[ogsa-wg] Fwd: Call for Poster and Demo: SpaCCS 2018 (Security, Privacy and Anonymity)

Jesson Butt jesson.butt at gmail.com
Fri Oct 5 22:58:48 EDT 2018


Call for Poster and Demo:

The 11th International conference on  Security, Privacy and Anonymity in
Computation, Communication and Storage  (SpaCCS 2018), 11-13 Dec. 2018,
Melbourne, Australia.

Website: http://www.swinflow.org/confs/2018/spaccs/poster.htm

Important Dates:
Deadline for proceedings published posters/demos with display at
conference: 10 October 2018

Notification of Acceptance: 15 October 2018
Final versions of proceeding published posters/demos: 20 October 2018
Deadline for web published posters/demos with display at conference: 30
October 2018

Submissions:
Please email your posters/demos to confs.aus at gmail.com with the email
subject as "SpaCCS 2018 demo poster submission".

Two types of posters and demos are welcome. Both of them will be displayed
during the conference.

1. Proceedings published posters and demos: Submission is a 2-page short
paper describing the post/demo content, research, relevance and importance
to the conference community. If accepted, the 2-page short paper will be
published in the main conference proceedings.

2. Web published posters and demos: Submission is a 1-page extended
abstract. Such posters/demos will not be included in the conference
proceedings, but will be published on the conference website.

---------------

Participants are invited to submit posters and research demos to SpaCCS
2018. SpaCCS 2018 is created to provide a prime international forum for
both researchers, industry practitioners and environment experts to
exchange the latest fundamental advances in the state of the art and
practice of Security, Privacy and Anonymity in Computation, Communication
and Storageas well as joint-venture and synergic research and development
across various related areas. Topics of interest for posters and demos
include, but not limited to:

Topics of particular interest include, but are not limited to:

Track 1: Security

1.1 Computation
(1) Security Model and Architecture
(2) Software and System Security
(3) Secure Computing Platform
(4) Secure Network Computing
(5) Security in Cloud Computing and Pervasive/Ubiquitous Computing
(6) Risk Analysis and Management

1.2 Communication

(1) Network Security
(2) Malware and Botnets
(3) Intrusion Detection
(4) Security in Web Services
(5) Security in Mobile Social Networks
(6) Security in Mobile and Wireless Communications
(7) Fraud and Cyber-Crime

1.3 Storage
(1) Access Control
(2) Applied Cryptography
(3) Database Security
(4) Data Protection and Data Integrity
(5) Digital Content Protection and Digital Forensics
(6) Information Hiding
(7) Security in Big Data and its Applications

Track 2: Privacy

2.1 Computation
(1) Measuring and Quantifying Privacy
(2) Privacy Modelling and Analysis
(3) Software and System Privacy
(4) Privacy-preserving Computing Platform
(5) Privacy-enhanced Network Computing
(6) Obfuscation-based Privacy
(7) Cryptographic Tools for Privacy
(8) Building and Deploying Privacy-enhancing Systems
(9) Reliability, Robustness, and Abuse Prevention in Privacy Systems

(10) Security and privacy in blockchain

2.2 Communication
(1) Privacy in Web Services
(2) Privacy Metrics and Policies
(3) Crowdsourcing for Privacy
(4) Location and Mobility Privacy
(5) Privacy in Cloud and Big Data Applications
(6) Privacy in Ubiquitous Computing and Mobile Devices
(7) Privacy in Social Networks and Microblogging Systems
(8) Privacy-enhanced Access Control, Authentication, and Identity Management

2.3 Storage
(1) Data Protection Technologies
(2) Differential Privacy
(3) Privacy in Big Data and its Applications
(4) Policy Languages and Tools for Privacy
(5) Privacy and Human Rights
(6) Interdisciplinary Research Connecting Privacy to Other Fields
(7) Privacy in Cloud Computing and Pervasive/Ubiquitous Computing
(8) Information Leakage, Data Correlation and Generic Attacks to Privacy
(9) Privacy-Preserving Data Mining, Data Release and Publishing

Track 3: Anonymity

3.1 Computation
(1) Anonymous Data Mining and Data Sharing
(2) Parallelism Exploitation Techniques for Anonymity
(3) Anonymity in Big Data Analytics
(4) Anonymous Management in Trust Relationships
(5) Anonymous Video Analytics Technology
(6) Anonymity Metrics, Measures and Evaluations
(7) Anonymity Models, Hardware/Device of Anonymity

3.2 Communication
(1) Anonymity in Wireless Communication Systems
(2) Anonymous Communication Protocols
(3) Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
(4) Anonymous Proxy Software
(5) Anonymous Communication and Internet
(6) Anonymous Social Networks, Structural k-Anonymity in Social Networks
(7) Authentication Protocol Providing User Anonymity

3.3 Storage
(1) Distributed Anonymous Information Storage and Management
(2) Private and Anonymous Data Storage
(3) Anonymity-Preserving Data Collection and Database
(4) Anonymity, Pseudonymity & Identity Management
(5) Anonymity in Big Data and Cloud Scenarios
(6) Anonymity in Health and Medical Databases
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.ogf.org/pipermail/ogsa-wg/attachments/20181006/6a43d995/attachment.html>


More information about the ogsa-wg mailing list