|
||||||||||||
SECURWARE 2012, The Sixth International Conference on Emerging Security Information Systems and Technologies, is an event covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related to low enforcement, security data mining, malware models, etc. Security, defined for ensuring protected communication among terminals and user applications across public and private networks, is the core for guaranteeing confidentiality, privacy, and data protection. Security affects business and individuals, raises the business risk, and requires a corporate and individual culture. In the open business space offered by Internet, it is a need to improve defences against hackers, disgruntled employees, and commercial rivals. There is a required balance between the effort and resources spent on security versus security achievements. Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs. Other technical aspects are related to the communication speed versus complex and time consuming cryptography/security mechanisms and protocols. Digital Ecosystem is defined as an open decentralized information infrastructure where different networked agents, such as enterprises (especially SMEs), intermediate actors, public bodies and end users, cooperate and compete enabling the creation of new complex structures. In digital ecosystems, the actors, their products and services can be seen as different organisms and species that are able to evolve and adapt dynamically to changing market conditions. Digital Ecosystems lie at the intersection between different disciplines and fields: industry, business, social sciences, biology, and cutting edge ICT and its application driven research. They are supported by several underlying technologies such as semantic web and ontology-based knowledge sharing, self-organizing intelligent agents, peer-to-peer overlay networks, web services-based information platforms, and recommender systems. To enable safe digital ecosystem functioning, security and trust mechanisms become essential components across all the technological layers. The aim is to bring together multidisciplinary research that ranges from technical aspects to socio-economic models. As a multi-track event, SECURWARE 2012 will serve as a forum for researchers from the academia and the industry, professionals, standard developers, policy makers and practitioners to exchange ideas. The topics could be on techniques and applications, best practices, awareness and experiences as well as future trends and needs (both in research and practices) related to all aspects of information security, security systems and technologies. SECURWARE 2012 has the following tracks: ARCH: Security frameworks, architectures and protocols We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals. Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status. Tutorials on specific related topics and panels on challenging areas are encouraged. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All topics and submission formats are open to both research and industry contributions. ARCH: Security frameworks, architectures and protocols Formal aspects of security METRICS: Security, trust and privacy measurement Security, trust and privacy metrics; SECMAN: Security management Identity management SECTECH: Security technologies Secure protocols SYSSEC: System security Internet security INFOSEC: Information security Information hiding RISK: Risk and security Operational risk (opRisk) MALWA: Malware and Anti-malware Threat taxonomies and modeling Messaging, viruses, spyware Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./ ANTIFO: Anti-forensics Advanced anti-forensics mechanisms PRODAM: Profiling data mining User and traffic profiling SECHOME: Smart home security Fundamentals for SHS SECDYN: Security and privacy in dynamic environments Fundamentals on highly dynamic environments ECOSEC: Ecosystem security and trust Secure and trusted service compositions in peer-to-peer networks CRYPTO: Cryptography Foundations of cryptography CYBER-Threat e-Crime
INSTRUCTION FOR THE AUTHORS Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals. Publisher: XPS (Xpert Publishing Services) Important deadlines:
Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system. Regular Papers (up to 6-10 page article) Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here. Your paper should also comply with the additional editorial rules. Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance. Work in Progress (short paper up to 4 pages long) Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings. For more details, see the Work in Progress explanation page Posters (poster or collection of 6 to 8 slides, including industrial presentations) Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. Acceptance will be decided based on a 1-2 page abstract and/or 6-8 .pdf slide deck submitted through the conference submission website. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. One big Poster and/or the associated slides should be used for discussions, once on the conference site. For more details, see the Posters explanation page. Ideas (2 page proposal of novel idea) This category is dedicated to new ideas in their early stage. Contributions might refer to PhD dissertation, testing new approaches, provocative and innovative ideas, out-of-the-box, and out-of-the-book thinking, etc. Acceptance will be decided based on a maximum 2 page submission through the conference submission website. The contributions for Ideas will be presented in special sessions, where more debate is intended. The Idea contribution must be comprehensive, focused, very well supported (details might miss, obviously). A 6-8 slide deck should be used for discussions, once on the conference site. For more details, see the Ideas explanation page. Technical marketing/business/positioning presentations The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre@iaria.org. Tutorials Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre@iaria.org Panel proposals The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site. For more information, petre@iaria.org Workshop proposals We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org. |
||||||||||||
Copyright (c) 2006-2012, IARIA