Stacks Image 119


BADGERS, 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security

The BADGERS workshop is positioned at the confluence of computer security and general purpose large-scale data processing and aims at bringing together people (e.g., researchers, practitioners, system administrators, security analysts) active in the emerging domain of security-related data collection and analysis for Internet-scale computer systems and networks. By giving visibility to existing solutions, the workshop promotes and encourages the better sharing of data and knowledge. The increasing availability of tools and techniques to process large-scale data (aka Big Data) will benefit computer security.

9th DPM International Workshop on Data Privacy Management

The aim of this workshop is to discuss and exchange the ideas related to privacy data management. Researchers and practitioners working in privacy, security, trustworthy data systems and related areas are welcome to participate in the workshop.

The main topics, but not limited to, include: privacy information management, privacy policy-based infrastructures and architectures, privacy-oriented access control languages and models, privacy in trust management, privacy data integration, privacy risk assessment and assurance, privacy services, privacy policy analysis, cryptography, cryptanalysis, query execution over privacy sensitive data, privacy preserving data mining, hippocratic and water-marking databases, privacy for integrity-based computing, privacy monitoring and auditing, privacy in social networks, privacy in ambient intelligence (AmI) applications, individual privacy vs. corporate/national security, code-based cryptology, privacy in computer networks, privacy and RFIDs, privacy and big data, privacy in sensor networks.

QASA, 3rd International Workshop on Quantitative Aspects in Security Assurance

There is an increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems & services, e.g., from requirements elicitation to run-time operation and maintenance. The aim of QASA 2014 workshop is to bring together researchers and practitioners interested in these research topics, with a particular emphasis on techniques for service oriented architectures. The scope of the workshop is intended to be broad, including aspects such as dependability, privacy, risk and trust.

SETOP, 7th International Workshop on Autonomous and Spontaneous Security

Security and reliability have become a major concern for service-oriented applications as well as for communications systems and networks. The workshop is devoted to results addressing the automated configuration of security policies in the context of dynamic, heterogeneous and mobile environments.

Aiming at secure and interoperable networks and systems, major challenges related to policy conflict detection and resolution must be addressed. This concerns in particular autonomous assessment and intrusion mitigation.

SIoT, 3rd International Workshop on Secure Internet of Things

SIoT 2014 is a community where interested stakeholders, from academia and industry, can present their original work on providing a secure environment for connecting systems in an Internet-specific structure. The wide spread of mobile and embedded devices, able to connect to a network and share information, requires a careful look at the security risks taken by end users. In this context, the workshop will focus on contributions related to the security of mesh and machine-to-machine networks, secure software stacks running on ubiquitous network nodes, and algorithms used to provide secure end-to-end communication between nodes.

STM, 10th International Workshop on Security and Trust Management

STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2014 is the tenth workshop in this series and will be held in Wroclaw, Poland, in conjunction with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.

Smart ConDev S&P 2014

the workshop has been cancelled

Usable and Efficient Secure Multiparty Computation (UaESMC)

Secure Multiparty Computation (SMC) has seen impressive theoretical advances during the last 5-7 years. These have been accompanied with some practical applications, but these have been small in number and restricted to a couple of fields. With this workshop, we want to bring together researchers of SMC and builders of secure systems, to discuss the secure computation techniques necessary for practical applications. We are interested in practical experience of applying SMC (both positive and negative), privacy-preserving methods of solving particular problems, the integration of SMC with the rest of a secure system and any positive and negative interplay it may have with other functional and non-functional requirements, etc.

The workshop is organized by FP7-funded project Usable and Efficient Secure Multiparty Computation (UaESMC).