[Om-announce] The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)

Yu Wang ica3pp2011 at gmail.com
Sat May 25 14:33:05 CEST 2013

Apologies if you received multiple copies of this CSS-13 CFPs with 4
workshops and 8 journal special issues.

The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)

Highlight 1:

The 4 symposiums/workshops (SQC-13/SRTC-13/TrustData-13/HNCC-13) will be
held in conjunction with CSS-13.

Highlight 2:

Distinguished papers, after further revisions, will be published in the
following SCI & EI indexed special issues:

(1) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 2.833)

(2) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact
Factor: 1.978)

(3) IEEE Systems Journal (SCI&EI Indexed, Impact Factor: 0.923)

(4) Computers & Security - Elsevier (SCI&EI Indexed, Impact Factor: 0.868)

(5) International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) -
INDERSCIENCE (SCI&EI Indexed, Impact Factor: 0.848)

(6) Security and Communication Networks - Wiley (SCI&EI Indexed, Impact
Factor: 0.414)

(7) *International Journal of Computational Science and Engineering (IJCSE)

(8) *International Journal of Autonomous and Adaptive Communications
Systems (IJAACS) - INDERSCIENCE (EI Indexed)

*Selected papers from this conference will be published directly in those
journal special issues (they will NOT appear in the conference proceedings).

Central South University, China
National University of Defense Technology, China
Hunan University, China
Jishou University, China

Technical Co-Sponsorship:
National Natural Science Foundation of China
Deakin University, Australia
Springer Lecture Notes in Computer Science
School of Information Science and Engineering, Central South University,
School of Software, Central South University, China

Venue & Dates:
Zhangjiajie, China, November 13-15, 2013


A large fraction of the population in the world now spends a great deal of
time in cyberspace. Cyberspace has become a critical infrastructure that is
embedded in almost all other critical infrastructures and enables every
movement of human society. It is thus very much in the public interest to
have a safe and secure cyberspace.

In the past several years, there has been a large number of attacks in
cyberspace, such as attacks on the Internet, attacks on embedded/real-time
computing and control systems, and attacks on dedicated computing
facilities. Many research efforts have been made to achieve cyberspace
safety and security, such as blocking and limiting the impact of
compromise, enabling accountability, promoting deployment of defense
systems, and deterring potential attackers and penalizing attackers.

In this context, we will focus our program on cyberspace safety and
security, such as authentication, access control, availability, integrity,
privacy, confidentiality, dependability and sustainability issues of
cyberspace. The aim of this symposium is to provide a leading edge forum to
foster interaction between researchers and developers with the cyberspace
safety and security communities, and to give attendees an opportunity to
network with experts in this area. The symposium will be a highly focused,
professional, high quality, and social event.

In the past, CSS has been held in Melbourne, Australia (2012), Milan, Italy
(2011), Chengdu, China (2009), and Sydney, Australia (2008).

Scope and Interests

The CSS-13 conference will provide a forum for engineers and scientists in
academia, industry, and government to address all challenges including
technical, safety, social, and legal issues related to Cyberspace Safety
and Security and to present and discuss their ideas, results,
work-in-progress and experience on all aspects of Cyberspace Safety and
Security. Topics of particular interest include, but are not limited to:

(1) Data and Applications Security
1. Digital Rights Management
2. Secure Information Integration and Transaction Processing
3. Secure Semantic Web and Web Services
4. Security in E-Commerce and M-Commerce
5. Secure Operating Systems
6. Watermarking
7. Privacy and Data Protection
8. Emerging Technologies and Applications
9. Database Security
10. Data Mining Security

(2) Network and Communications Security
1. Attack Containment
2. Active Defense Techniques and Systems
3. Attack Recovery
4. Intelligent Defense Systems
5. Internet and Network Forensics
6. Spam Detection and Prevention
7. Security for Ad-Hoc and Sensor Networks
8. Secure Network Architectures
9. Distributed Intrusion Detection / Prevention Systems
10. Denial-of-Service Attacks and Countermeasures

(3) Software and Systems Security
1. Software and Systems Assurance
2. Secure Design and Testing
3. Viruses, Worms, and Other Malicious Code
4. Security Theory and Tools
5. Security in Pervasive and Embedded Systems
6. Access Control
7. Security for Large-scale Systems and Critical Infrastructures
8. Security Auditing
9. Intrusion Detection System
10. Risk Assessment and Risk Management

(4) Cloud Security
1. Practical Cryptographic Protocols for Cloud Security
2. Multi-tenancy and Related Security Issues
3. Secure Cloud Resource Virtualization Mechanisms
4. Secure Data Management and Computation Outsourcing
5. Trust and Policy Management in Clouds
6. Sandboxing and VM-based Enforcements
7. Managing Security Benefits and Risks of Cloud Computing
8. New Cloud-aware Web Service Security Paradigms and Mechanisms
9. Network Security Mechanisms for Cloud Contexts
10. New Architectures and Design Methods for Developing Cloud Services

(5) Cyberspace Safety
1. Identity Management and Authentication
2. Security and Usability
3. Security and Privacy in Social Networks
4. Privacy Models
5. Privacy Enhancing Technologies
6. Human Factors in Computer Security
7. Modeling and Analyzing Online User Behavior
8. Risk Assessment in Cyber Security
9. Benchmark, Analysis and Evaluation of Cyber Security
10. Implementation, Deployment and Management of Cyber Security

Submission and Publication Information

The accepted papers from this conference will be published by Springer
Lecture Notes in Computer Science (EI Compendex indexed). Submitted papers
must not substantially overlap with papers that have been published or that
are simultaneously submitted to a journal or a conference with proceedings.
Papers must be clearly presented in English, must not exceed 15 pages  (or
20 pages with the over length charge), including tables, figures,
references and appendixes, in Springer LNCS Format with Portable Document
Format (.pdf). Please submit your paper at

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Distinguished papers,
after further revisions, will be considered for possible publication in
several SCI & EI indexed special issues of prestigious international
journals. The program committee will select and award two "Best Paper
Awards" for this conference. By submitting a paper to the conference,
authors assure that if the paper is accepted, at least one author will
attend the conference and present the paper. For no-show authors, their
papers will be removed from the digital library after the conference and
their affiliations will be notified.

Important Dates

(1) Paper Submission Due:       June 15, 2013
(2) Notification of Decision:   August 15, 2013
(3) Camera-ready Papers Due:    September 15, 2013

Steering Co-Chairs

Yang Xiang, Deakin University, Australia
Wanlei Zhou, Deakin University, Australia

General Co-Chairs

Guojun Wang, Central South University, China
Vijay Varadharajan, Macquarie University, Australia
Gregorio Martinez, University of Murcia, Spain

Program Co-Chairs

Indrakshi Ray, Colorado State University, USA
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Muttukrishnan Rajarajan, City University London, UK

Program Vice Co-Chairs

(1) Data and Applications Security Track
Di Ma, University of Michigan-Dearborn, USA
Raman Adaikkalavan, Indiana University South Bend, USA

(2) Network and Communications Security Track
Robin Doss, Deakin University, Australia
Yulei Wu, Chinese Academy of Sciences, China

(3) Software and Systems Security Track
Rose Gamble, University of Tulsa, USA
Jianxun Liu, Hunan University of Science and Technology, China

(4) Cloud Security Track
Hua Wang, University of Southern Queensland, Australia
Dhiren Patel, NIT Surat, India

(5) Cyberspace Safety Track
Steven Furnell, Plymouth University, UK
Avinash Srinivasan, George Mason University, USA

Workshop Co-Chairs

Jemal H.Abawajy, Deakin University, Australia
Jin-Hee Cho, U.S. Army Research Laboratory, USA
Yanjiang Yang, Institute for Infocomm Research, Singapore
Yeong-Deok Kim, Woosong University, Korea

Symposiums/Workshops in conjunction with CSS 2013

(1) The 3rd International Symposium on Security and Quantum Communications
(SQC 2013)

(2) The 2013 International Workshop on Security and Reliability in
Transparent Computing (SRTC 2013)

(3) The 2013 International Workshop on Trust, Security and Privacy for Big
Data (TrustData 2013)

(4) Special Sessions on Cyberspace Safety and Security of the 2013 HCF
Hunan Computer Conference (HNCC 2013)

Organizing Co-Chairs

Zhigang Chen, Central South University, China
Zhiying Wang, National University of Defense Technology, China
Chengzhong Xu, Hunan University, China
Bin Hu, Jishou University, China

Publicity Co-Chairs

Peter Mueller, IBM Zurich Research, Switzerland
Yulei Wu, Chinese Academy of Sciences, China
Scott Fowler, Linkoping University, Sweden

Publication Co-Chairs

Wang Yang, Central South University, China
Zhe Tang, Central South University, China

Finance Co-Chairs

Guihua Duan, Central South University, China
Jin Zheng, Central South University, China

Local Arrangement Chair

Guomin Cai, Jishou University, China


Fang Qi, Central South University, China
Tao Peng, Central South University, China


Biao Deng, Central South University, China


Please email inquiries concerning CSS 2013 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the conference organizers (css2013zhangjiajie AT gmail DOT com).

Copyright @ Trusted Computing Institute, CSU
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openmath.org/pipermail/om-announce/attachments/20130525/7ac3ac4e/attachment.html>

More information about the Om-announce mailing list