<html><body><div style="color:#000; background-color:#fff; font-family:times new roman, new york, times, serif;font-size:12pt">Apologies if you received multiple copies of this CSS-13 CFPs with 8 Keynote Speeches & 4 Workshops & 8 Journal Special Issues.<br><br>------------------------------------------------------------------------------------------------------------------------<br>Final Call for Papers for the 5th International Symposium on Cyberspace Safety and Security (CSS 2013)<br>http://trust.csu.edu.cn/conference/css2013<br> <br>------------------------------------------------------------------------------------------------------------------------<br><br><br>Highlight 1: Conference Venue --- Beautiful Zhangjiajie<br>------------<br><br>Introduction to Zhangjiajie, China, an emerging tourist destination:<br>http://trust.csu.edu.cn/conference/zhangjiajietour2013/<br><br><br>Highlight 2: 8 Keynote Speeches<br>------------<br><br>You are
welcome to attend all the 8 keynote speeches shared by co-located IEEE HPCC 2013 / IEEE/IFIP EUC 2013 / CSS 2013 <br>conferences/symposiums/workshops as below:<br><br>------------<br>Keynote Speaker 1: Dr. Ivan Stojmenovic<br>Professor at the University of Ottawa, Canada<br><br>Title: IoT/CPS: M2M Communication, Actuation and Coordination Challenges<br><br>------------<br>Keynote Speaker 2: Dr. Albert Y. Zomaya<br>Chair Professor at the University of Sydney, Australia<br><br>Title: Adaptable Resource Management in Clouds<br><br>------------<br>Keynote Speaker 3: Dr. Jianer Chen<br>Professor at Department of Computer Science, Texas A&M University, USA<br><br>Title: Transparent Computing: Theoretical Challenges<br><br>------------<br>Keynote Speaker 4: Dr. Yi Pan<br>Distinguished University Professor and Chair, Department of Computer Science, Georgia State University, USA<br><br>Title: Cloud Computing Programming Models - Challenges and
Solutions<br><br>------------<br>Keynote Speaker 5: Dr. Han-Chieh Chao<br>President & Professor at National Ilan University, I-Lan, Taiwan<br><br>Title: Quantum Cryptography and Network Applications<br><br>------------<br>Keynote Speaker 6: Dr. Hai Jin<br>Dean & Professor at School of Computer Science and Technology, Huazhong University of Science and Technology, China<br><br>Title: Cloud Security: Challenges and Practice<br><br>------------<br>Keynote Speaker 7: Dr. Minyi Guo<br>Head & Professor at Department of Computer Science & Engineering, Shanghai Jiao Tong University, China<br><br>Title: Data Center Architecture and OS for Massively Data-Intensive Computing<br><br>------------<br>Keynote Speaker 8: Dr. Huadong Ma<br>Dean & Professor at School of Computer Science, Beijing University of Posts and Telecommunications, China<br><br>Title: Some Research Challenges and Progresses in the Architecture of
IoT<br><br>------------<br><br><br>Highlight 3: 8 Journal Special Issues<br>------------<br><br>Distinguished papers, after further revisions, will be published in the following SCI & EI indexed journal special issues:<br><br>(1) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 2.833)<br>http://www.journals.elsevier.com/information-sciences/<br><br>(2) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact Factor: 1.978)<br>http://www.journals.elsevier.com/future-generation-computer-systems/<br><br>(3) IEEE Systems Journal (SCI&EI Indexed, Impact Factor: 0.923)<br>http://ieeesystemsjournal.org/<br><br>(4) Computers & Security - Elsevier (SCI&EI Indexed, Impact Factor: 0.868)<br>http://ees.elsevier.com/cose/<br><br>(5) International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) - INDERSCIENCE (SCI&EI Indexed, Impact Factor:
0.848)<br>http://www.inderscience.com/jhome.php?jcode=IJAHUC<br><br>(6) Security and Communication Networks - Wiley (SCI&EI Indexed, Impact Factor: 0.414)<br>http://www.interscience.wiley.com/security<br><br>(7) *International Journal of Computational Science and Engineering (IJCSE) - INDERSCIENCE (EI Indexed)<br>http://www.inderscience.com/jhome.php?jcode=IJCSE<br><br>(8) *International Journal of Autonomous and Adaptive Communications Systems (IJAACS) - INDERSCIENCE (EI Indexed)<br>http://www.inderscience.com/jhome.php?jcode=IJAACS<br><br>*Selected papers from this conference will be published directly in those journal special issues (they will NOT appear in the conference proceedings).<br><br>------------<br><br><br>Highlight 4: 4 Workshops in Conjunction with CSS 2013:<br><br>(1) The 3rd International Symposium on Security and Quantum Communications (SQC 2013)<br>http://trust.csu.edu.cn/conference/SQC2013/<br><br>(2) The 2013 International
Workshop on Security and Reliability in Transparent Computing (SRTC 2013)<br>http://trust.csu.edu.cn/conference/srtc2013/<br><br>(3) The 2013 International Workshop on Trust, Security and Privacy for Big Data (TrustData 2013)<br>http://trust.csu.edu.cn/conference/TrustData2013/<br><br>(4) Special Sessions on Cyberspace Safety and Security of the 2013 HCF Hunan Computer Conference (HNCC 2013)<br>http://trust.csu.edu.cn/conference/hncc2013/<br><br>------------------------------------------------------------------------------------------------------------------------------------<br><br><br>Organizers:<br>Central South University, China<br>National University of Defense Technology, China<br>Hunan University, China<br>Jishou University, China<br><br><br>Technical Co-Sponsorship:<br>National Natural Science Foundation of China<br>Deakin University, Australia<br>Springer Lecture Notes in Computer Science<br>School of Information Science and Engineering,
Central South University, China<br>School of Software, Central South University, China<br><br><br>Venue & Dates:<br>Zhangjiajie, China, November 13-15, 2013<br><br><br>Introduction<br><br>A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. <br><br>In the past several years, there has been a large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and
deterring potential attackers and penalizing attackers. <br><br>In this context, we will focus our program on cyberspace safety and security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. The aim of this symposium is to provide a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. The symposium will be a highly focused, professional, high quality, and social event. <br><br>In the past, CSS has been held in Melbourne, Australia (2012), Milan, Italy (2011), Chengdu, China (2009), and Sydney, Australia (2008). <br> <br><br>Scope and Interests<br><br>The CSS-13 conference will provide a forum for engineers and scientists in academia, industry, and government to address all challenges including technical,
safety, social, and legal issues related to Cyberspace Safety and Security and to present and discuss their ideas, results, work-in-progress and experience on all aspects of Cyberspace Safety and Security. Topics of particular interest include, but are not limited to: <br><br>(1) Data and Applications Security<br>1. Digital Rights Management<br>2. Secure Information Integration and Transaction Processing<br>3. Secure Semantic Web and Web Services<br>4. Security in E-Commerce and M-Commerce<br>5. Secure Operating Systems<br>6. Watermarking<br>7. Privacy and Data Protection<br>8. Emerging Technologies and Applications<br>9. Database Security<br>10. Data Mining Security<br><br>(2) Network and Communications Security<br>1. Attack Containment<br>2. Active Defense Techniques and Systems<br>3. Attack Recovery<br>4. Intelligent Defense Systems<br>5. Internet and Network Forensics<br>6. Spam Detection and Prevention<br>7. Security for Ad-Hoc and Sensor
Networks<br>8. Secure Network Architectures<br>9. Distributed Intrusion Detection / Prevention Systems<br>10. Denial-of-Service Attacks and Countermeasures <br><br>(3) Software and Systems Security<br>1. Software and Systems Assurance<br>2. Secure Design and Testing<br>3. Viruses, Worms, and Other Malicious Code<br>4. Security Theory and Tools<br>5. Security in Pervasive and Embedded Systems<br>6. Access Control<br>7. Security for Large-scale Systems and Critical Infrastructures<br>8. Security Auditing<br>9. Intrusion Detection System <br>10. Risk Assessment and Risk Management<br><br>(4) Cloud Security<br>1. Practical Cryptographic Protocols for Cloud Security<br>2. Multi-tenancy and Related Security Issues<br>3. Secure Cloud Resource Virtualization Mechanisms<br>4. Secure Data Management and Computation Outsourcing<br>5. Trust and Policy Management in Clouds<br>6. Sandboxing and VM-based Enforcements <br>7. Managing Security Benefits and Risks of
Cloud Computing<br>8. New Cloud-aware Web Service Security Paradigms and Mechanisms<br>9. Network Security Mechanisms for Cloud Contexts<br>10. New Architectures and Design Methods for Developing Cloud Services <br><br>(5) Cyberspace Safety<br>1. Identity Management and Authentication<br>2. Security and Usability<br>3. Security and Privacy in Social Networks<br>4. Privacy Models<br>5. Privacy Enhancing Technologies<br>6. Human Factors in Computer Security<br>7. Modeling and Analyzing Online User Behavior<br>8. Risk Assessment in Cyber Security<br>9. Benchmark, Analysis and Evaluation of Cyber Security<br>10. Implementation, Deployment and Management of Cyber Security<br> <br><br>Submission and Publication Information<br><br>The accepted papers from this conference will be published by Springer Lecture Notes in Computer Science (EI Compendex indexed). Submitted papers must not substantially overlap with papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 15 pages (or 20 pages with the over length charge), including tables, figures, references and appendixes, in Springer LNCS Format with Portable Document Format (.pdf). Please submit your paper at https://www.easychair.org/conferences/?conf=css2013.<br><br>Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. The program committee will select and award two "Best Paper Awards" for this conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. For no-show authors, their
papers will be removed from the digital library after the conference and their affiliations will be notified.<br><br><br>Important Dates<br><br>(1) Paper Submission Due: July 10, 2013 (Extended Firm Deadline) <br>(2) Notification of Decision: August 15, 2013<br>(3) Camera-ready Papers Due: September 15, 2013<br> <br><br>Steering Co-Chairs<br><br>Yang Xiang, Deakin University, Australia<br>Wanlei Zhou, Deakin University, Australia<br><br> <br>General Co-Chairs<br><br>Guojun Wang, Central South University, China<br>Vijay Varadharajan, Macquarie University, Australia<br>Gregorio Martinez, University of Murcia, Spain<br> <br><br>Program Co-Chairs<br><br>Indrakshi Ray, Colorado State University, USA<br>Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China<br>Muttukrishnan Rajarajan, City University London, UK<br><br> <br>Program Vice Co-Chairs<br><br>(1)
Data and Applications Security Track<br>Di Ma, University of Michigan-Dearborn, USA<br>Raman Adaikkalavan, Indiana University South Bend, USA<br><br>(2) Network and Communications Security Track<br>Robin Doss, Deakin University, Australia<br>Yulei Wu, Chinese Academy of Sciences, China<br><br>(3) Software and Systems Security Track<br>Rose Gamble, University of Tulsa, USA<br>Jianxun Liu, Hunan University of Science and Technology, China<br><br>(4) Cloud Security Track<br>Hua Wang, University of Southern Queensland, Australia<br>Dhiren Patel, NIT Surat, India<br><br>(5) Cyberspace Safety Track<br>Steven Furnell, Plymouth University, UK<br>Avinash Srinivasan, George Mason University, USA<br><br><br>Workshop Co-Chairs<br><br>Jemal H.Abawajy, Deakin University, Australia<br>Jin-Hee Cho, U.S. Army Research Laboratory, USA<br>Yanjiang Yang, Institute for Infocomm Research, Singapore<br>Yeong-Deok Kim, Woosong University, Korea<br> <br><br>Organizing
Co-Chairs<br><br>Zhigang Chen, Central South University, China<br>Zhiying Wang, National University of Defense Technology, China<br>Chengzhong Xu, Hunan University, China<br>Bin Hu, Jishou University, China<br><br> <br>Publicity Co-Chairs<br><br>Peter Mueller, IBM Zurich Research, Switzerland <br>Yulei Wu, Chinese Academy of Sciences, China<br>Scott Fowler, Linkoping University, Sweden<br><br><br>Publication Co-Chairs<br><br>Wang Yang, Central South University, China<br>Zhe Tang, Central South University, China<br><br><br>Finance Co-Chairs<br><br>Guihua Duan, Central South University, China<br>Jin Zheng, Central South University, China<br><br><br>Local Arrangement Chair<br><br>Guomin Cai, Jishou University, China<br><br> <br>Secretariats<br><br>Fang Qi, Central South University, China<br>Tao Peng, Central South University, China<br><br><br>Webmaster<br><br>Biao Deng, Central South University, China <br><br><br>Contact<br><br>Please email
inquiries concerning CSS 2013 to: <br>Prof. Guojun Wang: csgjwang AT gmail DOT com <br>and the conference organizers (css2013zhangjiajie AT gmail DOT com).<br><br>Copyright @ Trusted Computing Institute, CSU<br>http://trust.csu.edu.cn/<br>------------------------------------------------------------------------------------------------------------------------<br><br></div></body></html>