posted by user: ghorbani || 843 views || tracked by 9 users: [display]

PST 2018 : The Sixteen International Conference on Privacy, Security and Trust (PST)

FacebookTwitterLinkedInGoogle


Conference Series : Conference on Privacy, Security and Trust
 
Link: http://pstnet.ca/pst2018/
 
When Aug 28, 2018 - Aug 30, 2018
Where Belfast, United Kingdom
Submission Deadline Apr 23, 2018
Notification Due Jun 18, 2018
Final Version Due Jun 29, 2018
Categories    privacy   security   cybersecurity   trust
 

Call For Papers

PST 2018 Privacy, Security & Trust
August 28-30, 2018 – Titanic Venues Belfast
Belfast – Northern Ireland – UK

Innovation in ubiquitous interconnected technologies, together with the growth of interconnected computing and storage, defines the foundation to a vast landscape of unforeseen digital services and social networks. Instant access to services, real-time data and the ability to share content down to detailed social and very personal information. Developing sustainable communities and optimising the utilisation of resources, such as energy, led to the development of new technologies for smart utilities, smart cities, smart transport and the evolution of autonomous technologies for manufacturing and transport. Significant commercial opportunities promised by these technologies and services inevitably attract cybercrime and the need for research and innovation in Privacy, Security and Trust.

The Annual International Conference in Privacy, Security & Trust (PST) provides a premier forum for sharing advances in cybersecurity research and security applications. PST2018 will be held in Northern Ireland at the Centre for Secure Information Technologies (CSIT) and Queen's University Belfast, and will offer three days of keynotes, technical presentations, posters, workshops, and an Industrial day with vendor exhibition.

PST TECHNICAL SCOPE
Papers are invited which address new and previously unpublished results in the area of Privacy, Security & Trust, and related topics.

- Privacy Preserving / Enhancing Technologies
- Critical Infrastructure Protection
- Network and Wireless Security
- Cloud Security, Web Security and Privacy
- Internet Of Things (IoT) Security and Privacy
- Operating Systems Security
- Intrusion Detection / Prevention Technologies
- Secure Software Development and Architecture
- PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce
- Digital Forensics
- Security Analytics and Data mining
- Cryptographic Technologies
- Recommendation, Reputation and Delivery Technologies
- Continuous Authentication
- Trust Technologies, Technologies for Building Trust in e-Business Strategy
- Observations of PST in Practice, Society, Policy and Legislation
- Digital Rights Management
- Identity and Trust Management
- Human Computer Interaction and PST
- Biometrics, National ID Cards, Identity Theft
- Implications of, and Technologies for, Lawful Surveillance
- Privacy, Traceability, and Anonymity
- Trust and Reputation in Self-Organizing Environments
- Anonymity and Privacy vs. Accountability
- Access Control and Capability Delegation
- Representations and Formalizations of Trust in Electronic and Physical Social Systems

PST2018 Submission Instructions

High-quality papers in all PST-related areas that, at the time of submission, are not under review and have not already been published or accepted for publication elsewhere are solicited. Authors MUST ensure to select the track (Privacy, Security, or Trust) most relevant to their research when submitting their paper. Accepted papers will be accepted as ‘regular’ papers up to 10 pages, or ‘short’ papers of up to 5 pages. The standard IEEE two-column conference format should be used for all submissions. IEEE Manuscript Templates for Conference Proceedings can be downloaded here: http://www.ieee.org/conferences_events/conferences/publishing/templates.html

The conference proceedings will be submitted for inclusion in IEEE Xplore as in previous editions of the conference. At least one author of an accepted paper must register by June 29, 2018. A regular registration is required. Accepted (short or regular) papers will be published in the proceedings.

Double blind Submission

Reviewing will be double-blind: the reviewers will not know the identities of the authors. It will be up to the authors to ensure the proper anonymization of their paper. For effective anonymization please follow these guidelines:

Do not include any author name or affiliation in the title. Do not include any acknowledgments. Refer to your own published work in the third person: use "In the previous work of Jones et al.", not "In our previous work". If you cite own papers that are not widely available (e.g., a paper currently under review), use anonymous author names in the citation, for example an author of the form "A. Anonymous".

IMPORTANT DATES
Paper submission deadline: April 23, 2018
Notification of acceptance: June 18, 2018
Final camera-ready paper due: June 29, 2018
Advance registration (authors): July 14, 2018
Conference date: Aug. 28-30, 2018

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ACTICS 2018   The 7-th International Workshop on Advanced Communication Technologies and their Applications to Intelligent transportation systems, Cognitive radios and Sensor networks
SciSec 2018   The 1st International Conference on Science of Cyber Security
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
SPTM 2018   6th International Conference of Security, Privacy and Trust Management (SPTM 2018)
USENIX-Security 2018   27th USENIX Security Symposium
IJOE 2018   International Journal on Organic Electronics
IFIPTM 2018   The 12th IFIP International Conference on Trust Management
ACII 2018   Advanced Computational Intelligence: An International Journal