posted by organizer: bayforsec || 5359 views || tracked by 5 users: [display]

SHCIS 2015 : 2nd Workshop on Security in highly connected IT systems

FacebookTwitterLinkedInGoogle

Link: https://www.bayforsec.de/shcis15/
 
When Sep 21, 2015 - Sep 22, 2015
Where Vienna
Submission Deadline May 20, 2015
Notification Due Jun 22, 2015
Final Version Due Jul 17, 2015
Categories    computer science   network security   security   cyber security
 

Call For Papers

SHCIS ’15 – 2nd Workshop on Security in highly connected IT systems
Held in conjunction with
20th European Symposium on Research in Computer Security- ESORICS 2015
Vienna, Austria, September 21-25, 2015 (http://esorics2015.sba-research.org/)

Modern society over the course of the past two decades developed an
increasing dependency on their infrastructures in general, and on the
availability and correct functionality of their IT systems in particular.
While in the early days of the Internet revolution not many IT systems
outside the academic world were directly connected to the Internet, the
benefits of internetworking began to prevail by the end of the last
millennium. Nowadays, all kinds of IT systems, from industrial control
systems to nationwide sensor networks, from high-traffic business
platforms to e-health applications, are connected to the Internet and
thus directly connected to each other. Such highly connected IT systems
exhibit their very own peculiarities and need to be studied accordingly.

In this context, SHCIS’15 aims to bring together IT security researchers
and practitioners active in the field of highly-connected IT-systems,
with a strong emphasis on interdisciplinary aspects. The focus of the
workshop is on diffusion of early and ongoing work, with large room being
devoted to presentations of PhD students active in this field and large
scale national and international research projects. Suggested topics
are aligned along a cyclic IT security process for highly connected IT
systems, consisting of the phases “Preventive measures against attacks”,
“Defense against ongoing attacks”, and “Forensics and post-mortem
Examination of relevant IT-security incidents”. The workshop is organized
by the Bavarian Research Alliance FORSEC with focus on the security of
highly connected IT-Systems (https://www.bayforsec.de).

Suggested topics should be closely related to highly-connected IT-systems
and include, but are not limited to:
- Secure distributed architectures
- Secure mobile architectures
- Secure embedded systems
- Security in sensor networks
- Secure cloud computing
- Code obfuscation
- Security economics
- Identity and access management
- Privacy
- Online trust in large-scale systems
- Human factors in security and privacy
- Digital forensics
- Security through virtualization
- Security in virtualized environments
- Security in mobile computing
- Detection of security related anomalies

Relevant application areas include, but are not limited to:
- Virtualization platforms
- Smart grids, smart cities
- Social networks
- Big data applications
- Cloud services
- Business applications
- Transport and logistics
- E-Commerce

Workshop chairs
Günther Pernul, Guido Schryen, Rolf Schillinger
Bavarian Research Alliance FORSEC – Security of highly-connected IT-Systems

Submission Guideline
Authors are invited to publish original and unpublished research that is not
currently in a review process for other workshops, conferences or journals.
The focus of the workshop is on diffusion of early and ongoing work, with
large room being devoted to presentations of PhD students active in this
field
and large scale national and international research projects. Papers must
be written in English and formatted according to the IEEE Proceedings format

(http://ieee.org/conferences_events/conferences/publishing/templates.html)
Camera ready versions of the accepted papers must not exceed a length of 5
pages. At least one of the authors has to be attending the workshop to
present the paper. Submission will be handled electronically through
https://easychair.org/conferences/?conf=shcis15.

Important dates
Submission of full papers: May 20, 2015
Notification of acceptance: June 22, 2015
Camera-ready copies due: July 17, 2015

Program committee
Rainer Böhme, University of Münster, Germany
Zinaida Benenson, FAU Erlangen, Germany
Marijke Coetzee, University of Johannesburg, South Africa
Jorge Cuellar, Siemens AG, Germany
Steven Furnell, Plymouth University, UK
Benjamin Fabian, Humboldt University Berlin, Germany
Carmen Fernandez Gago, University of Madrid, Spain
Danilo Gligoroski, Norwegian University of Science and Technology, Norway
Martin Gilje Jaatun, SINTEF, Norway
Thomas Kittel, Technical University Munich, Germany
Lambrinoudakis Kostas, University of the Aegean, Greece
Hanna Krasnova, University of Bern, Switzerland
Emil C. Lupu, Imperial College London, UK
Tilo Müller, FAU Erlangen, Germany
Rolf Oppliger, eSecurity Technologies, Switzerland
Moussa Ouedraogo, Luxembourg Institute of Science and Technology,
Luxembourg
Hans Reiser, University of Passau, Germany
Heiko Roßnagel, Fraunhofer IAO, Germany
Thomas Schaberreiter, University of Oulu, Finland
Sven Wohlgemuth, CASED Darmstadt, Germany

Related Resources

SHCIS 2017   4th Workshop on Security in highly connected IT systems
TheWebConf 2018   The Web Conference (The International World Wide Web Conference - WWW2018)
NSDI 2017   14th USENIX Symposium on Networked Systems Design and Implementation
CODASPY 2018   Conference on Data and Application Security and Privacy
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
Social Information Systems @ HICSS-51   Social Information Systems Minitrack - Hawaii International Conference on System Sciences (HICSS-51)
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security