| |||||||||||||||
ISCSS 2014 : The Sixth International Symposium on Cyberspace Safety and Security | |||||||||||||||
Link: http://conference.css2014.studiocheik.fr/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Introduction
A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers. The CSS-2014 symposium is the 6th International Symposium on Cyberspace Safety and Security. It provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. The CSS-2014 symposium is the next event in a series of highly successful international conferences on cyberspace safety and security previously held as CSS-2013 (Zhangjiajie, China, 2013), CSS-2012 (Melbourne, Australia, 2012), CSS-2012 (Milan, Italy, 2011), CSS-2009 (Chengdu, China, 2009), and CSS-2008 (Sydney, Australia, 2008). Call for Papers IEEE Conference Proceedings and Journal Papers The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. Scope and Interests Topics of particular interests include the following tracks, but are not limited to: Access Control and Trust Management Active Defense Techniques and Systems Attack Containment Attack Recovery Benchmark, Analysis and Evaluation of Cybersecurity Digital Rights Management Distributed Intrusion Detection/Prevention Systems Denial-of-Service Attacks and Countermeasures Identity Management and Authentication Implementation, Deployment and Management of Cybersecurity Intelligent Defense Systems Internet and Network Forensics Risk Assessment in Cybersecurity Secure Design and Testing Secure Network Architectures Security for Large-scale Systems and Critical Infrastructures Security for P2P systems and Grid Systems Security for Ad-Hoc and Sensor Networks Security in Web Services Security in Pervasive and Embedded Systems Security Theory and Tools Spam Detection and Prevention Social and Legal Issues in Cybersecurity Software and System Assurance Viruses, Worms, and Other Malicious Code Tracks and Topics Track 1: Data and Applications Security Topics Digital Rights Management Secure Information Integration and Transaction Processing Secure Semantic Web and Web Services Security in E-Commerce and M-Commerce Watermarking Privacy and Data Protection Emerging Technologies and Applications Database Security Data Mining Security Track 2: Network and Communications Security Topics Active Defense Techniques and Systems Distributed Intrusion Detection/Prevention Systems Denial-of-Service Attacks and Countermeasures Intelligent Defense Systems Internet and Network Forensics Secure Network Architectures Security for Ad-Hoc and Sensor Networks Spam Detection and Prevention 5G Mobile Networks Security and Trust Trust, Security and Privacy in Social Networks Privacy Enhancement Technologies Security issues in emerging networking technologies (e.g., SDN, CCN) Track 3: Software and Systems Security Topics Analysis, identification, prevention, and removal of vulnerabilities Audit and digital forensics Authorization and access control of software objects Dependable computing and fault tolerance Detection of, defense against, containment of, and recovery from attacks Operating system and mobile operating system security Risk modeling, assessment, and management in software engineering Security for large-scale systems and critical infrastructures Security in distributed systems and pervasive computing Viruses, worms, Trojans, and other malicious codes Track 4: Cloud Security Topics: Cloud and mobile cloud computing data access control Privacy preservation and data privacy in cloud Trust management in cloud computing Big data trust in cloud Secure cloud data storage Verifiable cloud computing Security solutions based on cloud computing Trustworthy identity management in cloud Media cloud security and cloud security policy Security for personal cloud Track 5: Cyberspace Safety Topics Access Control and Trust Management Identity Management and Authentication Security and Usability Security in Pervasive and Embedded Systems Privacy Models, Privacy Enhancing Technologies Human Factors in Computer Security Risk Assessment in Cyber Security Cyber-Physical System Security Benchmark, Analysis and Evaluation of Cyber Security Implementation, Deployment and Management of Cyber Security Conference Proceedings Proceedings The accepted papers from this conference will be submitted for publication by IEEE Computer Society in IEEE proceedings and submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.(indexed by EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Full Papers (up to 8 pages, or 12 pages with the over length charge) and Short Papers (up to 4 pages) are solicited. Journal Special Issues Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. Co-located Conferences HPCC 2014 The 16th IEEE International Conference on High Performance Computing and Communications, France, August 20-22, 2014 ICESS 2014 The 11th IEEE International Conference on Embedded Software and Systems Paris, France, August 20-22, 2014 |
|