posted by system || 7073 views || tracked by 16 users: [display]

CSF 2014 : 27th IEEE Computer Security Foundations Symposium


Conference Series : IEEE Computer Security Foundations Symposium
When Jul 19, 2014 - Jul 22, 2014
Where Vienna, Austria
Abstract Registration Due Feb 3, 2014
Submission Deadline Feb 10, 2014
Categories    security

Call For Papers

The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF.

The program includes papers and panels. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area. See the Call for Papers and Panels for more information.

The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, e.g., formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection.

New results in computer security are welcome. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware- based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.
Special Sessions (NEW)

We strongly encourage papers in three foundational areas of research not traditionally represented at CSF:

AI & SECURITY (Chairs: Ariel Procaccia & Benjamin Rubinstein.) In recent years, a number of communities overlapping with AI--- notably algorithmic economics and machine learning---have made significant forays into security & privacy. This session aims to collect theoretical viewpoints on security & privacy, particularly from researchers across diverse communities such as those identifying with AAAI/IJCAI, AAMAS, EC, WEIS, ICML, NIPS, COLT, STOC/FOCS, S&P, and CCS (including the AISEC workshop). Papers in the following areas intersecting with information security are highly encouraged to submit to this special session: Economics: Game theory, mechanism design, market design, social choice; Learning: Online learning, robust statistics, adversarial machine learning, privacy-preserving technologies such as differential privacy.
PRIVACY (Chair: Vitaly Shmatikov.) CSF 2014 will include a special session on privacy foundations and invites submissions on definitions, models, and frameworks for communication and data privacy, principled analysis of deployed or proposed privacy protection mechanisms, and foundational aspects of practical privacy technologies. Submissions investigating connections between privacy law and policy and computer science are especially encouraged.
USABLE SECURITY (Chair: Lujo Bauer.) It has become accepted that any user-facing security technology or mechanism is unlikely to be secure if it is not usable. Hence, understanding, measuring, and designing for usability are foundational aspects of building secure systems. CSF 2014 encourages submission of papers that describe new results, quantitative or qualitative, in usability as it pertains to security and privacy. Particularly encouraged are papers that focus on foundational aspects of usability, as well as those whose results generalize beyond a specific environment or system.

These papers will be reviewed under the supervision of expert invited session chairs. They will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.
Challenges and Vision Papers

We particularly encourage challenge/vision papers, which may describe open questions and raise fundamental concerns about practical security. Challenges and/or vision papers should typically identify a real world security problem, argue why it raises foundational issues, explain why the currently available and relevant techniques are inadequate for addressing it, and identify foundational challenges that have to be addressed to solve the problem. These papers will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.

Proceedings, published by the IEEE Computer Society Press, will be available at the symposium, and selected papers will be invited for submission to the Journal of Computer Security.

Related Resources

OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
ACMC 2017   Australasian Computer Music Conference
IJSC 2017   International Journal on Soft Computing
CSF 2017   30th IEEE Computer Security Foundations Symposium
IJCCSA 2017   International Journal on Cloud Computing: Services and Architecture
ICPR 2018   24th International Conference on Pattern Recognition
IJCIS 2017   International Journal on Cryptography and Information Security
IEEE TETC SI 2017   IEEE Transactions on Emerging Topics in Computing, Special Issue on Scholarly Big Data
SI: IEEE Access VSB 2017   IEEE Access Special Section on Visual Surveillance and Biometrics: Practices, Challenges, and Possibilities