首页
社区
课程
招聘
[分享]IFIPTM 2010 - extended submission deadline
发表于: 2009-12-23 22:52 6053

[分享]IFIPTM 2010 - extended submission deadline

2009-12-23 22:52
6053
From: Mailing list for the scientific community interested in computer
security [mailto:SECURITY@FOSAD.ORG] On Behalf Of theo.dimitrakos@BT.COM
Sent: 16 December 2009 11:49
To: SECURITY@FOSAD.ORG
Subject: IFIPTM 2010 - extended submission deadline

Please note the new submission deadlines:

* Call for Papers: extended to January 9, 2010.
* Call for Tutorials: January 15, 2010
* Call for Workshops: January 15, 2010
* Call for Posters: February 26, 2010
* Call for Demonstrations: February 26, 2010

======  IFIPTM 2010   ===== Call For Papers  =====

Fourth IFIP International Conference on Trust Management
        Morioka, Japan, June 16-18, 2010
        http://www.ifip-tm2010.org/ <http://www.ifip-tm2010.org/>  

************************************************************************
****
**
******* THE DEADLINE IS EXTENDED TO JANUARY 9, 2010 *******
************************************************************************
****
**

Important dates
- Papers:
   * Submission deadline: (EXTENDED) January 9, 2010
   * Notification of acceptance: February 19, 2010
   * Camera-ready due: March 5, 2010
- Posters and Demonstrations:
   * Submission deadline: February 26, 2010
   * Notification of acceptance: March 26, 2010
- Tutorials and Workshops:
   * Submission deadline: January 15, 2010
   * Notification of acceptance: February 1, 2010

IFIPTM2010 Events:
        Regular paper sessions
        Short paper sessions
        Poster presentations
        Demonstrations
        Tutorials
        Workshops

The 4th IFIP International Conference on Trust Management (IFIPTM2010)
will
be held in Asia for
the first time, in Japan, in the city of Morioka, Iwate, from June 16
to 18,
2010, in cooperation
of Information Processing Society of Japan (IPSJ), supported by National
Institute of Information
and Communication Technology (NICT) and Information-Technology Promotion
Agency (IPA), Japan.

The mission of the IFIPTM 2010 Conference is to share research
solutions to
problems of Trust and
Trust management, including related Security and Privacy issues, and to
identify new issues and
directions for future research and development work. IFIPTM 2010 invites
submissions presenting
novel research on all topics related to Trust, Security and Privacy,
including but not limited to
those listed below:

* Trust models, formalization, specification, analysis and reasoning
* Reputation systems and architectures
* Engineering of trustworthy and secure software
* Ethics, sociology and psychology of trust
* Security management and usability issues including security
configuration
* Trust management frameworks for secure collaborations
* Language security
* Security, trust and privacy for service oriented architectures and
composite applications
* Security, trust and privacy for software as a service (SaaS)
* Security, trust and privacy for Web 2.0 Mashups
* Security, privacy, and trust as a service
* Legal issues related to the management of trust
* Semantically-aware security management
* Adaptive security policy management
* Mobile security
* Anonymity and privacy vs. accountability
* Critical infrastructure protection, public safety and emergency
management

* Privacy and identity management in e-services
* Biometrics, national ID cards, identity theft
* Robustness of trust and reputation systems
* Distributed trust and reputation management systems
* Human computer interaction aspects of privacy, security & trust
* Applications of trust and reputation management in e-services
* Trusted platforms and trustworthy systems

IFIPTM 2010 welcomes submissions of papers on any topic related to the
IFIP
TM themes of trust,
security and privacy and the topics mentioned above.

Submitted papers must not exceed 16 pages in length, including
bibliography
and well-marked
appendices. Submission will be through the IFIPTM 2010 website. Please
use
the LNCS templates and
style files available from
http://www.springer.com/computer/lncs?SGWID=0-164-7-72377-0
<http://www.springer.com/computer/lncs?SGWID=0-164-7-72377-0>  .

Accepted full papers will be published in the conference proceedings,
to be
published by Springer
in the series of gIFIP Advances in Information and Communication
Technology
(AICT)h under the
auspices of the IFIP WG 11.11 on Trust Management. Submissions must be
in
English and conform to
the "Springer LNCS Series" format since the IFIP AICT templates are not
yet
fully ready.

Papers accepted as short papers will be presented at the IFIPTM2010 main
conference. Short papers
will be limited to 8 pages in length (including bibliography and
well-marked
appendices), and
will be published in locally printed proceedings with an official ISSN
number.

See details below regarding the submission of posters, tutorials,
demonstrations and proposals
for organizing specialized workshops,

________________________
Call for Posters

IFIPTM 2010 welcomes submissions of posters that focus on any relevant
topic
under the theme
Trust, Security and Privacy.

Posters can e.g. present student projects (Bachelor, Masterfs or PhD)
or
any other relevant
study, idea or project. Posters should be visually easy to read, e.g.
combining text and diagrams
for illustration instead of only text.

Posters will be presented in poster-style (i.e. interactive
presentation) at
the IFIPTM 2010 demo
booth. Posters should be a single page in A0 format. The accompanying
poster
paper should be
formatted using the same format as specified for main conference
papers, and
should not exceed 4
pages in length including bibliography and well-marked appendices.
Poster
papers will be
published in locally printed proceedings with an official ISSN number.
Poster presenters should
bring their own A1 formatted poster to the conference venue on the
poster
presentation date.

Important dates:
   * Submission deadline: February 26, 2010
   * Notification of acceptance: March 26, 2010
   * Camera-ready poster papers due: April 30, 2010

________________________
Call for Demonstrations

Demonstrations should demonstrate to attendees, innovative solutions to major and significant topics addressed by the conference. Demonstrations should exhibit new research results and projects, industrial products, explore new business models, or illustrate new governmental frameworks and policies. They should allow members of the community to interactively discover and explore new paradigms or solutions through motivated examples.

A description of the demonstration must be submitted as a document of up to 4 pages in length.
The description can consist of slides, in which case 8 slides (assuming 2 slides per page) is the maximum length.

Demonstrator Proposals:
   * Submission deadline: February 26, 2010
   * Notification of acceptance: March 5, 2010
   * Camera-ready of demonstration description due: April 30, 2010
   * Demonstrations: June 17-18, 2010

________________________
Call for Tutorials

Tutorials should survey, explain and discuss research works and
projects,
industrial products and
markets, or governmental frameworks and policies. They should allow
members
of the community to
interactively gain specialist knowledge or skills, discover new
paradigms or
problematics through
motivated examples, compare existing approaches and concepts, and
possibly
put them in practice.
Tutorials should cover a varied range of issues and not be used to
promote a
single research
approach or a product.

Tutorial descriptions should consist of the title, abstract, contents,
target audience, and tutor
bio.

Tutorial Proposals:
   * Submission deadline: January 15, 2010
   * Notification of acceptance: February 1, 2010
   * Tutorial notes due: May 10, 2010
   * Tutorials: June 14-15, 2010

__________________________
Call for Workshops

Workshops should stimulate and facilitate an atmosphere of active and
constructive exchange on
current issues of interest. They should allow members of the community
to
compare and discuss
approaches, methods, and concepts about specific topics addressed by the
conference.

Workshop Proposals:
   * Submission deadline: January 15, 2010
   * Notification of acceptance: February 1, 2010
   * Camera-ready of workshop papers due: April 30, 2010
   * Workshops: June 14-15, 2010
_______________________

===  Organizing Committee  ===

Conference Co-chairs:
      * Yuko Murayama, Iwate Prefectural University, Japan
      * Stephen Marsh, Communications Research Centre, Canada

Technical program Co-chairs:
      * Audun Josang, University of Oslo, Norway
      * Masakatsu Nishigaki, Shizuoka University, Japan

Advisory Committee:
     * Yoichi Shinoda, National Institute of Information and
Communications
Technology (NICT), Japan
     * Ryoichi Sasaki, Tokyo Denki University, Japan
     * Eiji Okamoto, University of Tsukuba, Japan
     * Koji Nakao, KDDI Corp., Japan
     * Katsuya Uchida, Institute of Information Security, Japan
     * Kenzo Itoh, Iwate Prefectural University, Japan

Workshop Co-chairs:
     * Justin Zhan, CMU, U.S.A
     * Hiroaki Kikuchi, Tokai University, Japan

Tutorial Chair:
     * Ayako Komatsu, Information-Technology Promotion Agency (IPA),
Japan

Demonstration Chair:
     * Katsumi Takahashi, NTT Corp., Japan

Publications Co-chairs:
     * Tetsutaro Uehara, Kyoto University, Japan
     * Kanta Matsuura, The University of Tokyo, Japan

Local Organization Co-chairs:
     * Yasuhiro Fujihara, Iwate Prefectural University, Japan
     * Norihisa Segawa, Iwate Prefectural University, Japan

Registration Co-chairs:
     * Masato Terada, Hitachi Ltd., Japan
     * Toyoo Takata, Iwate Prefectural University, Japan

Publicity Co-chairs:
     * Yuji SUGA, Internet Initiative Japan Inc. (IIJ), Japan
     * Hidema Tanaka, National Institute of Information and
Communications
Technology (NICT), Japan

Liaison Co-chairs:
     * Masayuki Terada, NTT Docomo, Inc., Japan
     * Kozo Noaki, NTT Docomo, Inc., Japan

Website Co-chairs:
     * Yoshia Saito, Iwate Prefectural University, Japan
     * Kentarou Yamaguchi, Institute of Information Security, Japan

________________________

===  Program Committee ===

* Elisa Bertino, Purdue University, USA
* Gary Bolton, Pennsylvania State University, USA
* L. Jean Camp, Indiana University at Bloominton, USA
* Licia Capra, University College London, UK
* Cristiano Castelfranchi, ISTC-CNR, Italy
* Christian Damsgaard Jensen, Technical University of Denmark, Denmark
* Anupam Datta, Carnegie Mellon University, USA
* Chrysanthos Dellarocas, University of Maryland, USA
* Theo Dimitrakos, BT Innovate & Design, UK
* Pierpaolo Dondio, Trinity College Dublin, Ireland
* Naranker Dulay, Imperial College London, UK
* Sandro Etalle, T.U. Eindhoven and University of Twente, The
Netherlands
* Rino Falcone, ISTC-CNR, Italy
* Elena Ferrari, University of Insubria, Italy
* Giusella Finocchiaro, University of Bologna, Italy
* Jennifer Golbeck, University of Maryland, USA
* Dieter Gollmann, Hamburg University of Technology, Germany
* Elizabeth Gray, Accenture, USA
* Ehud Gudes, Ben Gurion University of the Negev, Israel
* Jochen Haller, SAP Research, Germany
* Peter Herrmann, The Norwegian University of Science and Technology,
Norway

* Kevin Hoffman, Purdue University, USA
* Steffen Huck, University College London, UK
* Roslan Ismail, Universiti Tenaga Nasional (UNITEN), Malaysia
* Valerie Issarny, INRIA, France
* James Joshi, University of Pittsburgh, USA
* Yuecel Karabulut, SAP Office of the CTO, USA
* Gunter Karjoth, IBM, Switzerland
* Reid Kerr, University of Waterloo, Canada
* Claudia Keser, University of Goettingen, Germany
* Hiroaki Kikuchi, Tokai University, Japan
* Mark Kramer MITRE, USA
* Adam J. Lee, University of Pittsburgh, USA
* Ninghui Li, Purdue University, USA
* Tie-Yan Liu, Microsoft Research, China
* Stephane Lo Presti, Brunel University, UK
* Emiliano Lorini, Institut de Recherche en Informatique de Toulouse
(IRIT),
France
* Xixi Luo, Beihang University, China
* Pratyusa Manadhata, Symantec Research, USA
* Fabio Massacci, University of Trento, Italy
* Kanta Matsuura, University of Tokyo, Japan
* D. Harrison McKnight, Michigan State University, USA
* Walter Quattrociocchi, ISTC-CNR, Italy
* Mark Ryan, University of Birmingham, UK
* Jordi Sabater-Mir, IIIA - CSIC, Spain
* Kent Seamons, Brigham Young University, USA
* Jean-Marc Seigneur, University of Geneva, Switzerland
* Simon Shiu, HP Labs, UK
* Joel Snyder, Opus One, USA
* Jessica Staddon, PARC, USA
* Ketil Stolen, SINTEF & University of Oslo, Norway
* Vipin Swarup, MITRE, USA
* Kenji Takahashi, NTT Corp., Japan
* Sotirios Terzis, University of Strathclyde, UK
* Mahesh Tripunitara, University of Waterloo, Canada
* Tetsutaro Uehara, University of Kyoto, Japan
* William H. Winsborough, University of Texas at San Antonio, USA
* Marianne Winslett, University of Illinois at Urbana-Champaign, USA
* Danfeng Yao, Rutgers University, New Brunswick, USA
===============================================

Theo Dimitrakos, PhD
Head of Security Architectures Research
Security Futures Practice
BT Innovate & Design
___________________________
Tel: +44(0)1473 605484
Mob: +44(0)7918081826
Fax: +44(0)1908 8611260
Email: theo.dimitrakos@bt.com
BT MeetMe Global Access: 02078196110 / 08007832726
Participant’s Passcode: available on request by authorised participants
For local dial-in numbers, see
http://www.conferencing.bt.com/pdf/meetmeglobalaccess/btmeetme_global_access
.pdf
<http://www.conferencing.bt.com/pdf/meetmeglobalaccess/btmeetme_global_a
cces
s.pdf>  
BT Group plc
Registered office: 81 Newgate Street London EC1A 7AJ Registered in England and Wales no. 4190816 This electronic message contains information from BT Group plc which may be privileged or confidential.
The information is intended to be for the use of the individual(s) or entity named above. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information is prohibited. If you have received this electronic message in error, please notify us by telephone or email (to the numbers or address above) immediately. Activity and use of the BT Group plc E-mail system is monitored to secure its effective operation and for other lawful business purposes.
Communications using this system will also be monitored and may be recorded to secure effective operation and for other lawful business purposes.

[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//