posted by organizer: bayforsec || 7770 views || tracked by 5 users: [display]

SHCIS 2015 : 2nd Workshop on Security in highly connected IT systems

FacebookTwitterLinkedInGoogle

Link: https://www.bayforsec.de/shcis15/
 
When Sep 21, 2015 - Sep 22, 2015
Where Vienna
Submission Deadline May 20, 2015
Notification Due Jun 22, 2015
Final Version Due Jul 17, 2015
Categories    computer science   network security   security   cyber security
 

Call For Papers

SHCIS ’15 – 2nd Workshop on Security in highly connected IT systems
Held in conjunction with
20th European Symposium on Research in Computer Security- ESORICS 2015
Vienna, Austria, September 21-25, 2015 (http://esorics2015.sba-research.org/)

Modern society over the course of the past two decades developed an
increasing dependency on their infrastructures in general, and on the
availability and correct functionality of their IT systems in particular.
While in the early days of the Internet revolution not many IT systems
outside the academic world were directly connected to the Internet, the
benefits of internetworking began to prevail by the end of the last
millennium. Nowadays, all kinds of IT systems, from industrial control
systems to nationwide sensor networks, from high-traffic business
platforms to e-health applications, are connected to the Internet and
thus directly connected to each other. Such highly connected IT systems
exhibit their very own peculiarities and need to be studied accordingly.

In this context, SHCIS’15 aims to bring together IT security researchers
and practitioners active in the field of highly-connected IT-systems,
with a strong emphasis on interdisciplinary aspects. The focus of the
workshop is on diffusion of early and ongoing work, with large room being
devoted to presentations of PhD students active in this field and large
scale national and international research projects. Suggested topics
are aligned along a cyclic IT security process for highly connected IT
systems, consisting of the phases “Preventive measures against attacks”,
“Defense against ongoing attacks”, and “Forensics and post-mortem
Examination of relevant IT-security incidents”. The workshop is organized
by the Bavarian Research Alliance FORSEC with focus on the security of
highly connected IT-Systems (https://www.bayforsec.de).

Suggested topics should be closely related to highly-connected IT-systems
and include, but are not limited to:
- Secure distributed architectures
- Secure mobile architectures
- Secure embedded systems
- Security in sensor networks
- Secure cloud computing
- Code obfuscation
- Security economics
- Identity and access management
- Privacy
- Online trust in large-scale systems
- Human factors in security and privacy
- Digital forensics
- Security through virtualization
- Security in virtualized environments
- Security in mobile computing
- Detection of security related anomalies

Relevant application areas include, but are not limited to:
- Virtualization platforms
- Smart grids, smart cities
- Social networks
- Big data applications
- Cloud services
- Business applications
- Transport and logistics
- E-Commerce

Workshop chairs
Günther Pernul, Guido Schryen, Rolf Schillinger
Bavarian Research Alliance FORSEC – Security of highly-connected IT-Systems

Submission Guideline
Authors are invited to publish original and unpublished research that is not
currently in a review process for other workshops, conferences or journals.
The focus of the workshop is on diffusion of early and ongoing work, with
large room being devoted to presentations of PhD students active in this
field
and large scale national and international research projects. Papers must
be written in English and formatted according to the IEEE Proceedings format

(http://ieee.org/conferences_events/conferences/publishing/templates.html)
Camera ready versions of the accepted papers must not exceed a length of 5
pages. At least one of the authors has to be attending the workshop to
present the paper. Submission will be handled electronically through
https://easychair.org/conferences/?conf=shcis15.

Important dates
Submission of full papers: May 20, 2015
Notification of acceptance: June 22, 2015
Camera-ready copies due: July 17, 2015

Program committee
Rainer Böhme, University of Münster, Germany
Zinaida Benenson, FAU Erlangen, Germany
Marijke Coetzee, University of Johannesburg, South Africa
Jorge Cuellar, Siemens AG, Germany
Steven Furnell, Plymouth University, UK
Benjamin Fabian, Humboldt University Berlin, Germany
Carmen Fernandez Gago, University of Madrid, Spain
Danilo Gligoroski, Norwegian University of Science and Technology, Norway
Martin Gilje Jaatun, SINTEF, Norway
Thomas Kittel, Technical University Munich, Germany
Lambrinoudakis Kostas, University of the Aegean, Greece
Hanna Krasnova, University of Bern, Switzerland
Emil C. Lupu, Imperial College London, UK
Tilo Müller, FAU Erlangen, Germany
Rolf Oppliger, eSecurity Technologies, Switzerland
Moussa Ouedraogo, Luxembourg Institute of Science and Technology,
Luxembourg
Hans Reiser, University of Passau, Germany
Heiko Roßnagel, Fraunhofer IAO, Germany
Thomas Schaberreiter, University of Oulu, Finland
Sven Wohlgemuth, CASED Darmstadt, Germany

Related Resources

EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
CHASE 2025   The Tenth IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies