posted by user: paolo_mori || 3170 views || tracked by 1 users: [display]

SECOTS 2015 : Fifth International Symposium on Security in Collaboration Technologies and Systems


When Jun 1, 2025 - Jun 5, 2005
Where Atlanta, Georgia, USA
Submission Deadline Feb 17, 2015
Notification Due Mar 6, 2015
Final Version Due Mar 23, 2015
Categories    security   collaboration technologies

Call For Papers

Call For Papers and Participation

Fifth International Symposium on Security in Collaboration Technologies and Systems(SECOTS 2015)

part of

The 2015 International Conference on Collaboration Technologies and Systems (CTS 2015)

June 01-05, 2015
The Westin Atlanta Airport Hotel
Atlanta, Georgia, USA
In Cooperation with the ACM, IEEE, IFIP

You are cordially invited to participate in this international Symposium through paper submission, a workshop or a special session organization, a tutorial, an invited speech, a demo, a poster, an exhibit, a panel discussion, a doctoral dissertation, whichever sounds more appropriate and convenient to you.

The Symposium will include invited presentations by experts from academia, industry, and government as well as contributed paper presentations describing original work on the current state of research

Call for Papers and Participation
Extended Paper Submission Deadline: February 17, 2015

Authors are invited to submit a PDF copy of their manuscript to the Symposium paper submission link at If the submission is for a short paper, indicate that as well.

This Symposium on Security in Collaboration Technologies and Systems, to be held as part of the 2015 International Conference on Collaboration Technologies and Systems (CTS 2015), will focus on security issues related to collaboration systems with emphasis on secure and trustworthy distributed environments, Grid and Cloud based resource virtualization and on-demand provisioning, multi-agent systems, mobile and wireless cooperation, cybersecurity and encryption for collaboration. The aim is to have a dedicated forum that fosters closer interactions among researchers and users communities, providing an excellent opportunity for them to meet and discuss their ideas. The symposium will address issues related to the security infrastructure and services design, implementation and operation. It intends to address new security challenges and present new ideas and solutions addressing modern security requirements, specific methods of access control that should allow large scale multi-organizational cooperation, use of mobile technologies and smartcards, enabling intrusion detection, system recovery and healing in the context of cooperative systems.

We invite original contributions from researchers in academia, research institutions and industry on these emerging and important cybersecurity areas of information technology.

Selected papers will be solicited from the best papers of SECOTS 2015 sessions for submitting an extended version of their papers to a special issue in a leading international journal.

The SECOTS Symposium topics include (but are not limited to) the following:

Fundamentals and Frameworks for Security in Collaboration Systems
Intrusion and Attacks Prevention and Detection in Collaboration Systems
Access and Usage Control in Collaboration Environments
Reputation and Trust Management
Cross Domain Identity and User Attributes Management Systems
Security Standards
Encryption and Cryptography Systems Supporting Cooperative Systems
Privacy and Privacy Preserving for Collaboration Systems
Trusted Operating Systems for Distributed Environments
Middleware Security
Security Metrics and Measures
Collaborative Security Monitoring Schemes and Systems
Usability, Social Engineering, and Security
Security and Information Assurance Education and Curriculum Issues
Security in Cloud Computing
Security in Collaborative Multi Agent Systems
Security Using Collaborative Agents
Botnet Analysis
Biologically Inspired Cyber Security and Defense
Security of Grid and Cluster Architectures Supporting Cooperative Applications
Security in Workflow Management Systems
Policy Driven SLA Negotiation
Security in Mobile and Wireless Networks for Collaboration
Security Models for Coalition Networks
Security in Social Networks
Virtual Organizations and Dynamic Security Associations
Web Services Security
Web Vulnerability Analysis
Use of Smartcards in the Context of Collaboration

Important Dates:
Paper Submission Deadline ------------------------------------- February 17, 2015
Notification of Acceptance ------------------------------------ March 06, 2015
Registration & Camera-Ready Manuscripts Due ------------------- March 23, 2015
Conference Dates ---------------------------------------------- June 01 - 05, 2015

For further details and updates, please consult the conference web site at URL: or or contact one of the organizers.

Follow us on Twitter: @CTS_Conference
Spread the news: #CTSConf15
Like us on FaceBook:

Related Resources

ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ITCE 2019   The International Conference on Innovative Trends in Computer Engineering
TII-SS-CPS-SEC 2019   IEEE Transactions on Industrial Informatics Special Section on Cyber - Physical Security in Industrial Environments
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
DBSEC 2019   33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
JDST - no. 2 2019   Journal of Defence & Security Technologies: Cyber Defence - Building a Rapid Response
ACNS 2019   International Conference on Applied Cryptography and Network Security
JDST - no. 3 2019   Journal of Defence & Security Technologies: Defence Technology Foresight
CDKP 2019   8th International Conference on Data Mining & Knowledge Management Process
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11