-
Notifications
You must be signed in to change notification settings - Fork 0
/
ACMCCSWS-CFP2009.txt
332 lines (302 loc) · 10.2 KB
/
ACMCCSWS-CFP2009.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
=
=
=
=
=
=
=
=
========================================================================
Please excuse multiple copies of this message.
=
=
=
=
=
=
=
=
========================================================================
Call for Papers: ACM CCS WORKSHOPS
co-located with the
16th ACM Conference on Computer and Communications Security (CCS)
2009
Nov. 9, 2009 - Nov. 13, 2009 -- Chicago, IL, USA
http://www.sigsac.org/ccs/CCS2009/
=
=
=
=
=
=
=
=
========================================================================
*** Workshop submissions due: June 12, 2009 ***
[ please check individual workshop pages for possible deadline
extensions ]
=
=
=
=
=
=
=
=
========================================================================
Workshop on Assurable & Usable Security Configuration (SafeConfig)
http://www.arc.cs.depaul.edu/~ehab/ccs/safeconfig09/
A typical enterprise network might have hundreds of security devices
such as firewalls, IPSec gateways, IDS/IPS, authentication servers,
authorization/RBAC servers and crypto systems. These must be logically
integrated into a security architecture satisfying security goals at
and across multiple networks. Logical integration is accomplished by
consistently setting thousands of configuration variables and rules on
the devices. The configuration must be constantly adapted to optimize
protection and block prospective attacks. The configuration must be
tuned to balance security with usability. These challenges are
compounded by the deployment of mobile devices and ad hoc
networks. The resulting security configuration complexity places a
heavy burden on both regular users and experienced administrators and
dramatically reduces overall network assurability and usability. The
workshop will bring together academic as well as industry researchers
to exchange experiences, discuss the major challenges and present
future solutions to offer manageable and usable security.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Digital Rights Management (DRM 2009)
http://www.almaden.ibm.com/cs/people/hongxia-jin/DRM2009/
The ACM Workshop on Digital Rights Management is an international
forum that serves as an interdisplinary bridge between areas that can
be applied to solving the problem of Intellectual Property protection
of digital content. These include: cryptography, software and computer
systems design, trusted computing, information and signal processing,
intellectual property law, policy-making, as well as business analysis
and economics. Its purpose is to bring together researchers from the
above fields for a full day of formal talks and informal discussions,
covering new results that will spur new investigations regarding the
foundations and practices of DRM.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Virtual Machine Security (VMSec 2009)
http://csis.gmu.edu/VMSec09/
This workshop, the first of its kind to deal exclusively with virtual
machine security, will tackle the important research topics in
virtualization security. This workshop aims to bring together leading
researchers in the fields of virtualization and security to present
the latest work on these topics.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Security and Artificial Intelligence (AISec 2009)
http://www.aisec.info/
This workshop is to facilitate an exchange of ideas between these AI
and Security and promote security and privacy solutions that leverage
AI technologies. Topics of interest include, but are not limited to
AI-informed approaches to: Spam and botnet detection, malware
identification, insider threat detection, incentives in
security/privacy systems, phishing, and others.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Secure Execution of Untrusted Code (SecuCode 2009)
http://www.docomoeurolabs.de/secucode
The workshop aims at bringing together researchers and practitioners
from industry and academia working on the protection of software
systems against untrusted code. Untrusted applications should only
access those resources and only call those functions that are
considered as non-security-critical. Topics of interest include
security for intermediate languages like Java or .NET and interpreted
languages like Python or PHP, runtime monitoring, static analysis and
security architectures.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Privacy in the Electronic Society (WPES 2009)
http://wpes09.unibg.it/
The increased power and interconnectivity of computer systems
available today create the ability to store and process large amounts
of data, resulting in networked information accessible from anywhere
at any time. It is becoming easier to collect, exchange, access,
process, and link information. This global scenario has inevitably
resulted in an increasing degree of awareness with respect to
privacy. Privacy issues have been the subject of public debates, and
the need for privacy-aware policies, regulations, and techniques has
been widely recognized. The goal of this workshop is to discuss the
problems of privacy in the global interconnected societies and
possible solutions to them.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Cloud Computing Security (CCSW 2009)
http://crypto.cs.stonybrook.edu/ccsw09/
The CCSW workshop aims to bring together researchers and practitioners
in all security aspects of cloud-centric and outsourced computing. How
exactly grid, cloud, utility computing etc will look like tomorrow is
still for the markets to decide, yet one thing is certain: clouds
bring with them new untested deployment and associated adversarial
models and vulnerabilities. It is essential that our community becomes
involved at this early stage.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Data Mining for Fraud Detection Workshop (DMFD 2009)
https://sites.google.com/site/dmfd09/
This workshop focuses on data mining techniques that can be applied to
organizational data to reveal fraudulent activity. We seek to foster
a greater exchange between data mining researchers and fraud detection
professionals. As fraud activity is highly context-dependent,
context-agnostic submission is highly encouraged.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Digital Identity Management (DIM 2009)
http://www2.pflab.ecl.ntt.co.jp/dim2009
This workshop will explore critical issues concerning identity
management technologies for the information society. Existing
solutions are not necessarily interoperable or complementary, and
sometimes overlap. Thus it is critical to lay foundations for a
holistic understanding of problem areas and approaches to innovative
solutions. The goal of this workshop is to share the latest findings,
identify key challenges, inspire debates, and foster collaboration
between industries and academia towards interoperable identity service
infrastructures.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Information Security Governance (WISG 2009)
http://ait.gmu.edu/~csis/wisg2009/
Information Security Governance is to establish a framework to drive
implementation of effective information security strategies in
organizations involving risk management, reporting, and
accountability. Recent changes in business environment such as
outsourcing, global supply chain, and cross organizational
collaborations is forcing users to access and retrieve business data
across organizational boundaries. This is making data governance in
enterprise intractable. These new disruptive trends will greatly
change the notions of the information security governance calling for
more fine-grained, data-centric, and risk-adjusted governance models
with the innovative implementation technologies.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Scalable Trusted Computing (STC 2009)
http://projects.cerias.purdue.edu/stc2009/
Built on the continuous success of ACM STC'06, STC'07 and STC'08, this
workshop focuses on fundamental technologies of trusted computing (in
a broad sense, with or without TPMs) and its applications in
large-scale systems -- those involving large number of users and
parties with varying degrees of trust. The workshop is intended to
serve as a forum for researchers as well as practitioners to
disseminate and discuss recent advances and emerging issues.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Secure Web Services (SWS 2009)
http://sesar.dti.unimi.it/SWS09
The SWS workshop explores many topics related to Web Services
Security, ranging from the advancement and best practices of building
block technologies such as XML and Web services security protocols to
higher level issues such as advanced metadata, general security
policies, trust establishment, risk management, and service
assurance. The workshop provides a forum for presenting research
results, practical experiences, and innovative ideas in web services
security.
=
=
=
=
=
=
=
=
========================================================================
Workshop on Security and Privacy in Medical and Home-Care Systems
(SPIMACS 2009)
http://www.infosecon.net/SPIMACS/
SPIMACS (pronounced spy-max) seeks to bring together the computer and
social scientists that will be required to address the challenges of
securing the intimate digital spaces of the most vulnerable. We invite
papers which analyze the use of technologies at home, the challenges
of design targeted at a population with cognitive decline, design for
the disable with a focus on medical and home support when these
projects have a primary or at least significant focus on privacy and
security. Papers explaining the data constraints and controls on data
from policy, ethical or legal perspectives are also welcome.
=
=
=
=
=
=
=
=
========================================================================