Newsroom

Call for Researchers

Are you looking to embark on a PhD program in Cybersecurity?

Read here how to proceed.

International Conference on Availability, Reliability and Security
[29-1/Aug/2017]

Event Category: 

The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.

ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

17th International School on Foundations of Security Analysis and Design
[28-2/Aug/2017]

Event Category: 

The International School on Foundations of Security Analysis and Design FOSAD is a one-week yearly school on cyber-security held in Bertinoro (Italy) in August-September. The main aim of the FOSAD school is to offer a good spectrum of current research in foundations of security - ranging from programming languages to analysis of protocols, from cryptographic algorithms to access control policies and trust management - that can be of help for graduate students and young researchers from academia or industry that intend to approach the field.

International Conference on Trust, Privacy And Security In Digital Business
[28-31/Aug/2017]

Event Category: 

New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision of high quality services all over the world. All these developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competitive in the global marketplace.

IEEE International Conference On Trust, Security And Privacy In Computing And Communications
[1-4/Aug/2017]

Event Category: 

With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time.

International Workshop on Security, Privacy and Performance in Cloud Computing
[17-21/Jul/2017]

Event Category: 

Cloud computing is transforming the way large-scale computation is performed. Dynamic scalability or -elasticity- provided by the cloud make high-performance computing accessible to everyone. However, cloud computing introduces new challenges with respect to security and privacy. Although virtualization addresses some of these concerns, it has a significant impact on performance: the actual gains in performance depend heavily on the predictability of physical and virtualized resources.

International Symposium on Engineering Secure Software and Systems
[3-5/Jul/2017]

Event Category: 

Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors.

The Workshop on the Economics of Information Security
[26-27/Jun/2017]

Event Category: 

Information security and privacy continue to grow in importance, as threats proliferate, privacy erodes, and attackers find new sources of value. Yet the security of information systems and the privacy offered by them depends on more than just technology. Each requires an understanding of the incentives and trade-offs inherent to the behavior of people and organizations. As society’s dependence on information technology has deepened, policy-makers have taken notice.

IFIP TM on Trust Management
[12-16/Jun/2017]

Event Category: 

Trust is an essential glue for any society, whether formed by human or artificial agents, whether in a real-life or an online setting. This trust needs to be established, reinforced or abolished to reflect changes in the society and its participants. The mechanisms for such trust management may be psychological or sociological in the case of humans, algorithmic or probabilistic, e.g., in the case of artificial agents.

Pages