<div dir="ltr"><div>===============================================================</div><div>CALL FOR PAPERS CSS 2014</div><div>The 6th International Symposium on Cyberspace Safety and Security</div><div>August 20-22, 2014, Paris, France</div>
<div><a href="http://www.computational-science.org/CSS2014/">http://www.computational-science.org/CSS2014/</a></div><div>===============================================================</div><div>*IMPORTANT DATES*</div><div>
Paper submission: 28 April, 2014 -> Extended to 12 May, 2014</div><div>Notification of acceptance: 23 June, 2014</div><div>Camera-Ready due: 15 July, 2014</div><div><br></div><div>*SCOPE*</div><div>A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. </div>
<div>In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers. </div>
<div>In this context, we focus our program on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. The aim of this symposium is to provide a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. The symposium will be a highly focused, professional, high quality, and social event.</div>
<div><br></div><div>Distinguished papers presented at the conference, after further revision, will be recommended for possible publication in special issues of the SCI Indexed Journals.</div><div> </div><div>Topics of interest include, but are not limited to:</div>
<div><br></div><div>(1) Data and Applications Security</div><div>- Digital Rights Management </div><div>- Secure Information Integration and Transaction Processing </div><div>- Secure Semantic Web and Web Services </div><div>
- Security in E-Commerce and M-Commerce </div><div>- Watermarking </div><div>- Privacy and Data Protection </div><div>- Emerging Technologies and Applications </div><div>- Database Security </div><div>- Data Mining Security</div>
<div><br></div><div>(2) Network and Communications Security</div><div>- Active Defense Techniques and Systems</div><div>- Distributed Intrusion Detection/Prevention Systems</div><div>- Denial-of-Service Attacks and Countermeasures</div>
<div>- Intelligent Defense Systems</div><div>- Internet and Network Forensics</div><div>- Secure Network Architectures</div><div>- Security for Ad-Hoc and Sensor Networks</div><div>- Spam Detection and Prevention</div><div>
- 5G Mobile Networks Security and Trust</div><div>- Trust, Security and Privacy in Social Networks</div><div>- Privacy Enhancement Technologies</div><div>- Security issues in emerging networking technologies (e.g., SDN, CCN)</div>
<div><br></div><div>(3) Software and Systems Security</div><div>- Analysis, identification, prevention, and removal of vulnerabilities</div><div>- Audit and digital forensics</div><div>- Authorization and access control of software objects</div>
<div>- Dependable computing and fault tolerance</div><div>- Detection of, defense against, containment of, and recovery from attacks</div><div>- Operating system and mobile operating system security</div><div>- Risk modeling, assessment, and management in software engineering</div>
<div>- Security for large-scale systems and critical infrastructures</div><div>- Security in distributed systems and pervasive computing</div><div>- Viruses, worms, Trojans, and other malicious codes</div><div><br></div><div>
(4) Cloud Security</div><div>- Cloud and mobile cloud computing data access control</div><div>- Privacy preservation and data privacy in cloud </div><div>- Trust management in cloud computing</div><div>- Big data trust in cloud</div>
<div>- Secure cloud data storage</div><div>- Verifiable cloud computing</div><div>- Security solutions based on cloud computing</div><div>- Trustworthy identity management in cloud</div><div>- Media cloud security and cloud security policy</div>
<div>- Security for personal cloud</div><div><br></div><div>(5) Cyberspace Safety</div><div>-Access Control and Trust Management</div><div>-Identity Management and Authentication </div><div>-Security and Usability </div><div>
-Security in Pervasive and Embedded Systems </div><div>-Privacy Models, Privacy Enhancing Technologies </div><div>-Human Factors in Computer Security </div><div>-Risk Assessment in Cyber Security </div><div>-Cyber-Physical System Security </div>
<div>-Benchmark, Analysis and Evaluation of Cyber Security </div><div>-Implementation, Deployment and Management of Cyber Security</div><div><br></div><div>*PAST HISTORY*</div><div>Previously CSS has been held in Zhangjiajie, China (2013), Melbourne, Australia (2012), Milan, Italy (2011), Chengdu, China (2009), and Sydney, Australia (2008).</div>
<div><br></div><div>*SUBMISSION INSTRUCTIONS*</div><div>Submitted manuscripts should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column, template available at <a href="http://www.computer.org/portal/web/cscps/formatting">http://www.computer.org/portal/web/cscps/formatting</a>). Manuscripts should not exceed 8 pages for full papers and 4 pages for short papers, including tables and figures. All paper submissions must represent original and unpublished work. Papers must be submitted electronically in PDF format through EasyChair:</div>
<div><a href="https://www.easychair.org/conferences/?conf=css20140">https://www.easychair.org/conferences/?conf=css20140</a> </div><div>For more information on submission please contact: </div><div><a href="mailto:css2014-0@easychair.org">css2014-0@easychair.org</a></div>
<div><br></div><div>*PUBLICATIONS*</div><div>The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. Selected excellent papers of CSS2014 will be recommended to be published in reputable journal SIs after further extension and improvement.</div>
<div><br></div><div>*CONFERENCE COMMITTEES*</div><div>General Chairs</div><div>Julien Bourgeois, UFC/FEMTO-ST Institute, France</div><div>Fr閐閞ic Magoul鑣, Ecole Centrale Paris, France</div><div><br></div><div>Program Chairs</div>
<div>Zheng Yan, Xidian University, China / Aalto University, Finland</div><div>Peter Mueller, IBM Zurich Research, Switzerland</div><div>Robert H. Deng, Singapore Management University, Singapore</div><div><br></div><div>
Steering Chairs</div><div>Yang Xiang, Deakin University, Australia</div><div>Laurence T. Yang, St. Francis Xavier University, Canada</div><div><br></div><div>Vice-program Chairs</div><div>(1) Data and Applications Security</div>
<div>Xinyi Huang, Fujian Normal University, China</div><div>Ioanna Dionysiou, University of Nicosia, Cyprus</div><div><br></div><div>(2) Network and Communications Security</div><div>Marinella Petrocchi, istituto di Informatica eTelematica, CNR, Italy</div>
<div>Tanveer A Zia, Charles Sturt University Australia</div><div><br></div><div>(3) Software and Systems Security</div><div>WenTao Zhu, Chinese Academy of Sciences, China</div><div>Jin Li, Guang Zhou University, China</div>
<div><br></div><div>(4) Cloud Security</div><div>Honggang Wang, University of Massachusetts Dartmouth, USA </div><div>Igor Kotenko, SPIIRAS, Russia</div><div><br></div><div>(5) Cyberspace Safety</div><div>Ming Li, Utah State University, USA</div>
<div>Shucheng Yu, University of Arkansas at Little Rock, USA</div><div><br></div><div>Program Committee </div><div>Track 1: Data and Applications Security</div><div><br></div><div>Man Ho Au, University of Wollongong, Australia</div>
<div>Xiaofeng Chen, Xidian University, China</div><div>Thoshitha Gamage, Washington State University, USA</div><div>Jinguang Han, Nanjing University of Finance & Economics, China</div><div>David Johnson, Imperial College London, UK</div>
<div>Daniel Conte de Leon, University of Idaho, USA</div><div>Jiguo Li, Hohai University, China</div><div>Joseph Liu, Institute for Infocomm Research, Singapore</div><div>Yuko Murayama, Iwate Prefectural University, Japan</div>
<div>Luca Spalazzi, Universit?Politecnica Delle Marche, Italy</div><div>Chunhua Su, JAIST, Japan</div><div>Ruben Trapero, TU Darmstadt, Germany</div><div>Raylin Tso, National Chengchi University, Taiwan</div><div>Wun-She Yap, University Tunku Abdul Rahman, Malaysia</div>
<div>Yong Yu, University of Wollongong, Australia</div><div><br></div><div>Track 2: Network and Communications Security</div><div><br></div><div>Marco Casassa Mont, Hewlett-Packard Labs Bristol, UK</div><div>David Chadwick, University of Kent, UK</div>
<div>Roberto Di Pietro, Bell Labs, France</div><div>Carmen Fernandez Gago, University of Malaga, Spain</div><div>Weili Han, Fudan University, China</div><div>Mohammed Kaosar, Charles Sturt University, Australia</div><div>
Muhammad Khurram Khan, King Saud University, Saudi Arabia</div><div>Gabriele Lenzini, University of Luxembourg, Luxembourg</div><div>Fabio Martinelli, IIT-CNR Pisa, Italy </div><div>Paolo Mori, IIT-CNR Pisa, Italy</div><div>
Federica Paci, University of Trento, Italy</div><div>Pierangela Samarati, Universit?degli Studi di Milano, Italy</div><div>Daniele Sgandurra, Imperial College, UK</div><div>Gianluca Stringhini, University of California at Santa Barbara, USA</div>
<div>Willy Susilo, University of Wollongong, Australia</div><div>Jianming Yong, University of Southern Queensland, Australia</div><div>Dajiang Zhang, Microsoft, China</div><div><br></div><div>Track 3: Software and Systems Security</div>
<div><br></div><div>Rafael Accorsi, University of Freiburg, Germany</div><div>Rose Gamble, University of Tulsa, USA</div><div>Dieter Gollmann, Hamburg University of Technology, Germany</div><div>Xiaoqi Jia, Chinese Academy of Sciences, China</div>
<div>Nan Jiang, East China Jiao Tong University, China</div><div>Muhammad Khurram Khan, King Saud University, Saudi Arabia</div><div>Junzuo Lai, Jinan University, China</div><div>Cheng-Chi Lee, Fu Jen Catholic University, Taiwan</div>
<div>Patrick P.C. Lee, The Chinese University of Hong Kong, Hong Kong</div><div>Chun-Ta Li, Tainan University of Technology, Taiwan</div><div>Jay Ligatti, University of South Florida, USA</div><div>Jingqiang Lin, Chinese Academy of Sciences, China</div>
<div>Jianxun Liu, Hunan University of Science and Technology, China</div><div>Joseph Liu, Institute for Infocomm Research, Singapore</div><div>Peng Liu, The Pennsylvania State University, USA</div><div>Zheli Liu, Nankai University, China</div>
<div>Gerardo Pelosi, Politecnico di Milano, Italy</div><div>Damien Sauveron, University of Limoges, France</div><div>Juan E. Tapiador, Universidad Carlos III de Madrid, Spain</div><div>Duncan Wong, City University of Hong Kong, Hong Kong</div>
<div>Shouhuai Xu, University of Texas at San Antonio, USA</div><div>Xianfeng Zhao, Chinese Academy of Sciences, China</div><div><br></div><div>Track 4: Cloud Security</div><div><br></div><div>Fabrizio Baiardi, University of Pisa, Italy</div>
<div>Miguel Correia, IST/INESC-ID, Portugal</div><div>Qian Duan, Penn State University, USA </div><div>Dennis Gamayunov, Moscow State University, Russia</div><div>Kun Hua, Lawrence Technological University, USA </div><div>
Jun Huang, South Dakota School of Mines & Technology, USA</div><div>Hong Liu, University of Massachusetts Dartmouth, USA</div><div>Gregorio Martinez Perez, University of Murcia, Spain</div><div>Rongxing Lu, Nanyang Technological University, Singapore </div>
<div>Nuno Neves, University of Lisboa,L, Portugal</div><div>Vladimir Oleshchuk, University of Agder, Norway</div><div>Roland Rieke, Fraunhofer Institute for Secure Information Technology SIT, Germany</div><div>Joel Rodrigues, University of Beira Interior, Portugal </div>
<div>Houbing Song, West Virginia University, USA </div><div>Yun Tian, California State University, Fullerton, USA </div><div>Dalei Wu, Massachusetts Institute of Technology, USA </div><div>Shaoen Wu, Ball State University, USA </div>
<div>Yan Wu, National Institute of Standards and Technology, USA</div><div>Igor Saenko, St.Petersburg Institute for Information and Automation of RAS, Russia </div><div>Jianjun Yang, University of North Georgia, USA</div>
<div>Qing Yang, Montana State University, USA </div><div>Liang Zhou, Nanjing University of Post and Telecommunications, China </div><div><br></div><div>Track 5: Cyberspace Safety</div><div><br></div><div>Ryan Gerdes, Utah State University, USA </div>
<div>Hui Li, Xidian University, China</div><div>Xiaodong Lin, University of Ontario Institute of Technology, Canada </div><div>Yao Liu, University of South Florida, USA </div><div>Javier Lopez, University of Malaga, Spain </div>
<div>Aziz Mohaisen, Verisign Labs, USA </div><div>Chiu C. Tan, Temple University, USA </div><div>A. Selcuk Uluagac, Georgia Institute of Technology, USA </div><div>Cong Wang, City University of Hong Kong, China </div><div>
Qian Wang: Wuhan University, China </div><div>Mengjun Xie, University of Arkansas at Little Rock, USA </div><div>Qing Yang, Montana State University, USA </div><div>Kai Zeng, University of Michigan - Dearborn, USA </div><div>
Rui Zhang, University of Hawaii, USA </div><div><br></div><div><br></div><div><div dir="ltr"><div><br></div><div><br></div><div><br></div> Best Regards,<br> <br> Li Yang (杨力)<div> </div><div> Xidian University (西安电子科技大学) </div>
<div> Virginia Polytechnic Institute and State University</div><div><br></div></div></div>
</div>