posted by organizer: bayforsec || 5470 views || tracked by 5 users: [display]

SHCIS 2015 : 2nd Workshop on Security in highly connected IT systems

FacebookTwitterLinkedInGoogle

Link: https://www.bayforsec.de/shcis15/
 
When Sep 21, 2015 - Sep 22, 2015
Where Vienna
Submission Deadline May 20, 2015
Notification Due Jun 22, 2015
Final Version Due Jul 17, 2015
Categories    computer science   network security   security   cyber security
 

Call For Papers

SHCIS ’15 – 2nd Workshop on Security in highly connected IT systems
Held in conjunction with
20th European Symposium on Research in Computer Security- ESORICS 2015
Vienna, Austria, September 21-25, 2015 (http://esorics2015.sba-research.org/)

Modern society over the course of the past two decades developed an
increasing dependency on their infrastructures in general, and on the
availability and correct functionality of their IT systems in particular.
While in the early days of the Internet revolution not many IT systems
outside the academic world were directly connected to the Internet, the
benefits of internetworking began to prevail by the end of the last
millennium. Nowadays, all kinds of IT systems, from industrial control
systems to nationwide sensor networks, from high-traffic business
platforms to e-health applications, are connected to the Internet and
thus directly connected to each other. Such highly connected IT systems
exhibit their very own peculiarities and need to be studied accordingly.

In this context, SHCIS’15 aims to bring together IT security researchers
and practitioners active in the field of highly-connected IT-systems,
with a strong emphasis on interdisciplinary aspects. The focus of the
workshop is on diffusion of early and ongoing work, with large room being
devoted to presentations of PhD students active in this field and large
scale national and international research projects. Suggested topics
are aligned along a cyclic IT security process for highly connected IT
systems, consisting of the phases “Preventive measures against attacks”,
“Defense against ongoing attacks”, and “Forensics and post-mortem
Examination of relevant IT-security incidents”. The workshop is organized
by the Bavarian Research Alliance FORSEC with focus on the security of
highly connected IT-Systems (https://www.bayforsec.de).

Suggested topics should be closely related to highly-connected IT-systems
and include, but are not limited to:
- Secure distributed architectures
- Secure mobile architectures
- Secure embedded systems
- Security in sensor networks
- Secure cloud computing
- Code obfuscation
- Security economics
- Identity and access management
- Privacy
- Online trust in large-scale systems
- Human factors in security and privacy
- Digital forensics
- Security through virtualization
- Security in virtualized environments
- Security in mobile computing
- Detection of security related anomalies

Relevant application areas include, but are not limited to:
- Virtualization platforms
- Smart grids, smart cities
- Social networks
- Big data applications
- Cloud services
- Business applications
- Transport and logistics
- E-Commerce

Workshop chairs
Günther Pernul, Guido Schryen, Rolf Schillinger
Bavarian Research Alliance FORSEC – Security of highly-connected IT-Systems

Submission Guideline
Authors are invited to publish original and unpublished research that is not
currently in a review process for other workshops, conferences or journals.
The focus of the workshop is on diffusion of early and ongoing work, with
large room being devoted to presentations of PhD students active in this
field
and large scale national and international research projects. Papers must
be written in English and formatted according to the IEEE Proceedings format

(http://ieee.org/conferences_events/conferences/publishing/templates.html)
Camera ready versions of the accepted papers must not exceed a length of 5
pages. At least one of the authors has to be attending the workshop to
present the paper. Submission will be handled electronically through
https://easychair.org/conferences/?conf=shcis15.

Important dates
Submission of full papers: May 20, 2015
Notification of acceptance: June 22, 2015
Camera-ready copies due: July 17, 2015

Program committee
Rainer Böhme, University of Münster, Germany
Zinaida Benenson, FAU Erlangen, Germany
Marijke Coetzee, University of Johannesburg, South Africa
Jorge Cuellar, Siemens AG, Germany
Steven Furnell, Plymouth University, UK
Benjamin Fabian, Humboldt University Berlin, Germany
Carmen Fernandez Gago, University of Madrid, Spain
Danilo Gligoroski, Norwegian University of Science and Technology, Norway
Martin Gilje Jaatun, SINTEF, Norway
Thomas Kittel, Technical University Munich, Germany
Lambrinoudakis Kostas, University of the Aegean, Greece
Hanna Krasnova, University of Bern, Switzerland
Emil C. Lupu, Imperial College London, UK
Tilo Müller, FAU Erlangen, Germany
Rolf Oppliger, eSecurity Technologies, Switzerland
Moussa Ouedraogo, Luxembourg Institute of Science and Technology,
Luxembourg
Hans Reiser, University of Passau, Germany
Heiko Roßnagel, Fraunhofer IAO, Germany
Thomas Schaberreiter, University of Oulu, Finland
Sven Wohlgemuth, CASED Darmstadt, Germany

Related Resources

NSDI 2017   14th USENIX Symposium on Networked Systems Design and Implementation
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
SHCIS 2017   4th Workshop on Security in highly connected IT systems
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems
ICS 2018   the 32nd ACM International Conference on Supercomputing
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
OSDI 2018   13th USENIX Symposium on Operating Systems Design and Implementation
IJMSA 2017   International Journal of Modeling, Simulation and Applications