![]() |
| |||||||||||||||
WSCS 2012 : Workshop on Semantic Computing and Security | |||||||||||||||
Link: http://ieee-security.org/TC/SPW2012/wscs-website/wscs.php | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The IEEE Computer Society's Technical Committees:
Security and Privacy (TCSP) Semantic Computing (TCSEM) Keynote Speaker: Jeanette Wing President's Professor of Computer Science and Department Head, Computer Science Department, Carnegie Mellon University This workshop follows the successful September 2011 workshop at the International Semantic Computing Symposium. This new workshop will explore additional topics and allow semantic computing researchers to have more opportunity to interact with security researchers. Semantic Computing technologies derive and use semantics from content, where “content” is wide-ranging: video, audio, text, conversation, software, devices, actions, behavior, etc. Security technology encompasses the specification of secure behavior as well as the detection of insecure behavior over computer networks. The two disciplines come together in this new and interesting combination, in a synergy-seeking, cutting-edge workshop. The delimited notions of semantics used within Security and Privacy provide a well-defined and as yet unstudied domain for semantic modeling, automated semantic interpretation, and inference, with clear practical uses and opportunities for novel and imaginative research. The workshop on Semantic Computing and Security addresses: deriving semantics from data used for security and privacy research; semantic verification of network activity; and inferring the semantics of malicious free-form data, such as email and web pages. Topics of interest include but are not limited to: Network dataset curation through semantic derivation Semantic MediaWiki for vulnerability sharing and detecting emergent security properties Network security semantics, dynamic classification Inferred semantics of malicious code Semantic verification of network operations Semantic specification and analysis of security experiment design Semantic analysis of access control policies Semantics of data acquisition and computation provenance Semantic analysis of malware communication Semantics-aware trust management |
|