posted by user: xgeorgio || 8056 views || tracked by 12 users: [display]

STAST 2011 : 1st Workshop on Socio-Technical Aspects in Security and Trust

FacebookTwitterLinkedInGoogle

Link: http://stast.uni.lu
 
When Sep 6, 2011 - Sep 8, 2011
Where Milan, Italy
Submission Deadline Jun 5, 2011
Notification Due Jul 4, 2011
Final Version Due Jul 20, 2011
Categories    security   trust
 

Call For Papers

* ********************************************************** *
* 1st Int. Workshop on *
* Socio-Technical Aspects of Security and Trust *
(STAST) - http://stast.uni.lu *
* ---------------------------------------------------------- *
* Co-located with 5th Int. Conference on *
* Network and System Security (NSS) *
* Milan, Italy - 6/8 September 2011 *
* ********************************************************** *

IMPORTANT DATES
----------------
Papers: 5 June 2011
Notification of Acceptance: 4 July 2011
Final version due: 20 July 2011
Workshop: 6-8 Sept 2011 (one day to be decided)

TECHNICAL CO-SPONSORS
-----------
IEEE and IEEE Council.

SCOPE
---------------------
Due to the huge yet increasing number of people carrying out
sensitive Internet transactions, security threats hardly ever
reduce to technical threats. Rather, they are socio-technical,
as they come from adversaries who combine social
engineering practices with technical skills.

Humans obviously cannot be treated as machines, as they take
actions that may seem irrational although they are perfectly
justifiable from a cognitive and a social perspective.
Computer security hence appears to acquire more and more the
facets of an interdisciplinary science with roots in both
interpretive and positivist research traditions.

The workshop intends to foster an interdisciplinary discussion
on how to model and analyse the socio-technical aspects
of modern security systems and on how to protect such
systems from socio-technical threats and attacks.

We welcome experts in computer science, in social and behavioral
sciences, philosophy and psychology.

WORKSHOP TOPICS
--------------
Relevant topics include but are not limited to:

* Usability Analysis
* System-User Interfaces
* Psychology of Deception
* Socio-Technical Attacks and Defenses
* User Perception of Security and Trust
* Design of Socio-Technical Secure Systems
* Cognitive Aspect in Human Computer Interaction
* Human Practice
* Behavioural Models
* Social Engineering
* Modelling and Analysis of Security
* Ceremonies and Workflows
* Game Theoretical Approaches to Security
* Cyber Crime Science
* Security Properties Specification and Verification
* Threat and Adversary Models
* Social Informatics and Networks
* Effects of Technology on Trust Building Behaviour
* Experiences and Test Cases

PROGRAM COMMITTEE
-------------------
Colin Boyd (Queensland University of Technology, AU)
Jose'-Rodrigo Co'rdoba-Pacho'n (Royal Holloway Univ. of London, UK)
Richard Clayton (Univ. of Cambridge, UK)
Rino Falcone (ISTC-CNR, IT)
Pieter Hartel (Univ. of Twente, NL)
Elena Ferrari (Univ. of Insubria, IT)
Dieter Gollmann (TU Hamburg, D)
Vincent Koenig (EMACS, Univ. of Luxembourg, L)
Sjouke Mauw (Univ. of Luxembourg, L)
Tyler Moore (SEAS Harvard, US)
Aad van Moorsel (Univ. of Newcastle, UK)
Ingrid Mulder (Rotterdam Univ. & TU Delft, NL)
Martin Ortlieb (Google, CH)
Christian W. Probst (DTU, D)
Angela Sasse (UCL, UK)
Melanie Volkameer (TU Darmstadt, D)
Trish Williams (Edith Cowan University, AU)

PAPER SUBMISSION
----------------
Contributions should be at most 8 pages, including
the bibliography and well-marked appendices, and
should follow the IEEE 8.5" x 11" Two-Columns Format.
Both theoretical and applied research papers are welcome.

Please visit our web site for more submission guidelines.

PROCEEDINGS
-----------

Accepted papers will be published by IEEE and
in the IEEE digital library.

ORGANIZING COMMITTEE
--------------------

*** NSS Conference General Chair

Sabrina de Capitani Di Vimercati (Univ. of Milan, IT)

*** Workshop Chairs

Giampaolo Bella (Univ. of Catania, IT)
Gabriele Lenzini (Univ. of Luxembourg, L)

*** Programme Chairs

Lizzie Coles-Kemp (Royal Holloway Univ. of London, UK)
Peter Ryan (Univ. of Luxembourg, L)

Related Resources

AAIM 2026   The 20th International Conference on Algorithmic Aspects in Information and Management
IJAIT 2026   International Journal of Advanced Information Technology
Leader 2050   Leader 2050 - Future Competencies in the Face of Sustainable Development Challenges, Systemic Resilience, and Ecological and Socio-Economic Crises
EI/Scopus-ICMLM 2026   2026 International Conference on Machine Learning and Large Models-EI/Scopus
AISIS 2026   2026 International Conference on Artificial Intelligence, Intelligent Systems, and Information Security-EI/Scopus
CIOS 2026   4th International Conference on Cloud, IoT and Security
ICAIBD 2026   IEEE--2026 The 9th International Conference on Artificial Intelligence and Big Data (ICAIBD 2026)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
ECCS 2026   IEEE--2026 the 6th European Conference on Communication Systems (ECCS 2026)
AISyS 2026   The Third International Conference on AI-based Systems and Services