posted by system || 10472 views || tracked by 16 users: [display]

CSF 2014 : 27th IEEE Computer Security Foundations Symposium

FacebookTwitterLinkedInGoogle


Conference Series : IEEE Computer Security Foundations Symposium
 
Link: http://csf2014.di.univr.it/index
 
When Jul 19, 2014 - Jul 22, 2014
Where Vienna, Austria
Abstract Registration Due Feb 3, 2014
Submission Deadline Feb 10, 2014
Categories    security
 

Call For Papers

The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF.

The program includes papers and panels. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area. See the Call for Papers and Panels for more information.

The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, e.g., formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection.
Topics

New results in computer security are welcome. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware- based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.
Special Sessions (NEW)

We strongly encourage papers in three foundational areas of research not traditionally represented at CSF:

AI & SECURITY (Chairs: Ariel Procaccia & Benjamin Rubinstein.) In recent years, a number of communities overlapping with AI--- notably algorithmic economics and machine learning---have made significant forays into security & privacy. This session aims to collect theoretical viewpoints on security & privacy, particularly from researchers across diverse communities such as those identifying with AAAI/IJCAI, AAMAS, EC, WEIS, ICML, NIPS, COLT, STOC/FOCS, S&P, and CCS (including the AISEC workshop). Papers in the following areas intersecting with information security are highly encouraged to submit to this special session: Economics: Game theory, mechanism design, market design, social choice; Learning: Online learning, robust statistics, adversarial machine learning, privacy-preserving technologies such as differential privacy.
PRIVACY (Chair: Vitaly Shmatikov.) CSF 2014 will include a special session on privacy foundations and invites submissions on definitions, models, and frameworks for communication and data privacy, principled analysis of deployed or proposed privacy protection mechanisms, and foundational aspects of practical privacy technologies. Submissions investigating connections between privacy law and policy and computer science are especially encouraged.
USABLE SECURITY (Chair: Lujo Bauer.) It has become accepted that any user-facing security technology or mechanism is unlikely to be secure if it is not usable. Hence, understanding, measuring, and designing for usability are foundational aspects of building secure systems. CSF 2014 encourages submission of papers that describe new results, quantitative or qualitative, in usability as it pertains to security and privacy. Particularly encouraged are papers that focus on foundational aspects of usability, as well as those whose results generalize beyond a specific environment or system.

These papers will be reviewed under the supervision of expert invited session chairs. They will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.
Challenges and Vision Papers

We particularly encourage challenge/vision papers, which may describe open questions and raise fundamental concerns about practical security. Challenges and/or vision papers should typically identify a real world security problem, argue why it raises foundational issues, explain why the currently available and relevant techniques are inadequate for addressing it, and identify foundational challenges that have to be addressed to solve the problem. These papers will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.

Proceedings, published by the IEEE Computer Society Press, will be available at the symposium, and selected papers will be invited for submission to the Journal of Computer Security.

Related Resources

S&P 2025   The 45th IEEE Symposium on Security and Privacy
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
CSW 2024   2024 3rd International Conference on Cyber Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IEEE-JBHI (SI) 2024   Special Issue on Revolutionizing Healthcare Informatics with Generative AI: Innovations and Implications
LAJC 2024   Latin-American Journal of Computing
CIoT 2024   6th International Conference on Internet of Things
Hacktivity 2024   Hacktivity 2024 - IT Security Festival
ECTIJ 2024   Economics, Commerce and Trade Management: An International Journal