posted by system || 6351 views || tracked by 16 users: [display]

CSF 2014 : 27th IEEE Computer Security Foundations Symposium


Conference Series : IEEE Computer Security Foundations Symposium
When Jul 19, 2014 - Jul 22, 2014
Where Vienna, Austria
Abstract Registration Due Feb 3, 2014
Submission Deadline Feb 10, 2014
Categories    security

Call For Papers

The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF.

The program includes papers and panels. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area. See the Call for Papers and Panels for more information.

The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, e.g., formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection.

New results in computer security are welcome. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware- based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.
Special Sessions (NEW)

We strongly encourage papers in three foundational areas of research not traditionally represented at CSF:

AI & SECURITY (Chairs: Ariel Procaccia & Benjamin Rubinstein.) In recent years, a number of communities overlapping with AI--- notably algorithmic economics and machine learning---have made significant forays into security & privacy. This session aims to collect theoretical viewpoints on security & privacy, particularly from researchers across diverse communities such as those identifying with AAAI/IJCAI, AAMAS, EC, WEIS, ICML, NIPS, COLT, STOC/FOCS, S&P, and CCS (including the AISEC workshop). Papers in the following areas intersecting with information security are highly encouraged to submit to this special session: Economics: Game theory, mechanism design, market design, social choice; Learning: Online learning, robust statistics, adversarial machine learning, privacy-preserving technologies such as differential privacy.
PRIVACY (Chair: Vitaly Shmatikov.) CSF 2014 will include a special session on privacy foundations and invites submissions on definitions, models, and frameworks for communication and data privacy, principled analysis of deployed or proposed privacy protection mechanisms, and foundational aspects of practical privacy technologies. Submissions investigating connections between privacy law and policy and computer science are especially encouraged.
USABLE SECURITY (Chair: Lujo Bauer.) It has become accepted that any user-facing security technology or mechanism is unlikely to be secure if it is not usable. Hence, understanding, measuring, and designing for usability are foundational aspects of building secure systems. CSF 2014 encourages submission of papers that describe new results, quantitative or qualitative, in usability as it pertains to security and privacy. Particularly encouraged are papers that focus on foundational aspects of usability, as well as those whose results generalize beyond a specific environment or system.

These papers will be reviewed under the supervision of expert invited session chairs. They will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.
Challenges and Vision Papers

We particularly encourage challenge/vision papers, which may describe open questions and raise fundamental concerns about practical security. Challenges and/or vision papers should typically identify a real world security problem, argue why it raises foundational issues, explain why the currently available and relevant techniques are inadequate for addressing it, and identify foundational challenges that have to be addressed to solve the problem. These papers will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.

Proceedings, published by the IEEE Computer Society Press, will be available at the symposium, and selected papers will be invited for submission to the Journal of Computer Security.

Related Resources

AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
CSF 2016   29th IEEE Computer Security Foundations Symposium
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
ICCV 2017   International Conference on Computer Vision