posted by user: rafspiny || 19922 views || tracked by 48 users: [display]

PASSAT 2014 : Privacy, Security, Risk and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Privacy, Security, Risk and Trust
 
Link: http://www.scienceengineering.org/ase/conference/2014/passat/boston/website
 
When Dec 15, 2014 - Dec 19, 2014
Where Cambridge, MA, USA
Submission Deadline Jul 15, 2014
Notification Due Sep 30, 2014
Final Version Due Oct 25, 2014
Categories    privacy   security   trust
 

Call For Papers

PASSAT is the premier forum for information privacy, risk, trust, and security researchers and practitioners to explore solutions to profound challenges on privacy, risk, trust, and security issues and exchange recent progresses. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of information privacy, risk, trust, and security.
We solicit previously unpublished papers offering novel research contributions in any aspect of information privacy, security, risk and trust. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems.
Paper Submission: Prepare your manuscripts with the following conference paper styles not more than 10 pages in PDF file. ( Paper Styles). Submit your paper(s) at the PASSAT 2014 submission site . Each submission should be regarded as an undertaking that, should the paper be accepted, at least one of the authors must attend the conference to present the work in order for the paper to be included in the Digital Library.

Paper Publications: Top 2% accepted papers will be submitted to the ASE Science Journal. The rest of accepted papers will be submitted to the ASE Public Access Digital Library.

Topics of particular interest include, but are not limited to:

Privacy Foundations
Privacy Enhancing Technologies
Privacy-Preserving Computing
Privacy Policies and Laws
Economics of Privacy
Privacy Theory and Engineering
Natural Disasters and Emergencies, and Terrorism Protection
Risk Analysis, Modeling, and Management
Trust Formalization and Modeling
Trustworthy Computing
Trust Management
Trust Evaluation
Security Foundations
Network and Communication Security
System Security
Database Security
Access Control
Accountability
Anonymity
Application Security
Attacks and Defenses
Authentication
Censorship and censorship-resistance
Distributed System Security
Embedded Systems Security
Forensics
Hardware Security
Intrusion Detection
Language-Based Security
Malware
Metrics
Network Security
Protocol Security
Secure Information Flow
Security and Privacy Policies
Security Architectures
System Security
Usability and Security
Web Security

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
No Hat 2025   No Hat - COMPUTER SECURITY CONFERENCE
MLAIJ 2025   Machine Learning and Applications: An International Journal
IC2SDA 2025   First International Conference on Intelligent Computer Systems, Data Science and Applications
STRAI 2025   International Workshop on Secure, Trustworthy, and Robust AI
CSRF 2025   The Second International Conference on Sustainable and Regenerative Farming
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
ISC 2025   Information Security Conference
IJMVSC 2025   The International Journal of Managing Value and Supply Chains
AISyS 2025   The Second International Conference on AI-based Systems and Services