posted by user: danielatwikicfp || 3980 views || tracked by 10 users: [display]

ISCSS 2014 : The Sixth International Symposium on Cyberspace Safety and Security

FacebookTwitterLinkedInGoogle

Link: http://conference.css2014.studiocheik.fr/
 
When Aug 20, 2014 - Aug 22, 2014
Where Paris, France
Submission Deadline Apr 28, 2014
Notification Due Jun 23, 2014
Final Version Due May 15, 2015
Categories    cybersecurity   safety   security   privacy
 

Call For Papers

Introduction

A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.

The CSS-2014 symposium is the 6th International Symposium on Cyberspace Safety and Security. It provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

The CSS-2014 symposium is the next event in a series of highly successful international conferences on cyberspace safety and security previously held as CSS-2013 (Zhangjiajie, China, 2013), CSS-2012 (Melbourne, Australia, 2012), CSS-2012 (Milan, Italy, 2011), CSS-2009 (Chengdu, China, 2009), and CSS-2008 (Sydney, Australia, 2008).

Call for Papers

IEEE Conference Proceedings and Journal Papers

The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
Scope and Interests

Topics of particular interests include the following tracks, but are not limited to:

Access Control and Trust Management
Active Defense Techniques and Systems
Attack Containment
Attack Recovery
Benchmark, Analysis and Evaluation of Cybersecurity
Digital Rights Management
Distributed Intrusion Detection/Prevention Systems
Denial-of-Service Attacks and Countermeasures
Identity Management and Authentication
Implementation, Deployment and Management of Cybersecurity
Intelligent Defense Systems
Internet and Network Forensics
Risk Assessment in Cybersecurity
Secure Design and Testing
Secure Network Architectures
Security for Large-scale Systems and Critical Infrastructures
Security for P2P systems and Grid Systems
Security for Ad-Hoc and Sensor Networks
Security in Web Services
Security in Pervasive and Embedded Systems
Security Theory and Tools
Spam Detection and Prevention
Social and Legal Issues in Cybersecurity
Software and System Assurance
Viruses, Worms, and Other Malicious Code

Tracks and Topics

Track 1: Data and Applications Security

Topics
Digital Rights Management
Secure Information Integration and Transaction Processing
Secure Semantic Web and Web Services
Security in E-Commerce and M-Commerce
Watermarking
Privacy and Data Protection
Emerging Technologies and Applications
Database Security
Data Mining Security

Track 2: Network and Communications Security

Topics
Active Defense Techniques and Systems
Distributed Intrusion Detection/Prevention Systems
Denial-of-Service Attacks and Countermeasures
Intelligent Defense Systems
Internet and Network Forensics
Secure Network Architectures
Security for Ad-Hoc and Sensor Networks
Spam Detection and Prevention
5G Mobile Networks Security and Trust
Trust, Security and Privacy in Social Networks
Privacy Enhancement Technologies
Security issues in emerging networking technologies (e.g., SDN, CCN)

Track 3: Software and Systems Security

Topics
Analysis, identification, prevention, and removal of vulnerabilities
Audit and digital forensics
Authorization and access control of software objects
Dependable computing and fault tolerance
Detection of, defense against, containment of, and recovery from attacks
Operating system and mobile operating system security
Risk modeling, assessment, and management in software engineering
Security for large-scale systems and critical infrastructures
Security in distributed systems and pervasive computing
Viruses, worms, Trojans, and other malicious codes

Track 4: Cloud Security

Topics:
Cloud and mobile cloud computing data access control
Privacy preservation and data privacy in cloud
Trust management in cloud computing
Big data trust in cloud
Secure cloud data storage
Verifiable cloud computing
Security solutions based on cloud computing
Trustworthy identity management in cloud
Media cloud security and cloud security policy
Security for personal cloud

Track 5: Cyberspace Safety

Topics
Access Control and Trust Management
Identity Management and Authentication
Security and Usability
Security in Pervasive and Embedded Systems
Privacy Models, Privacy Enhancing Technologies
Human Factors in Computer Security
Risk Assessment in Cyber Security
Cyber-Physical System Security
Benchmark, Analysis and Evaluation of Cyber Security
Implementation, Deployment and Management of Cyber Security

Conference Proceedings
Proceedings

The accepted papers from this conference will be submitted for publication by IEEE Computer Society in IEEE proceedings and submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.(indexed by EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.

Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Full Papers (up to 8 pages, or 12 pages with the over length charge) and Short Papers (up to 4 pages) are solicited.
Journal Special Issues

Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.


Co-located Conferences

HPCC 2014

The 16th IEEE International Conference on High Performance Computing and Communications, France, August 20-22, 2014

ICESS 2014

The 11th IEEE International Conference on Embedded Software and Systems Paris, France, August 20-22, 2014

Related Resources

Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
RAID 2017   20th International Symposium on Research in Attacks, Intrusions and Defenses
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
S4CIP 2017   2nd International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection
ICCNS - Ei 2017   ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
SoICT 2017   The Eighth Interntional Symposium on Information and Communication Technology
ISSRE 2017   International Symposium on Software Reliability Engineering