the original cloud security

Web 2.0 Security And Privacy 2014 Call For Papers

Web 2.0 Security And Privacy 2014 Call For Papers
Posted Oct 30, 2013
Site w2spconf.com

W2SP brings together researchers, practitioners, web programmers, policy makers, and others interested in the latest understanding and advances in the security and privacy of the web, browsers, cloud, mobile and their eco-system. The workshop will take place May 18th, 2014.

tags | paper, web, conference
MD5 | 802b642d7a1eeac40ef00a76e41cba50

Web 2.0 Security And Privacy 2014 Call For Papers

Change Mirror Download
http://w2spconf.com/2014/cfp.html

WEB 2.0 SECURITY AND PRIVACY 2014 WORKSHOP CALL FOR PAPERS

IMPORTANT DATES

Paper submission deadline: February 26, 2014 (11:59pm US-PST)
Workshop acceptance notification date: March 29, 2014
Workshop date: Sunday, May 18, 2014

Workshop paper submission web site: https://www.easychair.org/conferences/?conf=w2sp2014


W2SP brings together researchers, practitioners, web programmers, policy makers, and others interested in the latest understanding and advances in the security and privacy of the web, browsers, cloud, mobile and their eco-system. We have had seven years of successful W2SP workshops. This year, we will additionally invite selected papers to a special issue of the journal.


W2SP is held in conjunction with the IEEE Symposium on Security and privacy, which will take place from May 18-21, 2014, at the Fairmont Hotel in San Jose, California. W2SP will continue to be open-access: all papers will be made available on the workshop website, and authors will not need to forfeit their copyright.


We are seeking both short position papers (2–4 pages) and longer papers (a maximum of 10 pages). Papers must be formatted for US letter (not A4) size paper with margins of at least 3/4 inch on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates.


The scope of W2SP 2014 includes, but is not limited to:

Analysis of Web, Cloud and Mobile Vulnerabilities
Forensic Analysis of Web, Cloud and Mobile Systems
Security Analysis of Web, Cloud and Mobile Systems
Advances in Penetration Testing
Advances in (SQL/code) Injection Attacks
Trustworthy Cloud-based, Web and Mobile services
Privacy and Reputation in Web (e.g. Social Networks), Cloud, Mobile Systems
Security and Privacy as a Service
Usable Security and Privacy
Security and Privacy Solutions for the Web, Cloud and Mobile
Identity Management, Psuedonymity and ANonymity
Security/Privacy Web Services/Feeds/Mashups
Provenance and Governance
Security and Privacy Policy Management for the Web, Cloud and Mobile
Next-Generation Web/Mobile Browser Technology
Security/Privacy Extensions and Plug-ins
Online Privacy and Security frameworks
Advertisement and Affiliate fraud
Studies on Understanding Web/Cloud/Mobile Security and Privacy
Technical Solutions for Security and Privacy legislation

Solutions for connecting the Business, Legal, Technical and Social aspects on Web/Cloud/Mobile Security and Privacy.

Technologies merging Economics with Security/Privacy
Innovative Security/Privacy Solutions for Industry Verticals

Any questions should be directed to the program chair: tgrandison (at) proficiencylabs.com.



WORKSHOP CO-CHAIRS

Larry Koved (IBM Research)
Matt Fredrikson (University of Wisconsin - Madison)

PROGRAM CHAIR

Tyrone Grandison (Proficiency Labs)

PROGRAM COMMITTEE

Aaron Massey (Georgia Institute of Technology)
Adrienne Porter Felt (Google)
Aleecia M. McDonald (Center for Internet & Society)
Alex Smolen (Twitter)
Alexander Polyakov (ERPScan)
Amine Cherrai (Amine Cherrai Consulting)
Anand Prakash (E-Billing Solutions Pvt. Ltd)
Bhavani Thuraisingham (University of Texas - Dallas)
Brad Malin (Vanderbilt University)
Carrie Gates (CA Technologies)
Christy Philip Matthew (Offcon Info Security)
Dieter Gollmann (Hamburg University of Technology)
Elena Ferrari (University of Insubria)
Gerome Miklau (University of Massachusetts - Amherst)
Hakan Hacigumus (NEC Labs)
Ilya Mironov (Microsoft Research)
James Kettle (Context Information Security)
Kimberley Hall (Security Advisory & Management Services Ltd)
Michael Franz (University of California - Irvine)
Michael Waidner (Technische Universitat Darmstadt)
Monica Chew (Mozilla)
Pierangela Samarati (University of Milan)
Rafae Bhatti (Price Waterhouse Coopers)
Reginaldo Silva (Ubercomp)
Rose Gamble (University of Tulsa)
Sabrina De Capitani di Vimercati (University of Milan)
Sean Thorpe (University of Technology - Jamaica)
Sid Stamm (Mozilla)
Simson Garfinkel (Naval Postgraduate School)
Szymon Gruszecki
Varun Bhagwan (Yahoo)
Vinnie Moscaritolo (Silent Circle)



Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2015

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    2 Files
  • 2
    Feb 2nd
    17 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    16 Files
  • 5
    Feb 5th
    14 Files
  • 6
    Feb 6th
    4 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2015 Packet Storm. All rights reserved.

close