posted by user: usenixcfp || 1888 views || tracked by 2 users: [display]

CollSec 2010 : 2010 Workshop on Collaborative Methods for Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.usenix.org/events/collsec10/cfp/
 
When Aug 10, 2010 - Aug 10, 2010
Where Washington, DC
Submission Deadline Apr 20, 2010
Notification Due Jun 10, 2010
Final Version Due Jun 30, 2010
 

Call For Papers

Overview

The complexity and sophistication of security threats are expected to increase further in the near future. Existing security solutions might soon become useless in the face of attacks that will most likely be launched from many computers at once (for example, the use of large botnets). An appropriate answer to such threats should rely on collaborative methods that harness the collective strength of many independent units. When it comes to defending against a given threat, different end-units as well as entire networks are essentially performing the same work redundantly. As a result, the need to share knowledge (for accelerating detection and response to new attacks and threats) and resources (increasing efficiency and reducing resources consumption) becomes clear.

The workshop aims to bring to the forefront innovative approaches that involve the use of collaborative methods for privacy and security. While the workshop will touch on themes that are at the heart of the USENIX Security Symposium, discussion will focus on the boundary between collaborative algorithms and swarm intelligence and the implementation domains of networking, privacy, and security.

Co-located with the 19th USENIX Security Symposium in Washington, DC, CollSec '10 will be a one-day event on Tuesday, August 10, 2010. Accepted papers will be published electronically. Attendance at the workshop will be open to the public. The workshop will feature an award for the best paper.

Workshop Topics

Proposed topics for the workshop include but are not limited to the following:

* Collaborative detection of distributed network attacks
* Peer-to-peer–based security mechanisms
* Adversarial abuse of collaborative security mechanisms
* Anti-epidemic network vaccination
* Efficient implementation of security and privacy algorithms through sharing knowledge and resources
* Increasing energy efficiency through collaboration in network security
* Use of low complexity property testing methods by decentralized security agents
* Collaboration in future Internet security and privacy layers
* Novel collaborative network architectures for increased security and privacy
* Trust and authentication in collaborative environments
* Collaboration-aware network protocols: security and privacy aspects
* Collaborative privacy management: access controls and permissions
* Decentralized, trusted third-party approaches and methods
* Intrusion detection in collaborative and cloud computing environments
* Security configuration based on social context groups (social firewall, authentication protocols, etc.)
* Security algorithms inspired by human social-cooperation interactions
* Providing security and privacy for social overlay networks
* Configuring security protocol parameters based on social and cooperative information

Submission Instructions

Papers are due by April 20, 2010, at 11:59 p.m. PDT. All submissions should be made online via the Web form that will be available here soon. Submissions should be finished, complete papers.

Prospective authors are invited to submit original, unpublished research papers that are not being considered in another forum. We will welcome works in progress, in addition to well established works.

Your submission may be in the form of:

* A short position paper of up to 4 proceedings pages in length.
* A full-length technical paper of up to 12 proceedings pages in length.

Page limits include the bibliography and any appendices.

Papers should be typeset in two-column format, using a 10-point Times Roman font on 12-point leading in a text block of 6.5" by 9", as is customary for USENIX papers.

Papers will be evaluated in terms of their relevance to the workshop's topics, novelty, and scientific contribution, in addition to their potential for encouraging discussion and exchange of ideas during the workshop itself.

Please note: At least one author per paper must attend the workshop to present the accepted paper.

Submissions are single-blind; authors should include their names and affiliations as part of their submissions. Submissions must be in PDF format. Note that LaTeX users can use the "dvipdf" command to convert a DVI file into PDF format. Please ensure that your submission can be opened using Adobe Acrobat 4.0.

Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX CollSec '10 Web site; rejected submissions will be permanently treated as confidential.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details. Questions? Contact your program co-chairs, collsec10chairs@usenix.org (use "[CollSec '10]" in the subject of your email), or the USENIX office, submissionspolicy@usenix.org.

All papers will be available online to registered attendees before the workshop. If your accepted paper should not be published prior to the event, please notify production@usenix.org. The papers will be available online to everyone beginning on the day of the workshop, August 10, 2010.

Specific questions about submissions may be sent to the program co-chairs at collsec10chairs@usenix.org (use "[CollSec '10]" in the subject of your email).

Related Resources

TrustCom 2020   The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Sensors (MDPI) 2020   Special Issue on Security, Trust and Privacy in New Computing Environments
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
EMNLP 2020   Conference on Empirical Methods in Natural Language Processing
ICISSP 2021   7th International Conference on Information Systems Security and Privacy
ESPR-IoTBD 2020   Applied Scieces (Q1), Enterprise Security, Privacy and Risk for Internet of Things and Big Data (ESPR-IoTBD)
SSR 2020   Security Standardisation Research 2020
SmartITC 2020   The 2020 International Workshop on Smart Technologies for Intelligent Transportation and Communications (SmartITC 2020)