Building International Cooperation for Trustworthy ICT

EuroSec 2013: 6th European Workshop on Systems Security, 14th April 2013

A Call for Papers has been issued for EuroSec 2013, the 6th European Workshop on Systems Security being held on the 14th of April, 2013, in Prague, Czech
Republic. The EuroSec 2013 workshop will precede the main EuroSys 2013 conference.

About EuroSec
————-
The sixth European Workshop on Systems Security (EuroSec) aims to
bring together researchers, practitioners, system administrators,
system programmers, and others interested in the latest advances in
the security of computer systems and networks. The objective of the
workshop is to discuss novel, practical, systems-oriented work.

Important Dates

—————

* Paper submission: February 8, 2013
* Acceptance notification: March 20, 2013
* Final paper due: April 5, 2013
* Workshop: April 14, 2013

Topics of Interest
——————
EuroSec seeks contributions on all aspects of systems security. Topics
of interest include (but are not limited to):
* New attacks, evasion techniques, and defenses
* Operating system security
* Mobile systems security
* Malicious code analysis and detection
* Web security
* Identity management and anonymity
* Hardware and physical security
* Virtual machines and hypervisors
* Measuring security
* Trusted computing and its applications
* Systems-based forensics
* Systems work on fighting spam/phishing

In accordance with the spirit of the EuroSys conference, we also seek:
* Quantified or insightful experience with existing systems
* Reproduction or refutation of previous results
* Negative results
* Early ideas

EuroSec explicitly encourages members of the systems community to
explore leading-edge topics and ideas before they are presented
at a major conference. All submissions will be reviewed by the
Program Committee. Only original, novel work will be considered for
publication. Accepted papers will be published in the Proceedings of
EuroSec in the ACM Digital Library.

Second International Workshop on Privacy and Security in Online Social Media (PSOSM)

The Second International Workshop on Privacy and Security in Online Social Media (PSOSM) will be Co-located with 22nd International World Wide Web Conference in
Rio, Brazil during 13-17th May, 2013.  The full day PSOSM workshop will take place on 14th May 2013.

The main goals of the PSOSM workshop are:

(1) To create a platform to discuss latest and upcoming issues, trends, and cutting-edge research approaches in security and privacy in online social media / complex networked systems;

(2) To bring researchers who are working separately on security and privacy, and online social media, to discuss the problems that overlap and bring these two areas together.

Topics / themes include, but not limited to the following:
- Information privacy disclosure, revelation and its effects in OSM and online social networks
- Collateral damage due to information leakage (e.g. through photo tagging) on OSM
- Privacy issues related to location based services on OSM
- Effective and usable privacy setting and policies on OSM
- Anonymization of social network dataset
- Identifying and preventing social spam (including phishing and frauds) campaigns
- Tracking social footprint / identities across different social network
- Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media
- Cyber-bullying, abuse and harassment detection, and prevention strategies
- Identifying and curbing malware, phishing, and botnets on OSM
- Filtering of pornography, viruses, and human trafficking on OSM
- Studying the social and economic impact of security and privacy issues on OSM
- User behavior towards change in privacy features in OSM
- Usability (including design flaws) of secure systems on online social media
- Data modeling of human behavior in context of security and privacy threats
- Privacy and security in social gaming applications
- Trust systems based on social networks
- Legal and ethical issues for researchers studying security and privacy on OSM
- Information credibility on OSM
- Security and Privacy issues in new entrants in OSM (e.g. Google Plus)
- Effect of OSM on conventional crime (robberies and theft)
- Means to maintain different legitimate identities on the same OSM service
- Access control, rights management, and security of social content
- Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
- Identifying fraudulent entities in online social networks
- Problems due to unification of different identities of the same persona on different social media services
- Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks)

Important dates
Abstract submission: February 22nd, 2013
Manuscripts due: February 25th, 2013
Notification of acceptance: March 13th, 2013
Final revised manuscript: April 1st, 2013
Workshop: May 14, 2013 (Full day)

ENISA publishes report on Consumerization of IT: Risk Mitigation Strategies and Good Practices

In December 2012, European Network and Information Agency (ENISA) has published a report entitled Consumerization of IT: Risk Mitigation Strategies and Good Practices, which presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area. Additional information and the published report can be found here.

BIC Annual Forum held on 27th November 2012

The BIC project’s Annual Forum for 2012 was held on 27th November 2012 in Lisbon, Portugal and was comprised of two elements:

1. BIC International Advisory Group (IAG) workshop held on the morning of 27th November 2012.
2. BIC IAG Workshop on international cooperation covering trust management for mobile and cloud based services during the afternoon of 27th November 2012.

The slides and summary report are available here.

BIC Annual Forum 2012 is nearly here. Final agenda available

The BIC Annual Forum for 2012 is nearly upon us. The format of the event is the following:

1. Morning: International Advisory Group (IAG) Workshop on Building International Cooperation in Trust and Security;

2. Afternoon: IAG Programme management session and workshop on trust management models across countries.

The final agenda can be found here.

Agenda of the BIC Open workshop on 27th November 2012 available.

The agenda of the BIC open workshop being held on 27th November 2012 in Lisbon, Portugal on Trust management approaches in emerging countries is now available here. Please note if you want to attend lunch, you must pre-register to the workshop registration facility site by Friday 23rd November 2012.

BIC-IAG members from India take part in Joint Working Group (JWG) on cyber security.

India takes a bold initiative to engage with private sector and international community to secure her cyber space, BIC-International Advisory Group (IAG) members participate at the Joint Working Group (JWG) event organized by the National Security Adviser of India.

To counter cyber attacks in economic and social infrastructure development, the Indian government on Monday, 15 October 2012, said it would set up a joint working group to engage the private sector and will start four pilot projects for this purpose. The roadmap released by the national security adviser, Mr Shivshankar Menon, as a JWG report on engaging the private sector on cyber security envisages setting up a permanent Joint Working Group (JWG) on cyber security and start four pilot projects. BIC-IAG members from India; Dr Gulshan Rai, Director General CERT-India, Mr Abhishek Sharma and Mr Manmohan Chaturvedi participated in this event in India’s capital city of New Delhi.

The event,  attended by large number of Cyber Security experts from the Indian government and industry, heralds a turning point in public private cooperation for Cyber Security. The need for bilateral and multilateral international engagement in this area of national importance was more than once reiterated by the panel participants.

BIC Annual Forum 2012 (27th November 2012) Terms of reference now available

The terms of reference for the next BIC Annual Forum is now available at http://www.bic-trust.eu/events/bic-forum-2012/

To raise the impact for both International cooperation projects annual forum events, the FP7 projects BIC and EuroAfrica-ICT will hold their events together over the dates 27th – 29th November 2012 in Lisbon, Portugal.

On the 27th November 2102, the BIC project will hold their Annual Forum events comprised of two elements:

1. BIC International Advisory Group (IAG) meeting (by invitation only) on the morning of 27th November 2012.

2. Open workshop on international cooperation covering trust management for mobile services during the afternoon of 27th November 2012. This event requires registration at http://bic-forum2012.eventbrite.com/

The BIC participants are also encouraged and most welcomed to attend the 2012 Africa-EU Cooperation Forum on ICT Research organised by the EuroAfrica-ICT project being held on 28-29th November 2012 in the same venue.  Further information and registration for the EuroAfricaICT Annual forum can be found at http://euroafrica-ict.org/2012-africa-eu-cooperation-forum-on-ict/. Please note that you must register separately for this event at http://store.sigma-orionis.com/login?conferenceid=58

New report published entitled 2012/2013 ‘Cyber Threat Barometer for South Africa’

A report funded by the British High Commission in South Africa entitled 2012/2013 ‘Cyber Threat Barometer for South Africa: A strategic public-private partnership (PPP) initiative to combat cybercrime in South Africa (SA)’ has been published. The purpose of the report is to  identify and clarify some of the main threats facing South Africa, as well as providing areas for the United Kingdom and South Africa to work together to advance the security and prosperity of both countries.

Craig Rosewarne, Managing Director, Wolfpack Information Risk (Pty) Ltd, has provided the BIC project with a copy of the report, which can be found by clicking here -> SA 2012 Cyber Threat Barometer.

 

Information Day on ICT call -10: Objective 2013.1.5 – Trustworthy ICT being held on 9th October, 2012.

An information day on the specific objective on Trustworthy ICT of the last call for proposals of the seventh Framework Programme for Research and Technological development (FP7) is being held on the 9th of October 2012 in Brussels.

More information on FP7 and the call itself is available at:

http://cordis.europa.eu/fp7/ict/security/fp7-calls-trustworthy_en.html

The call is currently opened until 15 January 2013.

The agenda of the information day can be found by clicking Trustworthy ICT Information day_121009.

***********************************************************

ICT call -10: Objective 2013.1.5 – Trustworthy ICT

09/10/2012 – 9:30-16:00

Avenue de Beaulieu 25, B1160 Brussels, Belgium – Room S 0/1

Why attend?

· Learn more about the upcoming call for R&D project proposals under FP7 ICT objective 1.5

and how it focus on objectives that are in scope of our priorities for the Societal Challenge ‘Secure Societies’ in H2020

· Present your ideas, discuss them with others

· Meet peers and form a consortium

· Meet the Commission staff responsible for ICT objective 1.5 and get an indication on the scope of your proposed work.

Registration for the event is free of charge and it will be open till 05 October.
Please register by sending a mail to CNECT-TRUST-SECURITY@ec.europa.eu

Any questions contact Rodrigo, rodrigo.mendes@ec.europa.eu
or Virginie, virginie.de-haan@ec.europa.eu

Page 6 of 10« First...45678...Last »