2010-06-28

Re: [Mycolleagues] WORKSHOPS of 17th ACM Conference on Computer and Communications Security

THE DEADLINES OF CALL FOR PAPERS ARE EXTENDED. COULD YOU PLEASE CHOOSE
THE WORKSHOP AT http://www.sigsac.org/ccs/CCS2010/index.shtml?

> OCT 4-8, 2010. Hyatt Regency Chicago, Chicago, IL, USA
>
> http://www.sigsac.org/ccs/CCS2010/index.shtml
>
> ------------------------------------------
> Pre-Conference Workshops (October 4, 2010)
> ------------------------------------------
>
> * Workshop on Assurable and Usable Security Configuration (SafeConfig
> 2010)
>
> The workshop will bring together academic as well as industry
> researchers to exchange experiences, discuss the major challenges and
> present future solutions to offer manageable and usable security. This
> includes topics from design, implementation, and evaluation for usability
> issues as well as verification, testing and optimization for assurance and
> correctness issues. This workshop will seek presentations on security
> configuration abstraction, verification, enforcement, distribution,
> optimization, testing, visualization and other related topics.
>
> * Workshop on Digital Rights Management (DRM 2010)
>
> The ACM Workshop on Digital Rights Management is an international
> forum that serves as an interdisplinary bridge between areas that can be
> applied to solving the problem of Intellectual Property protection of
> digital content. These include: cryptography, software and computer
> systems design, trusted computing, information and signal processing,
> intellectual property law, policy-making, as well as business analysis and
> economics. Its purpose is to bring together researchers from the above
> fields for a full day of formal talks and informal discussions, covering
> new results that will spur new investigations regarding the foundations
> and practices of DRM.
>
> * Workshop on Privacy in the Electronic Society (WPES 2009)
>
> The increased power and interconnectivity of computer systems
> available today create the ability to store and process large amounts of
> data, resulting in networked information accessible from anywhere at any
> time. It is becoming easier to collect, exchange, access, process, and
> link information. This global scenario has inevitably resulted in an
> increasing degree of awareness with respect to privacy. Privacy issues
> have been the subject of public debates, and the need for privacy-aware
> policies, regulations, and techniques has been widely recognized. The goal
> of this workshop is to discuss the problems of privacy in the global
> interconnected societies and possible solutions to them.
>
> * Workshop on Scalable Trusted Computing (STC 2010)
>
> Built on the continuous success of ACM STC'06, STC'07, STC'08 and
> STC'09, this workshop focuses on fundamental technologies of trusted
> computing (in a broad sense, with or without TPMs) and its applications in
> large-scale systems -- those involving large number of users and parties
> with varying degrees of trust. The workshop is intended to serve as a
> forum for researchers as well as practitioners to disseminate and discuss
> recent advances and emerging issues.
>
> -------------------------------------------
> Post-Conference Workshops (October 8, 2010)
> -------------------------------------------
>
> * Workshop Cloud Computing Security(CCSW 2010)
>
> The CCSW workshop aims to bring together researchers and
> practitioners in all security aspects of cloud-centric and outsourced
> computing. How exactly grid, cloud, utility computing etc will look like
> tomorrow is still for the markets to decide, yet one thing is certain:
> clouds bring with them new untested deployment and associated adversarial
> models and vulnerabilities. It is essential that our community becomes
> involved at this early stage.
>
> * Workshop on Digital Identity Management (DIM 2010)
>
> This workshop will explore critical issues concerning identity
> management technologies for the information society. Existing solutions
> are not necessarily interoperable or complementary, and sometimes overlap.
> Thus it is critical to lay foundations for a holistic understanding of
> problem areas and approaches to innovative solutions. The goal of this
> workshop is to share the latest findings, identify key challenges, inspire
> debates, and foster collaboration between industries and academia towards
> interoperable identity service infrastructures.
>
> * Workshop on Insider Threats(WIT 2010)
>
> The Insider Threat has been identified as a hard, but important,
> computer security problem. This workshop broadly calls for novel research
> in the defense against insider threats. Relevant research may leverage
> operating systems, communication networking, data mining, social
> networking, or theoretical techniques to inform or create systems capable
> of detecting malicious parties. Cross-disciplinary work is encouraged but
> such work should contain a significant technical computer security
> contribution. Research in non-traditional systems, such as smart spaces,
> is encouraged as well as enterprise systems. Finally, while we discourage
> exploits of limited scope, we solicit generalized techniques that help an
> inside attacker evade modern defensive techniques.
>
> * Workshop on Security and Artificial Intelligence(AISec 2010)
>
> This workshop is to facilitate an exchange of ideas between these AI
> and Security and promote security and privacy solutions that leverage AI
> technologies. Topics of interest include, but are not limited to
> AI-informed approaches to: Spam and botnet detection, malware
> identification, insider threat detection, incentives in security/privacy
> systems, phishing, and others.
>
> * Workshop on Security and Privacy in Medical and Home-Care Systems
> (SPIMACS 2010)
>
> SPIMACS (pronounced spy-max) seeks to bring together the computer
> and social scientists that will be required to address the challenges of
> securing the intimate digital spaces of the most vulnerable. We invite
> papers which analyze the use of technologies at home, the challenges of
> design targeted at a population with cognitive decline, design for the
> disable with a focus on medical and home support when these projects have
> a primary or at least significant focus on privacy and security. Papers
> explaining the data constraints and controls on data from policy, ethical
> or legal perspectives are also welcome.
_______________________________________________
Mycolleagues mailing list
Mycolleagues@mailman.ufsc.br
http://mailman.ufsc.br/mailman/listinfo/mycolleagues

No comments: