posted by system || 5215 views || tracked by 1 users: [display]

SSR 2017 : Security Standardisation Research 2017


When Dec 18, 2017 - Dec 19, 2017
Where London, UK
Submission Deadline Jul 26, 2017
Notification Due Sep 20, 2017
Final Version Due Oct 9, 2017

Call For Papers

Conference scope

SSR covers the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST), security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific security standards (e.g. those produced by the payments, telecommunications and computing industries for such things as payment protocols, mobile telephony and trusted computing).


A wide range of standards now cover many of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series has become the internationally adopted basis for managing corporate information security.

Still, new security standards are proposed very frequently, and existing security standards need revision often. Security standards are one of the most active areas for many standards bodies. There is currently intense attention on the methods for ensuring security within standardisation.

SSR is a forum for identifying the conclusions from this process, and proposing improvements to achieve transparency, more unbiased results, and higher scientific quality.

Topics for papers

Papers offering research contributions to all aspects of security standardisation are solicited for submission to the SSR 2017 conference.

Papers may present theory, applications or practical experience in the field of security standardisation, including, but not necessarily limited to:

access control
cloud computing
CNI protection
critiques of standards
cryptographic protocols
cryptographic techniques
evaluation criteria
formal analysis of standards
identity management
industrial control systems security
internet security
intrusion detection
key management and PKIs
mobile security
network security
payment system security
RFID tag security
risk analysis
security controls
security management
security protocols
security services
security tokens
smart cards
telecommunications security
trusted computing
web security

Instructions for authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration for publication. Papers must be written in English. Each submitted paper should begin with a title, a short abstract, and a list of keywords. Papers should be at most 16 pages (excluding bibliography and appendices) in the standard LNCS format (see the Springer web page for details). Reviewers are not obliged to read appendices, so the paper must be self-contained without them.

Papers that do not adhere to these requirements will be rejected without consideration of their merits.

Papers must be submitted using the EasyChair conference management system.

Accepted papers will be presented at the conference and published in the conference proceedings in the Springer LNCS series (see At least one author of each accepted paper is required to register for the conference and present the paper.

Instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers.

Please send any enquiries to: webmaster [insert the at symbol], or to the chairs at ssr2017 [insert the at symbol]

Important dates

Extended deadline for submissions: Wednesday 26 July 2017 (anywhere on earth)
Notifications to authors: Wednesday 20 September 2017
Camera-ready due: Monday 9 October 2017
Conference: Monday and Tuesday 18-19 December 2017

Conference organisation

General Chair
Chris Mitchell, RHUL, UK

Programme Committee Co-chairs
Joshua Guttman, MITRE and WPI, USA
William Whyte, USA

Programme Committee
to be confirmed

Related Resources

ETHE Blearning 2017   Blended learning in higher education: research findings
eCrime 2018   13th Symposium on Electronic Crime Research
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
SIGIR 2018   International ACM SIGIR Conference on Research and Development in Information Retrieval
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems