Giovanni Livraga | 3 Jul 19:39 2015

Deadline approaching - IEEE CNS 2015 Call for Posters

*** Deadline approaching (2-page abstract due July 15, 2015) ***


3rd IEEE Conference on Communications and Network Security
Florence, Italy -- September 28-30, 2015

2-page Abstract Due by: July 15, 2015 11:59:pm American Samoa time
Notification of Acceptance: July 30, 2015
Final Abstract Due: August 10, 2015

A BEST POSTER AWARD Award will be given based on the poster's novelty and potentials in
research. The quality of presentation and the interaction during the session will also
be important criteria. The award will be announced in a plenary session of the main

IEEE CNS is a new conference series in IEEE Communications Society (ComSoc) core
conference portfolio and the only ComSoc conference focusing solely on cyber security.
IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking.
The goal of CNS is to provide an outstanding forum for cyber security researchers,
practitioners, policy makers, and users to exchange ideas, techniques and tools,
raise awareness, and share experience related to all practical and theoretical
aspects of communications and network security.
(Continue reading)

Barbara Jobstmann | 3 Jul 11:14 2015

VMCAI 2016: Call for Papers, Deadlines: Sep 4 (abstract), Sep 11 (paper)

17th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2016) January 17-19, 2016, St. Petersburg, Florida, United States

VMCAI provides a forum for researchers from the communities of Verification, Model Checking, and Abstract Interpretation facilitating interaction, cross-fertilization, and advancement of hybrid methods that combine these and related areas.

The program of VMCAI 2016 will consist of refereed research papers as well as invited lectures and tutorials. Research contributions can report new results as well as experimental evaluations and comparisons of existing techniques. Topics include, but are not limited to:
* Program Verification
* Model Checking
* Abstract Interpretation
* Abstract Domains
* Program Synthesis
* Static Analysis
* Type Systems
* Deductive Methods
* Program Certification
* Error Diagnosis
* Program Transformation
* Hybrid and Cyber-physical Systems
Submissions can address any programming paradigm, including concurrent, constraint, functional, imperative, logic, and object-oriented programming.

Important Dates
Abstract submission    Fri  4 Sep 2015
Paper submission       Fri 11 Sep 2015
Author notification    Sat 10 Oct 2015
VMCAI 2016 conference  Sun 17 - Tue 19 Jan 2016  

Submissions are restricted to 17 pages in Springer's LNCS format, not counting references. Additional material may be placed in an appendix, to be read at the discretion of the reviewers and to be omitted in the final version. Formatting style files and further guidelines for formatting can be found at the Springer website.

Submissions must be uploaded via the paper submission site:

Accepted papers will be published in Springer’s Lecture Notes in Computer Science series.

Student Travel Funding
We are in the process of acquiring funds to sponsor travel and other costs of attending VMCAI in St. Petersburg, Florida. Only students who are registered (or will register) for VMCAI are eligible to apply. If you are interested, please send the following information to vmcai2016-bC77Qfv0vuxrovVCs/
* Are you presenting a paper at VMCAI? If not, then a short paragraph on why you want to attend VMCAI.
* An estimate of the cost (travel and accommodation).
* Will you be able to attend the conference if we cannot fund you?
* Are you studying at a US university?
* A copy of your CV.

Program chairs
Barbara Jobstmann (EPFL and CNRS-Verimag)
K. Rustan M. Leino (Microsoft Research)

Program Committee
Bor-Yuh Evan Chang (University of Colorado at Boulder)   
Hana Chockler (King's College)
Eva Darulova (EPFL)
Rayna Dimitrova (MPI-SWS)
Javier Esparza (TU Munich)
Aarti Gupta (Princeton University)
Arie Gurfinkel (Carnegie Mellon University)  
Barbara Jobstmann (EPFL and CNRS-Verimag)
K. Rustan M. Leino (Microsoft Research)
Francesco Logozzo (Facebook)
Madhavan Mukund (Chennai Mathematical Institute)
Peter Mueller (ETH Zurich)
David Parker (University of Birmingham)
Andreas Podelski (University of Freiburg)
Nadia Polikarpova (MIT CSAIL)
Philipp Ruemmer (Uppsala University)
Roopsha Samanta (Institute of Science and Technology)
Martina Seidl (Johannes Kepler University Linz)
Sanjit A. Seshia (UC Berkeley)
Sharon Shoham (The Academic College of Tel Aviv Yaffo)
Tachio Terauchi (Japan Advanced Institute of Science and Technology)
Caterina Urban (Ecole Normale Superieure)
Thomas Wies (New York University)
Lenore Zuck (University of Illinois at Chicago)

Organizing Committee
Outreach Activities Chair: Ruzica Piskac (Yale University)
Treasurer & Conference Manager: Lenore Zuck (University of Illinois at Chicago)

Steering Committee
Agostino Cortesi (Universita Ca Foscari of Venezia)
Patrick Cousot (CNRS & ENS & INRIA, France and NYU)
E. Allen Emerson (University of Texas at Austin)
Andreas Podelski (University of Freiburg)
Thomas W. Reps (University of Wisconsin at Madison)
David Schmidt (Kansas State University)
Lenore Zuck (University of Illinois at Chicago)

Om-announce mailing list
STM 2015 | 2 Jul 19:42 2015

ERCIM STM 2015 PhD Thesis Award - call for applications (deadline approaching)

ERCIM STM WG 2015 Award for the
Best Ph.D. Thesis on Security and Trust Management

*** Deadline approaching (July 7, 2015) ***

The European Research Consortium in Informatics and Mathematics
(ERCIM) has a technical WG on Security and Trust Management (STM) for
performing a series of activities, as research projects,
workshop/conference organization, dissemination of knowledge, for
increasing the European research and development capabilities on
security, trust, and privacy.

One of the main goals of the WG is to promote the scientific growth of
young researchers interested in the field of security and trust
management. ERCIM STM WG then decided to establish an award for the
best Ph.D. thesis in this area to increase the visibility of the young
researchers within the ERCIM scientific community as well as in the
scientific community in general.

The topics of interest include, but are not limited to:

* applied cryptography;

* data and application security;

* identity management;

* networked systems security;

* privacy, anonymity, and untraceability;

* rigorous semantics and computational models for security and trust;

* security, privacy, and trust in emerging computing paradigms;

* security and trust management architectures, mechanisms, and policies.

Applications for the award in 2015 are open to all Ph.D. holders that
defended their thesis during 2014 in any European
University. Applications consisting of the Ph.D. Thesis (in PDF
format), a short summary of the Thesis (mandatory in English), a
curriculum vitae (in PDF format), and letters of support from at least
two researchers, one of whom should be from an ERCIM STM WG
Institution, should be sent by July 7, 2015 to stm@...  Please
use "ERCIM STM PhD Award 2015 - Application" as subject of the

Theses will be evaluated by a Committee appointed from the European
research community. The theses will be judged on the basis of
scientific quality, originality, clarity of presentation, as well as
potential impact of the results. 

The ceremony for the award will be held during the 11th International
Workshop on Security and Trust Management (STM 2015) on September
21-22 2015, Vienna, Austria. 

Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.
Geoff Sutcliffe | 2 Jul 16:38 2015

LPAR-20 Workshops - Calls for Papers

LPAR-20 call for workshop papers:
- Workshop on the Implementation of Logics(IWIL-2015)
- Models for Formal Analysis of Real Systems (MARS 2015)
- First International Workshop on Focusing (WoF'15)

                 Call for papers

    LPAR'20 Workshop on the Implementation of Logics

        SUBMISSION DEADLINE: 5 October 2015

General Information
The 11th International Workshop on the Implementation of Logics will be held in
November 2015 in conjunction with the 20th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning in Suva, Fiji

We are looking for contributions describing implementation techniques for and
implementations of automated reasoning programs, theorem provers for various
logics, logic programming systems, and related technologies. Topics of interest
include, but are not limited to:

  - Propositional logic and decision procedures, including SMT
  - First-order and higher order logics
  - Non-classical logics, including modal, temporal, description,
    non-monotonic reasoning
  - Formal foundations for efficient implementation of logics
  - Data structures and algorithms for the efficient representation and
    processing of logical concepts
  - Proof/model search organization and heuristics for logical reasoning
  - Data analysis and machine learning approaches to search control
  - Techniques for proof/model search visualization and analysis
  - Practical constraint handling
  - Reasoning with ontologies and other large theories
  - Implementation of efficient theorem provers and model finders for
    different logics
  - System descriptions of logical reasoning systems
  - Issues of reliability, witness generation, and witness verification
  - Evaluation and benchmarking of provers and other logic-based systems
  - I/O standards and communication between reasoning systems

We are particularly interested in contributions that help the community to
understand how to build useful and powerful reasoning systems, and how to
apply them in practice.

Researchers interested in participating are invited to submit a position
statement (2 pages), a short paper (up to 5 pages), or a full papers (up to 15
pages) via the EasyChair page for IWIL-2015,

Submissions will be refereed by the program committee, which will select a
balanced program of high-quality contributions.

Submissions should be in standard-conforming PDF. Final versions will be
required to be submitted in LaTeX using the easychair.cls class file.
Proceedings will be published as EasyChair Proceedings.

If number and quality of the submissions warrant it, we plan to produce a
special issue of a recognized journal on the topic of the workshop.

Important Dates
Submission of papers/abstracts:  October 5th, 2015
Notification of acceptance:      October 26th, 2015
Camera ready versions due:       November 9th, 2015
Workshop:                        November 23rd, 2015                                   

Program committee

Boris Konev (Co-Chair)       University of Liverpool
Stephan Schulz (Co-Chair)    DHBW Stuttgart
Laurent Simon (Co-Chair)     University of Bordeaux
Christoph Benzmüller         Freie Universität Berlin
Armin Biere                  Johannes-Kepler Universität Linz
Jasmin Blanchette            INRIA/LORIA/Max-Planck-Institut für Informatik
Guillaume Burel              ENSIIE/CÉDRIC
Simon Cruanes                INRIA Paris-Rocquencourt
Tommi Junttila               Aalto University
Konstantin Korovin           University of Manchester
Albert Oliveras              Universitat Politècnica de Catalunya
Jens Otten                   Universität Potsdam
Andrew Reynolds              Ecole polytechnique fédérale de Lausanne
Peter Schneider-Kamp         University of Southern Denmark
Geoff Sutcliffe              University of Miami
Josef Urban                  Radboud University/Czech Technical University
Uwe Waldmann                 Max-Planck-Institut für Informatik            

Previous Workshops
- Reunion Workshop (held in conjunction with LPAR'2000 on Reunion Island)
- Second Workshop (with LPAR'2001 in Havana, Cuba)
- Third Workshop (with LPAR'2002 in Tbilisi, Georgia)
- Fourth Workshop (with LPAR'2003 in Almati, Kazakhstan)
- Fifth Workshop (with LPAR'2004 in Montevideo, Uruguay)
- Sixth Workshop (with LPAR'2006 in Phnom Penh, Cambodia)
- Seventh Workshop (with LPAR'2008 in Doha, Qatar)
- Eighth Workshop (with LPAR‘2010 in Yogyakarta, Indonesia)
- Ninth Workshop (with LPAR‘2012 in Merida, Venezuela)
- Tenth Workshop (with LPAR‘2013 in Stellenbosch, South Africa)
                           Call for papers

                             Workshop on
              Models for Formal Analysis of Real Systems
                             (MARS 2015)

                       Affiliated With LPAR 20

                     November 23, 2015 Suva, Fiji


                  SUBMISSION DEADLINE: 24/31 August 2015

Aim: Logics and techniques for automated reasoning have often been
developed with formal analysis and formal verification in mind. To
show applicability, toy examples or tiny case studies are typically
presented in research papers. Since the theory needs to be developed
first, this approach is reasonable.
  However, to show that a developed approach actually scales to real
systems, large case studies are essential. The development of formal
models of real systems usually requires a perfect understanding of
informal descriptions of the system-sometimes found in RFCs or other
standard documents-which are usually just written in English. Based on
the type of system, an adequate specification formalism needs to be
chosen, and the informal specification translated into it. Abstraction
from unimportant details then yields an accurate, formal model of the
real system.
  The process of developing a detailed and accurate model usually takes
a large amount of time, often months or years; without even starting a
formal analysis. When publishing the results on a formal analysis in a
scientific paper, details of the model have to be skipped due to lack
of space, and often the lessons learnt from modelling are not
discussed since they are not the main focus of the paper.
  The workshop aims at discussing exactly these unmentioned lessons.
Examples are:

  * Which formalism is chosen, and why?
  * Which abstractions have to be made and why?
  * How are important characteristics of the system modelled?
  * Were there any complications while modelling the system?
  * Which measures were taken to guarantee the accuracy of the model?

The workshop emphasises modelling over verification. In particular, we
invite papers that present full Models of Real Systems, which may lay
the basis for future formal analysis. The workshop will bring together
researchers from different communities that all aim at verifying real
systems and are developing formal models for such systems. Areas where
large models often occur are within networks, (trustworthy) systems
and software verification (from byte code up to programming- and
specification languages). An aim of the workshop is to present
different modelling approaches and discuss pros and cons for each of them.

Submissions must be unpublished and not be submitted for publication elsewhere.
Contributions are limited to 8 pages EPTCS style (
(not counting the appendix), but shorter extended abstracts are welcome.
Appendices (of arbitrary length) can be used to present all details of
a formalised model; the appendices will be part of the proceedings.
Submissions must be in English and submitted in PDF format via EasyChair (TBC).

All submissions will be peer reviewed by at least three referees based
on their novelty, relevance and technical merit. The proceedings will be 
published as part of the open access series Electronic Proceedings 
in Theoretical Computer Science (EPTCS).

Important Dates (AoE)
 * Submission of abstracts: Monday 24 August 2015
 * Submission: Monday 31 August 2015
 * Notification: Friday 9 October 2015
 * Final version: Monday 2 November 2015
 * Workshop: Monday 23 November 2015

Programme Committee

Rance Cleaveland        (University of Maryland, USA)
Hubert Garavel          (INRIA, France)
Rob van Glabbeek  (co-chair) (NICTA, Sydney, Australia)
Jan Friso Groote  (co-chair) (Eindhoven University of Technology, The Netherlands)
He Jifeng               (Easy China Normal University, China)
Holger Hermanns         (Saarland University, Germany)
Peter Hoefner     (co-chair) (NICTA, Sydney, Australia)
Gerald Holzmann         (NASA/JPL, USA)
Magnus Myreen           (Chalmers University, Sweden)
Viet Yen Nguyen         (Fraunhofer IESE, Germany)
Bill Roscoe             (University of Oxford, UK)
Pamela Zave             (AT&T Laboratories, USA)


Rob van Glabbeek  (NICTA, Sydney, Australia)
Jan Friso Groote  (Eindhoven University of Technology, The Netherlands)
Peter Hoefner      (NICTA, Sydney, Australia)



                          Call for papers

             First International Workshop on Focusing

                   Suva, Fiji, 23 November 2015
                      Affiliated with LPAR-20

               SUBMISSION DEADLINE: 4/11 September 2015

Focusing is a proof search strategy that alternates two phases: an inversion
phase where invertible sequent rules are applied exhaustively and a chaining
phase where it selects a formula and decomposes it maximally using
non-invertible rules.  Focusing is one of the most exciting recent
developments in computational logic: it is complete for many logics of
interest and provides a foundation for their use as programming languages and
rewriting calculi.

This workshop has the purposes of bringing together researchers who work on or
with focusing, to foster discussion and to report on recent advances.  Topics
of interest include:

- Focusing in forward, backward and hybrid logic programming languages
- Focusing in theorem proving
- Focusing for substructural logics
- Focused term calculi
- Implementation techniques
- Parallelism and concurrency
- Focusing in security
- Pearls of focusing

Invited Speaker

Important Dates
Abstract submission deadline: Friday  September  4th
Submission deadline:          Friday  September 11th
Notification to authors:      Friday  October    9th
Final version due:            Friday  October   30th
Workshop date:                Monday  November  23rd

In addition to regular papers, we also solicit "work in progress" reports, in
a broad sense.  Those do not need to report fully polished research results,
but should be interesting for the community at large.  Submitted papers should
be in PDF, formatted using the EPTCS style guidelines. The length is
restricted to 12 pages for regular papers and6 pages for "Work in Progress"
papers.  Submission is via EasyChair (link on the WoF'15 web page).

Accepted regular papers will be included in the proceedings of WoF'15, which
will be published in the Electronic Proceedings in Theoretical Computer
Science series (EPTCS).

Program Committee
Iliano Cervesato (Carnegie Mellon University, co-chair)
Kaustuv Chaudhuri (Inria & LIX/École polytechnique)
Paul Blain Levy (University of Birmingham)
Chuck Liang (Hofstra University)
Elaine Pimentel (Universidade Federal do Rio Grande do Norte)
Carsten Schürmann (ITU Copenhagen & Demtech, co-chair)
Om-announce mailing list
Kashif Akhtar Saleem | 1 Jul 16:27 2015

CFP- International workshop on Mobile Computing Security (MCS 2015): Extended deadline (July 7)

***We apologize if you receive multiple copies of this CFP***



International workshop on Mobile Computing Security

(MCS 2015)

In conjunction with the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks

(EUSPN 2015)

Berlin, Germany on September 27-30, 2015

Workshop Website:



Important Dates


Submission Deadline:    July 7, 2015 (Extended)
Author Notification:         July 21, 2015 
Final Manuscript:            July 26, 2015




Technological advances in recent years have provided significant increases in the computing power and networking capabilities of mobile devices. For example, many smartphones and personal digital assistants (PDAs) currently employ powerful processors and have Internet broadband connectivity that rival that of desktop computers and laptops.  For these reasons, mobile devices are being used for many applications including social networking, and business applications like: online banking. Because these devices are ubiquitous, they are high-value targets for cyber criminals that seek financial gains.

Mobile devices are still suffering from many security challenges. The security policy offered by the mobile platforms is loose because it allows developers and users to install any application. As a result, we witnessed an increasing number of attacks and malware targeting mobile platforms like Android and iOS, and which caused serious issues for the user. For example, the malware can integrate compromised mobile devices into a botnet, it can also send SMS messages to premium numbers without the user’s knowledge, and hence the user’s bill is charged. In addition, the users are increasingly using their devices to handle their private information. However, the devices provide insufficient data security and data protection.

This workshop aims at gathering researchers and practitioners working on mobile computing security to share ideas and new research innovations in the field.

The topics of interest include (but are not limited to):

·        Smartphone security.

·        Vulnerability analysis for smartphones.

·        Data protection and privacy.

·        Security and privacy of operating systems, middleware, and applications.

·        Evaluation of mobile security solutions.

·        Mobile malware collection, statistics, and analysis;

·        Mobile malware detection.

·        Bots on mobile devices.

·        Mobile botnet detection.

·        Mobile botnet design and countermeasures.

·        Reverse engineering and automated analysis of mobile malware.

·        Traffic monitoring and detection algorithms for mobile platforms.

·        Cloud security and privacy solutions for mobile devices.

·        Mobile device forensics.

·        Mobile services and social networking security.

·        Security for smart payment applications.

·        Test beds and case studies for secure mobile platforms.

·        Formal models and architecture design for secure mobile platforms.

·        Virtualization solutions for mobile security.

·        Web browser security on mobile devices.




All MCS-2015 accepted papers will be published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on and on Elsevier content platform ScienceDirect (, and will be freely available worldwide. All papers in Procedia will be indexed by Scopus ( and by Thomson Reuters’ Conference Proceeding Citation Index The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (




Authors are requested to submit their papers electronically in PDF format. Blind submissions should be made through the Easychair system:

More information about paper formatting instructions, submission and registration can be found at:

  Workshop Chairs ==============

Abdelouahid Derhab, King Saud University, Saudi Arabia

Mohamed Guerroumi, USTHB University, Algeria

Kashif Saleem, CoEIA, King Saud University, Saudi Arabia



Technical Program Committee


Abdullah Bin Gani, University of Malaya, Malaysia.

Adam Bates, University of Florida, USA.

Ali Feizollah, University of Malaya, Malaysia.

Damien Octeau, Pennsylvania State University, USA.

Gang Tan, Lehigh University, USA. 

Garth V. Crosby, Southern Illinois University Carbondale, USA.

Hsiang-Cheh Huang, National University of Kaohsiung, Taiwan.

Hussain Almohri, Kuwait University, Kuwait.

Jalal Al-Muhtadi, King Saud University, Saudi Arabia.

John C.S. Lui, Chinese University of Hong Kong, China.

Juan Pedro Muñoz-Gea, Universidad Politécnica de Cartagena, Spain.

Karim Elish,  Virginia Tech, USA.

Kouichi Sakurai, Kyushu University, Japan.

Lanier A. Watkins, The Johns Hopkins University Applied Physics Laboratory, USA. 

Lotfi ben Othmane, Technische Universität Darmstadt, Germany.

Mauro Conti, University of Padua, Italy.

Mohamad Badra, Zayed University, The United Arab Emirat. 

Muath Al-Khalaf, King Saud University, Saudi Arabia.

Reaz Ahmed, University of Waterloo, Canada. 

Pedro Peris-Lopez, Universidad Carlos III de Madrid, Spain. 

Qiang Tang, University of Luxembourg, Luxembourg.  

Shouhuai Xu, University of Texas at San Antonio, USA.

Wissam Mallouli, Montimage, France.

Yajin Zhou, North Carolina State University, USA.

Yao Guo, Peking University, China.

Youssef Iraqi, Khalifa University of Science, Technology, and Research, The United Arab Emirates.

This communication is intended for the above named person and is confidential and / or legally privileged. Any opinion(s) expressed in this communication are not necessarily those of KSU (King Saud University). If it has come to you in error you must take no action based upon it, nor must you print it, copy it, forward it, or show it to anyone. Please delete and destroy the e-mail and any attachments and inform the sender immediately. Thank you.
KSU is not responsible for the political, religious, racial or partisan opinion in any correspondence conducted by its domain users. Therefore, any such opinion expressed, whether explicitly or implicitly, in any said correspondence is not to be interpreted as that of KSU.
KSU may monitor all incoming and outgoing e-mails in line with KSU business practice. Although KSU has taken steps to ensure that e-mails and attachments are free from any virus, we advise that, in keeping with best business practice, the recipient must ensure they are actually virus free.
Om-announce mailing list
Kashif Akhtar Saleem | 1 Jul 16:37 2015

Call for Papers : ReHIS'15. (Extended Deadline)

[ReHIS 2015] CFP: Reliability of eHealth Information Systems 2015

My apologies if you receive multiple copies of this call for papers (CFP)

Paper Submission: July 15, 2015 (firm)

The 2nd International Workshop on Reliability of eHealth Information Systems - IEEE HEALTHCOM 2015 (ReHIS 2015) 14th - 17th October 2015

In conjunction with
17th IEEE International Conference on e-Health Networking, Application & Services (IEEE HEALTHCOM 2015) Boston, USA

-: Accepted and registered papers will be published by IEEE Press and included in several abstracting and indexing databases :-

-: Extended version of Distinguished Papers that are registered and presented, after further revision, will be recommended for possible publication in special issues of several SCI Indexed Journals :-

Please forward this CFP to your friends, department colleagues, advanced graduate students and colleagues at local community/junior colleges.

Purpose and Scope
Reliability of eHealth Information Systems  workshop will introduce the research community to the advanced research in the latest methods for testing, verification and reliability analysis of eHealth systems. 
Topics of interest include, but not limited to:
•  Testing and verification of eHealth •  Verification of eHealth software and equipment •  Simulation based methods in eHealth •  Performance evaluation of eHealth systems •  Formal methods in eHealth •  Open issues and surveys on eHealth reliability •  Healthcare sensors reliability •  Patient data security and reliability •  Fault tolerance in eHealth •  Security access policies and privacy in eHealth •  Vulnerability assessment •  Secured network architectures for eHealth •  eHealth Security Forensics •  Secure transmission, processing, and storage •  Reliability of mobile Health. •  Intrusion and fraud detection in eHealth •  Reliability of  WBSN •  Electronic health record systems reliability •  Reliability of eHealth standards: IEEE, HL7, CHA •  Other related topics

Perspective authors are invited to submit their papers using EDAS System ( A full paper should not have more than six (6) IEEE style pages including results, figures and references. One (1) additional page is allowed with a charge of USD100, if accepted. Papers exceeding 7 pages will not be accepted at EDAS, nor will they be reviewed at all. Papers will be reviewed with the standard reviewing procedure (with at least 3 independent anonymous reviews). Accepted papers will be published on IEEE Explore ( Authors can = use the standard IEEE templates for Microsoft Word or LaTeX formats that can be found at

Important Dates
Paper Submission: July 15th, 2015 (firm)
Acceptance Notification: August 10th, 2015
Final Camera Ready Submission: August 30th 2015
Workshop : 14th - 17th October 2015 

The IEEE reserves the right to exclude a paper from distribution after the conference (including its removal from IEEE Xplore) if the paper is not presented.

Note: To be published in the IEEE [WORKSHOP] Workshop Proceedings and to be eligible for publication in IEEE /Xplore®/, an author of an accepted paper is required to register for the workshop and the paper must be presented by an author of that paper at the workshop unless the TPC Chair grants permission for a substitute presenter arranged in advance of the event and who is qualified both to present and answer questions. Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. For authors with multiple accepted papers in the workshop, one registration is valid for up to 2 papers. Papers will be published in the IEEE HEALTHCOM 2015 Workshop Proceedings and submitted to IEEE /Xplore®/.

It is a fabulous opportunity to explore, share and experience new research ideas.

wikiCFP :

Will be highly obliged, if can Please forward this CFP.

Thank you

ReHIS'15 Workshop Organizers 

This communication is intended for the above named person and is confidential and / or legally privileged. Any opinion(s) expressed in this communication are not necessarily those of KSU (King Saud University). If it has come to you in error you must take no action based upon it, nor must you print it, copy it, forward it, or show it to anyone. Please delete and destroy the e-mail and any attachments and inform the sender immediately. Thank you.
KSU is not responsible for the political, religious, racial or partisan opinion in any correspondence conducted by its domain users. Therefore, any such opinion expressed, whether explicitly or implicitly, in any said correspondence is not to be interpreted as that of KSU.
KSU may monitor all incoming and outgoing e-mails in line with KSU business practice. Although KSU has taken steps to ensure that e-mails and attachments are free from any virus, we advise that, in keeping with best business practice, the recipient must ensure they are actually virus free.
Om-announce mailing list
Giovanni Livraga | 2 Jul 10:17 2015

Deadline extended - IEEE CNS 2015 workshops

** Deadline extended: 
    9 July (IEEE SPC 2015, IEEE SPiCy 2015)
   10 July (2nd Workshop on Physical-layer Methods for Wireless Security) **

Florence, Italy -- September 30, 2015

IEEE CNS 2015 features four exciting workshops, whose paper submission 
deadline has been extended to respond to several requests.

For more information see links below.


The 2nd Workshop on Physical-layer Methods for Wireless Security

WORKSHOP CO-CHAIRS: Rafael F. Schaefer, H. Vincent Poor, Holger Boche
DEADLINE: July 10, 2015 [extended]


IEEE Workshop on Security and Privacy in the Cloud (IEEE SPC 2015)

WORKSHOP CO-CHAIRS: Elli Androulaki, Sara Foresti
DEADLINE: July 9, 2015 [extended]


IEEE Workshop on Security and Privacy in Cybermatics (IEEE SPiCy 2015)

WORKSHOP CO-CHAIRS: Hong Liu, Ruggero Donida Labati
DEADLINE: July 9, 2015 [extended]


Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.
Abdullah Arafat | 1 Jul 06:56 2015

CfP: Extended submission deadline 15 July 2015 - 25th ITNAC 2015 IEEE Sydney Australia 18-20 Nov 2015


ITNAC 2015 is technically Co-Sponsored by IEEE Computer Society

Indexed by Ei COMPENDEX


25th International Telecommunication Networks and Applications Conference 

(ITNAC 2015)

18-20 November 2015, Sydney, Australia

Website :


Paper Submission Now Open:
Full paper submission deadline: Extension to 15 July 2015
* There are 10 student travel assistance grants for $600 each. 
With the increasing focus on modelling and simulation in the fields of cyber-networks, data mining, cyber security, distributed computing, mobile computing, cognitive computing, cloud computing, computing tools, applications, simulation tools, system performance and data and computer communications the demand for high quality research outcomes has never been greater. ITNAC has been the international conference and forum for researchers and engineers to present and discuss topics related to advanced computing and data communication network technologies, services and applications.
Novel contributions are presented in the form of keynote speeches by international experts, peer-reviewed technical full and short papers, and posters. ITNAC 2015 seeks to address and capture highly innovative and state-of-the-art research from academia, industry and standardization bodies.
Workshops on modelling, simulation and Software Defined Networking (SDN) in conjunction with Hewlett Packard Australia will be held at ITNAC 2015.

ITNAC 2015 is an international conference for the presentation of research outcomes covering timely and relevant aspects concerning modelling and simulation related to computing, communications and applications. Contributions are welcome on all advanced research and particularly (but not limited to) on the following topics:

·  Modelling and simulation

·  Cyber-networks, data mining and cyber-security

·  Local and metropolitan networks

·  Data Communications

·  Networks and Management

·  Software Defined Networking

·  Internet Technologies and Applications

·  Distributed, Cognitive and Cloud Computing

·  Mobility and Vehicular

·  Mobile Cellular and Wireless computing

·  Optical, wireless and satellite communications

·  Wireless Sensor Networks

·  Power Efficiency and Sustainability 


Authors are invited to submit original manuscripts, neither submitted nor accepted for publication in any other workshop, conference, or journal. Papers must be formatted according to IEEE guidelines and style files to fit within 6 pages (full paper) or 3 pages (short paper), including references, diagrams, and appendices if any. A submitted paper must be self-contained and in English. The paper should not contain page numbers or any special headers or footers. For further guidelines, authors can refer to IEEE Manuscript Templates for Conference Proceedings in

Authors are invited to send the manuscripts through


Paper deadline 

Extension to 15 July 2015

Acceptance notification

31 July 2015

Final paper deadline

1 September 2015

Early bird deadline

30 September 2015

Registration deadline

1 November 2015


18-20 November 2015


Om-announce mailing list
Xiaoyu Chen | 30 Jun 11:56 2015

CFP : Special Session on Data and Knowledge Exploration of MACIS 2015

[Apologies if you receive multiple copies] 

                   MACIS 2015 
           6th International Conference on 
   Mathematical Aspects of Computer and Information Sciences 
                11-13 November 2015 
             Zuse Institute Berlin, Germany 

CALL FOR PAPERS:Special Session on Data and Knowledge Exploration of MACIS 2015 

About MACIS 
   MACIS is a series of biennial conferences focusing on research in mathematical 
   and computational aspects of computing and information science. It is broadly 
   concerned with algorithmic issues arising from the rich interplay across the 
   Numerical/Algebraic/Geometric/Topological axes. These issues often in scientific 
   and engineering computation where we need experimental studies to validate or 
   complement the theory. MACIS is interested in outstanding and emerging problems 
   in all these areas. 

Aim and Scope of the Special Session 
   The increased interest in discovering and managing the underlying, valid, insightful, 
   and valuable knowledge from diverse, massive, complex, and fast changing data has 
   stimulated the study and applications of many mathematical theories (for instance, 
   topology, computational geometry, differential equations, fluid dynamics, and quantum 
   statistics). Various methods and techniques have been proposed to solve problems in 
   designing, analyzing, and implementing data-intensive and knowledge-based information 
   systems. This special session of MACIS 2015 aims at gathering researchers, engineers, and others 
   interested in exploring mathematical methods for scientifically analyzing data and 
   systematically managing knowledge to discuss theoretical and practical challenges and 
   to present recent research progress and results dedicated (not exhausted) in 

      - mathematical foundation and theories for data-intensive and knowledge-based systems 
      - mathematical methods and techniques for complex knowledge representation, organization, 
        visualization, searching, and management 
      - theories and efficient methods for knowledge reasoning, revision, and validation 
      - statistical, dynamic, logical analysis of data and knowledge models 
      - mathematical modeling of recommendation systems, ranking systems, rating systems, 
        expert systems, etc. 

Important Dates 
   - Easy Chair open for all submissions:            Apr 21, 2015 
     (SHORT papers are decided on a rolling basis) 
   - Deadline for submission of all papers:          August 11, 2015 
   - Notification on REGULAR papers:                 September 30, 2015 
   - Camera Ready papers:                            November 30, 2015 
   - MACIS Conference:                               November 11-13, 2015 

Important Author Information for MACIS 2015 
   MACIS 2015 will be held in the renowned Zuse Institute Berlin (ZIB) 
   centrally located in the capital of Germany.  Named after Konrad Zuse, the 
   inventor of the first programmable computer, ZIB is an interdisciplinary 
   institute for applied mathematics and data-intensive high-performance 
   computing.  Its research areas in modeling, simulation and optimization in 
   partnership with academia and industry is exemplary of the goals of MACIS. 

   MACIS 2015 aims to span two conference cultures, that of computer 
   science and of mathematics:  mathematical conferences allow informal 
   presentations in order to allow rapid dissemination of ideas and feedback 
   from the community.  But their talk abstracts are expected to turn into 
   peer-reviewed journal papers. Computer science conferences expect close-to-final 
   papers to appear in conference proceedings. Often such papers might be 
   the final publication.  Recognizing the value of both modes of scientific 
   communication, MACIS 2015 will accept two categories of papers, SHORT and 
   REGULAR.  To facilitate your travel planning, we will make decisions on 
   SHORT papers on a rolling basis, normally 10-15 days after submission. 
   REGULAR papers will go through a standard refereeing process by the PC. 

   MACIS 2015 aims to be a forum for researchers. Within the MACIS framework, 
   you can easily organize Special Sessions (SS) for current hot topics.  We 
   invite you to send us inquiries or proposals, addressed to yap <at>

   A post-conference proceedings will be published with Springer's in the LNCS 
   series. In addition, following the conference, authors will have 
   the opportunity to submit to planned special issues of the journal 
   "Mathematics in Computer Science" (, published by 
   Birkhauser/Springer ( 

Submission Guideline 
   Original research papers in English, including experimental work and 
   work-in-progress are welcome.  All papers must be categorized as SHORT or 
   REGULAR, and indicate the Special Session (i.e., SS9). Paper titles must be 
   tagged as illustrated here: 
           "SHORT-SS9: ...title..."    -or-    "REGULAR-SS9: ...title..." 
   The 2-part tag must be in the same line as the title. 

   REGULAR papers are up to 15 pages, and SHORT papers are up to 5 pages, 
   inclusive of references.  The Special Session tag is a hint to the PC, 
   but it is non-binding on the author or on the PC.  Submit via EasyChair: 


   There is an option to convert from SHORT papers to REGULAR papers: 
   simply make a new submission for your REGULAR paper before the deadline, 
   keeping the same title but with a new tag.  For travel planning 
   purposes, we recommend submitting a SHORT paper immediately, and converting 
   into a REGULAR paper as desired. 

   At least one author of each accepted submission must register at MACIS 2015. 
   Decision on the SHORT paper will be made on a rolling basis, normally about 
   10-15 days after submission.  The title and abstract of accepted papers 
   will appear on our Website shortly after acceptance, and published in the 
   post-conference proceedings. 

MACIS 2015 Organization 
General Chair
Ilias S. Kotsireas (Wilfrid Laurier U, Canada)

Local Chair
Winfried Neun (Zuse Institute Berlin, Germany)
PC Chairs
Siegfried Rump (Hamburg University of Technology) 
Chee Yap (Courant Institute, NYU)

Program Committee
Johannes Blömer (University of Paderborn)
Jan Camenisch (IBM Zurich)
Xiaoyu Chen (Beihang University, Beijing)
Maxime Crochemore (Kings College London)
Rudolf Fleischer (German University of Technology in Oman)
Mark Giesbrecht (University of Waterloo)
Jonathan Hauenstein (Notre Dame University)
Costas Iliopoulous (Kings College, London)
R. Baker Kearfott (University of Louisiana, Lafayette)
Viktor Levandovskyy (RWTH Aachen University)
Jie Luo (Beihang University, Beijing)
Chenqi Mou (Beihang University)
Jordan Ninin (ENSTA Bretagne)
Takeshi Ogita (Tokyo Woman's Christian University)
Alexey Ovchinnikov (CUNY Graduate Center)
Mohab Safey El-Din (University of Pierre and Marie Curie, Paris)
Michael Sagraloff (Max-Planck Institute, Saarbruecken) 
Stefan Schirra (Otto von Guericke University Magdeburg)
Éric Schost (Western University, London, Ontario)
Vikram Sharma (Institute of Math Sciences, Chennai)
Thomas Sturm (Max-Planck Institute, Saarbruecken)
Michael Wibmer (RWTH Aachen and University of Pennsylvania)
Martin Ziegler (Technical University Darmstadt)

MACIS Steering Committee
Thomas Sturm (Chair)
Ilias Kotsireas
Stefan Ratschan
Dongming Wang
Jinzhao Wu
Zhiming Zheng

MACIS 2015 Invited Speakers
Wolfram Decker (University Kaiserslautern)
Stefan Dziembowski (Warsaw U)
Jean-Charles Faugère (Inria and UMPC Paris)
Claude-Pierre Jeannerod (Inria and ENS Lyon)
Hongbo Li (Chinese Academy of Sciences, Beijing)
Stefan Ratschan (Czech Academy of Sciences, Prague)
Günter Rote (Free University Berlin)
Andrew Sommese (Notre Dame University) 

More Information about MACIS 2015 can be found at: .

Om-announce mailing list
Sara Foresti | 1 Jul 11:52 2015

Deadline extended (July 9, 2015) - IEEE Workshop on Security and Privacy in the Cloud

** Deadline extended: July 9, 2015 - 11.59 pm American Samoa Time **

First IEEE Workshop on Security and Privacy in the Cloud (SPC 2015)
Florence, Italy - September 30, 2015

Cloud computing is today the reference paradigm for large-scale data
storage and processing due to the convenient and efficient network
access to configurable resources that can be easily adjusted according
to the users' needs. Although the benefits of cloud computing are
tremendous, security and privacy concerns have still a detrimental
impact on the adoption and acceptability of cloud services.
In fact, users as well as companies that rely on cloud storage and
computation services lose the direct control over the systems
managing their data and applications, thus putting the confidentiality,
integrity and availability of the data at risk. The goal of this
workshop is to bring together researchers and practitioners who are
interested in discussing the security, privacy, and data protection
issues emerging in cloud scenarios, and possible solutions to them.

SPC 2015 will be held in Florence, Italy, in conjunction with the
IEEE Conference on Communications and Network Security (CNS 2015).

The workshop seeks submissions from academia, industry, and government
presenting novel research, as well as experimental studies, on all
theoretical and practical aspects of security, privacy, and data
protection in cloud scenarios.
Topics of interest include, but are not limited to:
- Anonymity in cloud scenarios
- Applied cryptography in cloud scenarios
- Data and application security
- Data and system integrity
- Data availability in outsourcing scenarios
- Data protection
- Efficient access to outsourced data
- Key management in cloud scenarios
- Privacy
- Privacy of accesses
- Secure computation over encrypted data
- Security and trust metrics
- Security and privacy in crowdsourcing
- Security and privacy in multi-clouds and federated clouds
- Security and privacy in data outsourcing
- Security and privacy in the Internet of Things
- Security and privacy of big data
- Security and privacy of distributed computations
- Security and privacy policies
- Selective information sharing
- Threats, vulnerabilities, and risk management

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 9 pages
in the IEEE 8,5"x11" two-column format
Submissions should not be anonymized. The workshop will also consider
short submissions of up to 4 pages for results that are preliminary or
that simply require few pages to describe.
Papers should be submitted for review through EDAS
( Only PDF files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline
of July 9, 2015 (11:59 p.m. American Samoa time).
Authors of accepted papers must guarantee that their papers will be
presented at the workshop.
Accepted and presented papers will be published in the IEEE 2015
Conference Proceedings and submitted to IEEE Xplore as well as
other Abstracting and Indexing (A&I) databases.

Paper submission due: July 9, 2015 -- 11:59 p.m. American Samoa time
Notification to authors: August 3, 2015
Camera ready due: August 10, 2015

Elli Androulaki, IBM Research - Zurich, Switzerland
Sara Foresti, Università degli Studi di Milano, Italy

Nikola Knežević, IBM Research - Zurich, Switzerland

Massimiliano Albanese, George Mason University, USA
Rajkumar Buyya, University of Melbourne, Australia
Christian Cachin, IBM Research Zurich, Switzerland
Roy Campbell, University of Illinois at Urbana-Champaign, USA
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Theo Dimitrakos, British Telecom, UK
Sotiris Ioannidis, FORTH, Greece
Seny Kamara, Microsoft Research, USA
Ghassan Karame, NEC Labs, Germany
Florian Kerschbaum, SAP, Germany
Samee Khan, North Dakota State University, USA
Javier Lopez, University of Malaga, Spain
Jesus Luna, CSA Europe, UK
Melek Onen, EURECOM, France
Stefano Paraboschi,Università di Bergamo, Italy
Siani Pearson, HP Labs, UK
Kui Ren, University at Buffalo, USA
Pierangela Samarati, Università degli Studi di Milano, Italy
Andreas Schaad, Huawei Research, Germany
Anoop Singhal, NIST, USA
Alessandro Sorniotti, IBM Research - Zurich, Switzerland
Neeraj Suri, TU Darmstadt, Germany
Jaideep Vaidya, Rutgers University, USA
Cong Wang, City University of Hong Kong, Hong Kong
Meng Yu, Virginia Commonwealth University, USA
Moti Yung, Google, USA

If you have any question, please contact the organizers at spc2015 <at>

Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.

Om-announce mailing list
Om-announce <at>
Fulvio Frati | 1 Jul 09:15 2015

[C&TC2015] Paper Submission Deadline in 5 days (July 6th, 2015)

[Apologies if you receive multiple copies of this message]

5th International Symposium on Cloud Computing, Trusted Computing and 
Secure Virtual Infrastructures -- Cloud and Trusted Computing (C&TC 2015)
October 26-28, 2015 -- Rhodes, Greece 


Current and future software needs to remain focused towards the development
and deployment of large and complex intelligent and networked information
systems, required for internet-based and intranet-based systems in
organizations. Today software covers a very wide range of application
domains as well as technology and research issues. This has found
realization through Cloud Computing. Vital element in such networked
information systems are the notions of trust, security, privacy and risk

Cloud and Trusted Computing (C&TC 2015) is the 5th International Symposium
on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures,
organized as a component conference of the OnTheMove Federated Conferences &
Workshops. C&TC 2015 will be held in Rhodes, Greece. 

The conference solicits submissions from both academia and industry
presenting novel research in the context of Cloud Computing, presenting
theoretical and practical approaches to cloud trust, security, privacy and
risk management. The conference will provide a special focus on the
intersection between cloud and trust bringing together experts from the two
communities to discuss on the vital issues of trust, security, privacy and
risk management in Cloud Computing. Potential contributions could cover new
approaches, methodologies, protocols, tools, or verification and validation
techniques. We also welcome review papers that analyze critically the
current status of trust, security, privacy and risk management in the cloud.
Papers from practitioners who encounter trust, security, privacy and risk
management problems and seek understanding are also welcome.

Topics of interests of C&TC 2015 include, but are not limited to:

- Assurance Techniques
- Access Control, Authorization, and Authentication
- Cloud Computing with Autonomic and Trusted Environment
- Cryptographic Algorithms and Protocols
- Cyber Attack, Crime and Cyber War
- DRM, Watermarking Technology, IP Protection
- Emergency and Security Systems
- End-to-end security over complex cloud supply chain
- Forensics
- Human Interaction with Trusted and Autonomic Computing Systems
- Identity and Trust Management
- Multimedia Security Issues over Mobile and Wireless Clouds
- Network Security
- Networks of Trust, Clouds of Trust
- Privacy, Anonymity
- Privilege Management Infrastructure
- Reliable Computing and Trusted Computing
- Risk evaluation and Management
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- Security Models and Quantifications
- Self-protection and Intrusion-detection in Security
- Trust Evaluation and Prediction in Service-Oriented Environments
- Trust, Security, Privacy and Confidentiality
- Trusted Computing in virtualized environments
- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
- Virus Detections and Anti-virus Techniques/Software

- Algorithms and Computations on Encrypted Data
- Big Data, Frameworks and Systems for Parallel and Distributed Computing
- Database as a Service, Multi-tenancy, Data management and analytics as a
- Data Science and Scalable Machine Learning
- Elasticity and Scalability for Cloud Data Management Systems
- High Availability and Reliability
- Interoperability between Clouds
- New Protocols, Interfaces and Data Models for Cloud Databases
- Resource and Workload Management in Cloud Databases
- Service Level Agreements and Contracts
- Transactional Models for Cloud Databases, Consistency and Replication
- Virtualization and Cloud databases, Storage Structures and Indexing

- Autonomic Computing Theory, Models, Architectures and Communications
- Cloud Resource provisioning with QoS Guarantees
- Cloud Operation and Resource Management
- Cloud Performance Modeling and Benchmarks
- Datacenter Architecture and Management
- Formal methods and Tools for Cloud computing
- Infrastructures for Social Computing and Networking
- Software Architectures and Design for Trusted Emerging Systems
- Virtualized Computing Infrastructures

- Cloud Business Applications and Case Studies
- Clouds and Social Media, Network and Link Analysis
- Large Scale Cloud Applications, Reality Mining
- Mobile Cloud Services
- New Parallel / Concurrent Programming Models for Cloud Computing
- Pervasive / Ubiquitous Computing in the Cloud
- Reliability, Fault Tolerance, Quality-of-Service
- Service Level Agreements and Performance Measurement
- Service-Oriented Architectures, RESTful Services in Cloud Environments

Important Dates

- Abstract Submission Deadline: June 30, 2015
- Paper Submission Deadline: July 6, 2015
- Acceptance Notification: August 15, 2015
- Camera Ready Due: September 1, 2015
- Author Registration Due: September 1, 2015

Paper Submission

Full paper submissions to Cloud and Trusted Computing 2015 (C&TC 2015) must
present original, highly innovative, prospective and forward-looking
research in one or more of the themes given above. Full papers must break
new ground, present new insight, deliver a significant research contribution
and provide validated support for its results and conclusions. Successful
submissions typically represent a major advance for the field of cloud
computing, referencing and relating the contribution to existing research
work, giving a comprehensive, detailed and understandable explanation of a
system, study, theory or methodology, and support the findings with a
compelling evaluation and/or validation. Each paper must be submitted as a
single PDF file in Springer Lecture Notes in Computer Science format (not
longer than 18 pages in length). Accepted regular papers will be included in
the printed conference main proceedings and presented in the paper sessions.
Submissions to C&TC 2015 must not be under review by any other conference or
publication at any time during the C&TC review cycle, and must not be
previously published or accepted for publication elsewhere.

Notes (not longer than 6 pages in length) must report new results and
provide support for the results, as a novel and valuable contribution to the
field – just like full papers. Notes are intended for succinct work that is
nonetheless in a mature state ready for inclusion in archival proceedings.
Notes will be held to the same standard of scientific quality as full
papers, albeit for a shorter presentation, and must still state how they fit
with respect to related work, and provide a compelling explanation and
validation. Notes must be submitted as single PDF file in Springer Lecture
Notes in Computer Science format. Accepted notes will be published in the
conference main proceedings and will be presented in the paper sessions of
the conference.

A selection of the best papers from Cloud and Trusted Computing 2015 will be
published in a special issue of The International Journal of Computer
Systems Science and Engineering.

Submissions are to be made to the submission web site available at

The paper and notes submission site giving all the relevant submission
details is located at:
Failure to comply with the formatting instructions for submitted papers or
notes will lead to the outright rejection of the paper without review.
Failure to commit to presentation at the conference automatically excludes a
paper from the proceedings.

Program Chairs

- Claudio Agostino Ardagna, Universita' degli studi di Milano, Italy
- Meiko Jensen, Independent Centre for Privacy Protection
Schleswig-Holstein, Germany

Advisory Committee 

- Ernesto Damiani, Universita' degli studi di Milano, Italy
- Salim Hariri, The University of Arizona, USA
- Robert Meersman, Vrije Universiteit Brussel, Belgium
- Siani Pearson, HP Labs, UK

Program Committee 

- Marco Anisetti, Universita' degli Studi di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- N. Balakrishnan, Indian Institute of Science, India
- Endre Bangerter, Bern University of Applied Sciences, Switzerland	
- Michele Bezzi, SAP, France
- Bud Brugger, Fraunhofer IAO, Germany
- Marco Casassa Mont, HP Labs, UK
- David Chadwick, University of Kent, UK
- Henry Chan, The Hong Kong Polytechnic University
- Alfredo Cuzzocrea, University of Calabria, Italy
- Ernesto Damiani, Università degli Studi di Milano, Italy
- Stefan Dessloch, University of Kaiserslautern, Germany
- Francesco Di Cerbo, SAP Labs, France
- Scharam Dustdar, Technical University of Vienna, Austria
- Stefanos Gritzalis, University of the Aegean, Greece
- Nils Gruschka, FH Kiel, Germany
- Marit Hansen, Unabhangiges Landeszentrum fur Datenschutz
Schleswig-Holstein, Kiel, Germany
- Ching Hsien Hsu, Chung Hua University, Taiwan
- Patrick Hung, University of Ontario, Canada
- Martin Jaatun, SINTEF ICT, Norway
- Florian Kerschbaum, SAP, Germany
- Ryan Ko, University of Waikato, New Zealand
- Zhiqiang Lin, UT Dallas, USA
- Luigi Lo Iacono, Cologne University of Applied Sciences, Germany
- Gregorio Martinez, University of Murcia, Spain
- Hadi Otrok, Khalifa University, Abu Dhabi, UAE
- Smriti R. Ramakrishnan, Oracle Corporation, USA
- Damien Sauveron, Universite' de Limoges, France
- Jorg Schwenk, Ruhr-Universität Bochum, Germany
- Russell Sears, Pure Storage, USA
- Bhavani Thuraisingham, UT Dallas, USA
- Luca Vigano', King's College London, UK

Publicity Chair 

- Fulvio Frati, Universita' degli Studi di Milano, Italy

More information available at 

Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.