posted by user: ghorbani || 17387 views || tracked by 37 users: [display]

PST 2018 : The Sixteen International Conference on Privacy, Security and Trust (PST)

FacebookTwitterLinkedInGoogle


Conference Series : Conference on Privacy, Security and Trust
 
Link: http://pstnet.ca/pst2018/
 
When Aug 28, 2018 - Aug 30, 2018
Where Belfast, United Kingdom
Submission Deadline May 7, 2018
Notification Due Jun 18, 2018
Final Version Due Jun 29, 2018
Categories    privacy   security   cybersecurity   trust
 

Call For Papers

PST 2018 Privacy, Security & Trust
August 28-30, 2018 – Titanic Venues Belfast
Belfast – Northern Ireland – UK

Innovation in ubiquitous interconnected technologies, together with the growth of interconnected computing and storage, defines the foundation to a vast landscape of unforeseen digital services and social networks. Instant access to services, real-time data and the ability to share content down to detailed social and very personal information. Developing sustainable communities and optimising the utilisation of resources, such as energy, led to the development of new technologies for smart utilities, smart cities, smart transport and the evolution of autonomous technologies for manufacturing and transport. Significant commercial opportunities promised by these technologies and services inevitably attract cybercrime and the need for research and innovation in Privacy, Security and Trust.

The Annual International Conference in Privacy, Security & Trust (PST) provides a premier forum for sharing advances in cybersecurity research and security applications. PST2018 will be held in Northern Ireland at the Centre for Secure Information Technologies (CSIT) and Queen's University Belfast, and will offer three days of keynotes, technical presentations, posters, workshops, and an Industrial day with vendor exhibition.

PST TECHNICAL SCOPE
Papers are invited which address new and previously unpublished results in the area of Privacy, Security & Trust, and related topics.

- Privacy Preserving / Enhancing Technologies
- Critical Infrastructure Protection
- Network and Wireless Security
- Cloud Security, Web Security and Privacy
- Internet Of Things (IoT) Security and Privacy
- Operating Systems Security
- Intrusion Detection / Prevention Technologies
- Secure Software Development and Architecture
- PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce
- Digital Forensics
- Security Analytics and Data mining
- Cryptographic Technologies
- Recommendation, Reputation and Delivery Technologies
- Continuous Authentication
- Trust Technologies, Technologies for Building Trust in e-Business Strategy
- Observations of PST in Practice, Society, Policy and Legislation
- Digital Rights Management
- Identity and Trust Management
- Human Computer Interaction and PST
- Biometrics, National ID Cards, Identity Theft
- Implications of, and Technologies for, Lawful Surveillance
- Privacy, Traceability, and Anonymity
- Trust and Reputation in Self-Organizing Environments
- Anonymity and Privacy vs. Accountability
- Access Control and Capability Delegation
- Representations and Formalizations of Trust in Electronic and Physical Social Systems

PST2018 Submission Instructions

High-quality papers in all PST-related areas that, at the time of submission, are not under review and have not already been published or accepted for publication elsewhere are solicited. Authors MUST ensure to select the track (Privacy, Security, or Trust) most relevant to their research when submitting their paper. Accepted papers will be accepted as ‘regular’ papers up to 10 pages, or ‘short’ papers of up to 5 pages. The standard IEEE two-column conference format should be used for all submissions. IEEE Manuscript Templates for Conference Proceedings can be downloaded here: http://www.ieee.org/conferences_events/conferences/publishing/templates.html

The conference proceedings will be submitted for inclusion in IEEE Xplore as in previous editions of the conference. At least one author of an accepted paper must register by June 29, 2018. A regular registration is required. Accepted (short or regular) papers will be published in the proceedings.

Double blind Submission

Reviewing will be double-blind: the reviewers will not know the identities of the authors. It will be up to the authors to ensure the proper anonymization of their paper. For effective anonymization please follow these guidelines:

Do not include any author name or affiliation in the title. Do not include any acknowledgments. Refer to your own published work in the third person: use "In the previous work of Jones et al.", not "In our previous work". If you cite own papers that are not widely available (e.g., a paper currently under review), use anonymous author names in the citation, for example an author of the form "A. Anonymous".

IMPORTANT DATES
Paper submission deadline: April 23, 2018
Notification of acceptance: June 18, 2018
Final camera-ready paper due: June 29, 2018
Advance registration (authors): July 14, 2018
Conference date: Aug. 28-30, 2018

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
IWSPA 2025   IWSPA 2025 : The 11th ACM International Workshop on Security and Privacy Analytics
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2