=========================================================================
CALL FOR PAPERS
IEEE 2014 Fourth International Workshop on
Security and Privacy Engineering (SPE2014)
One day between June 27 and July 2, 2014,
at Hilton Anchorage, Alaska, USA
Co-located with IEEE SERVICES 2014
(http://www.servicescongress.org/2014/)
Workshop Web page: http://sesar.dti.unimi.it/SPE2014/
=========================================================================
==========
Description
==========
Built upon the success of spectrum of conferences within the IEEE
World Congress on Services, the Security and Privacy Engineering (SPE
2014) workshop is a unique place to exchange ideas of engineering
secure systems in the context of service computing, cloud computing,
and big data analytics. The emphasis on engineering in security and
privacy of services differentiates the workshop from other traditional
prestigious security and privacy workshops, symposiums, and
conferences. The practicality and value realization are examined by
practitioners from leading industries as well as scientists from
academia.
In line with the engineering spirit, we solicit original papers on
building secure service systems that can be applied to government
procurement, digital medical records, cloud environments, social
networking for business purposes, multimedia application, mobile
commerce, education, and the like. Potential contributions could
cover, but are not limited to, methodologies, protocols, tools, or
verification and validation techniques. We also welcome review papers
that analyze critically the status of current Security and Privacy
(S&P) in a specific area. Papers from practitioners who encounter
security and privacy problems and seek understanding are also welcome.
Topics of interests of SPE 2014 include, but are not limited to:
- S&P Engineering of Service-Based Applications
- Security Engineering of Service Compositions
- Practical Approaches to Security Engineering of Services
- Privacy-Aware Service Engineering
- Industrial and Real Use Cases in S&P Engineering of (Cloud) Services
- S&P Engineering of Cloud Services
- Auditing and Assessment
- Assurance and Certification
- Security Management and Governance
- Privacy Enforcement in Clouds and Services
- Cybersecurity Issues of Clouds and Services
- Validation and Verification of S&P in Clouds and Services
- Applied Cryptography for S&P in Clouds and Services
- S&P Testing in Clouds and Services
- Security and Privacy Modeling
- Socio-Economics and Compliance
- Education and Awareness
- Big Data S&P Engineering
==============
Important Dates
==============
Full Paper Submission Due Date: March 29, 2014
Decision Notification (Electronic): April 12, 2014
Camera-Ready Copy Due Date & Pre-registration Due: May 1, 2014
===============
Paper Submission
===============
Authors are invited to submit full papers (about 8 pages) or short
papers (about 4 pages) as per IEEE 8.5 x 11 manuscript guidelines
(download Word templates
http://conferences.computer.org/icws/2014/IEEECS_CPS_8.5x11x2.zip or
LaTeX templates
http://conferences.computer.org/icws/2014/IEEECS_CPS_LaTeX_Letter_2Col.zip).
The submitted papers can only be in the format of PDF or WORD. Please
follow the IEEE Computer Society Press Proceedings Author Guidelines
to prepare your papers, respectively. At least one author of each
accepted paper is required to attend the workshop and present the
paper. All papers must be submitted via the confhub submission system
for the SPE workshop (TBD).
First time users need to register with the system first (see these
instructions for details
http://www.servicescongress.org/2014/submission.html). All the
accepted papers by the workshops will be included in the Proceedings
of the IEEE 10th World Congress on Services (SERVICES 2014) which will
be published by IEEE Computer Society.
==============
Workshop Chairs
==============
- Claudio Agostino Ardagna, Università degli Studi di Milano, Italy,
claudio.ardagna-AT-unimi.it
- Meiko Jensen, Independent Centre for Privacy Protection
Schleswig-Holstein, Germany, Meiko.Jensen-AT-rub.de
- Zhixiong Chen, Mercy College, NY, USA, zchen-AT-mercy.edu
- Ernesto Damiani, Università degli Studi di Milano, Italy,
ernesto.damiani-AT-unimi.it
================
Program Committee
================
- Rafael Accorsi, University of Freiburg, Germany
- Rasool Asal, Etisalat BT Innovation Centre, UAE
- Jens-Matthias Bohli, NEC Laboratories Europe, Germany
- Bud Brgger, Fraunhofer IAO, Germany
- Ali Chettih, Pivot Point Security, Mercy College NY, USA
- Frances Cleary, Waterford Institute of Technology, Ireland
- Quiang Duan, Penn State at Abington, USA
- Massimo Felici, Hewlett-Packard Laboratories, USA
- Christopher Frenz, CTO at See-Thru, USA
- Atsuhiro Goto, Institute of Information Security, Japan
- Nils Gruschka, University of Applied Sciences Kiel, Germany
- Marit Hansen, Independent Centre for Privacy Protection
Schleswig-Holstein, Germany,
- Patrick Hung, University of Ontario Institute of Technology, Canada
- Luigi Lo Iacono, University of Applied Sciences Cologne, Germany
- Florian Kerschbaum, SAP Research Karlsruhe, Germany
- Zhiqiang Lin, UT Dallas, USA
- Jörg Schwenk, Ruhr University Bochum, Germany
- Wei Tan, IBM, USA
- Jong Yoon, Mercy College, USA
- Yingzhou Zhang, Nanjing University of Posts and Telecommunications, China
==============
Publicity Chair
==============
- Fulvio Frati, Università degli studi di Milano, Italy
More information available at http://sesar.dti.unimi.it/SPE2014/
Workshop „Cyberwarfare“
1. Oktober 2015
im Rahmen der INFORMATIK 2015 in Cottbus
http://www.informatik2015.de
Call for Papers
---------------
Erstens sind inzwischen mehrere konkrete Fälle von staatlich organisierten Angriffen auf andere Staaten bekannt, zweitens haben spätestens die Snowden-Enthüllungen klar gemacht, dass neben der passiven und aktiven Informationsgewinnung insbesondere auch aktive Angriffe zur Beeinträchtigung von Informations- und Kommunikationssystemen geplant und durchgeführt wurden und werden. Doch nicht nur die Vereinigten Staaten greifen andere Länder an (wobei sie offenbar auch wenig Unterschied zwischen Verbündeten und Gegnern machen), sondern auch umgekehrt werden westliche Staaten und deren Wirtschaft angegriffen (z.B. der Nordkoreanische Angriff auf Sony Pictures Entertainment vom Jahreswechsel 2014/2015, der umgekehrt zu Wirtschaftssanktionen gegen Nordkorea) führte.
Der Workshop „Cyberwarfare“ soll etwa Beiträge zu folgenden Fragen liefern:
Inwieweit unterscheiden sich staatlich organisierte Cyberangriffe von denen krimineller Organisationen und/oder einzelnen Hackern?
- Welche konkreten Gefahren gehen von zwischenstaatlichen Angriffen aus?
- Was sind die technischen Mittel für derartige Angriffe?
- Welche Kosten und welche Schäden werden durch die Angriffe verursacht?
- Können Angriffe gegen nicht-demokratische Staaten ethisch gerechtfertigt sein?
- Welche außenpolitische Dimension geht von den Angriffen aus?
- Inwieweit tragen Cyberangriffe militärische Züge (Cyberwar)?
- Gibt es für diese Form der Cyberwaffen ähnliche Regulierungsmechanismen wie beispielsweise für chemische, biologische oder nukleare Waffen?
Die angenommenen Workshop-Beiträge werden im Tagungsband der INFORMATIK 2015 veröffentlicht. Die Autorenrichtlinien und Vorlagen zur Anfertigung von Beiträgen finden sich unter [1] auf der Webseite der INFORMATIK 2015.
Termine und Fristen
-------------------
20.04.2015 Einreichungen von Beiträgen für den Workshop
18.05.2015 Entscheidung über die Annahme der Workshopbeiträge
20.06.2015 Einreichung der druckfähigen Workshopbeiträge für die Proceedings
Geplanter Ablauf
----------------
Donnerstag, 1. Oktober 2015
09:00-09:45 Eingeladener Eröffnungsvortrag
09:45-12:15 Vorträge (3-4) der angenommenen Papiere inkl. einer Kaffeepause
12:15-12:30 Zusammenfassung der Ergenisse
12:30 Ende des Workshops
Programmkomitee
----------------
Jürgen Altmann, Universität Dortmund
Matthias Englert, TU Darmstadt
Hannes Federrath, Universität Hamburg
Sandro Gaycken, Freie Universität Berlin
Gerald Kirchner, Zentrum für Naturwissenschaft und Friedensforschung Hamburg
Götz Neuneck, Institut für Friedensforschung und Sicherheitspolitik Hamburg
Stefan Oeter, Universität Hamburg
Hintergrund
-----------
Anknüpfend an die Ringlvorlesung „Cyber-Security, Cyber-War, Cyber-Peace“ [2], die im Wintersemester 2013 an der Universität Hamburg stattfand, soll das Thema nun im Rahmen des halbtägigen Workshops [3] auf der INFORMATIK 2015 aufgegriffen werden.
Organisatoren
-------------
Hannes Federrath, Universität Hamburg
Götz Neuneck, Institut für Friedensforschung und Sicherheitspolitik Hamburg
Kontakt
-------
Hannes Federrath <federrath(a)informatik.uni-hamburg.de>
Links
-----
[1] http://www.informatik2015.de/autoren-ressourcen.html
[2] https://www.inf.uni-hamburg.de/de/home/news/archive/friedensvorlesung.html
[3] https://svs.informatik.uni-hamburg.de/workshop-cyberwarfare/
=====================================================================
CALL FOR PARTICIPATION
IFIP SEC 2015
30th IFIP TC-11 SEC 2015 International Information
Security and Privacy Conference
Hamburg, Germany, 26-28 May 2015
https://ifipsec.org/2015/
Early Registration until 31 March 2015
via https://ifipsec.org/2015/reg-index.php
The IFIP SEC conference is the flagship event of the International
Federation for Information Processing (IFIP) Technical Committee 11 on
Security and Privacy Protection in Information Processing Systems
(TC-11, www.ifiptc11.org). IFIP SEC 2015 is organized by and hosted at
the University of Hamburg, a vibrant harbor city in Northern Germany.
The program committee selected 42 out of 232 submissions, which present
novel research on various theoretical and practical aspects of security
and privacy protection in ICT systems.
CONFERENCE PROGRAM:
- 42 paper presentations (14 sessions)
- Four co-located conferences/workshops
- Keynote and Award Sessions
- Reception, Gala Dinner and Social Event
SESSION TOPICS:
- Privacy
- Web Security
- Access Control, Trust and Identity Management
- Network Security
- Security Management and Human Aspects of Security
- Software Security
- Applied Cryptography
- Mobile and Cloud Services Security
- Cyber-physical systems and Critical Infrastructures Security
The detailed program is available here:
https://ifipsec.org/2015/program.php
CO-LOCATED EVENTS:
IFIP WG 11.11 International Conference on Trust Management (IFIPTM)
IFIP WG 11.8 World Conference on Information Security Education (WISE)
IFIP WG 11.5 Workshop on IT Assurance & Control (27 May)
IFIP WG 11.1 Workshop on Information Security Management (29 May)
Details regarding all co-located events can be found here:
https://ifipsec.org/2015/colocated.php
GENERAL CHAIRS:
Kai Rannenberg (Goethe-Universitaet Frankfurt, DE)
Steven Furnell (Plymouth University, UK)
PROGRAM CHAIRS:
Hannes Federrath (University of Hamburg, DE)
Dieter Gollmann (Hamburg University of Technology, DE)
ORGANIZING CHAIR:
Dominik Herrmann (University of Hamburg, DE)
PROGRAM COMMITTEE:
see https://ifipsec.org/2015/committees.php
For more information, please feel free to contact the chairs at
sec2015(a)ifipsec.org or visit https://ifipsec.org/2015/
We look forward to welcoming you in Hamburg!
=====================================================================