res.mb.conference | 1 Jul 11:15 2016

Security Rockstars – Start-up Competition - apply now until July 15, 2016

CALL FOR APPLICATIONS
Security Rockstars - Start-up Competition in Information Security
www.securityrockstars.com

*********
APPLY NOW until July 15, 2016
*********

Apply now for “Security Rockstars”  -  the European Information Security Start-up Competition organized by SBA Research and supported by partners from the public and private sector.
The competition's goal is to find and support innovative ideas and solutions in the area of Information Security.

Submission deadline for proposals is 15 July 2016. The final pitch takes place in the context of the CCS Conference on 24 October 2016 in Vienna (https://www.sigsac.org/ccs/CCS2016/).

********
PRICES:
********

First place: 20.000 EUR
Second place: 10.000 EUR
Thirs place: 5.000 EUR

TOP 25
A detailed business plan will be drawn up under the guidance of experts and with the help of the "Innovation Box" by WhatAVenture. 25+ experts - university professors, serial entrepreneurs, CISOs of Fortune 500 companies and venture capitalists - will screen these concepts and give feedback. Additionally, the best 25 will receive an invitation to attend the final event of the competition taking place during ACM CCS 2016, one of the most acknowledged international academic conferences for information security.

TOP 10
The Top 10 participants will be invited to join a 5-day start-up boot camp in Vienna as well as receive the opportunity to present their idea at a vendor booth at the Security Rockstars finals.

TOP 5
The Top 5 participants will present in front of an expert jury as well as 250+ senior security professionals from Top 500 companies and leading universities during the Security Rockstars finals on the 24th of October in the Hofburg in Vienna.

********
IMPORTANT DATES:
********

15  July  2016 - Submission deadline for the abstract
1 August 2016 - Nomination Top 25          
1 September 2016 - Submission deadline for the business plan
24 September 2016 - Nomination Top 5
20 October 2016 - Sponsor workshops and “Meet the Founders” evening event
21 October 2016 - Sponsor workshops and pitch training
22 October 2016 - Presentation training
23 October 2016 - Final workshop and day of preparation with the experts from WhatAVenture
24 October 2016 - ACM CCS 2016 in Vienna with the final pitches as well as award ceremony
 
********
SUBMISSION
********

Stage 1 – Abstract
 
To make entering the competition easy for early-stage start-ups as well, only a short abstract or pitch deck is necessary during the first stage, summarizing the problem and its technical solution (max. one page) as well as presenting the team and the business model (max. one page).

For more information please visit: www.securityrockstars.com


Follow Security Rockstars on Facebook and Twitter:
www.facebook.com/SecRockStars
https://twitter.com/SecRockStars

 

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Filippo Gaudenzi | 1 Jul 10:52 2016
Picon

Call for Papers: IWSAC 2016

[Apologies if you receive multiple copies of this message]
 
***************
CALL FOR PAPERS
***************

FOURTH INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSAC 2016)
Held in conjunction with the 12nd International Conference on Signal Image Technology & Internet Based Systems (SITIS 2016)
One day between November 28 - December 1, 2016, Naples, Italy

IWSAC 2016 BACKGROUND AND GOALS
Cloud computing paradigm provides a new environment fostering the integration of services located within company boundaries with those in the Cloud. An increasing number of organizations implement their business processes and applications via runtime composition of services made available in the Cloud by external suppliers. This scenario is changing the traditional view of security introducing new service security risks and threats, and requires re-thinking of current assurance, development, testing, and verification methodologies. In particular, security assurance in the cloud is becoming a pressing need to increase the confidence of the cloud actors that the cloud and its services are behaving as expected, and requires novel approaches addressing cloud peculiarities. In addition, the increasing usage of cloud resources as a means to perform big data analytics introduces the need of adapting existing assurance solutions towards big data. On one side, security assurance techniques can benefit from the availability of big data (big data for security assurance), while on the other side they can be applied to verify properties of big data analytics (security assurance for big data). IWSAC 2016 is the fourth edition of the International Workshop on Security Assurance in the Cloud. It aims to address the security assurance issues related to Cloud and Big Data environments, along with evaluating their impact on traditional security solutions for software and network systems.

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and assurance of Cloud and Big Data services, as well as experimental studies in Cloud and Big Data infrastructures, the implementation of services, and lessons learned. Topics of interest include, but are not limited to:  

* Accountability in the cloud
* Authentication and access control in the cloud
* Big Data for security assurance
* Big Data analytics monitoring and testing
* Big Data analytics verification
* Big Data security and privacy
* Challenges in moving critical systems to the cloud
* Cloud audit, certification, and compliance
* Cloud transparency, introspection, and outrospection
* Data security and privacy in the Cloud
* Evidence-based assurance of cloud services
* Information assurance and trust management 
* Intrusion detection in the cloud
* Policy compliance
* Security assurance in the cloud 
* Security assurance for big data
* Security and assurance protocols in the cloud
* Security and privacy in the cloud
* Service level agreements
* Service procurement in the cloud
* Verification of cloud services

IMPORTANT DATES
Submission deadline: September 11, 2016 (11:59 PM American Samoa time)
Acceptance/Reject notification: October 9, 2016
Camera-ready: October 16, 2016
Author Registration: October 23, 2016

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format available at

Submissions are to be made to the submission web site https://www.easychair.org/conferences/?conf=sitis2016 by selecting track "Workshop on Security Assurance in the Cloud". Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of expression by at least three reviewers. The organizers will examine the reviews and make final paper selections.

Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper must register for the workshop. A single registration for the workshop or the conference allows attending both events.

All the papers accepted for the workshop will be included in the conference proceedings. The proceedings will be published by IEEE Computer Society. Content will be submitted to the indexing companies for possible indexing. The proceedings will be available at the conference. 

IWSAC 2016 COMMITTEES AND CHAIRS

Program Chairs
* Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
* Ernesto Damiani, ETISALAT BT Innovation Center, Khalifa University, UAE
* George Spanoudakis, City University of London, UK

Publicity Chair
* Filippo Gaudenzi, Universita' degli Studi di Milano, Italy

Program Committee 
TO BE COMPLETED
* Marco Anisetti, Universit‡ degli Studi di Milano, Italy
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Michele Bezzi, SAP, France
* Nora Cuppens-Boulahia, Telecom Bretagne, France
* Theo Dimitrakos, British Telecommunications, UK
* Eduardo Fernandez, Florida Atlantic University, USA
* William Michael Fitzgerald, Tyco GBS, Ireland
* Nils Gruschka, NEC Laboratories Europe, Germany
* Mathias Kohler, SAP, Germany
* Patrick Hung, University of Ontario Institute of Technology, Canada
* Meiko Jensen, Southern Denmark University, Denmark
* Nicolas Larrieu, ENAC, France
* Jesus Luna, Cloud Security Alliance, UK
* Antonio Mana, Universidad de Malaga, Spain
* Siani Pearson, HP Labs, UK

This call for papers and additional information about the conference can be found at http://sesar.di.unimi.it/IWSAC2016

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Qin Liu | 1 Jul 05:50 2016

PST2016 CALL FOR PAPERS

PST2016 CALL FOR PAPERS

 

14th Annual Conference on Privacy, Security and Trust

December 12-14, 2016, Unitec Institute of Technology, Auckland, New Zealand

 

PAPER SUBMISSION INFORMATION

 

The conference seeks submissions from academia, government, and industry presenting novel research results in all practical and theoretical aspects of privacy, security and trust with an emphasis on cybersecurity. All topic areas related to privacy, security and trust are of interest and in scope. Theoretical papers must make a convincing argument for the relevance of the results to secure systems. 

 

Accepted papers will be published by IEEE in the conference proceedings.

 

Click here for a list PST 2016 topics.

 

PAPER SUBMISSION PROCESS

 

Submissions must be made by the deadline of August 1, 2016 (23.59 EDT). The review process will be carried out in two phases and authors will have an opportunity to comment on the first-phase reviews.

 

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Note that submitted papers cannot be withdrawn from the process after the first phase reviews are received by authors. Authors of accepted papers must guarantee that their papers will be presented at the conference.

 

The paper submission system is available here  

 

INSTRUCTIONS TO AUTHORS

 

Accepted papers will be accepted as 'regular' papers up to 8 pages, or 'short' papers of up to 4 pages. The standard IEEE two-column conference format should be used for all submissions. IEEE Manuscript Templates for Conference Proceedings can be downloaded here.http://www.ieee.org/conferences_events/conferences/publishing/templates.html

 

At least one author of an accepted paper must register by 1 October, 2016. A regular registration is required.

   

IMPORTANT DATES

 

Submission Deadline: 1 August 2016 (23.59 EDT)

Notification of Acceptance:   15 September 2016                                  

Final Manuscript Due & Authors' Registration: 1 October 2016

Early registration: 15 October 2016

PST 2016: 12-14 December 2016

 

For more information please see the following;

 

Email: pst2016 <at> unitec.ac.nz

Website:   pst2016.unitec.ac.nz

Instagram:      #pstconference

--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157


 

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
DPM 2016 | 30 Jun 19:03 2016
Picon

Deadline in a few days - 11th International Workshop on Data Privacy Management (DPM 2016)

CALL FOR PAPERS

*** Submission deadline in a few days! (July 02, 2016 - 11:59PM American Samoa time ***

******************************************************************************
11th International Workshop on Data Privacy Management (DPM 2016)
co-located with ESORICS 2016
Heraklion, Crete, Greece - September 26-27, 2016
http://dpm2016.di.unimi.it
******************************************************************************

DPM is an annual international workshop covering research in data privacy management. 
DPM 2016, the 11th International Workshop on Data Privacy Management, will be 
held in Heraklion, Crete, Greece, in conjunction with the 21st European Symposium 
on Research in Computer Security (ESORICS 2016). 

SCOPE
Organizations are increasingly concerned about the privacy of information that 
they manage (as witnessed, for example, by lawsuits filed against organizations 
for violating the privacy of customer's data). Thus, the first management of 
privacy-sensitive information is very critical and important for every organization. 
This poses several challenging problems, such as how to translate the high-level 
business goals into system-level privacy policies, administration of 
privacy-sensitive data, privacy preserving data integration and engineering, 
privacy preserving access control mechanisms, information-oriented security, 
and query execution on privacy-sensitive data for partial answers.

TOPICS
The aim of this workshop is to discuss and exchange the ideas
related to data privacy management. We invite papers from researchers
and practitioners working in privacy, security, trustworthy data
systems and related areas to submit their original papers in this
workshop. Submissions by PhD students as well as controversial ideas 
are encouraged. Case studies (successful or not) are also encouraged.
Topics of interest include, but are not limited to:

*  Privacy Information Management
*  Privacy Policy-Based Infrastructures and Architectures
*  Privacy-Oriented Access Control Languages and Models
*  Privacy in Trust Management
*  Privacy in Digital Currencies
*  Privacy Risk Assessment and Assurance
*  Privacy Services
*  Cryptography and Cryptanalysis
*  Privacy Policy Analysis
*  Query Execution over Privacy-Sensitive Data
*  Privacy Preserving Data Mining
*  Privacy for IntegrityBased Computing
*  Privacy Monitoring and Auditing
*  Privacy in Social Networks
*  Privacy in Ambient Intelligence (AmI) Applications
*  Individual Privacy vs. Corporate/National Security
*  Privacy in Computer Networks
*  Privacy and RFIDs
*  Privacy and Big Data
*  Privacy in Sensor Networks
*  Privacy and Security Management in Cloud Computing
*  Privacy and Security Management in the IoT
*  Privacy and Security Management in Pervasive Computing

SUBMISSION GUIDELINES
Submitted papers must not substantially overlap papers that have 
been published or that are simultaneously submitted to a journal 
or a conference with proceedings.
Papers can be submitted as Full Papers or Short Papers. 
Full papers should be at most 16 pages in the LNCS format 
(as done in previous DPM), including the bibliography and 
well-marked appendices. 
Short papers should be at most 8 pages in the LNCS format 
(as done in previous DPM), including the bibliography and 
well-marked appendices. 
Program Committee members are not required to read the 
appendices, so papers should be intelligible without them. 
Authors must submit their papers by the deadline indicated below,
using the EasyChair web site (at easychair.org/conferences/?conf=dpm2016).
Authors must indicate whether they are submitting a full or short paper
by selecting the appropriate choice in the EasyChair submission form. 
All submissions must be written in English, and only PDF files will 
be accepted (a Latex source file will be required for the final 
version of the accepted papers).
All papers will be refereed. Accepted papers must be presented at
the Workshop. At least one author of each accepted paper must register
to the workshop, by the early date indicated by the organizers, and
present the paper.
Accepted papers will be published in the workshop proceedings by Springer in 
the Lecture Notes in Computer Science (LNCS) series. The LNCS template 
can be found at http://www.springer.com/computer/lncs/lncs+authors .
Proceedings will be made available in time for the workshop.

IMPORTANT DATES
Paper Submission: July 02, 2016 (11:59PM American Samoa time) [extended]
Notification to authors: July 29, 2016
Camera ready: August 07, 2016

PROGRAM CO-CHAIRS:
Giovanni Livraga (Universita' degli Studi di Milano, Italy)
Vicenc Torra (University of Skovde, Sweden)

PROGRAM COMMITTEE:
Ken Barker, University of Calgary, Canada
Michele Bezzi, SAP, France
Jordi Casas-Roma, Universitat Oberta de Catalunya, Spain
Jordi Castella-Roca, Universitat Rovira i Virgili, Spain
Jorge Cuellar, Siemens AG, Germany
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens, Telecom Bretagne, France
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Vladimir Estivill-Castro, Griffith University, Australia
Carmen Fernandez-Gago, University of Malaga, Spain
Simone Fischer-Hubner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, Plymouth University, United Kingdom
Sebastien Gambs, University of Rennes, France
Joaquin Garcia-Alfaro, Telecom SudParis, France
Stefanos Gritzalis, University of the Aegean, Greece
Javier Herranz, Universitat Politecnica de Catalunya, Spain
Jordi Herrera-Joancomarti, Universitat Autonoma de Barcelona, Spain
Marc Juarez, Katholieke Universiteit Leuven, Belgium
Sokratis Katsikas, Giovik University College, Norway
Florian Kerschbaum, SAP, Germany
Hiroaki Kikuchi, Tokai University, Japan
Jiguo Li, Hohai University, China
Traian Marius-Truta, Northern Kentucky University, United States
Fabio Martinelli, IIT-CNR, Italy
Chris Mitchell, Royal Holloway, United Kingdom
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
Anna Monreale, University of Pisa, Italy
Melek Onen, EURECOM, France
Gerardo Pelosi, Politecnico di Milano, Italy
Cristina Perez-Sola, Universitat Autonoma de Barcelona, Spain
Silvio Ranise, FBK Security and Trust Unit, Italy
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Andreas Schaad, Huawei, Germany
Matthias Templ, Vienna University of Technology, Austria
Yasuyuki Tsukada, NTT Communication Science Laboratories, Japan
Edgar Weippl, SBA Research / TU Wien, Austria
Lena Wiese, University of Gottingen, Germany

This call for papers and additional information about the workshop 
can be found at http://dpm2016.di.unimi.it
Alam | 25 Jun 18:34 2016
Picon

[Spam:*****] DependSys 2016 CFPs deadline soon: Symposium on Dependability in Sensor, Cloud, and Big Data Systems [with attractive SCI/SCIE/EI Journals’ Special Issues]

********************************************************************************************************************
We apologize in advance if you receive multiple copies of this DependSys2016 CFP with 9+ Keynotes & 12+ Special Issues.
We appreciate your help if you forward this CFP to your email lists.
********************************************************************************************************************

                            DependSys 2016| Call for Papers
                =====================================================
 The Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys2016)
                       Zhangjiajie, China, November 16-18, 2016 [Springer, EI-Indexed]  
                            http://trust.csu.edu.cn/conference/DependSys2016/ 
                               https://sites.google.com/site/dependsys/ 

         In conjunction with SpaCSS 2016 [http://trust.csu.edu.cn/conference/SpaCCS2016/]

                               Hosted by:
                        Temple University, USA 
                      Guangzhou University, China

                         Technical Co-Sponsorship:
                 Springer Lecture Notes in Computer Science

                           Venue & Dates:
                  Zhangjiajie, China, November 16-18, 2016

--------------------------------------------------------------------
The conference proceedings (including main conference papers and workshop papers) will be published by Springer Lecture Notes in Computer Science (LNCS) series (EI indexed). Distinguished papers, after further revisions, will be published in several SCI & EI indexed special issues (to be announced soon).
--------------------------------------------------------------------

HIGHLIGHT 1: Special Issues
==========================
Authors of selected, high-quality papers of the symposium would be invited to submit their improved versions to one of high-impact SCI, SCI-E, &EI indexed Journals' Special Issues (confirmed): 

(1) IEEE Access (SCI&EI Indexed: Coming soon)
http://www.ieee.org/publications_standards/publications/ieee_access/

(2) IEEE Transactions on Big Data (SCI&EI Indexed: Coming soon)
http://www.computer.org/portal/web/tbd

(3) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact Factor: 2.786)
http://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/acoustic-sensor-networks-in-iot-applications

(4) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact Factor: 2.786)
http://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/special-issue-on-social-networking-big-data-opportunities-so/

(5) Journal of Network and Computer Applications - Elsevier (SCI&EI Indexed, Impact Factor: 2.229)
http://www.journals.elsevier.com/journal-of-network-and-computer-applications

(6) Journal of Computational Science - Elsevier (SCI&EI Indexed, Impact Factor: 1.231)
http://www.journals.elsevier.com/journal-of-computational-science/

(7) Wireless Personal Communications - Springer (SCI&EI Indexed, Impact Factor: 0.653)
http://link.springer.com/journal/11277

(8) IEICE Transactions on Information and Systems (SCI&EI Indexed)
http://www.ieice.org/eng/index.html

(9) International Journal of Computational Science and Engineering (IJCSE) - INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJCSE

(10) International Journal of Embedded Systems (IJES) - INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJES

(11) International Journal of High Performance Computing and Networking (IJHPCN) - INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=ijhpcn

(12) Future Internet (EI Indexed)
http://www.mdpi.com/journal/futureinternet


HIGHLIGHT 2: Keynotes
====================
Keynote Speaker 1: Prof. Jie Wu, IEEE Fellow, Temple University, USA
Title: Algorithmic Crowdsourcing: Current State and Future Perspective 

Keynote Speaker 2: Prof. Schahram Dustdar, IEEE Fellow, TU Wien, Austria
Title: Services Computing - A Research Agenda for the Next 10 Years

Keynote Speaker 3: Prof. Hai Jin, Huazhong University of Science and Technology, China
Title: To be decided

Keynote Speaker 4: Prof. David Basin, ETH Zurich, Switzerland 
Title:   To be decided 

Keynote Speaker 5: Prof. David Naccache, ENS Paris, France
Title:  Thrifty Zero-Knowledge: When Linear Programming Meets Cryptography 




INTRODUCTION
=============
The DependSys 2016 is the second event, which is a timely event bringing together new ideas, techniques, and solutions for dependability and its issues in sensor, cloud, and big data systems and applications. The first event (DependSys 2015) was held at the same place, which was of a great success. As we are deep into the Information Age, we witness the explosive growth of data available on the Internet. Human beings are producing quintillion bytes of data every day, which come from sensors, individual archives, social networks, Internet of Things, enterprise and Internet in all scales and formats. One of the most challenging issues we face in achieving designed system performance to an expected level, i.e., how to effectively provide dependability in sensor, cloud, and big data systems. These systems need to typically run continuously, which often tend to become inert, brittle, and vulnerable after a while.  We can observe that this trend is further stimulated by an ever-increasing cost pressure.  

The focus of DependSys 2016 is to provide a forum for individuals, academics, practitioners, and organizations, who are developing or procuring sophisticated computer systems on whose dependability of services they need to place great confidence. Future systems need to close the dependability gap in face of challenges in different circumstances. The emphasis will be on differing properties of such services, e.g., continuity, effective performance, real-time responsiveness, ability to overcome data fault/corruption/anomaly, ability to avoid catastrophic failures, prevention of deliberate privacy intrusions, reliability/availability/sustainability/adaptability/heterogeneity/security/safety, and so on. 

SCOPE AND INTERESTS
===================
DependSys2016 will focus on emerging ideas and trends, algorithms and applications, systems design techniques, platforms and tools, as well as measurement assessment tools in all aspects of Dependability, which include but are not limited to the following list:

(1) Fundamentals and Technologies 
 + Concepts, theory, principles, standardization and modelling, and methodologies for dependability
 + Security and privacy
 + Anomaly detection and protection
 + Dependability of sensor, wireless, and Ad-hoc networks dependability in mobile computing
 + Dependability of software defined networks (SDN)
 + Dependability issues in clouds (e.g., cloud storage, computing)
 + Software and hardware dependability
 + Reliability and fault-tolerant computing
 + Dependability by virtualization
 + Dependability in distributed scheduling and resource management
 + Dependability issues in parallel and distributed databases 
 + Dependability issues in autonomic computing
 + Dependable Biocomputing, Quantum computing, etc.
 + Dependable big data foundation and management
 + Big data privacy and security
 + Dependable IoT supporting technologies
 + Social networks and crowdsensing

(2) Systems
 + Dependable sensor systems
 + Dependability and availability issues in distributed systems
 + Cyber-physical systems (e.g. networked embedded systems, autonomous vehicle, aerospace, healthcare, smart grid systems, and so on)
 + Dependability issues in socio-technical systems
 + Dependability issues in database and transaction processing systems 
 + Safety and security in distributed computing systems
 + Self-healing, self-protecting, and fault-tolerant systems
 + IoT smart sensors and systems
 + RFID Systems
 + Reliability issues in long-distance telemetry of distributed sensor systems
 + Dependability in automotive systems
 + Dependable computing clouds for cyber-physical systems
 + Dependable integration between sensor systems and the cloud
 + Dependability in big data systems
 + Safety-critical systems and software
 + Software system security

(3) Applications
 + Sensor and robot applications, sensor network applications
 + Big data applications
 + Cloud computing applications
 + Datacenter monitoring
 + Safety care, medical care and services, IoT-based  healthcare 
 + Aerospace, industrial, and transportation applications
 + IoT Energy, smart grid, and utility applications
 + Scientific applications
 + e-commerce and e-government
 + Activity monitoring
 + Mobile sensing applications, detection and tracking

(4) Measures and Assessments
 + Dependability metrics and measures for safety, trust, faith, amenity, easiness, comfort, and worry
 + Dependability levels and relations, assessment criteria and authority
 + Dependability assessment standards
 + Dependability measurement, modeling, evaluation, and tools 
 + Dependability evaluation of parallel, distributed systems
 + Software and hardware reliability, testing, verification and validation
 + Evaluation of fault-tolerant systems
 + Evaluations and tools of anomaly detection and protection in sensor, cloud, big data systems
 + Experimental performance of parallel & distributed systems
 + Practical experiences and prototypes

SUBMISSION AND PUBLICATION INFORMATION
======================================
All papers in PDF format need to be submitted electronically through the symposium website (https://easychair.org/conferences/?conf=dependsys2016). Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 12 pages (or 18 pages with the over length charge), including tables, figures, references and appendixes, in Springer LNCS Format with PDF. The majority of papers that finally appear in the symposium will likely be the result of the symposium solicitation. Papers will be evaluated based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers from respective research areas.
All accepted papers will be published by Springer LNCS (EI-Indexed). 


IMPORTANT DATES
===============
(1) Paper Submission Deadline:  July 15, 2016
(2) Author Notification: September 01, 2016
(3) Camera-Ready Paper:  September 15, 2016
(4) Conference Dates:    November 16-18, 2016

Organizing Committee
=====================
Jie Wu, Temple University, USA (Chair)
Guojun Wang, Guangzhou University, China (Chair)
A. B. M Shawkat Ali, The University of Fiji, Fiji
Al-Sakib Khan Pathan, UAP and SEU, Bangladesh/lslamic University in Madinah, KSA
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Kamruzzaman Joarder, Federation University and Monash University, Australia
Kenli Li, Hunan University, China
Laurence T. Yang, St. Francis Xavier University, Canada 
Mohammed Atiquzzaman, University of Oklahoma, USA
Shui Yu, Deakin University, Australia
Sy-Yen Kuo, National Taiwan University, Taiwan
Yang Xiang, Deakin University, Australia

General Chairs
==============
WenZhan Song, Georgia State University, USA
Kim-Kwang Raymond Choo, University of South Australia, Australia
Md Zakirul Alam Bhuiyan, Temple University, USA

Program Chairs
===============
Aniello Castiglione, University of Salerno, Italy
Guerroumi Mohamed, University of Sciences and Technology Houari Boumediene, Algeria
M. Thampi Sabu, Indian Institute of Information Technology and Management, India

Publicity Chairs
=================
Mubashir Husain Rehmani, COMSATS Institue of Information Technology, Pakistan
Mahmuda Naznin, Bangladesh University of Engineering and Technology, Bangladesh
Risat Mahmud Pathan, Chalmers University of Technology, Sweden
Rossi Kamal, Kyung Hee University, South Korea
Shahriar Hossain, Kennesaw State University, USA
Sajal Bhatia, Fordham University, USA
Tian Wang, Huaqiao University, China
William Liu, Auckland University of Technology, New Zealand
Yuan-Fang Chen, University of Paris VI, France

Program Committee Members
=================================================
(Please refer to the DependSys 2016 website: 
http://trust.csu.edu.cn/conference/DependSys2016/
https://sites.google.com/site/dependsys/)

Webmaster
=========
Xian Tang, Central South University, China
 
Contact
=======
Please email inquiries concerning DependSys 2016 to: 
Dr. Md Zakirul Alam Bhuiyan: zakirulalam AT gmail DOT com and the conference organizers (dependsys AT yahoo DOT com).
Homepage: https://sites.google.com/site/zakirulalam/ 
Please, accept our apologies in case of multiple copies of this CFP

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
liyuanfang | 28 Jun 05:06 2016
Picon

Deadline extended: 21st International Conference on Engineering of Complex Computer Systems (ICECCS 2016), Dubai, United Arab Emirates, November 6-8 2016

ICECCS is an A-ranked conference by the Computing Research and Education Association of Australasia
(CORE) 2014 ranking (http://portal.core.edu.au/conf-ranks/?search=ICECCS&by=all&source=CORE2014&sort=atitle&page=1
). Please kindly consider submitting papers to the conference, and please encourage your colleagues and
students to submit too.

---------------------------------------------------------------
21st International Conference on Engineering of Complex Computer Systems (ICECCS 2016)
|| November 6-8, Dubai, United Arab Emirates 
|| http://www.aston.ac.uk/eas/about-eas/academic-groups/computer-science/iceccs-2016/

Overview
---------------------
Over the past several years, we have seen a rapid rising emphasis on design, implement and manage complex
computer systems to help us deal with an increasingly volatile, globalised complex world. These systems
are critical for dealing with the Grand Challenge problems we are facing in the 21st century, including
health care, urbanization, education, energy, finance, and job creation. The complex computer systems
are frequently distributed over heterogeneous networks and processing large amount data.
Performance, real-time behavior, fault tolerance, security, adaptability, development time and
cost, long life concerns are the key issues. 

The goal of this conference is to bring together industrial, academic, and government experts, from a
variety of user domains and software disciplines, to determine how the disciplines' problems and
solution techniques interact within the whole system. Researchers, practitioners, tool developers
and users, and technology transition experts are all welcome. The scope of interest includes long-term
research issues, near-term complex system requirements and promising tools, existing complex
systems, and commercially available tools.

Scope and Topics
---------------------
We invite contributions in what concerns the following areas (please keep in mind that this is not an
exhaustive list): 

*	Requirement specification and analysis
*	Verification and validation
*	Security and privacy of complex systems
*	Model-driven development
*	Reverse engineering and refactoring
*	Architecture software
*	Big Data Management
*	Ambient intelligence, pervasive computing
*	Ubiquitous computing, context awareness, sensor networks
*	Design by contract
*	Agile methods
*	Safety-critical & fault-tolerant architectures
*	Adaptive, self-managing and multi-agent systems
*	Real-time, hybrid and embedded systems
*	Systems of systems
*	Cyber-physical systems and Internet of Things (IoT)
*	Tools and tool integration
*	Past reflections and future outlooks
*	Industrial case studies

Different kinds of contributions are sought, including novel research, lessons learned, experience
reports, and discussions of practical problems faced by industry and user domains. The ultimate goal is
to build a rich and comprehensive conference program that can fit the interests and needs of different
classes of attendees: professionals, researchers, managers, and students. A program goal is to
organize several sessions that include both academic and industrial papers on a given topic and
culminate panels to discuss relationships between industrial and academic research. 

Full Papers 
---------------------
Full papers are divided into two categories: Technical Papers and Experience Reports. The papers
submitted to both categories will be reviewed by program committee members, and papers accepted in
either category will be published in the conference proceedings. Technical papers should describe
original research, and experience reports should present practical projects carried out in industry,
and reflect on the lessons learnt from them.

Short Papers
---------------------
Short paper submissions describe early-stage, ongoing or PhD research. All short papers will be reviewed
by program committee members, and accepted short papers will be published in the conference proceedings.

Paper Submissions 
---------------------
Submitted manuscripts should be in English and formatted in the style of the double-column IEEE ormat.
Full papers should not exceed 10 pages, and short papers should not exceed 4 pages, including figures,
references, and appendices. All submissions should be in PDF format. Submissions not adhering to the
specified format and length may be rejected immediately, without review.

Please prepare your manuscripts in accordance to the IEEE guidelines:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html. 

We invite all prospective authors to submit their manuscripts via the ICECCS'16 portal, hosted on
Easychair: 
https://www.easychair.org/conferences/?conf=iceccs16 

Conference proceeding
---------------------
The conference proceedings will be published by IEEE Conference Publishing Services (EI indexed). 

Important Dates
---------------------
Updated abstract submission: 11th July 2016
Updated paper submission: 16th July 2016
Notification of acceptance: 8th Aug 2016
Camera ready copy due: 29th Aug 2016

Organizers
---------------------
General Chair
Prof. Ian Nabney, Aston University, UK
Dr. Jun Sun, Singapore University of Technology and Design, SG

Program Chair
Dr. Mounir Mokhtari, Institut MINES TELECOM, FR
Dr. Hai Wang, Aston University, UK

For enquiries, please contact H.WANG10@... or mounir.mokhtari@...

 
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Qin Liu | 28 Jun 08:33 2016

TrustData 2016: Deadline Extended to July 15, 2016

Apologies if you received multiple copies of this TrustData 2016 CFP.
---------------------------------------------------------------------------------------------------------------------
Call for Papers for the 7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)
 
Venue & Dates: 
Zhangjiajie, China, November 16-18, 2016

Conference Website:
http://trust.csu.edu.cn/conference/TrustData2016
 
Introduction
The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting researchers and practitioners with more and more attention.
 
Scope and Interests
TrustData2016 is a part of SpaCCS 2016,  9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Topics of interest include, but are not limited to:
 
Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data
 
Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data
(12) Secure quantum communications
 
Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards
 
Submission and Publication Information
The accepted papers from this workshop will be published by Springer Lecture Notes in Computer Science (EI indexed). Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages (or 14 pages with the over length charge), including tables, figures, references and appendixes, in Springer LNCS Format with Portable Document Format (.pdf). Please submit your paper at https://www.easychair.org/conferences/?conf=trustdata2016.
 
All presented papers in the conference will be published in the proceedings of the conference and submitted to the IEEE Xplore Digital Library. Authors (at least one) of any accepted paper are requested to register at the conference.
 
Important Dates
Paper Submission Deadline:   July 15, 2016
Author Notification:         August 15, 2016
Camera-Ready Paper Due:      September 15, 2016
Conference Dates             November 16-18, 2016
 
Steering Chairs
Guojun Wang, Central South University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
 
General Chairs
Qin Liu, Hunan University, China
Konstantinos Lambrinoudakis, University of Piraeus, Greek
 
Program Chairs
Jiankun Hu, University of New South Wales at the Australian, Australia
Isaac Agudo, University of Malaga, Spain
 
 
Publicity Chairs
Shui Yu, Deakin University, Australia
Weirong Liu, Central South University, China
 
Webmaster
Yinong Long, Central South University, China
 
 
Contact
Please email inquiries concerning TrustData 2016 to:
Qin Liu: gracelq AT 126 DOT com and the symposium organizers: trustdata2016 AT gmail DOT com
LQ's new homepage:
Homepage:http://trust.csu.edu.cn/faculty/~liuqin/ 




--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157


 

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Qin Liu | 24 Jun 03:08 2016

CNS 2016: CALL FOR POSTERS

CALL FOR POSTERS
Third IEEE Conference on Communications and Network Security (CNS 2016) Philadelphia, USA, 
October 17-19, 2016
http://www.ieee-cns.org

IMPORTANT DATES
2‐page Abstract Due by: July 15, 2016 11:59pm 
Notification of Acceptance: August 1, 2016
Final Abstract Due: August 12, 2016
 
SCOPE
The IEEE Conference on Communications and Network Security (CNS) provides an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security.
 
Building on the success of the past three years' conferences, IEEE CNS 2016 welcomes poster submissions to be presented during the conference. A poster submission should be a 2-page abstract, which summarizes the key merits of proposed ideas, presents initial results, and identifies challenges to develop a complete solution. Abstracts will be evaluated by the Posters Session Committee based on the novelty and the potential to stimulate discussions and promote collaborations. Poster abstracts should be submitted via EDAS at http://edas.info/N22693. Please follow the same template for regular conference papers available on http://www.ieee-cns.org. Sample topics of interest include but are not limited to:

Anonymization and privacy in communication systems
Biometric authentication and identity management
Computer and network forensics
Data and application security
Data protection and integrity
Availability of communications, survivability of networks in the presence of attacks
Key management and PKI for networks
Information-theoretic security
Intrusion detection and prevention
Location privacy
Mobile security
Outsourcing of network and data communication services
Physical layer security methods, cross-layer methods for enhancing security
Secure routing, network management
Security for critical infrastructures
Security metrics and performance evaluation
Security and privacy for big data
Security and privacy in body area networks
Security and privacy in content delivery network
Security and privacy in cloud computing and federated cloud
Security and privacy in crowdsourcing
Security and privacy in the Internet of Things
Security and privacy in multi-hop wireless networks: ad hoc, mesh, sensor, vehicular and RFID networks
Security and privacy in peer-to-peer networks and overlay networks
Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max
Security and privacy in smart grid, cognitive radio networks, and disruption/delay tolerant networks
Security and privacy in social networks
Security and privacy in pervasive and ubiquitous computing
Social, economic, and policy issues of trust, security, and privacy
Traffic analysis
Usable security for networked computer systems
Vulnerability, exploitation tools, malware, botnet, DDoS attacks
Web, e-commerce, m-commerce, and e-mail security
 
The conference will arrange the poster session in a room where the posters can be displayed. An accepted poster must be presented by an author in the poster session to interested attendees. The abstract of the accepted posters will appear in the conference proceedings and be submitted to IEEE Xplore. Each accepted poster requires an author to register for the conference at the appropriate rate based on the membership level. Each author registration can cover up to three posters or papers of the conference, but each poster must have a dedicated presenter at the session.
 
A Best Poster Award will be given based on the poster's novelty and potentials in research. The quality of presentation and the interaction during the session will also be important criteria. The award will be announced in a plenary session of the main conference.

--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157


 

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Albert Heinle | 29 Jun 15:41 2016
Picon
Picon

[ISSAC-ANNOUNCE] WWCA2016: Call for participation

Call for participation: online participation indication open.

==================================================
  Waterloo Workshop on Computer Algebra (WWCA 2016)
  Celebrating the research of Sergei Abramov
  July 23-24, 2016
  Wilfrid Laurier University, Waterloo, Canada
  http://bohr.wlu.ca/ezima/WWCA2016/
==================================================

The WWCA 2016 is a satellite workshop of ISSAC'2016 and is intended to provide a forum for researchers and
practitioners in the area of computer algebra. This workshop is devoted to the 70th birthday of Sergei
Abramov (CCAS, Moscow, Russia) whose influential contributions to symbolic methods are highly
acknowledged and adopted by many Computer Algebra systems.

The purpose of this workshop is to present some recent developments in the area of symbolic summation and
symbolic integration, ordinary differential equations, difference equations, partial differential
equations and their applications in combinatorics, number theory, particle physics, etc. It is also to
highlight the current state of the art in both - complexity analysis of summation and integration
algorithms, and improvements in the complexity of aforementioned algorithms.

Registration:
-------------------------
The registration is free. However, the organizers would appreciate if you could indicate your interest in
participation at http://bohr.wlu.ca/ezima/WWCA2016/

Organizing Committee:
-------------------------
Carsten Schneider (Research Institute for Symbolic Computation, Johannes Kepler University)
Eugene Zima (Physics and Computer Science Department, Wilfrid Laurier University)

*****
You may leave the ISSAC-ANNOUNCE list at any time by sending a "SIGNOFF ISSAC-ANNOUNCE" command to
LISTSERV@... or by visiting http://listserv.acm.org/archives/ISSAC-ANNOUNCE.html.
IEEE SPC 2016 | 27 Jun 23:31 2016
Picon

Call for Papers - 2nd IEEE Workshop on Security and Privacy in the Cloud (IEEE SPC 2016)

CALL FOR PAPERS

********************************************************************************
2nd IEEE Workshop on Security and Privacy in the Cloud (IEEE SPC 2016)
October 19, 2016, Philadelphia, PA, USA
http://cns2016.ieee-cns.org/workshop/2nd-workshop-security-and-privacy-cloud-spc
********************************************************************************

Cloud computing is today the reference paradigm for large-scale data
storage and processing due to the convenient and efficient network
access to configurable resources that can be easily adjusted according
to the users' needs. Although the benefits of cloud computing are
tremendous, security and privacy concerns have still a detrimental
impact on the adoption and acceptability of cloud services. In fact,
users as well as companies that rely on cloud storage and computation
services lose the direct control over the systems managing their data
and applications, thus putting the confidentiality, integrity and
availability of the data at risk. The goal of this workshop is to
bring together researchers and practitioners who are interested in
discussing the security, privacy, and data protection issues emerging
in cloud scenarios, and possible solutions to them.

The workshop seeks submissions from academia, industry, and government
presenting novel research, as well as experimental studies, on all
theoretical and practical aspects of security, privacy, and data
protection in cloud scenarios.

Topics of interest include, but are not limited to:

* Anonymity in cloud scenarios
* Applied cryptography in cloud scenarios
* Cloud-based biometric systems
* Data and application security
* Data and system integrity
* Data availability in outsourcing scenarios
* Data protection
* Efficient access to outsourced data
* Key management in cloud scenarios
* Privacy
* Privacy of accesses
* Secure computation over encrypted data
* Security and trust metrics
* Security and privacy in crowdsourcing
* Security and privacy in multi-clouds and federated clouds
* Security and privacy in data outsourcing
* Security and privacy in the Internet of Things
* Security and privacy of big data
* Security and privacy of distributed computations
* Security and privacy of fog computing
* Security and privacy policies
* Selective information sharing
* Threats, vulnerabilities, and risk management

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 9 pages in
the IEEE 8,5”x11” two-column format
https://www.ieee.org/conferences_events/conferences/publishing/templates.html

Submissions must not be anonymized. The workshop will also consider
short submissions of up to 4 pages for results that are preliminary or
that simply require few pages.

Papers should be submitted for review through EDAS. Only PDF files
will be accepted. Submissions not meeting these guidelines risk
rejection without consideration of their merits. Papers must be
received by the deadline of July 3, 2016 (11:59 p.m. American Samoa
time). Authors of accepted papers must guarantee that their papers
will be presented at the workshop.

The electronic submission site is available at: https://edas.info/N22626

Accepted and presented papers will be included in the IEEE CNS 2016
conference proceedings and also in IEEE Xplore.

IMPORTANT DATES
Paper submission due: July 3, 2016 (11:59 p.m. American Samoa time)
Notification to authors: August 3, 2016
Camera ready due: August 10, 2016 (hard deadline)

GENERAL CHAIR
Pierangela Samarati, Università degli Studi di Milano, Italy

PROGRAM COMMITTEE CHAIR
Stefano Paraboschi, Università degli Studi di Bergamo, Italy

PROGRAM COMMITTEE
Massimiliano Albanese, George Mason University, USA
Roy Campbell, University of Illinois at Urbana-Champaign, USA
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Theo Dimitrakos, British Telecom, UK
Sara Foresti, Università degli Studi di Milano, Italy
Ghassan Karame, NEC Labs, Germany
Florian Kerschbaum, SAP, Germany
Melek Önen, EURECOM, France
Siani Pearson, HP Labs, UK
Pierangela Samarati, Università degli Studi di Milano, Italy
Andreas Schaad, Huawei Research, Germany
Neeraj Suri, TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, Hong Kong
Meng Yu, University of Texas at San Antonio, USA

PUBLICITY CHAIR
Enrico Bacis, Università degli Studi di Bergamo, Italy

If you have any question, please contact the organizers at spc2016 <at> unibg.it
_______________________________________________
Om-announce mailing list
Om-announce <at> openmath.org
http://openmath.org/mailman/listinfo/om-announce
Fulvio Frati | 29 Jun 16:34 2016
Picon

[CFP] 6th Int. Symposium on Data-driven Process Discovery and Analysis (SIMPDA2016)

*** SIMPDA 2016 ***

[Apologies if you receive multiple copies of this CFP]
****************************************************************************
*****************
SIXTH INTERNATIONAL SYMPOSIUM ON DATA-DRIVEN PROCESS DISCOVERY AND ANALYSIS
(SIMPDA2016)
14-16 DECEMBER, 2016 - GRAZ, AUSTRIA

http://simpda2016.di.unimi.it
****************************************************************************
*****************

## About SIMPDA
With the increasing automation of business processes, growing amounts of
process data become available. This opens new research opportunities for
business process data analysis, mining and modeling. The aim of the IFIP 2.6
International Symposium on Data-Driven Process Discovery and Analysis is to
offer a forum where researchers from different communities and the industry
can share their insight in this hot new field.
The Symposium will feature a number of keynotes illustrating advanced
approaches, shorter presentations on recent research, a competitive PhD
seminar and selected research and industrial demonstrations. This year the
symposium will be held in Graz.

## Call for Papers
The IFIP International Symposium on Data-Driven Process Discovery and
Analysis (SIMPDA 2016) offers a unique opportunity to present new approaches
and research results to researchers and practitioners working in business
process data modelling, representation and privacy-aware analysis.
The symposium will bring together leading researchers, engineers and
scientists from around the world. Full papers must not exceed 15 pages.
Short papers are limited to at most 4 pages. All papers must be original
contributions, not previously published or under review for publication
elsewhere. All contributions must be written in English and must follow the
LNCS Springer Verlag format. Templates can be downloaded from:
http://www.springer.de/comp/lncs/authors.html
Accepted papers will be published in a pre-proceeding volume of CEUR
workshop series. The authors of the accepted papers will be invited to
submit extended articles to a post-symposium proceedings volume which will
be published in the LNBIP series (Lecture Notes in Business Information
Processing, http://www.springer.com/series/7911), scheduled for late 2017
(extended papers length will be between 7000 and 9000 words). Around 10-15
papers will be selected for publication after a second round of review.

### Topics
Topics of interest for submission include, but are not limited to:

* Business Process Modeling languages, notations and methods
* Lightweight Process Model
* Data-aware and data-centric approaches
* Process Mining with Big Data
* Variability and configuration of process models
* Process simulation and static analyses
* Process data query languages
* Process data mining
* Privacy-aware process data mining
* Process metadata and semantic reasoning
* Process patterns and standards
* Foundations of business process models
* Resource management in business process execution
* Process tracing and monitoring
* Process change management and evolution
* Business process lifecycle
* Case studies and experience reports
* Social process discovery
* Crowdsourced process definition and discovery

### Workshop Format:
In accordance to our historical tradition of proposing SIMPDA as a
symposium, we propose an innovative format for this workshop:
The number of sessions depend on the number of submissions but, considering
the previous editions, we envisage to have four sessions, with 4-5 related
papers assigned to each session. A special session (with a specific review
process) will be dedicated to discuss research plan from PhD students.
Papers are pre-circulated to the authors that will be expected to read all
papers in advance but to avoid exceptional overhead, two are assigned to be
prepared with particular care,  making ready comments and suggestions. 
The bulk of the time during each session will be dedicated to open
conversations about all of the papers in a given session, along with any
linkages to the papers and discussions within an earlier session. 
The closing session (30 minutes), will include a panel about open challenges
during which every participant will be asked to assemble their
thoughts/project ideas/goals/etc… that they got out of the workshop.

### Call for PhD Research Plans
The SIMPDA PhD Seminar is a workshop for Ph.D. students from all over the
world. The goal of the Seminar is to help students with their thesis and
research plans by providing feedback and general advice on how to use their
research results.
Students interested in participating in the Seminar should submit an
extended abstract describing their research. Submissions can relate to any
aspect of Process Data: technical advances, usage and impact studies, policy
analyses, social and institutional implications, theoretical contributions,
interaction and design advances, innovative applications, and social
implications.

Research plans should be at most of 5 page long and should be organised
following the following structure: 

* Abstract: summarises, in 5 line, the research aims and significance.
* Research Question: defines what will be accomplished by eliciting the
relevant the research questions.
* Background: defines the background knowledge providing the 5 most relevant
references (papers or books).
* Significance: explains the relevance of the general topic and of the
specific contribution.
* Research design and methods: describes and motivates the method adopted
focusing on: assumptions, solutions, data sources, validation of results,
limitations of the approach.
* Research stage: describes what the student has done so far.

### SIMPDA PhD award
A doctoral award will be given by the SIMPDA PhD Jury to the best research
plan submitted.
Student Scholarships
An application for a limited number of scholarships aimed at students coming
from emerging countries has been submitted to IFIP.
In order to apply, please contact paolo.ceravolo@...

### CALL for Demonstrations and Posters
Demonstrations showcase innovative technology and applications, allowing for
sharing research work directly with colleagues in a high-visibility setting.
Demonstration proposals should consist of a title, an extended abstract, and
contact information for the authors, and should not exceed 10 pages.
Posters allow the presentation of late-breaking results in an informal,
interactive manner. Poster proposals should consist of a title, an extended
abstract, contact information for the authors, and should not exceed 2
pages.
Accepted demonstrations and posters will be presented at the symposium.
Abstracts will appear in the proceedings.

### Important Dates

- Submission of Full Papers: 			October 4th 2016
- Submission of PhD Research Plans: 	October 4th 2016
- Notification of Acceptance: 			November 7th 2016
- Submission of Camera Ready Papers: 	November 21th 2016
- Post-proceeding submissions:			March 30th 2017

## Keynote Speakers

### DATA-DRIVEN PROCESS DISCOVERY: WHAT HAS THE WEB TO OFFER?

*MARKUS LANTHALER*
*SOFTWARE ENGINEER AT GOOGLE*
*CREATOR OF JSON-LD AND HYDRA*

Even though the vision of paperless offices is still largely an utopia, a
large number of processes have already been digitalised in recent years.
While this shift was traditionally driven by the usage of, e.g., enterprise
resource planning (ERP) or customer relationship management (CRM) systems,
it increasingly moves into more lightweight and less formal contexts.
Increasing smartphone adoption, fast and affordable internet access across
the globe and investments in the Internet of Things, to only name a few
development we currently see, will only accelerate this development.
Thus, challenges like the effective discovery of ad-hoc processes, their
subsequent execution, and the analysis of the resulting artefacts across
systems will need to be addressed. This keynote gives a different
perspective on the aforementioned issues by drawing parallels to promising
approaches that try to tackle similar problems at web-scale.

## Organizers
### CHAIRS 

- Paolo Ceravolo, Università degli Studi di Milano, Italy
- Christian Guetl, Graz University of Technology, Austria
- Stefanie Rinderle-Ma, University of Vienna, Austria

### ADVISORY BOARD 
- Ernesto Damiani, Università degli Studi di Milano, Italy
- Erich Neuhold, University of Vienna, Austria
- Maurice van Keulen, University of Twente, The Netherlands
- Philippe Cudré-Mauroux , University of Fribourg, Switzerland
- Robert Meersman, Graz University of Technology, Austria
- Wilfried Grossmann, University of Vienna, Austria

### Program Committee
- AKHIL KUMAR PENN STATE UNIVERSITY, USA
- ANDREA BURATTIN UNIVERSITY OF INNSBRUCK, AUSTRIA
- BABIGA BIRREGAH UNIVERSITY OF TECHNOLOGY OF TROYES, FRANCE
- BENOIT DEPAIRE UNIVERSITY OF HASSELT, BELGIUM
- CHINTAN MRIT UNIVERSITY OF TWENTE, THE NETHERLANDS
- CHRISTOPHE DEBRUYNE TRINITY COLLEGE DUBLIN, IRELAND
- DETLEF NAUCK BRITISH TELECOM RESEARCH, UK
- EBRAHIM BAGHERI RYERSON UNIVERSITY, CANADA
- EDGAR WEIPPL TU VIENNA, AUSTRIA
- HARIS MOURATIDIS UNIVERSITY OF BRIGHTON
- HELEN BALINSKY HEWLETT-PACKARD LABORATORIES, UK
- JAN MENDLING VIENNA UNIVERSITY OF ECONOMICS AND BUSINESS, AUSTRIA
- JANEZ HRASTNIK AMIS TELECOMMUNICATIONS, SLOVENIA
- JOSEP CARMONA UPC - BARCELONA, SPAIN
- MARCELLO LEIDA TAIGER, SPAIN
- MASSIMILIANO DE LEONI EINDHOVEN TU, NETHERLANDS
- MATTHIAS WEIDLICH IMPERIAL COLLEGE, UK
- MAURICE VAN KEULEN UNIVERSITY OF TWENTE, THE NETHERLANDS
- MEIKO JENSEN RUHR-UNI_VER_SI_TY BO_CHUM, GERMANY
- MOHAMED MOSBAH UNIVERSITY OF BORDEAUX
- PNINA SOFFER UNIVERSITY OF HAIFA, ISRAEL
- ROBERT SINGER FH JOANNEUM, AUSTRIA
- ROLAND RIEKE FRAUNHOFER SIT, GERMANY
- THOMAS VOGELGESANG UNIVERSITY OF OLDENBURG, GERMANY
- WIL VAN DER AALST TECHNISCHE UNIVERSITEIT EINDHOVEN, THE NETHERLANDS
- MARK STREMBECK WU VIENNA, AUSTRIA
- MARIA LEITNER AUSTRIAN INSTITUTE OF TECHNOLOGY, AUSTRIA
- THERESIA GSCHWANDTNER VIENNA UNIVERSITY OF TECHNOLOGY, AUSTRIA

## Historical Information on Previous Editions

SIMPDA was proposed in 2011, 2012, 2013, 2014, 2015 by IFIP WG 2.6 and
2.12/12.4 as the International Symposium on Data-Driven Process Discovery
and Analysis. 
The symposium had around 30 attendees in 2011 and 20 in 2012. It featured a
number of keynotes illustrating new approaches, shorter presentations on
recent research, and a competitive PhD seminar, together with selected
research and industrial demonstrations. The authors of the accepted papers
have been invited to submit extended articles to a post-symposium
proceedings volume published in the Springer LNBIP series.
Several events and activities arose off these symposia, among the most
notables we have two Dagstuhl seminars: 

* Dagstuhl Seminar on Semantic Challenges in Sensor Networks, January 24-29,
2010.
* Dagstuhl Seminar on Unleashing Operational Process Mining, November 24-29,
2010. 

Gmane