posted by user: rafspiny || 8583 views || tracked by 48 users: [display]

PASSAT 2014 : Privacy, Security, Risk and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Privacy, Security, Risk and Trust
 
Link: http://www.scienceengineering.org/ase/conference/2014/passat/boston/website
 
When Dec 15, 2014 - Dec 19, 2014
Where Cambridge, MA, USA
Submission Deadline Jul 15, 2014
Notification Due Sep 30, 2014
Final Version Due Oct 25, 2014
Categories    privacy   security   trust
 

Call For Papers

PASSAT is the premier forum for information privacy, risk, trust, and security researchers and practitioners to explore solutions to profound challenges on privacy, risk, trust, and security issues and exchange recent progresses. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of information privacy, risk, trust, and security.
We solicit previously unpublished papers offering novel research contributions in any aspect of information privacy, security, risk and trust. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems.
Paper Submission: Prepare your manuscripts with the following conference paper styles not more than 10 pages in PDF file. ( Paper Styles). Submit your paper(s) at the PASSAT 2014 submission site . Each submission should be regarded as an undertaking that, should the paper be accepted, at least one of the authors must attend the conference to present the work in order for the paper to be included in the Digital Library.

Paper Publications: Top 2% accepted papers will be submitted to the ASE Science Journal. The rest of accepted papers will be submitted to the ASE Public Access Digital Library.

Topics of particular interest include, but are not limited to:

Privacy Foundations
Privacy Enhancing Technologies
Privacy-Preserving Computing
Privacy Policies and Laws
Economics of Privacy
Privacy Theory and Engineering
Natural Disasters and Emergencies, and Terrorism Protection
Risk Analysis, Modeling, and Management
Trust Formalization and Modeling
Trustworthy Computing
Trust Management
Trust Evaluation
Security Foundations
Network and Communication Security
System Security
Database Security
Access Control
Accountability
Anonymity
Application Security
Attacks and Defenses
Authentication
Censorship and censorship-resistance
Distributed System Security
Embedded Systems Security
Forensics
Hardware Security
Intrusion Detection
Language-Based Security
Malware
Metrics
Network Security
Protocol Security
Secure Information Flow
Security and Privacy Policies
Security Architectures
System Security
Usability and Security
Web Security

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
ITCSS 2017   3rd International Conference on Information Technology Convergence and Services
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
SciSec 2018   The 1st International Conference on Science of Cyber Security
IJE 2017   International Journal of Education (IJE)
WEIS 2018   Workshop on the Economics of Information Security
SACMAT 2018   23rd ACM Symposium on Access Control Models and Technologies
CIRC 2018   International Workshop on Cyber Insurance and Risk Controls