posted by user: aarmando || 4200 views || tracked by 2 users: [display]

WSCS 2012 : 2nd Workshop on Semantic Computing and Security

FacebookTwitterLinkedInGoogle

Link: http://ieee-security.org/TC/SPW2012/wscs-website/wscs.php
 
When May 24, 2012 - May 24, 2012
Where San Francisco
Submission Deadline Feb 28, 2012
Notification Due Mar 31, 2012
Final Version Due Apr 15, 2012
Categories    security   semantic computing   privacy
 

Call For Papers

WSCS12 : 2nd Workshop on Semantic Computing and Security
http://ieee-security.org/TC/SPW2012/wscs-website/wscs.php

CALL FOR PAPERS
An event of The IEEE Computer Society's Security and Privacy
Workshops
http://ieee-security.org/TC/SPW2012/workshops.php

May 24, 2012, The Westin Hotel, San Francisco, CA USA

Sponsored by
The IEEE Computer Society's Technical Committees:
* Security and Privacy (TCSP)
* Semantic Computing (TCSEM)

This workshop follows the successful September 2011 workshop at the
International Semantic Computing Symposium. This new workshop will
explore additional topics and allow semantic computing researchers to
have more opportunity to interact with security researchers.

Semantic Computing technologies derive and use semantics from content,
where “content” is wide-ranging: video, audio, text, conversation,
software, devices, actions, behavior, etc. Security technology
encompasses the specification of secure behavior as well as the
detection of insecure behavior over computer networks. The
two disciplines come together in this new and interesting
combination, in a synergy-seeking, cutting-edge workshop. The delimited
notions of semantics used within Security and Privacy provide a
well-defined and as yet unstudied domain for semantic modeling,
automated semantic interpretation, and inference, with clear
practical uses and opportunities for novel and imaginative research.

The workshop on Semantic Computing and Security addresses:
* deriving semantics from data used for security and privacy research;
* semantic verification of network activity; and
* inferring the semantics of malicious free-form data, such as email and
web pages.

Topics of interest include but are not limited to:
* Network dataset curation through semantic derivation
* Semantic MediaWiki for vulnerability sharing and detecting emergent
security properties
* Network security semantics, dynamic classification
* Inferred semantics of malicious code
* Semantic verification of network operations
* Semantic specification and analysis of security experiment design
* Semantic analysis of access control policies
* Semantics of data acquisition and computation provenance
* Semantic analysis of malware communication
* Semantics-aware trust management

SUBMISSIONS AND REGISTRATION

Authors are invited to submit Regular Papers (maximum 8 pages) or
Short Papers (maximum 4 pages) using EasyChair
(https://www.easychair.org/conferences/?conf=wscs12). Regular papers
will be evaluated according to normal research conference criteria
with respect to relevance, originality, and quality of the methodology
and writing. Work that is highly novel, controversial, or preliminary
can be submitted as a short paper.Papers accepted by the workshop will
be published by the IEEE Computer Society Press. Electronic media with
the proceedings will be distributed to attendees.

IMPORTANT DATES
* Regular & Short Paper Submission deadline: February 28, 2012 (*extended*)
(by 11:59 PM, Pacific Standard time)
* Notification to authors: March 31, 2012
* Camera-Ready copy due: April 15, 2012
* Registration opens: early March, 2012
* Workshop: May 24, 2012

ORGANIZING COMMITTEE
* Alessandro Armando, U. of Genova & Fondazione Bruno Kessler
* Hilarie Orman, Purple Streak

PROGRAM COMMITTEE
* Alessandro Armando (co-chair), U. of Genova & Fondazione Bruno Kessler
* Terry Benzel, Information Sciences Institute, U. of Southern California
* L. Jean Camp, Indiana University
* Bruno Crispo, U. of Trento
* Eduard Hovy, Information Sciences Institute, U. of Southern California
* Alefiya Hussain, Information Sciences Institute, U. of Southern California
* Lalana Kagal, CSAIL, MIT
* Daniela Oliveira, Bowdoin College
* Hilarie Orman (co-chair), Purple Streak
* Pierangela Samarati, U. of Milano

CONTACT
Hilarie Orman (hilarie@purplestreak.com) & Alessandro Armando
(armando@fbk.eu)


Related Resources

ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
LAJC 2024   Latin-American Journal of Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
AIxSET 2024   IEEE International Conference on AI x Science, Technology, and Technology
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI