DATES
************
Submission Deadline: March 13, 2016
Author Notification: May 30, 2016
Proceedings Version: June 20, 2016
Conference: August 31 – September 2, 2016

************
SUBMISSION
************
The proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS) of IEEE. Authors of selected papers that are accepted by and presented at the ARES Conference (including workshops) will be invited to submit an extended version to special issues of international journals.
Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.
For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:

full paper (10 pages)
short paper (6 pages)
workshop paper (8 pages, a maximum of 10 pages is tolerated)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.
Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.
The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2016

************
PROGRAM COMMITTEE
************
Isaac Agudo, University of Malaga, Spain
Esma Aimeur, University of Montreal, Canada
Philipp Amann, Europol, EC3, Netherlands
Todd R. Andel, University of South Alabama, US
Amin Anjomshoaa, Massachusetts Institute of Technology (MIT), US
Francesco Buccafurri, University of Reggio Calabria, Italy
Luanne Burns Goldrich, The Johns Hopkins University Applied Physics Laboratory, US
Mario Cagalj, University of Split, Croatia
Jordi Castellà-Roca,Rovira i Virgili University of Tarragona, Spain
Lorenzo Cavallaro, Royal Holloway, University of London, UK
David Chadwick, University of Kent, UK
Soon Ae Chun, City University of New York, US
Nathan Clarke, Plymouth University, UK
Marijke Coetzee, University of Johannesburg, South Africa
Mark Dillon, International Criminal Court, NL
Adam Doupé, Arizona State University, US
Pavlos Efraimidis, Democritus University of Thrace, Greece
Christian Engelmann, Oak Ridge National Laboratory, US
Luis Enrique Sánchez Crespo, University of Castilla-la Mancha, Spain
Zekeriya Erkin, TU Delft, Netherlands
Aristide Fattori, Università degli Studi di Milano, Italy
Christophe Feltus, Luxembourg Institute of Science and Technology, Luxembourg
José Maria de Fuentes, Carlos III University of Madrid, Spain
Steven Furnell, Plymouth University, UK
Nico Golde, Qualcomm Research Germany, Germany
Bogdan Groza, Politehnica University of Timisoara, Romania
Dominik Herrmann, University Hamburg, Germany
Martin Gilje Jaatun, SINTEF, Norway
Hai Jin, Huazhong University of Science and Technology, China
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany
Sokratis K. Katsikas, University of Piraeus, Greece
Peter Kieseberg, SBA Research, Austria
Ezzat Kirmani, St. Cloud State University, US
Thomas Korak, TU Graz, Austria
Thorsten Kramp, IBM Research Zurich, Switzerland
Ralf Kuesters, University of Trier, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Shujun Li University of Surrey, UK
Giovanni Livraga, Universita‘ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Konstantinos Markantonakis, Royal Holloway, University of London, UK
Keith Martin, Royal Holloway, University of London, UK
Ioannis Mavridis, University of Macedonia, Greece
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Jeffrey McDonald, University of South Alabama, US
Mattia Monga, Universita` degli Studi di Milano, Italy
Haralambos Mouratidis, University of Brighton, UK
Thomas Moyer, MIT Lincoln Laboratory, US
Alexios Mylonas, Staffordshire University, UK
Thomas Nowey, Krones AG, Germany
Christoforos Ntantogian, University of Piraeus, Greece
Rolf Oppliger, eSECURITY Technologies, Switzerland
Jaehong Park, University of Alabama in Huntsville, US
Günther Pernul, University of Regensburg, Germany
Andreas Peter, University of Twente, Netherlands
Stefanie Rinderle-Ma, Vienna University, Austria
Stefanie Roos, TU Dresden, Germany
Domenico Rosaci, University „Mediterranea“ of Reggio Calabria, Italy
Volker Roth, Freie Universität Berlin, Germany
Giovanni Russello, University of Auckland, New Zealand
Mark Scanlon, University College Dublin, Ireland
Sebastian Schinzel, FH Münster, Germany
Jörn-Marc Schmidt, secunet, Germany
Max Schuchard, University of Minnesota, US
Stefan Schulte Vienna University of Technology, Austria
Dimitris Simos, SBA Research, Austria
Jon A. Solworth, University of Illinois at Chicago, US
Mark Strembeck, WU Vienna, Austria
Jakub Szefer, Yale School of Engineering & Applied Science, US
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Andreas Unterweger, Salzburg University of Applied Sciences, Austria
Umberto Villano, Universita‘ del Sannio, Italy
Artemios Voyiatzis, SBA Research, Austria
Xiao Wang, Carnegie Mellon University, US
Jinpeng Wei, Florida International University, US
Christos Xenakis, University of Piraeus, Greece
Fabian Yamaguchi, Göttingen University, Germany
Alec Yasinsac, University of South Alabama, US
Nicola Zannone, Eindhoven University of Technology, Netherlands

************
TOPCIS of interest include, but are not limited to:
************
Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security

XcodeGhost threat still remains

XcodeGhost is a malware on Apple’s iOS appeared in September 2015. Chinese cybercriminals exploited the fact that official Xcode developer’s kit, almost 3 GB, take long time to be downloaded by Apple’s servers. They offered an easier and faster way to download the Xcode package from cloud file sharing service Baidu. However the offered version proved to be the malicious XcodeGhost as the Chinese cybercriminals planted malware in the original Xcode package. The malware didn’t show off in the developer’s computer but it indirectly infected all the applications compiled with the XcodeGhost compiler. Consequently it made it to the App store and it was detected in more than 300 apps. Infected applications sent information to the XcodeGhost command and control servers (CnC) through http protocol. Additionally according to paloalto security company ([1], [2]) XcodeGhost could be used for phishing passwords by prompt deceptive alert dialog with built-in remote control functionalities. Apple responded quickly to this threat and on 22th of September announced [3] that the infected apps were removed from the App Store. Also pointed out that Xcode should be directly downloaded from Apple and that in other case the package should be assessed for its validity with the «spctl –assess –verbose /Applications/Xcode.app» terminal command on a Gatekeeper enabled system.

However the XcodeGhost threat seems persistent. Quite some time after the disclosure of the threat, some users are sticked to the old infected versions of the apps and the iOS. Additionally, having developers, who had the malicious XcodeGhost version, refresh and validate their Xcode installation is not enough. Most of the developers use third-party components in their programs which can be considered a risk as they cannot be sure if the third-party libraries or sub-programs are infected or not.
Moreover the Fireeye security company [4] monitored customers’ networks and came in some interesting deductions: XcodeGhost has entered into U.S. enterprises and a variant of XcodeGhost is around. In only a month time, 210 enterprises were found to be infected that generated 28.000 attempts to connect to XcodeGhost CnC. Enterprises’ efforts to block the XcodeGhost DNS query inside their networks in order to prevent communication between iPhones and CnCs is not effective when their users are outside their domain.

Besides FireEye identified a new version of malware called XcodeGhost S. XcodeGhost S intends to infect iOS 9 applications and allow them to bypass Apple’s detection. Specifically Apple in a new approach introduced in iOS 9 has made obligatory the use of secure connections through https. This breaks the communications of XcodeGhost infected apps with its CnCs servers that use http. To circulate this problem cybercriminals used an Apple’s feature that allows developers to add exceptions in app’s configuration files (info.plist) to allow http connections. Moreover new XcodeGhost malware concatenates character by character the strings to bypass a simple detection scheme.

Unfortunately there is no feature provided by Apple that automatically inspects iOS devices for XcodeGhost malware. Though SANS researchers [6] suggested that end users should check applications’ logs for suspicious http traffic to «http://init.icloud-analysis.com» and the IP addresses 52.2.85.22, 52.4.74.88, 52.6.167.64, 52.68.131.221, 104.238.125.92.

[1] XcodeGhost Attacker Can Phish Passwords and Open URLs through Infected Apps – paloalto networks
[2] More Details on the XcodeGhost Malware and Affected iOS Apps – paloalto networks
[3] https://www.fireeye.com/blog/threat-research/2015/11/xcodeghost_s_a_new.html – FireEye
[4] https://developer.apple.com/news/?id=09222015a – Apple Developer
[5] https://nakedsecurity.sophos.com/2015/11/09/apples-xcodeghost-malware-still-in-the-machine/
[6] https://isc.sans.edu/diary/Detecting+XCodeGhost+Activity/20171 – SANS ISC InfoSec Forums

Last CFP CLOSER 2016 – Int’l Conf. on Cloud Computing and Services Science (Rome/Italy)

The 6th International Conference on Cloud Computing and Services Science (CLOSER 2016 – http://closer.scitevents.org) steering committee cordially invites you to submit a paper to the CLOSER 2016 Conference, to be held in Rome, Italy. The deadline for paper submission is scheduled for October 27, 2015.

CLOSER 2016 will be held in Rome, Italy, April 23 – 25, 2016.

The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) and held in cooperation with the ACM Special Interest Group on Management Information Systems (ACM SIGMIS). The conference is also technically co-sponsored by the IEEE CS CC STC and IEEE STC Cloud Computing. INSTICC is Member of the Workflow Management Coalition (WfMC) and Object Management Group (OMG).

We would like to highlight the presence of the following keynote speakers:
– Pierangela Samarati, Università degli Studi di Milano, Italy
– Frank Leymann, University of Stuttgart, Germany
– Peter Sloot, University of Amsterdam, Netherlands; Complexity Institute Singapore, Singapore; ITMO St. Petersburg, Russian Federation
– Verena Kantere, University of Geneva, Switzerland

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

CLOSER 2016 will be held in conjunction with CSEDU (8th International Conference on Computer Supported Education – http://www.csedu.org), SMARTGREENS (5th International Conference on Smart Cities and Green ICT Systems – http://www.smartgreens.org/), WEBIST (12th International Conference on Web Information Systems and Technologies – http://www.webist.org), VEHITS (2nd International Conference on Vehicle Technology and Intelligent Transport Systems –http://www.vehits.org), IoTBD (International Conference on Internet of Things and Big Data) and COMPLEXIS (International Conference on Complex Information Systems- http://www.complexis.org) in Rome, Italy. Registration to CLOSER will enable free attendance to any sessions of CSEDU, SMARTGREENS, WEBIST, VEHITS, IoTBD, COMPLEXIS conferences  as a non-speaker.

Please check further details at the CLOSER conference website (http://closer.scitevents.org).

Second call for papers for the 15th European Conference on Cyber Warfare and Security ECCWS-2016

This is the Second call for papers for the 15th European Conference on Cyber Warfare and Security ECCWS-2016, being hosted by Bundeswehr University, Munich, Germany on the 7-8 July 2016.

This call will close on the 3rd of December 2015.

The 15th European Conference on Cyber Warfare and Security (ECCWS) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat cyber warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.

For more information please go to: http://academic-conferences.org/eccws/eccws2016/eccws16-call-papers.htm

3rd International Conference on Cloud Security and Management ICCSM-2015

Preparations for the 3rd International Conference on Cloud Security and Management ICCSM-2015 are now well underway.

 You can see the latest programme at: http://academic-conferences.org/iccsm/iccsm2015/iccsm15-timetable.htm

Please note that the timetable is subject to change and will be updated as necessary until  mid October 2015.

There are a number of registration options available, details of which can be found at: http://academic-conferences.org/iccsm/iccsm2015/iccsm15-registration.htm

Follow the conference on LinkedIn   Facebook and Twitter

Securing Email Communications from Facebook

To enhance the privacy of  email content, Facebook is gradually rolling out an experimental new feature that enables people to add OpenPGP public keys to their profile; these keys can be used to “end-to-end” encrypt notification emails sent from Facebook to email accounts. People may also choose to share OpenPGP keys from their profile, with or without enabling encrypted notifications.

Users will be able to update their own public key, using a desktop browser, at:

Screenshot

Where encrypted notifications are enabled, Facebook will sign outbound messages using their own key to provide greater assurance that the contents of inbound emails are genuine. The Facebook key can be checked at keyservers such as SKS and MIT.

Screenshot-1
More info:

https://www.facebook.com/notes/protect-the-graph/securing-email-communications-from-facebook/1611941762379302

(Greek) Πρόσκληση Συμμετοχής στο ICT Security World – Τετάρτη 4 Μαρτίου 2015

Sorry, this entry is only available in Greek.