| ||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||
All CFPs on WikiCFP | ||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||
Present CFP : 2014 | ||||||||||||||||||||||||||||||||||||||||||||||
PASSAT is the premier forum for information privacy, risk, trust, and security researchers and practitioners to explore solutions to profound challenges on privacy, risk, trust, and security issues and exchange recent progresses. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of information privacy, risk, trust, and security.
We solicit previously unpublished papers offering novel research contributions in any aspect of information privacy, security, risk and trust. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems. Paper Submission: Prepare your manuscripts with the following conference paper styles not more than 10 pages in PDF file. ( Paper Styles). Submit your paper(s) at the PASSAT 2014 submission site . Each submission should be regarded as an undertaking that, should the paper be accepted, at least one of the authors must attend the conference to present the work in order for the paper to be included in the Digital Library. Paper Publications: Top 2% accepted papers will be submitted to the ASE Science Journal. The rest of accepted papers will be submitted to the ASE Public Access Digital Library. Topics of particular interest include, but are not limited to: Privacy Foundations Privacy Enhancing Technologies Privacy-Preserving Computing Privacy Policies and Laws Economics of Privacy Privacy Theory and Engineering Natural Disasters and Emergencies, and Terrorism Protection Risk Analysis, Modeling, and Management Trust Formalization and Modeling Trustworthy Computing Trust Management Trust Evaluation Security Foundations Network and Communication Security System Security Database Security Access Control Accountability Anonymity Application Security Attacks and Defenses Authentication Censorship and censorship-resistance Distributed System Security Embedded Systems Security Forensics Hardware Security Intrusion Detection Language-Based Security Malware Metrics Network Security Protocol Security Secure Information Flow Security and Privacy Policies Security Architectures System Security Usability and Security Web Security | ||||||||||||||||||||||||||||||||||||||||||||||
|