posted by user: Terppy || 5572 views || tracked by 6 users: [display]

CSP 2013 : The second International Workshop on Cyber Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.cyberc.org
 
When Oct 10, 2013 - Oct 12, 2013
Where Beijing
Submission Deadline Jun 14, 2013
Notification Due Jul 5, 2013
Final Version Due Aug 1, 2013
 

Call For Papers

CSP Workshop is Co-Sponsored by:
IEEE Computer Society (Technically Co-sponsored)
IEEE Technical Committee on Simulation
IEEE CS Task Force on Networked Mobile Systems
Beijing Jiaotong University, China
University of Louisville, USA
Embedded Pervasive Computing Lab, HUST, China

Patrons: AT&T, InfoBeyond, EMC, Teradata, Comrise, RainStor and Huawei

CyberC Facebook
http://www.facebook.com/groups/nasirsyed.utp/

CyberC Weibo
http://weibo.com/u/2500282610

Important Dates
June 14, 2013 - Conference Paper Submission Deadline
June 15, 2013 (Submission before May 25)- Notification of Acceptance/Rejection & Registration Starts
July 5, 2013 (Submission after May 25)- Notification of Acceptance/Rejection & Registration Starts
August 1, 2013 - Camera-Ready Paper Submission Due & Registration Due

Contact:
For more information about the conference, please visit www.CyberC.org or contact us at Papers@CyberC.org.

We are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.

Social networks have become part of the business and personal fabric of the world. The growth and advancement of social media faces risks of attackers targeting users as well as users concerns about personal privacy. Mobile security has become increasingly important when more and more users and businesses use smartphones as communication tools but also as means of planning and organizing their work and private life. Some common security threats on PC platform have jumped to mobile platforms of Android and iOS. For example, Zitmo, a variant of Zeus Trojan has got wide spreading on Android devices in 2012. Clouds bring us new application and various XaaSs along with new vulnerabilities that we have to investigate. Assessing, managing and controlling the risks associated with cloud computing such as identity, privacy, data integrity, and tenant isolation, are critical to the adoption of cloud technologies.

CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.

Authors of CSP workshop 2013 are promoted to freely enjoy CyberC 2013 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.

Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:
• Access control
• Authorization, identification & authentication
• Accountability and anonymity
• Biometric authentication
• Censorship and censorship-resistance
• Cloud security
• Cryptography and key algorithms
• Distributed systems security
• Embedded systems security and forensics
• Hardware, application, and system security
• Information integrity, assurance and trustworthy
• Intrusion detection, traffic analysis and decision making of security
• Language-based security
• Location Privacy and Exposure
• Mobile security
• Network security and malware
• Networking protocols and security trace back
• Privacy in pervasive sensing
• Privacy in social media
• Privacy-preserving systems
• Secure distributed data outsourcing (e.g., database as a service)
• Security and privacy policies
• Security architectures, policies, and regulations
• Security and privacy in database systems
• Security modeling and vulnerability analysis
• Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
• Usability/energy/cost/efficiency of security in the network
• Web browser security

Technical Program Committee

Shared with CyberC 2013

Submissions:
Authors are invited to submit original technical papers to http://edas.info/ by selecting “CSP 2013”.
Electronic submission to papers@cyberc.org with title of CSP 2013 Submission is also accepted.
Please DO NOT submit both ways.

Manuscript Guidelines:
All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see ftp://pubftp.computer.org/Press/Outgoing/proceedings/. The templates in word are:
• Instruct8.5x11x2.doc 254 KB 8/22/2008 12:00:00 AM
• Instruct8.5x11x2.pdf 276 KB 8/22/2008 12:00:00 AM
and that in Latex are:
• IEEE_CS_Latex8.5x11x2.zip 766 KB 11/11/2008 12:00:00 AM
• IEEE_CS_Latex8.5x11x3.zip 874 KB 8/19/2011 9:59:00 AM

Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.


Paper Acceptance

Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.

Publications

All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of accepted papers, or at least one of them, should register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE Xplore and EI after the conference.

Related Resources

CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
S&P 2025   The 45th IEEE Symposium on Security and Privacy
JoL 2024   International Journal of Law
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
SPTM 2024   12th International Conference of Security, Privacy and Trust Management
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins