posted by user: rafspiny || 18406 views || tracked by 48 users: [display]

PASSAT 2014 : Privacy, Security, Risk and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Privacy, Security, Risk and Trust
 
Link: http://www.scienceengineering.org/ase/conference/2014/passat/boston/website
 
When Dec 15, 2014 - Dec 19, 2014
Where Cambridge, MA, USA
Submission Deadline Jul 15, 2014
Notification Due Sep 30, 2014
Final Version Due Oct 25, 2014
Categories    privacy   security   trust
 

Call For Papers

PASSAT is the premier forum for information privacy, risk, trust, and security researchers and practitioners to explore solutions to profound challenges on privacy, risk, trust, and security issues and exchange recent progresses. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of information privacy, risk, trust, and security.
We solicit previously unpublished papers offering novel research contributions in any aspect of information privacy, security, risk and trust. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems.
Paper Submission: Prepare your manuscripts with the following conference paper styles not more than 10 pages in PDF file. ( Paper Styles). Submit your paper(s) at the PASSAT 2014 submission site . Each submission should be regarded as an undertaking that, should the paper be accepted, at least one of the authors must attend the conference to present the work in order for the paper to be included in the Digital Library.

Paper Publications: Top 2% accepted papers will be submitted to the ASE Science Journal. The rest of accepted papers will be submitted to the ASE Public Access Digital Library.

Topics of particular interest include, but are not limited to:

Privacy Foundations
Privacy Enhancing Technologies
Privacy-Preserving Computing
Privacy Policies and Laws
Economics of Privacy
Privacy Theory and Engineering
Natural Disasters and Emergencies, and Terrorism Protection
Risk Analysis, Modeling, and Management
Trust Formalization and Modeling
Trustworthy Computing
Trust Management
Trust Evaluation
Security Foundations
Network and Communication Security
System Security
Database Security
Access Control
Accountability
Anonymity
Application Security
Attacks and Defenses
Authentication
Censorship and censorship-resistance
Distributed System Security
Embedded Systems Security
Forensics
Hardware Security
Intrusion Detection
Language-Based Security
Malware
Metrics
Network Security
Protocol Security
Secure Information Flow
Security and Privacy Policies
Security Architectures
System Security
Usability and Security
Web Security

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BIOSIG 2025   International Conference of the Biometrics Special Interest Group
IFIP SEC 2025   40th International Conference on ICT Systems Security and Privacy Protection
BIOSIG 2025   International Conference of the Biometrics Special Interest Group
CBMS 2025 - ST Security and Privacy 2025   CBMS 2025 - Special Track: Security and Privacy in Health Systems: Addressing Technology, Society, and Law
IJCSITY 2024   International Journal of Computational Science and Information Technology
DBSec 2025   Conference on Data and Applications Security and Privacy
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)