posted by organizer: spaulus || 1004 views || tracked by 1 users: [display]

EICAR 2016 : EICAR Conference 2016: TRUSTWORTHINESS IN IT SECURITY PRODUCTS

FacebookTwitterLinkedInGoogle

Link: http://www.eicar.org/17-0-General-Info.html
 
When Oct 17, 2016 - Oct 18, 2016
Where Nuremberg, Germany
Submission Deadline Jun 30, 2016
Notification Due Jul 31, 2016
Final Version Due Sep 15, 2016
Categories    it security   trustworthiness   data privacy   validation
 

Call For Papers

he conference brings together experts from industry, government, military, law enforcement, academia, research and end-users to examine and discuss new research and development in anti-virus solutions, malware detection, IT Security, and Information Security Management, as well as privacy and legal aspects of Information Technology. A specific focus will be given to the topic of trustworthiness of IT security solutions.

For over 22 years, EICAR supports independent scientific research activities in the field of computer anti-virus (malware) and other aspects of IT security and the privacy and legal aspects of the Information Society. Achievements of the past have always been based on an open, authentic process supported by some of the best researchers in the field. Trying to stay abreast with the latest developments in the area of Information Technology and the new threats and vulnerabilities discovered in contemporary environments (notably, the role of government organizations and the consequences for trust and transparency in IT security technology) has become a Sisyphus task.

The EICAR Conference 2016 intends to provide a road to regain trust and ensure that security products fulfil the trustworthiness expectations of the user and to clarify corresponding legal uncertainties that IT managers today have to live with. The conference also intends to initiate a more prospective view on the development, testing and certification of IT Security products, as well as on the trust into and liability of vendors and testers of IT security products.

The conference committee is seeking submissions of papers for oral presentation at the conference on the following topics:
Verifiability of information security
Certification of IT security solutions
Common Criteria and alternative certification schemes
Trustworthy Internet and Cloud services
Trust in cryptographic mechanisms and processes
Secure software development
Malware and spyware detection
Trustworthiness aspects of smart technologies in the home environment
Legal aspects of digital surveillance technologies
Legal aspects of software contracts, development and maintenance related to trustworthiness
Software liability aspects
Safe harbour alternatives, software security and trustworthiness issues from a legal standpoint
Legal viewpoints on the conflict of privacy / data protection and cybersecurity

Related Resources

CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
CYSARM 2020   2nd Workshop on Cyber-Security Arms Race
SYSINT 2020   5th International Conference on System-Integrated Intelligence Intelligent, flexible and connected systems in products and production
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)
CCNC 2021   IEEE Consumer Communications & Networking Conference
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
CRITIS 2021   The 16th International Conference on Critical Information Infrastructures Security