PETSE 2011 - PETSE 2011 : The FTRA 3rd International Workshop - Privacy Enhanced Technology and Security Engineering
Topics/Call fo Papers
The FTRA 3rd International Workshop on
Privacy Enhanced Technology and Security Engineering (PETSE 2011)
Busan, Korea, 26-28 May 2011
http://www.ftrai.org/petse2011
In conjunction with ICASE 2011
(http://www.ftrai.org/icase2011)
Introduction
The integration of advanced wireless technology and internet tends to increase connections of computing devices. However, in order to achieve such integration, security problems and privacy concerns such as personal information outflows should be considered. Privacy enchanced technology and security engineering are required for technical security and personal information protection. The aim of this workshop is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Privacy Enchanced Technology and Security Engineering.
PETSE-11 is a successor of the 2009 Special Session on Security & Privacy in Pervasive Computing environments (SPCC-09, Suwon, Korea, June 29 - July 2, 2009) and SPCC-08 (Busan, Korea, April 2008).
Topics
The topics of interest include, but are not limited to:
- Privacy-aware access control
- Privacy enhancing technologies
- Privacy policies and their enforcement
- Privacy preserving data publishing and anonymity
- Privacy in e-commerce and user profiling
- Privacy aspects of ubiquitous computing systems
- Privacy-preserving data integration and record linkage
- Privacy threats due to data mining
- privacy issues in mobility and spatiotemporal data mining
- Privacy in social networks
- RFIDs and privacy
- Access control, anonymity, audit, and authentication
- Applied cryptography, cryptanalysis, and digital signatures
- Biometric security
- Data and system integrity, database security
- Defensive information warfare
- Grid / Cloud computing security
- Mobile, Ad Hoc and Sensor Network Security
- Monitoring and surveillance
- Performance evaluations of protocols & security application
- Abuse cases and threat modeling
- Architecture and design for security
- Language based security
- Malicious code prevention and code safety
- Fundamentals of security engineering
- Information security standards
- Management of software security in industrial practice
- Security requirements and policies
- Architecture and design for security
- Security risk analysis
- Modeling for security engineering
- Methodologies for security engineering
- Methodologies and tools for requirement analysis of security functions
- Specification formalisms for security artifacts
- Security assurance cases
- Trade-off between security and other non-functional requirements
- Support for assurance, certification and accreditation
- Application security: detection and protection
- Software piracy and protection
- Case studies and experience reports on security engineering
Important Dates
Full paper due: Dec. 1, 2010
Notification of acceptance: Feb. 1, 2011
Camera-ready paper & early registration due: Feb. 28, 2011
Conference: May 26-28, 2011
Submissions and Proceedings
Every submitted paper will be carefully reviewed by at least three members of the Program Committee.
All accepted papers will be included in the conference proceeding published by IEEE Press and will be included in the IEEE Xplorer (TBA).
Authors should submit a paper with 4-6 pages in length (Max. 8 pages, extra charges for two pages) by using online systems for review.
Submission of a paper should be regarded as a commitment that, if the paper be accepted, at least one of the authors will register and attend the conference. Otherwise papers will be removed from IEEE digital library.
Submission system: http://www.editorialsystem/petse2011
Distinguished selected papers accepted and presented in PETSE 2011, after further revisions, will be published in the special issues of the following international journals - JoC, FTRA Publising and IJITCC, InderScience.
Organization
TBA
Contact
If you have any questions about the CFPs and papers submission,
please email to Prof. James (Jong Hyuk) Park (parkjonghyuk1-AT-hotmail.com) and Prof. Jongsung Kim (jongsung.k-AT-gmail.com).
Privacy Enhanced Technology and Security Engineering (PETSE 2011)
Busan, Korea, 26-28 May 2011
http://www.ftrai.org/petse2011
In conjunction with ICASE 2011
(http://www.ftrai.org/icase2011)
Introduction
The integration of advanced wireless technology and internet tends to increase connections of computing devices. However, in order to achieve such integration, security problems and privacy concerns such as personal information outflows should be considered. Privacy enchanced technology and security engineering are required for technical security and personal information protection. The aim of this workshop is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Privacy Enchanced Technology and Security Engineering.
PETSE-11 is a successor of the 2009 Special Session on Security & Privacy in Pervasive Computing environments (SPCC-09, Suwon, Korea, June 29 - July 2, 2009) and SPCC-08 (Busan, Korea, April 2008).
Topics
The topics of interest include, but are not limited to:
- Privacy-aware access control
- Privacy enhancing technologies
- Privacy policies and their enforcement
- Privacy preserving data publishing and anonymity
- Privacy in e-commerce and user profiling
- Privacy aspects of ubiquitous computing systems
- Privacy-preserving data integration and record linkage
- Privacy threats due to data mining
- privacy issues in mobility and spatiotemporal data mining
- Privacy in social networks
- RFIDs and privacy
- Access control, anonymity, audit, and authentication
- Applied cryptography, cryptanalysis, and digital signatures
- Biometric security
- Data and system integrity, database security
- Defensive information warfare
- Grid / Cloud computing security
- Mobile, Ad Hoc and Sensor Network Security
- Monitoring and surveillance
- Performance evaluations of protocols & security application
- Abuse cases and threat modeling
- Architecture and design for security
- Language based security
- Malicious code prevention and code safety
- Fundamentals of security engineering
- Information security standards
- Management of software security in industrial practice
- Security requirements and policies
- Architecture and design for security
- Security risk analysis
- Modeling for security engineering
- Methodologies for security engineering
- Methodologies and tools for requirement analysis of security functions
- Specification formalisms for security artifacts
- Security assurance cases
- Trade-off between security and other non-functional requirements
- Support for assurance, certification and accreditation
- Application security: detection and protection
- Software piracy and protection
- Case studies and experience reports on security engineering
Important Dates
Full paper due: Dec. 1, 2010
Notification of acceptance: Feb. 1, 2011
Camera-ready paper & early registration due: Feb. 28, 2011
Conference: May 26-28, 2011
Submissions and Proceedings
Every submitted paper will be carefully reviewed by at least three members of the Program Committee.
All accepted papers will be included in the conference proceeding published by IEEE Press and will be included in the IEEE Xplorer (TBA).
Authors should submit a paper with 4-6 pages in length (Max. 8 pages, extra charges for two pages) by using online systems for review.
Submission of a paper should be regarded as a commitment that, if the paper be accepted, at least one of the authors will register and attend the conference. Otherwise papers will be removed from IEEE digital library.
Submission system: http://www.editorialsystem/petse2011
Distinguished selected papers accepted and presented in PETSE 2011, after further revisions, will be published in the special issues of the following international journals - JoC, FTRA Publising and IJITCC, InderScience.
Organization
TBA
Contact
If you have any questions about the CFPs and papers submission,
please email to Prof. James (Jong Hyuk) Park (parkjonghyuk1-AT-hotmail.com) and Prof. Jongsung Kim (jongsung.k-AT-gmail.com).
Other CFPs
- 2nd Workshop on Scientific Cloud Computing
- Workshop on Emerging Mobile Sensing Technologies, Systems, and Applications
- ICMFE 2011 : INTERNATIONAL CONFERENCE ON MATHEMATICAL FINANCE AND ECONOMICS
- DEMI 2011 : 1st International Conference on Model & Data Engineering
- TOPI 2012 : Workshop on Developing Tools as Plug-ins
Last modified: 2010-12-30 13:18:50