HotSoS 2014 : 2014 Symposium and Bootcamp on the Science of Security
Call For Papers
NEW EXTENDED DEADLINES — 2014 Symposium and Bootcamp on the Science of Security (HotSoS)
April 8-9, 2014, Raleigh, North Carolina, United States
Additional Background: http://cps-vo.org/group/SoS
*** SYMPOSIUM OVERVIEW ***
Hot SoS is a research event centered on the Science of Security (SoS). The key motivation behind developing a Science of Security is to address in a principled manner the fundamental problems of security.
Security has been intensively studied, however, previous research has often emphasized the engineering of specific solutions and attacks without developing the scientific understanding of the problem domain. All too often, security research focuses on responding to specific threats in an apparently ad hoc manner.
The motivation behind the nascent Science of Security is to understand how computing systems are architected, built, used, and maintained with a view to understanding and addressing security challenges systematically across their life cycle. In particular, two features distinguish the Science of Security from other research programs on security: scope and approach.
* Scope. The Science of Security considers not just computational artifacts, but incorporates the human, social, and organizational aspects of computing within its purview.
* Approach. The Science of Security takes a decidedly scientific approach, based on the understanding of empirical evaluation and theoretical foundations as developed in the natural and social sciences, but adapted as appropriate for the artificial science (in Herb Simon's term) that is computing.
Following a successful invitational SoS Community Meeting in December 2012, Hot SoS 2014 will be the first open research event in what is expected to be a continuing series.
Submissions to the symposium will be peer-reviewed and indexed in the IEEE Digital Library.
Thanks to support from our sponsors, travel scholarships will be available for students, with a preference for student authors.
*** TOPICS OF INTEREST ***
We welcome submissions on all topics relevant to the theme of Science of Security including, but not limited to, the following (each from the perspective of the Science of Security):
* Computing architectures
* Software engineering practices
* Models of human interaction and behavior
* Organizational models
* Evaluation methodologies
If you have any questions about the topics or submission instructions, please contact the Program Chairs, Professors David M. Nicol and Munindar P. Singh, at email@example.com
*** IMPORTANT DATES ***
Abstracts: December 4, 2013 (EXTENDED)
Submissions: December 11, 2013 (EXTENDED)
First round of reviews: January 10, 2014
Author responses: January 15, 2014
Decisions: February 1, 2014
Final versions of accepted submissions: March 1, 2014
Conference: April 8-9, 2014
To encourage participation, registration fees will be kept low thanks for support from our sponsors.
*** SUBMISSION INSTRUCTIONS ***
Submissions must be formatted in the IEEE Conference Proceedings format and be no more than 10 pages long with an additional 2 pages for references to yield a total of 12 pages maximum. Submissions must be prepared for double-blind review, that is, removing the authors names and any explicit indicators of the authors' identities, such as removing past publications identified in the paper as "our work" or "we showed".
Submissions must not be previously published or accepted for publication and must not be submitted for publication elsewhere between the Hot SoS submission and decision dates. Prior or concurrent submission to workshops without a proceedings might be acceptable, if disclosed at the time of submission.
Submit your manuscript using Easy Chair:
*** ORGANIZATION ***
Laurie A. Williams, North Carolina State University
David M. Nicol, University of Illinois, Urbana-Champaign
Munindar P. Singh, North Carolina State University
Gul Agha, University of Illinois
Ehab Al-Shaer, University of North Carolina, Charlotte
Bo An, Nanyang Technological University
Travis Breaux, Carnegie Mellon University
Jean Camp, Indiana University
Amit Chopra, Lancaster University
Jedidiah Crandall, University of New Mexico
Fabiano Dalpiaz, Utrecht University
Anupam Datta, Carnegie Mellon University
Scott DeLoach, Kansas State University
Will Enck, North Carolina State University
Rino Falcone, ISTC-CNR
David Garlan, Carnegie Mellon University
Dieter Gollmann, TU Hamburg-Harburg
Mark Greaves, Pacific Northwest National Laboratory
Xiaohui Gu, North Carolina State University
Somesh Jha, University of Wisconsin
Christopher Kiekintveld, University of Texas at El Paso
Karl Levitt, UC Davis
Ninghui Li, Purdue University
Emil Lupu, Imperial College
William Martin, U.S. Department of Defense
Christopher Mayhorn, North Carolina State University
Ian Molloy, IBM Research
Emerson Murphy-Hill, North Carolina State University
Tim Norman, University of Aberdeen
Nir Oren, University of Aberdeen
Simon Parsons, University of Liverpool
Wolter Pieters, Delft University of Technology
Robert Proctor, Purdue University
Angela Sasse, University College London
Greg Shannon, CERT/SEI
Kevin Sullivan, University of Virginia
Wamberto Vasconcelos, University of Aberdeen
Serena Villata, INRIA Sophia Antipolis
Claire Vishik, Intel
Tara Whalen, Carlton University
Rebecca Wright, Rutgers University