-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Liebe NETSEC-Mitglieder,
Am 19. und 20. April 2016 findet an der Ruhr-Universität Bochum das
interdisziplinäre Symposium der Arbeitsgruppe Identitätsschutz im
Internet (a-i3) und des Bundesamts für Sicherheit in der
Informationstechnik (BSI) statt.
Wie immer wird die aktuelle Angriffslage im Internet technisch und
rechtlich diskutiert.
Das Programm wurde jetzt um Beiträge zu aktuellen Themen erweitert!
"Ransomware" bezeichnet Schadsoftware, mit der Nutzer zur Zahlung eines
"Lösegelds" ("ransom") erpresst werden. Dazu werden persönliche Dateien
verschlüsselt, versteckt oder gelöscht, verbunden mit dem Angebot, diese
nach Zahlung des Lösegeldes wieder herzustellen. Ob dieses Versprechen
aber eingehalten wird, ist fraglich. Eine neue Dimension erreichten
Ransomware-Angriffe, als 2016 bekannt wurde, dass zwei deutsche und drei
amerikanische Krankenhäuser ihre Tätigkeit teilweise einstellen mussten,
da sie einem solchen Angriff zum Opfer gefallen waren.Das Thema wird
durch den renommierten Experten Ralf Benzmüller, Leiter des G Data
Security Labs, sowie durch Tilman Frosch, G Data, erörtert.
Am gleichen Tag wird zudem der Gegenstand des aktuellen Streits zwischen
Apple und dem FBI diskutiert: Was nützt Sicherheitstechnik mit
Hintertüren?
Weitere aktuelle Trends:
·Advanced Persistent Threads, referiert durch Frank Boldewin,
IT-Security Architekt bei der GAD eG.
·Aktuelle Gesetzgebung: Umsetzung der eIDAS-Verordnung, ein Vortrag aus
Sicht der Praxis von Dr. Kim Nguyen, Bundesdruckerei.
Das aktuelle Programm finden Sie unter www.a-i3.org
<http://www.a-i3.org> zum Abruf bereit.
Wir würden uns freuen, wenn Sie auf dem diesjährigen Symposium mit uns
diskutieren.
Mit freundlichen Grüßen
Arbeitsgruppe Identitätsschutz im Internet e.V. (a-i3)
Bundesamt für Sicherheit in der Informationstechnik (BSI)
- --
Prof. Dr. Jörg Schwenk
www.nds.rub.de
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
iEYEARECAAYFAlcDf2UACgkQuEf499yiNI35WgCeOUGvFZpXJq5h7rgUKRWQRffK
5dsAn2ub7m6eahP2e87SPDmf8R7e1mkm
=WtC7
-----END PGP SIGNATURE-----
Liebe Kollegen,
ein für einige von Ihnen wahrscheinlich sehr interessanter CFP. Harte Einreichungsfrist ist der 21.3.2016.
Ich möchte gleichzeitig auf die Security & Privacy Week im Sommer in Darmstadt hinweisen, bei der wir ein sehr starkes Programm haben werden:
https://www.securityweek2016.tu-darmstadt.de/spw2016/
Viele Grüße
Matthias Hollick
++++++++++++++++++++++++++++++++++++++++++++++++++++++
Call For Papers
-----------------------------------------------------------------------
The 9th ACM Conference on Security and Privacy
in Wireless and Mobile Networks
ACM WiSec '16
Darmstadt, Germany
July 18th - 20th 2016
https://www.securityweek2016.tu-darmstadt.de/wisec-2016
-----------------------------------------------------------------------
ACM WiSec 2016 will run from July 18 to July 20, 2016. It will be
co-located with PETS 2016 as well as a number of security-related
workshops as a part of the Security Week 2016 in Darmstadt, Germany.
IMPORTANT DATES:
Abstract submission: March 21, 2016 (EXTENDED)
Paper submission: March 21, 2016 (EXTENDED)
Notification to authors: April 25, 2016
Poster and demo proposal submission: May 4, 2016
Notification to poster/demo presenters: May 10, 2016
Camera-ready version: May 20, 2016
CONFERENCE SCOPE:
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all
aspects of security and privacy in wireless and mobile and mobile
networks and their applications. In addition to the traditional
ACM WiSec topics of physical, link, and network layer security,
we welcome papers focusing on the security and privacy of mobile
software platforms, usable security and privacy, biometrics,
cryptography, and the increasingly diverse range of mobile or
wireless applications such as Internet of Things, and Cyber-
Physical Systems. The conference welcomes both theoretical
as well as systems contributions.
Topics of interest include, but are not limited to:
* Security & privacy for smart devices (e.g., smartphones)
* Wireless and mobile privacy and anonymity
* Secure localization and location privacy
* Cellular network fraud and security
* Jamming attacks and defenses
* Key management (agreement or distribution) for wireless or mobile systems
* Information-theoretic security schemes for wireless systems
* Theoretical and formal approaches for wireless and mobile security
* Cryptographic primitives for wireless and mobile security
* NFC and smart payment applications
* Security and privacy for mobile sensing systems
* Wireless or mobile security for emerging applications
(e.g, privacy in health, automotive, avionics, smart grid, or IoT applications)
* Physical tracking security and privacy
* Usable mobile security and privacy
* Economics of mobile security and privacy
* Bring Your Own Device (BYOD) security
* Mobile malware and platform security
* Security for cognitive radio and dynamic spectrum access systems
* Security protocols for wireless networking
The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.
FULL AND SHORT PAPERS: Full paper submissions to ACM WiSec 2016 can be
up to 10 pages in the ACM conference style excluding the bibliography
and well marked appendices, and up to 12 pages in total. ACM WiSec
also encourages the submission of short papers with a length of up to
6 pages, which describe mature work of a more succinct nature. All
papers must be thoroughly anonymized for double-blind reviewing.
Detailed submission instructions will appear on the conference website.
POSTERS AND DEMOS: WiSec also solicits submission of posters and demos.
ORGANISATION:
Organising Committee:
General Chair:
* Matthias Hollick, Technische Universität Darmstadt, Germany
Program Chairs:
* Panos Papadimitratos, KTH, Sweden
* William Enck, NC State University, USA
Publicity Chairs:
* Roberto Di Pietro, Nokia Bell Labs, Paris, France
* Wenjia Li, New York Institute of Technology, USA
Publication/Registration Chairs:
* Daniel Steinmetzer, Technische Universität Darmstadt, Germany
* Adwait Nadkarni, NC State University, USA
Poster and Demo Chairs:
* Alexandra Dmitrienko, ETH Zürich and TU Darmstadt, Switzerland/Germany
* Bruce DeBruhl, Cal Poly, USA
Web Chair:
* Jiska Classen, Technische Universität Darmstadt, Germany
Local Organization/Arrangement Chair:
* Matthias Schulz, Technische Universität Darmstadt, Germany
Finance Chair
* Matthias Schulz, Technische Universität Darmstadt, Germany
Steering Committee:
* Srdjan Capkun, ETH Zürich, Switzerland (chair)
* Ivan Martinovic, Oxford University, UK
* Cristina Nita-Rotaru, Purdue University, USA
* Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany
* Patrick Traynor, University of Florida, USA
--
*new phone numbers from 08.02.2016 on*
Prof. Dr.-Ing. Matthias Hollick
Secure Mobile Networking Lab - SEEMOO
Email: mhollick(a)seemoo.tu-darmstadt.de
Web: http://www.seemoo.de
Phone: +49 6151 16-25470 Fax: +49 6151 16-25471
Department of Computer Science
Center for Advanced Security Research Darmstadt
Technische Universität Darmstadt
Mornewegstr. 32 (Office 4.2.09, Building S4/14)
D-64293 Darmstadt, Germany
=========================================================================
CALL FOR PAPERS
IEEE 2014 Fourth International Workshop on
Security and Privacy Engineering (SPE2014)
One day between June 27 and July 2, 2014,
at Hilton Anchorage, Alaska, USA
Co-located with IEEE SERVICES 2014
(http://www.servicescongress.org/2014/)
Workshop Web page: http://sesar.dti.unimi.it/SPE2014/
=========================================================================
==========
Description
==========
Built upon the success of spectrum of conferences within the IEEE
World Congress on Services, the Security and Privacy Engineering (SPE
2014) workshop is a unique place to exchange ideas of engineering
secure systems in the context of service computing, cloud computing,
and big data analytics. The emphasis on engineering in security and
privacy of services differentiates the workshop from other traditional
prestigious security and privacy workshops, symposiums, and
conferences. The practicality and value realization are examined by
practitioners from leading industries as well as scientists from
academia.
In line with the engineering spirit, we solicit original papers on
building secure service systems that can be applied to government
procurement, digital medical records, cloud environments, social
networking for business purposes, multimedia application, mobile
commerce, education, and the like. Potential contributions could
cover, but are not limited to, methodologies, protocols, tools, or
verification and validation techniques. We also welcome review papers
that analyze critically the status of current Security and Privacy
(S&P) in a specific area. Papers from practitioners who encounter
security and privacy problems and seek understanding are also welcome.
Topics of interests of SPE 2014 include, but are not limited to:
- S&P Engineering of Service-Based Applications
- Security Engineering of Service Compositions
- Practical Approaches to Security Engineering of Services
- Privacy-Aware Service Engineering
- Industrial and Real Use Cases in S&P Engineering of (Cloud) Services
- S&P Engineering of Cloud Services
- Auditing and Assessment
- Assurance and Certification
- Security Management and Governance
- Privacy Enforcement in Clouds and Services
- Cybersecurity Issues of Clouds and Services
- Validation and Verification of S&P in Clouds and Services
- Applied Cryptography for S&P in Clouds and Services
- S&P Testing in Clouds and Services
- Security and Privacy Modeling
- Socio-Economics and Compliance
- Education and Awareness
- Big Data S&P Engineering
==============
Important Dates
==============
Full Paper Submission Due Date: March 29, 2014
Decision Notification (Electronic): April 12, 2014
Camera-Ready Copy Due Date & Pre-registration Due: May 1, 2014
===============
Paper Submission
===============
Authors are invited to submit full papers (about 8 pages) or short
papers (about 4 pages) as per IEEE 8.5 x 11 manuscript guidelines
(download Word templates
http://conferences.computer.org/icws/2014/IEEECS_CPS_8.5x11x2.zip or
LaTeX templates
http://conferences.computer.org/icws/2014/IEEECS_CPS_LaTeX_Letter_2Col.zip).
The submitted papers can only be in the format of PDF or WORD. Please
follow the IEEE Computer Society Press Proceedings Author Guidelines
to prepare your papers, respectively. At least one author of each
accepted paper is required to attend the workshop and present the
paper. All papers must be submitted via the confhub submission system
for the SPE workshop (TBD).
First time users need to register with the system first (see these
instructions for details
http://www.servicescongress.org/2014/submission.html). All the
accepted papers by the workshops will be included in the Proceedings
of the IEEE 10th World Congress on Services (SERVICES 2014) which will
be published by IEEE Computer Society.
==============
Workshop Chairs
==============
- Claudio Agostino Ardagna, Università degli Studi di Milano, Italy,
claudio.ardagna-AT-unimi.it
- Meiko Jensen, Independent Centre for Privacy Protection
Schleswig-Holstein, Germany, Meiko.Jensen-AT-rub.de
- Zhixiong Chen, Mercy College, NY, USA, zchen-AT-mercy.edu
- Ernesto Damiani, Università degli Studi di Milano, Italy,
ernesto.damiani-AT-unimi.it
================
Program Committee
================
- Rafael Accorsi, University of Freiburg, Germany
- Rasool Asal, Etisalat BT Innovation Centre, UAE
- Jens-Matthias Bohli, NEC Laboratories Europe, Germany
- Bud Brgger, Fraunhofer IAO, Germany
- Ali Chettih, Pivot Point Security, Mercy College NY, USA
- Frances Cleary, Waterford Institute of Technology, Ireland
- Quiang Duan, Penn State at Abington, USA
- Massimo Felici, Hewlett-Packard Laboratories, USA
- Christopher Frenz, CTO at See-Thru, USA
- Atsuhiro Goto, Institute of Information Security, Japan
- Nils Gruschka, University of Applied Sciences Kiel, Germany
- Marit Hansen, Independent Centre for Privacy Protection
Schleswig-Holstein, Germany,
- Patrick Hung, University of Ontario Institute of Technology, Canada
- Luigi Lo Iacono, University of Applied Sciences Cologne, Germany
- Florian Kerschbaum, SAP Research Karlsruhe, Germany
- Zhiqiang Lin, UT Dallas, USA
- Jörg Schwenk, Ruhr University Bochum, Germany
- Wei Tan, IBM, USA
- Jong Yoon, Mercy College, USA
- Yingzhou Zhang, Nanjing University of Posts and Telecommunications, China
==============
Publicity Chair
==============
- Fulvio Frati, Università degli studi di Milano, Italy
More information available at http://sesar.dti.unimi.it/SPE2014/
[Apologies if you receive multiple copies of this message]
==========================================================================
Call For Papers
Annual Privacy Forum 2016 (http://privacyforum.eu/) bringing research &
policy together,7-8 September, Frankfurt am Main
Nowadays electronic communication networks and digital services are an
essential part of an increasing number of everyday commodities. In the
era of automated profiling and electronic surveillance, citizens face a
serious threat against their right to privacy and informational
self-determination, especially when using the internet and mobile
services. The lack of transparency regarding the functionality and
interconnection of such services increases the risk of uncontrollable
processing of personal data. In this regard, the upcoming Data
Protection Regulation will be a useful instrument to protect the privacy
of individuals. However, for its successful implementation, this new
framework needs to be enforced by proper technologies and encompassed
with sustainable business models along with mechanisms to promote
privacy awareness and help users to understand the value of their data.
ENISA is organizing the 2016 edition of the annual privacy forum, in the
light of the upcoming data protection regulation and the European
digital agenda. We invite papers covering original work on the
technological, economic, legal and societal aspects of the challenges
that will come up with the implementation of the new framework. We
particularly invite multidisciplinary papers that make it explicit how
the presented work can contribute to bridging the gap between research
and policy. Moreover, in order to also encourage contributions from
policy makers, representatives of competent authorities (such as Data
Protection Authorities), industry experts, NGOs and civil society
associations, we invite opinion papers from all stakeholders on the
above mentioned topics. Opinion papers will reflect the opinion/position
of the author(s) on the selected privacy-related topic.
Both research and opinion papers should deal with at least one of the
following aspects:
- Implementation aspects of 'by design' and 'by default' paradigms
- Implementation and adoption of PETs in today's digital services
- Modelling of data protection and privacy requirements, such as:
machine readable representations and automatic evaluation of policies
- Enabling transparency: technological and organizational challenges.
- Technical solutions for the enforcement and the implications of the
subject's right, e.g. right to erasure, access and correction.
- Aspects of privacy impact and risk assessment
- Technical solutions for data portability
- Sustainable business models for privacy friendly online services
- Information and consent in online environments: practical solutions
and implementations
- Privacy awareness, reliability and usability of PETs
- Trust services for the protection of personal data - privacy aware
trust services (i.e. electronic certificates, signatures, etc.)
- Security measures for the protection of personal data
- Economics of privacy and personal data
Review and Publication
All submissions will be thoroughly reviewed by our PC members. We aim at
minimal 3 average 4 reviews per Paper. Furthermore, papers will be
published in the proceedings of the conference with a publishing house
soon to be selected and announced.
Important dates
Submission of full papers: March 15, 2016 23:59 AoE Notification to
author: May 10, 2016 Camera-ready copies: May 31, 2016 APF 2016 taking
place on: September 7-8, 2016 in Frankfurt am Main
Liebe NETSECler,
das Projekt "USecureD - Usable Security by Design" führt aktuell eine
Onlinestudie durch, mit der der Stellenwert des Themas Usable Security
and Privacy ermittelt werden soll und Schwierigkeiten von Anwendern im
Umgang mit Mechanismen der Informationssicherheit identifiziert werden
sollen. Die Ergebnisse der empirischen Untersuchung dienen der
bedarfsgerechten Weiterentwicklung von IT-Sicherheitslösungen für KMU.
Mit Ihrer Teilnahme können Sie unmittelbar zum Erfolg der Studie
beitragen. Wir würden uns daher sehr freuen, wenn Sie sich 10 Minuten
Zeit nehmen, um die Fragen zu beantworten (die Teilnahme ist möglich bis
zum 20. Dezember 2015):
https://www.usecured.de/survey/index.php/126657
Mit den besten Grüßen aus Köln, Luigi Lo Iacono.
Workshop „Cyberwarfare“
1. Oktober 2015
im Rahmen der INFORMATIK 2015 in Cottbus
http://www.informatik2015.de
Call for Papers
---------------
Erstens sind inzwischen mehrere konkrete Fälle von staatlich organisierten Angriffen auf andere Staaten bekannt, zweitens haben spätestens die Snowden-Enthüllungen klar gemacht, dass neben der passiven und aktiven Informationsgewinnung insbesondere auch aktive Angriffe zur Beeinträchtigung von Informations- und Kommunikationssystemen geplant und durchgeführt wurden und werden. Doch nicht nur die Vereinigten Staaten greifen andere Länder an (wobei sie offenbar auch wenig Unterschied zwischen Verbündeten und Gegnern machen), sondern auch umgekehrt werden westliche Staaten und deren Wirtschaft angegriffen (z.B. der Nordkoreanische Angriff auf Sony Pictures Entertainment vom Jahreswechsel 2014/2015, der umgekehrt zu Wirtschaftssanktionen gegen Nordkorea) führte.
Der Workshop „Cyberwarfare“ soll etwa Beiträge zu folgenden Fragen liefern:
Inwieweit unterscheiden sich staatlich organisierte Cyberangriffe von denen krimineller Organisationen und/oder einzelnen Hackern?
- Welche konkreten Gefahren gehen von zwischenstaatlichen Angriffen aus?
- Was sind die technischen Mittel für derartige Angriffe?
- Welche Kosten und welche Schäden werden durch die Angriffe verursacht?
- Können Angriffe gegen nicht-demokratische Staaten ethisch gerechtfertigt sein?
- Welche außenpolitische Dimension geht von den Angriffen aus?
- Inwieweit tragen Cyberangriffe militärische Züge (Cyberwar)?
- Gibt es für diese Form der Cyberwaffen ähnliche Regulierungsmechanismen wie beispielsweise für chemische, biologische oder nukleare Waffen?
Die angenommenen Workshop-Beiträge werden im Tagungsband der INFORMATIK 2015 veröffentlicht. Die Autorenrichtlinien und Vorlagen zur Anfertigung von Beiträgen finden sich unter [1] auf der Webseite der INFORMATIK 2015.
Termine und Fristen
-------------------
20.04.2015 Einreichungen von Beiträgen für den Workshop
18.05.2015 Entscheidung über die Annahme der Workshopbeiträge
20.06.2015 Einreichung der druckfähigen Workshopbeiträge für die Proceedings
Geplanter Ablauf
----------------
Donnerstag, 1. Oktober 2015
09:00-09:45 Eingeladener Eröffnungsvortrag
09:45-12:15 Vorträge (3-4) der angenommenen Papiere inkl. einer Kaffeepause
12:15-12:30 Zusammenfassung der Ergenisse
12:30 Ende des Workshops
Programmkomitee
----------------
Jürgen Altmann, Universität Dortmund
Matthias Englert, TU Darmstadt
Hannes Federrath, Universität Hamburg
Sandro Gaycken, Freie Universität Berlin
Gerald Kirchner, Zentrum für Naturwissenschaft und Friedensforschung Hamburg
Götz Neuneck, Institut für Friedensforschung und Sicherheitspolitik Hamburg
Stefan Oeter, Universität Hamburg
Hintergrund
-----------
Anknüpfend an die Ringlvorlesung „Cyber-Security, Cyber-War, Cyber-Peace“ [2], die im Wintersemester 2013 an der Universität Hamburg stattfand, soll das Thema nun im Rahmen des halbtägigen Workshops [3] auf der INFORMATIK 2015 aufgegriffen werden.
Organisatoren
-------------
Hannes Federrath, Universität Hamburg
Götz Neuneck, Institut für Friedensforschung und Sicherheitspolitik Hamburg
Kontakt
-------
Hannes Federrath <federrath(a)informatik.uni-hamburg.de>
Links
-----
[1] http://www.informatik2015.de/autoren-ressourcen.html
[2] https://www.inf.uni-hamburg.de/de/home/news/archive/friedensvorlesung.html
[3] https://svs.informatik.uni-hamburg.de/workshop-cyberwarfare/
=====================================================================
CALL FOR PARTICIPATION
IFIP SEC 2015
30th IFIP TC-11 SEC 2015 International Information
Security and Privacy Conference
Hamburg, Germany, 26-28 May 2015
https://ifipsec.org/2015/
Early Registration until 31 March 2015
via https://ifipsec.org/2015/reg-index.php
The IFIP SEC conference is the flagship event of the International
Federation for Information Processing (IFIP) Technical Committee 11 on
Security and Privacy Protection in Information Processing Systems
(TC-11, www.ifiptc11.org). IFIP SEC 2015 is organized by and hosted at
the University of Hamburg, a vibrant harbor city in Northern Germany.
The program committee selected 42 out of 232 submissions, which present
novel research on various theoretical and practical aspects of security
and privacy protection in ICT systems.
CONFERENCE PROGRAM:
- 42 paper presentations (14 sessions)
- Four co-located conferences/workshops
- Keynote and Award Sessions
- Reception, Gala Dinner and Social Event
SESSION TOPICS:
- Privacy
- Web Security
- Access Control, Trust and Identity Management
- Network Security
- Security Management and Human Aspects of Security
- Software Security
- Applied Cryptography
- Mobile and Cloud Services Security
- Cyber-physical systems and Critical Infrastructures Security
The detailed program is available here:
https://ifipsec.org/2015/program.php
CO-LOCATED EVENTS:
IFIP WG 11.11 International Conference on Trust Management (IFIPTM)
IFIP WG 11.8 World Conference on Information Security Education (WISE)
IFIP WG 11.5 Workshop on IT Assurance & Control (27 May)
IFIP WG 11.1 Workshop on Information Security Management (29 May)
Details regarding all co-located events can be found here:
https://ifipsec.org/2015/colocated.php
GENERAL CHAIRS:
Kai Rannenberg (Goethe-Universitaet Frankfurt, DE)
Steven Furnell (Plymouth University, UK)
PROGRAM CHAIRS:
Hannes Federrath (University of Hamburg, DE)
Dieter Gollmann (Hamburg University of Technology, DE)
ORGANIZING CHAIR:
Dominik Herrmann (University of Hamburg, DE)
PROGRAM COMMITTEE:
see https://ifipsec.org/2015/committees.php
For more information, please feel free to contact the chairs at
sec2015(a)ifipsec.org or visit https://ifipsec.org/2015/
We look forward to welcoming you in Hamburg!
=====================================================================
=====================================================================
Call for Papers
IFIP SEC 2015
30th IFIP TC-11 SEC 2015 International Information
Security and Privacy Conference
Hamburg, Germany, 26-28 May 2015
http://ifipsec.org/2015/
EXTENDED SUBMISSION DEADLINE: Jan 15, 2015
The IFIP SEC conference is the flagship event of the International
Federation for Information Processing (IFIP) Technical Committee 11 on
Security and Privacy Protection in Information Processing Systems
(TC-11, www.ifiptc11.org). Previous SEC conferences were held in
Marrakech (Morroco) 2014, Auckland (New Zealand) 2013, Heraklion
(Greece) 2012, Lucerne (Switzerland) 2011, and Brisbane (Australia)
2010. We seek submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
security and privacy protection in ICT Systems.
TOPICS OF INTEREST
- Access control and authentication
- Applied cryptography
- Audit and risk analysis
- Big data security and privacy
- Cloud security and privacy
- Critical infrastructure protection
- Cyber-physical systems security
- Data and applications security
- Digital forensics
- Human aspects of security and privacy
- Identity management
- Information security education
- Information security management
- Information technology mis-use and the law
- Managing information security functions
- Mobile security
- Multilateral security
- Network & distributed systems security
- Pervasive systems security
- Privacy protection and privacy enhancing technologies
- Surveillance and counter-surveillance
- Trust management
TRAVEL SUPPORT
For the travels (not stays or registrations fees) of PhD students of
developing countries with an accepted paper in SEC 2015, SEC 2015 has
applied for funding from the IFIP Developing Countries Support
Committee. We hope, this will result in travel support for the best
three papers from PhD students of developing countries.
SUBMISSION GUIDELINES
Submitted papers must be original, unpublished, and not submitted to
another conference or journal for consideration. Accepted papers will be
presented at the conference and included in the conference proceedings
published in the IFIP AICT series by Springer Science and Business Media.
All papers must be written in English. Submissions should be at most 14
pages long in total including references and appendices. PC members are
not required to read the appendices, so the paper should be intelligible
without them.
Authors must follow the Springer LNCS formatting instructions. Each
paper will receive at least four reviews. At least one author of each
accepted paper must register by the early date indicated on the
conference website and present the paper.
After the conference, extended versions of selected papers will be
considered for publication in the journal Computers & Security. Those
papers will undergo at least one other review round.
IMPORTANT DATES:
- Submissions due (extended): Jan 15, 2015
- Notification of acceptance: Feb 27, 2015
- Deadline for final version: Mar 13, 2015
GENERAL CHAIRS:
Kai Rannenberg (Goethe-Universitaet Frankfurt, DE)
Steven Furnell (Plymouth University, UK)
PROGRAM CHAIRS:
Hannes Federrath (University of Hamburg, DE)
Dieter Gollmann (Hamburg University of Technology, DE)
ORGANIZING CHAIR:
Dominik Herrmann (University of Hamburg, DE)
PROGRAM COMMITTEE:
see http://ifipsec.org/2015/committees.php
A PDF version of this call is available at
http://ifipsec.org/2015/files/sec2015-cfp.pdf
For more information, please feel free to contact the chairs at
sec2015(a)ifipsec.org or visit http://ifipsec.org/2015/
=====================================================================
--
Dominik Herrmann (Postdoctoral Researcher)
Tel: +49-40-42883-2092 - https://svs.informatik.uni-hamburg.de/
Universität Hamburg - FB Informatik - Sicherheit in Verteilten Systemen
Associate Professor Position in Cyber Security at the University of
Southern Denmark, Odense
The Centre for Smart Energy Solutions seeks an energetic and dynamic
candidate who will be able to contribute to the Centre’s research
activities in cyber security for smart grids and smart energy systems.
The Centre for Smart Energy Solutions is an interdisciplinary research
and innovation Centre that brings together energy experts, software
engineers, computer scientists, applied physicists, and social and
managerial studies experts. The Centre applies traditional and novel
practices within these expert areas to solve complex problems in the
energy domain. The Centre’s mission is to participate in the green
transition of the energy system towards a sustainable future. The Centre
has a global perspective on innovation of smart energy solutions,
especially aimed at global needs and influential technological and
societal factors. The Centre’s researchers work closely together with
consumers, utilities, technology companies, policy makers, and research
institutes at national and international levels.
The starting date of the position is June 1, 2014 or as soon as possible
thereafter.
The preferred candidates have experience with the following topics:
Application Security
Middleware for system security
Cloud computing security
Embedded systems security
Network and operating system security
Intrusion detection
Trusted computing
Applicants for this position must have a Ph.D. degree in Software
Engineering, or a closely related discipline with an outstanding record
of research and publication. Candidates with experience in the design,
implementation and maintenance of cyber security for mission critical
systems are preferred and relevant industrial experience would be an asset.
The appointee will be expected to participate in the normal
administrative, educational and professional activities of the Centre,
Faculty and University. Teaching duties will include undergraduate
courses in Software Engineering, a graduate course in cyber security,
and supervising of student projects at all levels.
The successful candidate is expected to maintain an ongoing vigorous
research program, collaborate on joined research projects, and actively
participate in attracting external research funding in close
collaboration with existing Centre Faculty.
The Centre for Smart Energy Solutions is part of the Department of
Technology and Innovation, one of four Departments of the Faculty of
Engineering at University of Southern Denmark
University of Southern Denmark is a prominent, research-intensive
academic institution situated in Odense, Denmark’s fourth largest city
with a population of approximately 190,000.
Further information is available from Professor, mso, PhD, Bo Nørregaard
Jørgensen, tel. +45 6550 3545, email: bnj(a)iti.sdu.dk
Application, salary and conditions of employment, etc.
An associate professorship is a full time position.
Applications will be assessed by an expert committee. Applicants will be
informed of their assessment by the Faculty.
As part of the overall assessment of the applicant’s qualifications, an
interview may be applied.
Appointment to the positions will be in accordance with the salary
agreement between the Ministry of Finance and the Danish Confederation
of Professional Associations (Cirkulære om overenskomst for Akademikere
i staten 2012).
Applications must be submitted online using the link below. Attached
files must be in Adobe PDF or Word format. The Faculty expects
applicants to read the information “How to apply” before applying.
Each box can only contain a single file of max. 10 Mb.
An application must include:
Curriculum Vitae
Diplomas/Certificates
Teaching portfolio (please see below)
List of publications indicating the publications attached
Examples of the most relevant publications. Please attach one pdf-file
for each publication, a possible co-author statement must be part of
this pdf-file
Co-author statements
Applicants for an associate professorship at the Faculty of Engineering
are requested to submit a teaching portfolio with the application as
documentation for teaching experience as well as supervision
qualifications. More details at
http://static.sdu.dk/mediafiles//Files/Om_SDU/Fakulteterne/Teknik/Administr…
.
Applicants are expected to attach a maximum of four publications.
The University encourages all interested persons to apply, regardless of
age, gender, religious affiliation or ethnic background.
Campus:
Odense
Application deadline:
28/02/2014
Application online at
http://www.sdu.dk/en/servicenavigation/right/ledige_stillinger
Contact:
Bo Nørregaard Jørgensen
Professor WSR, Head of Centre, ITI - Centre for Smart Energy Solutions
Tel. +4565503545
Fax +4566157697
Email bnj(a)iti.sdu.dk
Web http://www.sdu.dk/smartenergysolutions
Addr. Campusvej 55, DK-5230 Odense M, Denmark
UNIVERSITY OF SOUTHERN DENMARK
Dear colleagues,
we are happy to announce that the ACM flagship conference on Computer and Communications Security - driven by TU Darmstadt, Center for Advanced Security Research Darmstadt - takes place in Berlin, Germany this year. Early registration until September 15, 2013.
Apologies for multiple copies of this announcement.
===================================
20TH ACM CCS CALL FOR PARTICIPATION
===================================
ACM Computer and Communications Security (CCS) 2013
November 4-8, 2013
Berlin, Germany
------------------------------------
CCS 2013 HIGHLIGHTS
------------------------------------
- Exciting keynotes
- Intriguing invited talks
- 105 scientific papers in the main conference
- 91 technical papers in specialized workshops on timely topics
- Tutorials on cutting-edge technologies
See below for details.
Registration is now open:
http://www.sigsac.org/ccs/CCS2013/registration-2/index.html
Register by the 15th of September 2013 to enjoy the early bird discount!
GROUP DISCOUNTS AVAILABLE: Get a 6th main conference registration for free when registering 5 people from the same organization for CCS'13.
------------------------------------
KEYNOTES
------------------------------------
Martin Schallbruch (Chief Information Officer at the Federal Ministry of the Interior, Germany)
Mikko Hypponen (Chief Research Officer of F-Secure, Finland)
Prof. Ravi Sandhu (Executive Director of the Institute for Cyber Security at the University of Texas at San Antonio, USA)
------------------------------------
INVITED TALKS
------------------------------------
Jacob Appelbaum (Independent Security Analyst)
Vincenzo Iozzo (Director of Security Engineering, Trail of Bits, USA)
Felix FX Lindner (Research Lead of Recurity Labs GmbH, Germany)
Dr Ivan Martinovic (Faculty Member, Department of Computer Science, University of Oxford, UK)
------------------------------------
TUTORIALS
------------------------------------
C. Paar: Constructive and Destructive Aspects of Embedded Security in the Internet of Things
N. Asokan, J.-E. Ekberg, K. Kostiainen: Trusted Execution Environments on Mobile Devices
Eric Bodden: Easily Instrumenting Android Applications for Security Purposes
------------------------------------
TECHNICAL PROGRAM
------------------------------------
With a record number of 530 submissions, the Organizing Committee of CCS 2013 has put together an outstanding program that includes:
- 105 scientific papers in the main conference,
- 91 technical papers in specialized pre- and post-conference workshops,
- 39 posters,
- Exciting keynotes,
- Intriguing invited talks,
- Tutorials on cutting-edge technologies.
The papers cover many important topics including:
- Trusted Systems
- Critical Infrastructure Security
- Mobile Security and Privacy
- Control and Information Flow Protection
- Secure Outsourcing of Data and Computation
- Security Awareness
- Protocol Synthesis and Analysis
- Network and Web Security
- Cryptographic Tools
- Formal Methods
A list of all accepted papers can be found here:
http://www.sigsac.org/ccs/CCS2013/program/accepted-papers/
The tentative agenda is available at the CCS 2013 website:
http://www.sigsac.org/ccs/CCS2013/program/agenda/
------------------------------------
WORKSHOPS
------------------------------------
- Workshop on Privacy in the Electronic Society (WPES)
- Trustworthy Embedded Devices (TrustED)
- Workshop on Security, Privacy and Dependability for Cyber Vehicles (CyCAR)
- Artificial Intelligence and Security (AISec)
- Language Support for Privacy-Enhancing Technologies (PETShop)
- Cloud Computing Security Workshop (CCSW)
- Security and Privacy in Smartphones and Mobile Devices (SPSM)
- Smart Energy Grid Security Workshop (SEGS)
- Digital Identity Management (DIM)
------------------------------------
VENUE
------------------------------------
The Conference will take place at the Berlin Congress Centre (BCC) in the east center of Berlin right next to Alexanderplatz, which is a lively part of town with many shops, excellent dining possibilities and good public transport capabilities.
Further details on the conference are available at:
http://www.sigsac.org/ccs/CCS2013/
We look forward to seeing you in Berlin, Germany, this November!
--
Prof. Dr.-Ing. Matthias Hollick
Secure Mobile Networking Lab - SEEMOO
Email: matthias.hollick(a)seemoo.tu-darmstadt.de
Web: http://www.seemoo.de
Phone: +49 6151 16-70920 Fax: +49 6151 16-70921
Department of Computer Science
Center for Advanced Security Research Darmstadt
Technische Universität Darmstadt
Mornewegstr. 32 (Office 4.2.09, Building S4/14)
D-64293 Darmstadt, Germany
--
Prof. Dr.-Ing. Matthias Hollick
Secure Mobile Networking Lab - SEEMOO
Email: matthias.hollick(a)seemoo.tu-darmstadt.de
Web: http://www.seemoo.de
Phone: +49 6151 16-70920 Fax: +49 6151 16-70921
Department of Computer Science
Center for Advanced Security Research Darmstadt
Technische Universität Darmstadt
Mornewegstr. 32 (Office 4.2.09, Building S4/14)
D-64293 Darmstadt, Germany