posted by user: xgeorgio || 6590 views || tracked by 12 users: [display]

STAST 2011 : 1st Workshop on Socio-Technical Aspects in Security and Trust

FacebookTwitterLinkedInGoogle

Link: http://stast.uni.lu
 
When Sep 6, 2011 - Sep 8, 2011
Where Milan, Italy
Submission Deadline Jun 5, 2011
Notification Due Jul 4, 2011
Final Version Due Jul 20, 2011
Categories    security   trust
 

Call For Papers

* ********************************************************** *
* 1st Int. Workshop on *
* Socio-Technical Aspects of Security and Trust *
(STAST) - http://stast.uni.lu *
* ---------------------------------------------------------- *
* Co-located with 5th Int. Conference on *
* Network and System Security (NSS) *
* Milan, Italy - 6/8 September 2011 *
* ********************************************************** *

IMPORTANT DATES
----------------
Papers: 5 June 2011
Notification of Acceptance: 4 July 2011
Final version due: 20 July 2011
Workshop: 6-8 Sept 2011 (one day to be decided)

TECHNICAL CO-SPONSORS
-----------
IEEE and IEEE Council.

SCOPE
---------------------
Due to the huge yet increasing number of people carrying out
sensitive Internet transactions, security threats hardly ever
reduce to technical threats. Rather, they are socio-technical,
as they come from adversaries who combine social
engineering practices with technical skills.

Humans obviously cannot be treated as machines, as they take
actions that may seem irrational although they are perfectly
justifiable from a cognitive and a social perspective.
Computer security hence appears to acquire more and more the
facets of an interdisciplinary science with roots in both
interpretive and positivist research traditions.

The workshop intends to foster an interdisciplinary discussion
on how to model and analyse the socio-technical aspects
of modern security systems and on how to protect such
systems from socio-technical threats and attacks.

We welcome experts in computer science, in social and behavioral
sciences, philosophy and psychology.

WORKSHOP TOPICS
--------------
Relevant topics include but are not limited to:

* Usability Analysis
* System-User Interfaces
* Psychology of Deception
* Socio-Technical Attacks and Defenses
* User Perception of Security and Trust
* Design of Socio-Technical Secure Systems
* Cognitive Aspect in Human Computer Interaction
* Human Practice
* Behavioural Models
* Social Engineering
* Modelling and Analysis of Security
* Ceremonies and Workflows
* Game Theoretical Approaches to Security
* Cyber Crime Science
* Security Properties Specification and Verification
* Threat and Adversary Models
* Social Informatics and Networks
* Effects of Technology on Trust Building Behaviour
* Experiences and Test Cases

PROGRAM COMMITTEE
-------------------
Colin Boyd (Queensland University of Technology, AU)
Jose'-Rodrigo Co'rdoba-Pacho'n (Royal Holloway Univ. of London, UK)
Richard Clayton (Univ. of Cambridge, UK)
Rino Falcone (ISTC-CNR, IT)
Pieter Hartel (Univ. of Twente, NL)
Elena Ferrari (Univ. of Insubria, IT)
Dieter Gollmann (TU Hamburg, D)
Vincent Koenig (EMACS, Univ. of Luxembourg, L)
Sjouke Mauw (Univ. of Luxembourg, L)
Tyler Moore (SEAS Harvard, US)
Aad van Moorsel (Univ. of Newcastle, UK)
Ingrid Mulder (Rotterdam Univ. & TU Delft, NL)
Martin Ortlieb (Google, CH)
Christian W. Probst (DTU, D)
Angela Sasse (UCL, UK)
Melanie Volkameer (TU Darmstadt, D)
Trish Williams (Edith Cowan University, AU)

PAPER SUBMISSION
----------------
Contributions should be at most 8 pages, including
the bibliography and well-marked appendices, and
should follow the IEEE 8.5" x 11" Two-Columns Format.
Both theoretical and applied research papers are welcome.

Please visit our web site for more submission guidelines.

PROCEEDINGS
-----------

Accepted papers will be published by IEEE and
in the IEEE digital library.

ORGANIZING COMMITTEE
--------------------

*** NSS Conference General Chair

Sabrina de Capitani Di Vimercati (Univ. of Milan, IT)

*** Workshop Chairs

Giampaolo Bella (Univ. of Catania, IT)
Gabriele Lenzini (Univ. of Luxembourg, L)

*** Programme Chairs

Lizzie Coles-Kemp (Royal Holloway Univ. of London, UK)
Peter Ryan (Univ. of Luxembourg, L)

Related Resources

STPIS 2022   The 8th International Workshop on Socio-Technical Perspective in IS development
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
IoT special issue 2022   Call for papers on the Special Issue titled Sustainability Privacy-Preserving of IoT-Based Application in Smart Healthcare
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
SAPSE 2022   14th IEEE International Workshop on Security Aspects in Processes and Services Engineering
NLMLT 2022   International Conference on NLP and Machine Learning Trends
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
USENIX ATC 2022   2022 USENIX Annual Technical Conference
IJANS 2022   International Journal on AdHoc Networking Systems
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications