2010-05-08

[Tccc] WORKSHOPS of 17th ACM Conference on Computer and Communications Security

OCT 4-8, 2010. Hyatt Regency Chicago, Chicago, IL, USA

http://www.sigsac.org/ccs/CCS2010/index.shtml

------------------------------------------
Pre-Conference Workshops (October 4, 2010)
------------------------------------------

* Workshop on Assurable and Usable Security Configuration (SafeConfig
2010)

The workshop will bring together academic as well as industry
researchers to exchange experiences, discuss the major challenges and
present future solutions to offer manageable and usable security. This
includes topics from design, implementation, and evaluation for usability
issues as well as verification, testing and optimization for assurance and
correctness issues. This workshop will seek presentations on security
configuration abstraction, verification, enforcement, distribution,
optimization, testing, visualization and other related topics.

* Workshop on Digital Rights Management (DRM 2010)

The ACM Workshop on Digital Rights Management is an international
forum that serves as an interdisplinary bridge between areas that can be
applied to solving the problem of Intellectual Property protection of
digital content. These include: cryptography, software and computer
systems design, trusted computing, information and signal processing,
intellectual property law, policy-making, as well as business analysis and
economics. Its purpose is to bring together researchers from the above
fields for a full day of formal talks and informal discussions, covering
new results that will spur new investigations regarding the foundations
and practices of DRM.

* Workshop on Privacy in the Electronic Society (WPES 2009)

The increased power and interconnectivity of computer systems
available today create the ability to store and process large amounts of
data, resulting in networked information accessible from anywhere at any
time. It is becoming easier to collect, exchange, access, process, and
link information. This global scenario has inevitably resulted in an
increasing degree of awareness with respect to privacy. Privacy issues
have been the subject of public debates, and the need for privacy-aware
policies, regulations, and techniques has been widely recognized. The goal
of this workshop is to discuss the problems of privacy in the global
interconnected societies and possible solutions to them.

* Workshop on Scalable Trusted Computing (STC 2010)

Built on the continuous success of ACM STC'06, STC'07, STC'08 and
STC'09, this workshop focuses on fundamental technologies of trusted
computing (in a broad sense, with or without TPMs) and its applications in
large-scale systems -- those involving large number of users and parties
with varying degrees of trust. The workshop is intended to serve as a
forum for researchers as well as practitioners to disseminate and discuss
recent advances and emerging issues.

-------------------------------------------
Post-Conference Workshops (October 8, 2010)
-------------------------------------------

* Workshop Cloud Computing Security(CCSW 2010)

The CCSW workshop aims to bring together researchers and
practitioners in all security aspects of cloud-centric and outsourced
computing. How exactly grid, cloud, utility computing etc will look like
tomorrow is still for the markets to decide, yet one thing is certain:
clouds bring with them new untested deployment and associated adversarial
models and vulnerabilities. It is essential that our community becomes
involved at this early stage.

* Workshop on Digital Identity Management (DIM 2010)

This workshop will explore critical issues concerning identity
management technologies for the information society. Existing solutions
are not necessarily interoperable or complementary, and sometimes overlap.
Thus it is critical to lay foundations for a holistic understanding of
problem areas and approaches to innovative solutions. The goal of this
workshop is to share the latest findings, identify key challenges, inspire
debates, and foster collaboration between industries and academia towards
interoperable identity service infrastructures.

* Workshop on Insider Threats(WIT 2010)

The Insider Threat has been identified as a hard, but important,
computer security problem. This workshop broadly calls for novel research
in the defense against insider threats. Relevant research may leverage
operating systems, communication networking, data mining, social
networking, or theoretical techniques to inform or create systems capable
of detecting malicious parties. Cross-disciplinary work is encouraged but
such work should contain a significant technical computer security
contribution. Research in non-traditional systems, such as smart spaces,
is encouraged as well as enterprise systems. Finally, while we discourage
exploits of limited scope, we solicit generalized techniques that help an
inside attacker evade modern defensive techniques.

* Workshop on Security and Artificial Intelligence(AISec 2010)

This workshop is to facilitate an exchange of ideas between these AI
and Security and promote security and privacy solutions that leverage AI
technologies. Topics of interest include, but are not limited to
AI-informed approaches to: Spam and botnet detection, malware
identification, insider threat detection, incentives in security/privacy
systems, phishing, and others.

* Workshop on Security and Privacy in Medical and Home-Care Systems
(SPIMACS 2010)

SPIMACS (pronounced spy-max) seeks to bring together the computer
and social scientists that will be required to address the challenges of
securing the intimate digital spaces of the most vulnerable. We invite
papers which analyze the use of technologies at home, the challenges of
design targeted at a population with cognitive decline, design for the
disable with a focus on medical and home support when these projects have
a primary or at least significant focus on privacy and security. Papers
explaining the data constraints and controls on data from policy, ethical
or legal perspectives are also welcome.

_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: