posted by user: rafspiny || 6559 views || tracked by 48 users: [display]

PASSAT 2014 : Privacy, Security, Risk and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Privacy, Security, Risk and Trust
 
Link: http://www.scienceengineering.org/ase/conference/2014/passat/boston/website
 
When Dec 15, 2014 - Dec 19, 2014
Where Cambridge, MA, USA
Submission Deadline Jul 15, 2014
Notification Due Sep 30, 2014
Final Version Due Oct 25, 2014
Categories    privacy   security   trust
 

Call For Papers

PASSAT is the premier forum for information privacy, risk, trust, and security researchers and practitioners to explore solutions to profound challenges on privacy, risk, trust, and security issues and exchange recent progresses. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of information privacy, risk, trust, and security.
We solicit previously unpublished papers offering novel research contributions in any aspect of information privacy, security, risk and trust. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems.
Paper Submission: Prepare your manuscripts with the following conference paper styles not more than 10 pages in PDF file. ( Paper Styles). Submit your paper(s) at the PASSAT 2014 submission site . Each submission should be regarded as an undertaking that, should the paper be accepted, at least one of the authors must attend the conference to present the work in order for the paper to be included in the Digital Library.

Paper Publications: Top 2% accepted papers will be submitted to the ASE Science Journal. The rest of accepted papers will be submitted to the ASE Public Access Digital Library.

Topics of particular interest include, but are not limited to:

Privacy Foundations
Privacy Enhancing Technologies
Privacy-Preserving Computing
Privacy Policies and Laws
Economics of Privacy
Privacy Theory and Engineering
Natural Disasters and Emergencies, and Terrorism Protection
Risk Analysis, Modeling, and Management
Trust Formalization and Modeling
Trustworthy Computing
Trust Management
Trust Evaluation
Security Foundations
Network and Communication Security
System Security
Database Security
Access Control
Accountability
Anonymity
Application Security
Attacks and Defenses
Authentication
Censorship and censorship-resistance
Distributed System Security
Embedded Systems Security
Forensics
Hardware Security
Intrusion Detection
Language-Based Security
Malware
Metrics
Network Security
Protocol Security
Secure Information Flow
Security and Privacy Policies
Security Architectures
System Security
Usability and Security
Web Security

Related Resources

TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
INSERT 2017   1st International Conference on Security, Privacy, and Trust (INSERT'17)
PST 2017   Privacy, Security and Trust 2017
ACISP 2017   Australasian Conference on Information Security and Privacy
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
USENIX Security 2017   USENIX Security '17
SOUPS 2017   Symposium on Usable Privacy and Security
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
SI: Security-BD-SmartCity 2017   Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium