Please accept our apologies if you receive multiple copies of UbiSec 2024 Call for Papers with Deadline (July 15, 2024).
============================== UbiSec 2024 ==============================
Call for Papers (CFPs) of The 4th International Conference on Ubiquitous Security (UbiSec 2024)
Changsha, China, December 29 - 31, 2024
Organizers:
Central South University, China
Guangzhou University, China
http://ubisecurity.org/2024/
======================================================================
Keynote Speeches Section
You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Keynote 1: Prof. Robert H. Deng, Singapore Management University, Singapore
http://www.mysmu.edu/faculty/robertdeng/
(2) Keynote 2: Prof. Zonghua Gu, Ume University, Sweden
https://www.umu.se/en/staff/zonghua-gu/
(3) Keynote 3: Prof. Md Zakirul Alam Bhuiyan, Fordham University, USA
https://dependsys.com/dr-alam/
======================================================================
Invited Talks Section
TBD.
======================================================================
Panel Discussions Section
TBD.
======================================================================
Special Issues Section
TBD.
======================================================================
Welcome to participate in UbiSec 2024, Changsha, China, December 29 - 31, 2024! Changsha is a famous historical and cultural city with a variety of interest. This city has been an important grain production base in China since ancient times. The green and verdant Mt. Yuelu stands in the city and Xiangjiang River is clear as a mirror passing through the city. Orange Isle lies in the heart of the river. In particular, Changsha is very close to Chairman Mao's former residence within one-hour driving. Nowadays, being an intellectual center, Changsha has over 100 research institutions and engineering laboratories. Hybrid rice breeding and the Tianhe supercomputer are the main scientific research achievements.
The 4th International Conference on Ubiquitous Security (UbiSec 2024) stems from three conference/symposium/workshop series:
(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, "Spa" for short), which covers "Big Security" leveraging computation, communication and storage ("CCS" for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.
(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on "Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced "UbiSafe"). UbiSec extends this vision to "Ubiquitous Security", using "Big Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)" (pronounced "UbiSec").
(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace Security", with "Cyberspace" as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus "YOU (will) BE SECure"!
The UbiSec 2024 Conference ("The Conference" for short) is the fourth event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.
UbiSec 2024 follows the UbiSec 2023 conference in Exeter, UbiSec 2022 conference in Zhangjiajie and the UbiSec 2021 in Guangzhou, and also the traditions of previous successful SpaCCS/UbiSafe/IWCSS conference/symposium/workshop series, held in Nanjing, China (SpaCCS 2020/UbiSafe 2020), Guangzhou,China (IWCSS 2020); Altanta, USA (SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The conference aims at bringing together researchers and practitioners in the world working in the research fields of security, privacy, and anonymity aspects of computer systems and networks. The conference will focus on broad areas of architectures, algorithms, techniques, and applications for cyberspace security, cyberspace privacy, and cyberspace anonymity.
UbiSec 2024 topics include, but are not limited to the following:
Track 1: Cyberspace Security
--Security Model and Architecture
--Software and System Security
--Trustworthy Computing
--Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
--Machine Learning and AI Security
--Network Security
--Attacks and Defenses
--Intrusion Detection and Prevention
--Security in Web Services
--Security in Mobile Social Networks
--Security in Internet of Things
--Fraud and Cyber Crime
--Accounting and Auditing
--Applied Cryptography
--Database Security
--Authentication
--Forensics and Diagnostics for Security
--Information Hiding
--Security in Big Data and its Applications
--Blockchain and Distributed System Security
--Security in Hardware, Side Channels, and CyberPhysical Systems
--Security in Formal Methods and Programming Languages
Track 2: Cyberspace Privacy
--Economics, Policies, Metrics, and Mechanisms of Privacy
--Privacy Modeling and Analysis
--Privacy-Preserving Computing
--Privacy-Preserving Data Mining
--Privacy-enhancing Technologies and Anonymity
--Privacy for the Internet of Things
--Privacy in Big Data and its Applications
--Privacy-Preserving in Blockchain
--Privacy-Preserving in Mobile Social Networks
--Privacy-Preserving Crowdsensing
--Privacy-Preserving Deep Learning
Track 3: Cyberspace Anonymity
--Anonymous Data Mining and Data Sharing
--Anonymous Management in Trust Relationships
--Anonymous Video Analytics Technology
--Anonymity Metrics, Measures and Evaluations
--Anonymity Models, Hardware/Device of Anonymity
--Anonymity in Wireless Communication Systems
--Anonymous Communication Protocols
--Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
--Anonymous Communication and Internet
--Anonymous Social Networks, Structural k-Anonymity in Social Networks
--Authentication Protocol Providing User Anonymity
--Anonymous Information Storage and Management
--Private and Anonymous Data Storage
--Anonymity, Pseudonymity & Identity Management
--Anonymity in Big Data and Cloud Scenarios
--Anonymity in Health and Medical Databases
--Anonymity in Sensor-Cloud Systems
--Anonymity in Edge Computing
IMPORTANT DATES
Paper Submission Deadline: July 15, 2024
Author Notification: August 15, 2024
Author Registration Due: September 15, 2024
Camera-Ready Paper Due: September 15, 2024
Conference Dates: December 29 - 31, 2024
SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
Excecutive General Chair
Guojun Wang, Guangzhou University, China
General Chairs
Richard Hill, University of Huddersfield, United Kingdom
Tian Wang, Beijing Normal University, China
Guihua Duan, Central South University, China
Program Chairs
Guojun Wang, Guangzhou University, China
Zheng Yan, Xidian University, China
Kuan-Ching Li, Providence University, Taiwan
Yulei Wu, University of Bristol, United Kingdom
Program Vice Chairs
Track 1: Cyberspace Security
Tariq Alsboui, University of Huddersfield, United Kingdom
Muhammad Arif, Superior University Lahore, Pakistan
Zhitao Guan, North China Electric Power University, China
Qin Liu, Hunan University, China
Yuxiang Ma, Henan University, China
Junwei Zhou, Wuhan University of Technology, China
Track 2: Cyberspace Privacy
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Bin Cao, Hebei University of Technology, China
Songwen Pei, University of Shanghai for Science and Technology, China
Asis Kumar Tripathy, VIT University, India
Zehua Wang, The University of British Columbia, Canada
Shigeng Zhang, Central South University, China
Track 3: Cyberspace Anonymity
Wenxiu Ding, Xidian University, China
Antonio Esposito, Università degli Studi della Campania Luigi Vanvitelli, Italy
Jiajia Jiao, Shanghai Maritime University, China
Florin Pop, Polytechnic University of Bucharest (UPB), Romania
Zhe Qu, Central South University, China
Guohua Tian, Xidian University, China
Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Scott Fowler, Linkoping University, Sweden
Xiangyong Liu, Guangzhou University, China
Wenjia Li, New York Institute of Technology, USA
Guanghui Feng, Guangzhou University, China
Registration Chair
Pin Liu, Central South University, China
Conference Secretariat
Wenyin Yang, Foshan University, China
Web Chairs
Yonglin Liu, Foshan University, China
Zhuoran Feng, Foshan University, China
Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Exeter, UK
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and Management - KeralaKerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China/Aalto University, Finland
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China
Program Committee
Please check the "Program Committee" web page at the conference website for detail:
http://ubisecurity.org/2024/
Previous Proceedings
UbiSec 2023: https://link.springer.com/book/10.1007/978-981-97-1274-8
UbiSec 2022: https://link.springer.com/book/10.1007/978-981-99-0272-9
UbiSec 2021: https://link.springer.com/book/10.1007/978-981-19-0468-4
Contact
Please email inquiries concerning UbiSec 2024 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2024 AT googlegroups.com.
Prof. Guojun Wang, Executive General Chair of UbiSec 2024
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
============
Call for Papers
============
=================================================
ICLA 2025: Indian Conference on Logic and its Applications
Dates: Feb 3 -- 5, 2025
Venue: Indian Statistical Institute (ISI), Kolkata, India
Website: https://logicindia.org/icla/icla2025/
=================================================
===================
About the conference
===================
The Indian Conference on Logic and its Applications (ICLA) is the primary conference of the Association for Logic in India (ALI [1]). It is a forum for bringing together researchers from a variety of fields in which formal logic plays a significant and often foundational role: Mathematics, Computer Science, Philosophy, Linguistics and Cognitive Science. A special feature of ICLA is the inclusion of studies in systems of logic in the Indian tradition, as well as historical research on logic. Details of the previous ICLA 2023 can be found at [2], and those of the earlier editions of the conference at the ALI website.
[1] https://logicindia.org/
[2] https://icla2023.iiti.ac.in/
The upcoming ICLA 2025 is the 11th edition of the conference and features the following:
* Best paper and best student paper awards;
* Two kinds of contributed papers:
- Extended abstracts for inclusion in the conference proceedings. The review process for these abstracts will involve a rebuttal phase;
- Short abstracts only for presentation in the conference;
* Invitation to selected accepted papers of the conference for submission to a special issue of a journal (to be announced in due course);
* The conference will take place in offline in-person mode;
* ALI will co-organize with Jadavpur University, the Asian Workshop on Philosophical Logic (AWPL) which will take place for the first time in India in Kolkata following ICLA 2025.
==================================
Events: Main conference and workshops
==================================
+ Main conference: ICLA 2025:
- Date: Feb 3 -- 5, 2025
- Venue: ISI Kolkata
- Website: https://logicindia.org/icla/icla2025/
+ Workshop: AWPL 2025:
- Date: Feb 6 -- 8, 2025
- Venue: Jadavpur University Kolkata
- Website: https://sites.google.com/view/awpl2025/
============================
Important dates and information
============================
Submission dates: All dates below are AOE (Anywhere on Earth).
- Deadline for abstract of submission: Aug 11, 2024
- Submission deadline: Aug 15, 2024
- Rebuttal period: Sep 23 -- Sep 28, 2024
- Notification to authors: 18 Oct, 2024
- Camera-ready version: TBA
- Registration: TBA
Easychair website: https://easychair.org/conferences/?conf=icla2025
====================
Submission guidelines
====================
Authors are invited to submit papers presenting original and unpublished research in any area of logic and its applications. Please see below for a detailed list of topics. The publisher and publication series will be announced soon.
Listed below are common guidelines for all submissions. A submission is either an extended abstract or a short abstract.
1) Submissions must be in electronic form, and must be submitted through Easychair via https://easychair.org/conferences/?conf=icla2025.
2) Submissions must be in English and should provide sufficient details to allow the program committee to assess their merits. Each submission must be a single PDF file.
3) Submissions will be peer-reviewed in a single-blind process.
4) Submissions authored or co-authored by PC members are allowed. PC member submissions will however be subject to a higher level of scrutiny than other submissions.
5) For an accepted submission, one of the authors must commit to presenting it in person at the conference.
—------------------------------------------------------
Additional guidelines for extended abstracts
—------------------------------------------------------
1) The submission should not exceed 12 pages excluding references, and should adhere to the Springer-Verlag Lecture Notes LaTeX2e style [SV]. Detailed proofs of technical results or other supplementary material, if necessary, can be included in a clearly marked appendix or made available via pointers to technical reports which may be read at the discretion of the programme committee. There is no restriction on the length of the appendix.
[SV] https://www.springer.com/gp/computer-science/lncs/conference-proceedings-gu…
2) Submissions of previously published works, or concurrent submissions to journals or to other conferences with proceedings, are not allowed. The authors can however make full versions of their submissions available at online repositories such as ArXiv, HAL, ECCC and the like.
3) During the reviewing, there will be a rebuttal phase for extended abstracts which would give the authors an opportunity to respond to the initial reviews. Instructions related to the rebuttal will be communicated to the authors before the rebuttal period.
4) Accepted extended abstracts will be published in the conference proceedings.
—-------------------------------------------------
Additional guidelines for short abstracts
—-------------------------------------------------
1) The submission should be about a page in length describing the main results of the work. Pointers to technical reports detailing the results can be provided.
2) There will be no rebuttal phase for short abstracts.
3) Accepted short abstracts will not be published in the conference proceedings. They might however be made available on the conference website.
==================
Submission Topics
==================
The list of topics include, but are not limited to, the following. Submissions of interdisciplinary nature are especially encouraged.
+ Logic in Mathematics: algorithmic randomness, category theory, descriptive set theory, foundations of mathematics, homotopy type theory, logical aspects of topology, model theory, recursion theory, reverse mathematics, universal algebra
+ Logic in Computer Science: algorithmic meta theorems, automated reasoning, category theory in computer science, decision procedures for logics, definable functions on relational structures, first order modal logic, formal analysis of programs, formal verification and synthesis, hyperproperties, logic and algebraic methods, logic and automata theory, logic and computational complexity, logic and concurrency, logic and constraint satisfaction problems, logic and databases, logic and games, logic and graph structure theory, logic in industrial applications, logic in machine learning and artificial intelligence, logic and quantum computing, logic in security and privacy, many valued logics in finite model theory, modal logic – algebraic, category theoretic and model theoretic aspects, probabilistic logics and stochastic processes, programming language semantics, proof complexity, real time logics, temporal logics, theory and applications of SAT and SMT solvers and theorem provers, software/app development for logic, stability theory over finite structures, two-variable logics, well quasi orders
+ Logic in Philosophy: belief change and revision, deontic logics, description logics, dynamic epistemic logic, formal epistemology, general tools and frameworks for logical systems, history of logic – Indian, Chinese and Western and comparative studies, imperative logics, Indian philosophical systems: Buddhism, Jainism, Mīmāṃsa and Nyāya, interaction of classical logic with other logics, Large Language Models (LLMs) – cognitive aspects and impact on society, logic and cognitive science, logic and ethics in artificial intelligence, logic and linguistics, logic and metaphysics, logic and philosophy of mathematics, logic and philosophy of science, logic and social choice theory, logic and social cognition, logic and social software, logic for information, logic for probability and uncertainty, logic in decision and game theory, logic in education, logic in law, many valued logics and their applications, paraconsistency, particular systems of logic, philosophical issues of logical systems, philosophy of language, multi-agent systems, non-monotonic logics, normative reasoning, provability logics
=======
Awards
=======
The following awards will be given to selected contributed papers during the conference:
- Best paper award
- Best student paper award
All the authors in any paper considered for the best student paper award must be students at the time of submission of the paper. Please note that it is possible for neither of these awards to be given in the event that none of the submitted papers meet the requisite standards.
====================
Programme Committee
====================
Chairs:
C Aiswarya (Chennai Mathematical Institute, India)
Prabal Kumar Sen (University of Calcutta, India)
Shashi Mohan Srivastava (IACS Kolkata and RKMVERI Belur, India)
Members:
Rupa Bandyopadhyay (Jadavpur University Kolkata, India)
Sanjukta Basu (Rabindra Bharati University Kolkata, India)
Kuntala Bhattacharya (Rabindra Bharati University Kolkata, India)
Amita Chatterjee (Jadavpur University Kolkata, India)
Madhumita Chatterjee (Jadavpur University Kolkata, India)
Tran Chieu-Minh (National University of Singapore, Singapore)
Deepak D’Souza (IISc Bangalore, India)
Anupam Das (University of Birmingham, UK)
Hans van Ditmarsch (University of Toulouse, CNRS, IRIT, France)
Su Gao (Nankai University, China)
Shibashis Guha (TIFR Mumbai, India)
Petr Hliněný (Masaryk University, Brno, Czech Republic)
Moritz Lichter (RWTH Aachen, Germany)
Khushraj Madnani (MPI-SWS Saarbrücken, Germany)
Gayatri Panicker (Vellore Institute of Technology, India)
Anand Pillay (University of Notre Dame, USA)
R Ramanujam (Azim Premji University, India)
Nicholas Ramsey (University of Notre Dame, USA)
Krishna S (IIT Bombay, India)
Abhisekh Sankaran (TCS Research, India)
Manidipa Sanyal (University of Calcutta, India)
Sylvain Schmitz (IRIF Paris, France)
Stephen G Simpson (Vanderbilt University, USA)
Slawomir Solecki (Cornell University, USA)
Shichang Song (Beijing Jiaotong University)
Bama Srinivasan (Anna University, India)
Vaishnavi Sundararajan (IIT Delhi, India)
Sergei Starchenko (University of Notre Dame, USA)
Ramanathan S Thinniyam (Uppsala University, Sweden)
Jouko Väänänen (University of Helsinki, Finland)
More members are expected to join.
==========================
Organizing Committee Chairs
==========================
Sourav Chakraborty (Indian Statistical Institute Kolkata)
Sujata Ghosh (Indian Statistical Institute Chennai)
=====================
Co-located Workshops
=====================
Asian Workshop on Philosophical Logic (AWPL)
- Date: Feb 6 -- 8, 2025
- Venue: Jadavpur University Kolkata
- Website: https://sites.google.com/view/awpl2025/
More information about the conference can be found at:
https://logicindia.org/icla/icla2025/.
For any queries or suggestions, feel free to write to:
icla2025(a)gmail.com.
Please, accept our apologies if you receive multiple copies of this email.
CALL FOR PAPERS
******************************************************
Data Privacy Management (DPM 2024)
19th International Workshop
September 19, 2024, Bydgoszcz, Poland
(co-located with ESORICS 2024)
website: https://deic.uab.cat/dpm/dpm2024/
******************************************************
IMPORTANT DATES
======================
Submission Deadline:
-- June 30, 2024 (extended)
Notification:
-- July 15, 2024
Camera Ready:
-- August 19, 2024
======
SCOPE
======
DPM is an annual international workshop covering research in data
privacy management. Organizations are increasingly concerned
about the privacy of information that they manage (as witnessed,
for example, by lawsuits filed against organizations for
violating the privacy of customer's data). Thus, the management
of privacy-sensitive information is very critical and important
for every organization.
This poses several challenging problems, such as how to translate the
high-level business goals into system-level privacy policies,
administration of privacy-sensitive data, privacy preserving data
integration and engineering, privacy preserving access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers. Starting from these
observations, the aim of DPM is to discuss and exchange ideas related
to data privacy management. We invite papers from researchers and
practitioners working in privacy, security, trustworthy data systems
and related areas to submit their original papers in this workshop.
Submissions by PhD students as well as controversial ideas are
encouraged. Case studies (successful or not) are also encouraged.
TOPICS
========
Topics of interest include, but are not limited to:
- Privacy in Machine Learning
- Privacy Information Management
- Privacy Policy-based Infrastructures and Architectures
- Privacy-oriented Access Control Languages and Models
- Privacy in Trust Management
- Privacy in Cryptocurrencies
- Privacy Data Integration
- Privacy Risk Assessment and Assurance
- Privacy Services
- Privacy Policy Analysis
- Data Protection Regulations in Practice
- Cryptographic Protocols for Privacy
- Query Execution over Privacy Sensitive Data
- Privacy Preserving Data Mining
- Privacy for Integrity-based Computing
- Privacy Monitoring and Auditing
- Privacy in Social Networks
- Privacy in Ambient Intelligence (AmI) Applications
- Individual Privacy vs. Corporate/National Security
- Privacy in computer networks
- Privacy and RFIDs
- Privacy and Big Data
- Privacy in sensor networks
- Privacy in the Internet of Things
PAPER SUBMISSIONS
===================
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers can be submitted as Full Papers or
Short Papers. Full papers should be at most 16 pages in the LNCS
format, including the bibliography and well-marked appendices. Short
papers should be at most 8 pages in the LNCS format, including the
bibliography and well-marked appendices. Program Committee members are
not required to read the appendices, so papers should be intelligible
without them.
Authors should indicate whether their paper is a short paper to
differentiate them from full papers. All submissions must be written
in English. It is planned to have accepted papers published by
Springer in the Lecture Notes in Computer Science (LNCS) series, the
LNCS template can be found at
http://www.springer.com/computer/lncs/lncs+authors.
Authors must submit their papers by the indicated deadline, using the
EasyChair web site:
https://easychair.org/conferences/?conf=dpm2024
Only PDF files will be accepted (a Latex source file will be required
for the
final version of the accepted papers). All papers will be refereed. Accepted
papers must be presented at the Workshop. At least one author of each
accepted
paper must register to the workshop, by the early date indicated by the
organizers, and present the paper.
GENERAL CHAIR
===============
Joaquin Garcia-Alfaro ((Institut Polytechnique de Paris)
PROGRAM CHAIRS
===============
Ken Barker (University of Calgary)
Guillermo Navarro-Arribas (Universitat Autonoma de Barcelona)
PROGRAM COMMITTEE
=================
Esma Aïmeur (University of Montreal)
Abderrahim Ait Wakrime (Mohammed V University)
Jordi Casas-Roma (Universitat Autonoma de Barcelona)
Jordi Castellà-Roca (Universitat Rovira i Virgili)
Depeng Chen (Anhui University)
Mauro Conti (University of Padua)
Mathieu Cunche (University of Lyon / Inria)
Nora Cuppens-Boulahia (Polytechnique Montreal)
Mila Dalla Preda (University of Verona)
Sabrina De Capitani di Vimercati (Universita degli Studi di Milano)
Jose M. De Fuentes (Universidad Carlos III de Madrid)
Josep Domingo-Ferrer (Universitat Rovira i Virgili)
Sebastien Gambs (Université du Québec à Montréal)
Lorena González Manzano (Universidad Carlos III de Madrid)
M. Emre Gursoy (Koç University)
Guy-Vincent Jourdan (University of Ottawa)
Marc Juarez (University of Edinburgh)
Christos Kalloniatis (University of the Aegean)
Bruce Kapron (University of Victoria)
Sokratis Katsikas (Norwegian University of Science and Technology)
Christophe Kiennert (Telecom SudParis)
Romain Laborde (University Paul Sabatier Toulouse III)
Patrick Lacharme (Ensicaen)
Giovanni Livraga (University of Milan)
Brad Malin (Vanderbilt University)
Lukas Malina (Brno University of Technology)
David Megias (Universitat Oberta de Catalunya)
Chris Mitchell (Royal Holloway, University of London)
Gerardo Pelosi (Politecnico di Milano)
Cristina Perez-Sola (Universitat Utonoma de Barcelona)
Kai Rannenberg (Goethe University Frankfurt)
Isabel Praça (GECAD / ISEP)
Ruben Rios (Universidad de Malaga)
Pierangela Samarati (Universita degli Studi di Milano)
Vicenç Torra (Umeå University)
Alexandre Viejo (Universitat Rovira i Virgili)
Isabel Wagner (University of Basel)
Jens Weber (University of Victoria)
Lena Wiese (University of Göttingen)
Nicola Zannone (Eindhoven University of Technology)
==================
VENUE/FORMAT
==================
The workshop will be held in Bydgoszcz, Poland, in conjunction with the 29th
annual European Symposium on Research in Computer Security, ESORICS. More
information on accommodation and venue available from the ESORICS 2024
website
at https://esorics2024.org/
This call for papers and additional information about DPM 2024
can be found at https://deic.uab.cat/dpm/dpm2024/
Kinldy contact dpm2024(a)easychair.org in case of doubts or questions.
=====================================================
7th Asian Workshop on Philosophical Logic
6-8 February, 2025
Department of Philosophy, Jadavpur University, Kolkata, India
https://sites.google.com/view/awpl2025/
=====================================================
[CALL FOR PAPERS]
The 7th Asian Workshop on Philosophical Logic will be held on 6-8 February 2025 at the Department of Philosophy, Jadavpur University, Kolkata, India.
The Asian Workshop on Philosophical Logic (AWPL[1]) is a series of events initiated by a group of Asian logicians. Its first instalment took place at JAIST in Japan in 2012. The workshop's primary goal is to promote awareness, understanding, and collaboration among researchers in philosophical logic and related fields. It emphasises the interaction between philosophical ideas and formal theories.
*Topics of interest include* (but are not restricted to):
Algebraic logic; Chinese logic; Constructive logic; Decision Theory; Formal epistemology; Game Theory; Greek logic; Indian logic; Inductive logic; Logics of belief change; Logics of conditionals; Modal, temporal, epistemic and deontic logics; Nonmonotonic logics; Relevance and other non-classical logics; Philosophy of language; Philosophy of mathematics; Philosophy of Science; Proof Systems, Quantum logic; Vagueness;
*as well as their applications in:*
Artificial Intelligence, Cognitive Science; Computer Science; Law; Linguistics; Mathematics; Social Sciences.
[1] http://awpl.org/Workshops.html
[IMPORTANT DATES]
Submission deadline: 15 August 2024
Notification of acceptance: 30 September 2024
Workshop dates: 6-8 February, 2025
[SUBMISSION]
All submissions should present original works that have not been previously published. Submissions should be written in English and follow the LNCS template[2]. Please prepare your submission as a PDF file with a maximum of 12 pages, including the reference list, appendixes, acknowledgements, etc. Submissions should be sent electronically via EasyChair[3] by the corresponding author within the specified deadline. It is expected that at least one of the authors will attend the workshop and present the accepted work. After the workshop, selected submissions will be invited to revise and resubmit for the post-conference proceedings, which will be published in the "Logic in Asia"[4] series.
[2] https://www.springer.com/gp/computer-science/lncs/conference-proceedings-gu…
[3] https://easychair.org/conferences/?conf=awpl2025
[4] http://www.springer.com/series/13080?detailsPage=titles
[STEERING COMMITTEE]
Phan Minh Dung (Asian Institute of Technology, Bangkok)
Hu Liu (Sun Yat-sen University, Guangzhou)
Beishui Liao (Zhejiang University, Hangzhou)
Fenrong Liu (Tsinghua University, Beijing)
Hiroakira Ono (Japan Advanced Institute of Science and Technology, Ishikawa)
R. Ramanujam (Azim Premji University, Bengaluru)
Hsing-chien Tsai (National Chung Cheng University, Chiayi)
[PROGRAM COMMITTEE]
Rupa Bandyopadhyay (Jadavpur University)
Mihir Chakraborty (Jadavpur University)
Madhumita Chattopadhyay (Jadavpur University)
Sujata Ghosh (Indian Statistical Institute) (Co-Chair)
Purbita Jana (Madras School of Economics)
Kohei Kishida (University of Illinois, Urbana-Champaign)
Dazhu Li (University of Chinese Academy of Sciences)
Yanjun Li (Nankai University)
Fei Liang (Shandong University)
Abhishek Anant Nowbagh (Jadavpur University) (Co-Chair)
Hitoshi Omori (Tohoku University)
R.Ramanujam (Azim Premji University)
Abhisekh Sankaran (Tata Consultancy Services Research)
Manidipa Sanyal (University of Calcutta)
Chenwei Shi (Tsinghua University)
Sourav Tarafder (St. Xavier's College)
Yanjing Wang (Peking University)
Yì Nicholas Wáng (Sun Yat-sen University)
Tomoyuki Yamada (Hokkaido University)
Fan Yang (Utrecht University)
We are expecting more members to join.
[LOCAL ORGANIZING COMMITTEE]
Gopinath Mondal (Jadavpur University, Kolkata)
Samar Kumar Mondal (Jadavpur University, Kolkata)
Tamoghna Sarkar (Jadavpur University, Kolkata)
Mainak Pal (Jadavpur University, Kolkata)
Sunirmal Das (Jadavpur University, Kolkata)
[CONTACT]
awpl2025ju(a)gmail.com
----- Forwarded message from Preetam Mukherjee <preetam.mukherjee(a)duk.ac.in> -----
From: Preetam Mukherjee <preetam.mukherjee(a)duk.ac.in>
Date: Fri, 21 Jun 2024 09:57:18 +0530
Subject: Deadline Approaching [CFP] 20th International Conference on
Information Systems Security (ICISS-2024), December 16-20, 2024,
Jaipur, India.
Dear Researcher/Academician/Practitioner,
The 20th International Conference on Information Systems Security
solicits previously unpublished research works. Please feel free to
forward this call to your research group and others who are working in
the field of information security. The submission deadline is July 10,
2024.
--
with best regards,
The Publicity Chairs of ICISS 2024.
https://iciss.isrdc.in
CALL FOR PAPERS
--------------------------
------------------------------------------------------------------------------------------
The 20th International Conference on Information Systems Security
(ICISS-2024)
December 16 - 20, 2024
LNMIIT Jaipur, INDIA
https://iciss.isrdc.in
------------------------------------------------------------------------------------------
ICISS 2024 is accepting submissions under various tracks.
Please consider submitting your security research to ICISS 2024.
KEY HIGHLIGHTS:
--------------
- submission deadline for regular papers track: July 10, 2024
- double-blind review
- best paper award
- proceedings published by SpringerNature LNCS
- possibility of an invitation to exceptionally good papers to be
submitted to the Sadhana journal
- pre-conference winter school (emerging topics like Security
Challenges with Generative AI)
- Two keynotes speakers confirmed:
Rakesh Agrawal, Data Insights Laboratories, USA.
Ahmad-Reza Sadeghi, Technical University of Darmstadt, Germany.
ABOUT ICISS 2024:
----------------
The 20th ICISS will be held at the LNM Institute of Information
Technology (LNMIIT) Jaipur between December 16 and 20, 2024. This
annual conference provides a forum for researchers and industry
practitioners of security to present their cutting-edge research and
use case experiences. We solicit previously unpublished technical
papers in the field of Security & Privacy. Papers that involve
innovative solutions, usability studies, longitudinal studies,
industrial use cases, and SoK are welcome.
ICISS also accepts submissions under Industry/Demo track demonstrating
implementations/PoC in the area of systems security, and a separate
track for PhD students presenting their early/WiP through lightning
talks & posters. ICISS has generous funds supporting student to attend
pre-conference school (tutorials, etc.) and the main conference.
A broad but non-exhaustive list of TOPICS OF INTEREST is as below:
SYSTEMS SECURITY
OS, VM, containers, cloud
Network: SDN, NFV, SD-WAN
IoT, RFID, SCADA systems
Communication Protocols
IDS, IPS, SIEM, XDR, etc
Honeypot, Botnet, etc
ACCESS CONTROL
Authentication, MFA
Authorization model/policy
PKI & Trust management
Information flow control
APPLICATION SECURITY
Vulnerabilities, DevSecOps
API security, WAF, OWASP
Static/Binary analysis, Zero trust
Malware, Ransomware, APTs
HARDWARE SECURITY
Remote attestation, PUFs
Trojans, Backdoors, FPGA
TEE, TRNG, 2FA, payment wallets
PRIVACY
PETs, anonymization tech
Deidentification attacks
Surveillance & Censorship
Inference, correlation attacks
BLOCKCHAIN
Cryptocurrency, stablecoins
Interoperability, scalability
Smart contracts, concurrency
DIDs, NFTs, CBDCs, AML
SECURITY IN AI/ML
Adversarial learning/inputs
Prompt injection, RLHF strategies
Model stealing, poisoning
EMERGING TECH/STANDARDS
ChatGPT, LaMDA, Dall-E 2, et al
Security-by-design, SBOM
Privacy-by-design, STIX/TAXII
S&P USE CASES
e-voting, e-gov, smart cities
COVID-19 contact tracing
SUBMISSION GUIDELINES:
---------------------
Submissions must be written in English and should not exceed 20 pages
using LNCS format; including the bibliography and appendices.
DOUBLE-BLIND review process will be followed, therefore the
manuscripts should not have author names, affiliations,
acknowledgements, self-references or any indirect information related
to authors of the manuscript. Please read the submission guidelines
carefully before submitting to ICISS. The extended versions of a
select few exceptional papers will be invited for publication in the
Indian Academy of Sciences' journal Sadhana.
Use of tools like ChatGPT while preparing the manuscripts must be
explicitly mentioned as a footnote. Manuscripts must comply with the
detailed submission guidelines provided on the website.
Detailed Guidelines: https://iciss.isrdc.in/submission-guidelines/
Past Proceedings: https://dblp.org/db/conf/icisshttps://link.springer.com/conference/iciss
THERE WILL BE A BEST PAPER AWARD! The award constitutes a monetary
component of INR 15,000 sponsored by IDRBT Hyderabad.
The conference will be precedeed by a WINTER SCHOOL covering a set of
state-of-the-art topics delivered by experts from the field.
GENERAL CHAIR:
-------------
RK Shyamasundar, IIT Bombay
PROGRAM CHAIRS:
--------------
Ram Krishnan, University of Texas at San Antonio
Vishwas Patil, IIT Bombay & IIM Mumbai
STEERING COMMITTEE:
------------------
Venu Govindaraju, University of Buffalo
Sushil Jajodia, George Mason University
Somesh Jha, University of Wisconsin
Atul Prakash, University of Michigan
Pierangela Samarati, University of Milan
RK Shyamasundar, IIT Bombay
IMPORTANT DATES (in AoE):
------------------------
Submission deadline: July 10, 2024
Acceptance notification: Sep 20, 2024
Camera-ready deadline: Sep 30, 2024
LINKS TO CALLS FOR OTHER TRACKS:
-------------------------------
PhD Forum Track: https://iciss.isrdc.in/phd-forum/
Tutorials Track: https://iciss.isrdc.in/tutorials/
Demo Track: https://iciss.isrdc.in/call-for-industry-demo-papers/
-------------------------- END OF CALL ---------------------------
----- End forwarded message -----
=====================================================
SAT 2024
International Conference on Theory and Applications of Satisfiability Testing 2024
Call for Participation
=====================================================
Important dates:
- SAT 2024 conference: August 21 - 24, 2024
- Workshops: August 20, 2024
- Indian SAT+SMT School: August 18 - 19, 2024
Place: Tata Consultancy Services (TCS), Sahyadri Park - 2, Hinjewadi, Pune, India
Website: https://satisfiability.org/SAT24/
About the conference
SAT 2024 is the 27th edition of the International Conference on Theory and Applications of Satisfiability Testing (SAT). The scope of SAT 2024 includes all aspects of the theory and applications of propositional satisfiability, broadly construed. This also includes Boolean optimization, such as MaxSAT and Pseudo-Boolean (PB) constraints, Quantified Boolean Formulas (QBF), Satisfiability Modulo Theories (SMT), Model Counting, and Constraint Programming (CP) for problems with clear connections to Boolean-level reasoning.
SAT 2024 is the first time that SAT will take place in India. There will be co-located schools and workshops prior to the conference. The events are being organized by TCS Research and Indian Institute of Technology Bombay.
Keynote Speakers
- Martina Seidl, Johannes Kepler University, Austria
- Cesare Tinelli, University of Iowa, USA
- Moshe Y. Vardi, Rice University, USA
Awards
- A "Best Paper Award" and a "Best Student Paper Award" will be announced during the conference.
- The "Fahiem Bacchus PhD Award in Satisfiability" will also be announced. This new award established by the SAT Association distinguishes one outstanding PhD thesis from the past two years in the field of Satisfiability, broadly construed. The award is named after Fahiem Bacchus who made significant contributions to the theory and practice of SAT as well as to the SAT community and the SAT Association.
About the venue
The venue of SAT 2024 is Tata Consultancy Services (TCS), Sahyadri Park - 2, Hinjewadi, Pune. Surrounded by the rolling hills of the Sahyadri ranges on three sides, this campus is a scenic and well-equipped setting for hosting SAT 2024. The campus has shared conference rooms, breakout areas, training rooms and a 500-seater multi-purpose auditorium.
Pune is the second largest city after Mumbai (erstwhile Bombay) in the state of Maharashtra in western India. It is well-known for its salubrious climate, rich culture, a vibrant theatre and classical music scene, and its automotive and information technology industries. The city of Mumbai, with its associated tourist attractions, is a 3-hour pleasant drive from Pune.
Registration
The registrations for the conference, and the co-located schools and workshops are now open.
- Early registration deadline: July 15, 2024, 23:59 AoE
- Registration link: https://satisfiability.org/SAT24/registration.php
Grants & Travel Support
Grants and travel support are available for student participants. The details can be found on the conference website: https://satisfiability.org/SAT24/registration.php.
Co-located Schools and Workshops
- Indian SAT+SMT school
+ Website: https://sat-smt.in/
+ Dates: Aug 18 - 19, 2024
- Pragmatics of SAT
+ Website: http://www.pragmaticsofssat.org/2024/
+ Dates: Aug 20, 2024
- International Workshop on Quantified Boolean Formulas and Beyond
+ Website: https://qbf24.pages.sai.jku.at/qbf/
+ Dates: Aug 20, 2024
- Workshop on Counting, Sampling, and Synthesis
+ Website: https://mccompetition.org
+ Dates: Aug 20, 2024
Competitions
Results of the 2024 editions of SAT competition, Pseudo-Boolean Solver competition and Model Counting competition will be announced at the conference.
Sponsors
- Diamond sponsors: TCS Research
- Platinum sponsors: Artificial Intelligence Journal, Amazon Web Services
- Gold sponsors: Cadence, Synopsis
- Bronze sponsors: Google, Microsoft
Partners
- ACM India Council
- Indian Association for Research in Computing Science (IARCS)
For more information, please visit https://satisfiability.org/SAT24/.
We look forward to seeing you in Pune!
Best regards,
SAT 2024 Organizing Committee
Please accept our apologies if you receive multiple copies of UbiSec 2024 Preliminary CFPs with Deadline (July 15, 2024).
============================== UbiSec 2024 ==============================
Call for Papers (CFPs) of The 4th International Conference on Ubiquitous Security (UbiSec 2024)
Changsha, China, December 29 - 31, 2024
Organizer:
Central South University, China
http://ubisecurity.org/2024/
======================================================================
Keynote Speeches Section
TBD.
======================================================================
Invited Talks Section
TBD.
======================================================================
Panel Discussions Section
TBD.
======================================================================
Special Issues Section
TBD.
======================================================================
Welcome to participate in UbiSec 2024, Changsha, China, December 29 - 31, 2024! Changsha is a famous historical and cultural city with a variety of interest. This city has been an important grain production base in China since ancient times. The green and verdant Mt. Yuelu stands in the city and Xiangjiang River is clear as a mirror passing through the city. Orange Isle lies in the heart of the river. In particular, Changsha is very close to Chairman Mao's former residence within one-hour driving. Nowadays, being an intellectual center, Changsha has over 100 research institutions and engineering laboratories. Hybrid rice breeding and the Tianhe supercomputer are the main scientific research achievements.
The 4th International Conference on Ubiquitous Security (UbiSec 2024) stems from three conference/symposium/workshop series:
(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, "Spa" for short), which covers "Big Security" leveraging computation, communication and storage ("CCS" for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.
(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on "Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced "UbiSafe"). UbiSec extends this vision to "Ubiquitous Security", using "Big Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)" (pronounced "UbiSec").
(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace Security", with "Cyberspace" as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus "YOU (will) BE SECure"!
The UbiSec 2024 Conference ("The Conference" for short) is the fourth event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.
UbiSec 2024 follows the UbiSec 2023 conference in Exeter, UbiSec 2022 conference in Zhangjiajie and the UbiSec 2021 in Guangzhou, and also the traditions of previous successful SpaCCS/UbiSafe/IWCSS conference/symposium/workshop series, held in Nanjing, China (SpaCCS 2020/UbiSafe 2020), Guangzhou,China (IWCSS 2020); Altanta, USA (SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The conference aims at bringing together researchers and practitioners in the world working in the research fields of security, privacy, and anonymity aspects of computer systems and networks. The conference will focus on broad areas of architectures, algorithms, techniques, and applications for cyberspace security, cyberspace privacy, and cyberspace anonymity.
UbiSec 2024 topics include, but are not limited to the following:
Track 1: Cyberspace Security
--Security Model and Architecture
--Software and System Security
--Trustworthy Computing
--Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
--Machine Learning and AI Security
--Network Security
--Attacks and Defenses
--Intrusion Detection and Prevention
--Security in Web Services
--Security in Mobile Social Networks
--Security in Internet of Things
--Fraud and Cyber Crime
--Accounting and Auditing
--Applied Cryptography
--Database Security
--Authentication
--Forensics and Diagnostics for Security
--Information Hiding
--Security in Big Data and its Applications
--Blockchain and Distributed System Security
--Security in Hardware, Side Channels, and CyberPhysical Systems
--Security in Formal Methods and Programming Languages
Track 2: Cyberspace Privacy
--Economics, Policies, Metrics, and Mechanisms of Privacy
--Privacy Modeling and Analysis
--Privacy-Preserving Computing
--Privacy-Preserving Data Mining
--Privacy-enhancing Technologies and Anonymity
--Privacy for the Internet of Things
--Privacy in Big Data and its Applications
--Privacy-Preserving in Blockchain
--Privacy-Preserving in Mobile Social Networks
--Privacy-Preserving Crowdsensing
--Privacy-Preserving Deep Learning
Track 3: Cyberspace Anonymity
--Anonymous Data Mining and Data Sharing
--Anonymous Management in Trust Relationships
--Anonymous Video Analytics Technology
--Anonymity Metrics, Measures and Evaluations
--Anonymity Models, Hardware/Device of Anonymity
--Anonymity in Wireless Communication Systems
--Anonymous Communication Protocols
--Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
--Anonymous Communication and Internet
--Anonymous Social Networks, Structural k-Anonymity in Social Networks
--Authentication Protocol Providing User Anonymity
--Anonymous Information Storage and Management
--Private and Anonymous Data Storage
--Anonymity, Pseudonymity & Identity Management
--Anonymity in Big Data and Cloud Scenarios
--Anonymity in Health and Medical Databases
--Anonymity in Sensor-Cloud Systems
--Anonymity in Edge Computing
IMPORTANT DATES
Paper Submission Deadline: July 15, 2024
Author Notification: August 15, 2024
Author Registration Due: September 15, 2024
Camera-Ready Paper Due: September 15, 2024
Conference Dates: December 29 - 31, 2024
SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
Excecutive General Chair
Guojun Wang, Guangzhou University, China
General Chairs
Richard Hill, University of Huddersfield, United Kingdom
Tian Wang, Beijing Normal University, China
Guihua Duan, Central South University, China
Program Chairs
Guojun Wang, Guangzhou University, China
Zheng Yan, Xidian University, China
Kuan-Ching Li, Providence University, Taiwan
Yulei Wu, University of Bristol, United Kingdom
Program Vice Chairs
Track 1: Cyberspace Security
Tariq Alsboui, University of Huddersfield United, Kingdom
Muhammad Arif, Superior University Lahore, Pakistan
Zhitao Guan, North China Electric Power University, China
Qin Liu, Hunan University, China
Yuxiang Ma, Henan University, China
Junwei Zhou, Wuhan University of Technology, China
Track 2: Cyberspace Privacy
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Bin Cao, Hebei University of Technology, China
Songwen Pei, University of Shanghai for Science and Technology, China
Asis Kumar Tripathy, VIT University, India
Zehua Wang, The University of British Columbia, Canada
Shigeng Zhang, Central South University, China
Track 3: Cyberspace Anonymity
Wenxiu Ding, Xidian University, China
Antonio Esposito, Università degli Studi della Campania Luigi Vanvitelli, Italy
Jiajia Jiao, Shanghai Maritime University, China
Florin Pop, Polytechnic University of Bucharest (UPB), Romania
Zhe Qu, Central South University, China
Guohua Tian, Xidian University, China
Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Scott Fowler, Linkoping University, Sweden
Xiangyong Liu, Guangzhou University, China
Wenjia Li, New York Institute of Technology, USA
Guanghui Feng, Guangzhou University, China
Registration Chair
Pin Liu, Central South University, China
Conference Secretariat
Wenyin Yang, Foshan University, China
Web Chairs
Yonglin Liu, Foshan University, China
Zhuoran Feng, Foshan University, China
Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Exeter, UK
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and Management - KeralaKerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China/Aalto University, Finland
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China
Program Committee
Please check the "Program Committee" web page at the conference website for detail:
http://ubisecurity.org/2024/
Previous Proceedings
UbiSec 2023: https://link.springer.com/book/10.1007/978-981-97-1274-8
UbiSec 2022: https://link.springer.com/book/10.1007/978-981-99-0272-9
UbiSec 2021: https://link.springer.com/book/10.1007/978-981-19-0468-4
Contact
Please email inquiries concerning UbiSec 2024 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2024 AT googlegroups.com.
Prof. Guojun Wang, Executive General Chair of UbiSec 2024
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
Please accept our apologies if you receive multiple copies of this DASC 2024 Preliminary Call for Papers (CFPs).
=====================CALL FOR PAPERS=============================
The 22nd IEEE International Conference on Dependable, Autonomic and Secure Computing
IEEE DASC 2024
http://cyber-science.org/2024/dasc/
joint conference IEEE DASC/PICom/CBDCom/CyberSciTech 2024
5-8 November 2024 - Boracay Island, Malay, Philippines
=====================INTRODUCTION=============================
As computer and communication systems, as well as other systems such as Cyber-Physical Systems (CPS), Internet of Things (IoT), and Autonomous Robotic Systems, become increasingly large and complex, their Dependability and Security play critical roles in supporting next-generation science, engineering, and commercial applications. It remains a challenge to design, analyze, evaluate, and improve the dependability and security of a large-scale computing environment. Trusted and autonomic computing/autonomous systems need synergistic research efforts covering many disciplines, from natural sciences to social sciences. It requires scientific and technological advances in a variety of fields, as well as new software, architectures, and communication technology that support the integration of the constituent technologies. IEEE DASC 2024 will be held during November 5-8, 2024, in Boracay Island, Malay, Philippines, co-located with IEEE CyberSciTech 2024, IEEE PICom 2024, and IEEE CBDCom 2024. It aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange theoretical and implementation results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust, and/or autonomic computing, and autonomous systems.
=====================TRACKS AND TOPICS=============================
- Track 1: Dependable and Fault-tolerant Computing
- Track 2: Network and System Security and Privacy
- Track 3: Autonomic Computing and Autonomous Systems
- Track 4: Industrial Applications and Emerging Techniques
- Track 5: Autonomic and Secure Computing with AI/ML
Topics of interest include, but are not restricted to:
- Self-Organization and Organic Computing
- Cognitive Computing and Self-Aware Computing
- Energy Management in Autonomic Computing and Autonomous Systems
- Dependable & Fault-tolerant Computing in Big Data, CPS, IoT, SDN, and Real-time System
- Hardware and Software Reliability, Verification and Testing
- Security and Privacy in Cloud/Fog/Edge Computing, Mobile and Pervasive Computing, Big Data, CPS and IoT systems
- Artificial Intelligence Techniques in Network and System Security and Privacy
- Autonomic and Autonomous Issues in Cloud/Fog/Edge Computing, Mobile and Pervasive Computing, Big Data, CPS and IoT systems
- Software/Apps/Tools Development for Dependable and Secure Applications
- IoT and Sensor Network, Big Data, Smart Grid, Aerospace, Transportation Applications
=====================IMPORTANT DATES==========================
Paper Submission Due: 15 Jun 2024
Authors Notification: 15 Aug 2024
Camera-ready Submission: 15 Sep 2024
=====================SUBMISSION INSTRUCTION===================
Authors are invited to submit their original research work that has not previously been submitted or published in any other venue. Regular, work-in-progress (WiP), workshop, and special session papers need to be submitted in IEEE CS Proceedings format. IEEE formatting info:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
All the accepted papers will be published by IEEE in the Conference Proceedings (IEEE-DL and EI indexed). Best Paper Awards will be presented to high quality papers. Selected papers will be recommended to prestigious journal Special Issues.
Some papers originally submitted as full papers can be accepted as short papers during the review process. In such cases, the authors will need to reduce the paper accordingly when preparing the camera-ready version. At least one of the authors of any accepted paper is requested to register and present the paper at the conference.
Regular Tracks: 6-8 pages - WiP/Workshop/Special Session Tracks: 4-6 pages
=====================ORGANIZING COMMITTEE=============================
-Honorary Chairs-
- Tadashi Dohi, Hiroshima University, Japan
- Mohammed Atiquzzaman, Univ. of Oklahoma, USA
-General Chairs-
- Zakirul Alam Bhuiyan, Fordham University, USA
- Kenichi Kourai, Kyushu Inst. of Tech., Japan
-General Executive Chairs-
- Moayad Aloqaily, Mohamad Bin Zayed Univ., UAE
- Bernady O. Apduhan, Kyushu Sangyo Univ., Japan
-Program Chairs-
- Wenjia Li, New York Institute of Technology, USA
- Aniello Castiglione, University of Salerno, Italy
-Program Co-chairs-
- Mohamed Rahouti, Fordham University, USA
- Wei Wang, Beijing Jiaotong University, China
- Adnan Anwar, Deakin University, Australia
- Shan Jiang, The Hong Kong Polytechnic University, Hong Kong
- Changqing Luo, Virginia Commonwealth Univ., USA
- Lei Chen, Georgia Southern University, USA
-Workshop & Special Session Chairs-
- Preeti Mishra, Doon University, India
- Arafatur Rahman, University of Wolverhampton, UK
-WiP & LBI Chairs-
- Saqib Ali, Univ. of Agri. Faisalabad, Pakistan
- Mrinal Kanti Bhowmik, Tripura University, India
-Publicity Chairs-
- Mubashir Rehmani, Cork Inst. of Tech., Ireland
- Junjun Zheng, Hiroshima University, Japan
- Qin Liu, Hunan University, China
- Senthil Kumar, Mepco Schlenk Eng. College, India
- Yuhong Liu, Santa Clara University, USA
-Steering Committee-
- Jianhua Ma, Hosei University, Japan
- Laurence T. Yang, St. Francis Xavier Univ., Canada
- Yuanshun Dai, Univ. of Elec. Sci. & Tech. of China, China
- Tadashi Dohi, Hiroshima University, Japan
- Zakirul Alam Bhuiyan, Fordham University, USA
Program Committee:
Please check the "Program Committee" web page on the conference website for details:
http://cyber-science.org/2024/dasc/tpc/
Contact: Please email inquiries concerning DASC 2024 to Prof. Zakirul Alam Bhuiyan: zakirulalam AT gmail DOT com.
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
Please, accept our apologies if you receive multiple copies of this email.
*********************************************************************
CALL FOR PAPERS
*********************************************************************
8th International Workshop on
Cryptocurrencies and Blockchain Technology - CBT 2024
(in conjunction with ESORICS 2024 and DPM 2024)
September 19, 2024, Bydgoszcz, Poland
Website: http://cbtworkshop.org/
*********************************************************************
IMPORTANT DATES
================
* Submission deadline: **June 23, 2024 (extended)**
* Notification to authors: July 22, 2024
* Camera-ready versions: August 19, 2024
*********************************************************************
=================
WORKSHOP HISTORY
=================
Since the appearance of Bitcoin in 2009, a plethora of new
cryptocurrencies and other blockchain based systems have been deployed
with different success. While some of them are slightly different
copies of Bitcoin, other ones propose interesting improvements or new
usages of the underlying blockchain technology. However, the novelty
of such technologies is often tied with rapid developments and
proof-of-concept software, and rigorous scientific analyses of the
proposed systems are often skipped.
This workshop aims to provide a forum for researchers in this area to
carefully analyze current systems and propose new ones in order to
create a scientific background for a solid development of new
cryptocurrencies and blockchain technology systems.
The main topics include (but are not limited to):
* Anonymity and privacy in cryptocurrencies
* Privacy-preserving technologies
* Cryptocurrency based trust systems
* Security analysis of existing cryptocurrencies
* Formal threat models in cryptocurrency systems
* Improvement proposals for existing cryptocurrencies
* Application and service cases of distributed ledgers technologies
* P2P network cryptocurrencies analysis
* Private transactions in blockchain based systems
* New usages of the blockchain technology
* Scalability solutions for blockchain systems
* Blockchain-defined networking
* Smart contracts
* Distributed Identity Management
* Distributed consensus and fault tolerance
* Blockhain Protocols and algorithms
* Transaction Monitoring and Analysis
* Token Economy, finance and payments
* Consensus mechanisms
* On-chain and off-chain code synergies
* Oracles, DeFi, and non-fungible tokens
* Decentralized applications and protocols
* Blockchain as a service
===================
SUBMISSION DETAILS
===================
Regular and short papers must be original and not submitted for
publication elsewhere. Authors are invited to submit their manuscripts
following the LNCS Proceedings Manuscript style. Papers are limited to
16 pages (full papers), or 8 pages (short papers) including references
and appendices, and can be submitted as PDF via the CBT 2024 submission
site: https://easychair.org/conferences/?conf=cbt2024
*Double blind review*: CBT requires anonymized submissions -- please
make sure that submitted papers contain no author names or obvious
self-references.
Accepted regular papers will be published by Springer in the LNCS
collection. At least one author of each accepted paper is required to
register and present their work at the workshop; otherwise the paper
will not be included in the proceedings.
==================
PROGRAM COMMITEE
==================
PC Chairs:
Sergi Delgado-Segura - Chaincode Labs
Cristina Perez-Sola - Universitat Autonoma de Barcelona
PC Members:
Lennart Ante - Blockchain Research Lab
Daniel Augot - INRIA Saclay
Alex Biryukov - University of Luxembourg
Mauro Conti - University of Padua
Vanesa Daza - Universitat Pompeu Fabra
Victor Garcia - Universitat Oberta de Catalunya
Hannes Hartenstein - KIT
Jordi Herrera-Joancomarti - Universitat Autonoma de Barcelona
Jiasun Li - George Mason University
Shin'ichiro Matsuo - Virginia Tech and Georgetown University
Jose Luis Munoz-Tapia - Universitat Politecnica de Catalunya
Guillermo Navarro-Arribas - Universitat Autonoma de Barcelona
Dongming Peng - University of Nebraska-Lincoln
Matteo Signorini - Nokia Bell Labs
Hitesh Tewari - Trinity College Dublin
Florian Tschorsch - Technische Universitat Berlin
Eirini Tsiropoulou - University of New Mexico
Dimitrios Vasilopoulos - IMDEA Software Institute
==================
VENUE/FORMAT
==================
The workshop will be held in Bydgoszcz, Poland, in conjunction
with the 29th annual European Symposium on Research in Computer Security,
ESORICS. More information on accommodation and venue available from the
ESORICS 2024 website at https://esorics2024.org/
This call for papers and additional information about CBT 2024
can be found at http://cbtworkshop.org/
Kindly contact us at cbt2024(a)easychair.org in case of doubts or
questions.
--
*Aquest missatge s'adreça exclusivament al seu destinatari i pot
contenir informació confidencial. Si no sou el destinatari indicat, no
utilitzeu, divulgueu ni copieu sense autorització el contingut del
missatge. *Si heu rebut aquest missatge per error, us demanem que ens ho
feu saber immediatament per aquesta via i que el destruïu.**
*El
responsable de les dades facilitades en aquest correu és la UOC; la
finalitat és mantenir la relació contractual o facilitar-vos la informació
que necessiteu. Les dades podran conservar-se mentre es mantingui la
relació o s'hagi donat per resolta la sol·licitud d'informació. La base
jurídica és la relació contractual que manteniu amb la UOC o, si s'escau,
l'interès legítim de la UOC a donar-vos resposta.*
*Les dades no seran
cedides per al seu ús per tercers; hi poden tenir accés únicament
proveïdors que ens presten serveis auxiliars i que tenen la condició
d'encarregats del tractament.*
*Podeu exercir els drets previstos als
articles 15 a 22 del RGPD adreçant-vos a **fuoc_pd(a)uoc.edu*
<mailto:fuoc_pd@uoc.edu>*. Podeu contactar amb el nostre delegat de
protecció de dades a **dpd(a)uoc.edu* <mailto:dpd@uoc.edu>*. Així mateix,
teniu dret a presentar una reclamació davant l'APDCAT.*
*Este mensaje se
dirige exclusivamente a su destinatario y puede contener información
confidencial. Si usted no es el destinatario indicado, no utilice, divulgue
ni copie sin autorización su contenido. *Si ha recibido este mensaje por
error, le pedimos que nos lo haga saber inmediatamente por esta vía y que
lo destruya.**
*El responsable de los datos facilitados en este correo es
la UOC; su finalidad es mantener la relación contractual o facilitarle la
información que necesita. Los datos podrán conservarse mientras se mantenga
la relación o se haya dado por resuelta la solicitud de información. La
base jurídica es la relación contractual que mantiene con la UOC o, en su
caso, el interés legítimo de la UOC de darle respuesta.*
*Los datos no
serán cedidos para su uso por terceros; pueden tener acceso a ellos
únicamente proveedores que nos prestan servicios auxiliares y que tienen la
condición de encargados del tratamiento.*
_Puede ejercer los derechos
previstos en los artículos 15 a 22 del RGPD dirigiéndose a
*fuoc_pd(a)uoc.edu* <mailto:fuoc_pd@uoc.edu>_. Puede contactar con nuestro
delegado de protección de datos en *dpd(a)uoc.edu* <mailto:dpd@uoc.edu>_. Así
mismo, tiene derecho a presentar una reclamación ante la APDCAT.___
*This message is intended exclusively for its recipient and may contain
confidential information. If you are not the intended recipient, do not
use, disclose or copy its contents without authorization. *If you have
received this message in error, please let us know immediately through this
channel and destroy it.**
*The data controller for the data provided in
this email is the Universitat Oberta de Catalunya (UOC), and the purpose is
to maintain the contractual relationship or provide you with any
information you may need. The data may be retained for as long as the
relationship continues or until the request for information is deemed to
have been resolved. The legal basis is your contractual relationship with
the UOC or, where applicable, its legitimate interest in responding to
you.*
*The data will not be transferred for use by third parties; only
providers that provide auxiliary services and act as data processors may
have access.*
*You can exercise the rights provided in Articles 15 to 22
of the GDPR by writing to **fuoc_pd(a)uoc.edu* <mailto:fuoc_pd@uoc.edu>*. You
can contact our Data Protection Officer at **dpd(a)uoc.edu*
<mailto:dpd@uoc.edu>*. You are also entitled to file a claim with the
Catalan data protection authority (APDCAT).*
Please, accept our apologies if you receive multiple copies of this email.
CALL FOR PAPERS
******************************************************
Data Privacy Management (DPM 2024)
19th International Workshop
September 19, 2024, Bydgoszcz, Poland
(co-located with ESORICS 2024)
website: https://deic.uab.cat/dpm/dpm2024/
******************************************************
IMPORTANT DATES
======================
Submission Deadline:
-- June 23, 2024 (extended)
Notification:
-- July 15, 2024
Camera Ready:
-- August 19, 2024
======
SCOPE
======
DPM is an annual international workshop covering research in data
privacy management. Organizations are increasingly concerned
about the privacy of information that they manage (as witnessed,
for example, by lawsuits filed against organizations for
violating the privacy of customer's data). Thus, the management
of privacy-sensitive information is very critical and important
for every organization.
This poses several challenging problems, such as how to translate the
high-level business goals into system-level privacy policies,
administration of privacy-sensitive data, privacy preserving data
integration and engineering, privacy preserving access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers. Starting from these
observations, the aim of DPM is to discuss and exchange ideas related
to data privacy management. We invite papers from researchers and
practitioners working in privacy, security, trustworthy data systems
and related areas to submit their original papers in this workshop.
Submissions by PhD students as well as controversial ideas are
encouraged. Case studies (successful or not) are also encouraged.
TOPICS
========
Topics of interest include, but are not limited to:
- Privacy in Machine Learning
- Privacy Information Management
- Privacy Policy-based Infrastructures and Architectures
- Privacy-oriented Access Control Languages and Models
- Privacy in Trust Management
- Privacy in Cryptocurrencies
- Privacy Data Integration
- Privacy Risk Assessment and Assurance
- Privacy Services
- Privacy Policy Analysis
- Data Protection Regulations in Practice
- Cryptographic Protocols for Privacy
- Query Execution over Privacy Sensitive Data
- Privacy Preserving Data Mining
- Privacy for Integrity-based Computing
- Privacy Monitoring and Auditing
- Privacy in Social Networks
- Privacy in Ambient Intelligence (AmI) Applications
- Individual Privacy vs. Corporate/National Security
- Privacy in computer networks
- Privacy and RFIDs
- Privacy and Big Data
- Privacy in sensor networks
- Privacy in the Internet of Things
PAPER SUBMISSIONS
===================
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers can be submitted as Full Papers or
Short Papers. Full papers should be at most 16 pages in the LNCS
format, including the bibliography and well-marked appendices. Short
papers should be at most 8 pages in the LNCS format, including the
bibliography and well-marked appendices. Program Committee members are
not required to read the appendices, so papers should be intelligible
without them.
Authors should indicate whether their paper is a short paper to
differentiate them from full papers. All submissions must be written
in English. It is planned to have accepted papers published by
Springer in the Lecture Notes in Computer Science (LNCS) series, the
LNCS template can be found at
http://www.springer.com/computer/lncs/lncs+authors.
Authors must submit their papers by the indicated deadline, using the
EasyChair web site:
https://easychair.org/conferences/?conf=dpm2024
Only PDF files will be accepted (a Latex source file will be required
for the
final version of the accepted papers). All papers will be refereed. Accepted
papers must be presented at the Workshop. At least one author of each
accepted
paper must register to the workshop, by the early date indicated by the
organizers, and present the paper.
GENERAL CHAIR
===============
Joaquin Garcia-Alfaro ((Institut Polytechnique de Paris)
PROGRAM CHAIRS
===============
Ken Barker (University of Calgary)
Guillermo Navarro-Arribas (Universitat Autonoma de Barcelona)
PROGRAM COMMITTEE
=================
Esma Aïmeur (University of Montreal)
Abderrahim Ait Wakrime (Mohammed V University)
Jordi Casas-Roma (Universitat Autonoma de Barcelona)
Jordi Castellà-Roca (Universitat Rovira i Virgili)
Depeng Chen (Anhui University)
Mauro Conti (University of Padua)
Mathieu Cunche (University of Lyon / Inria)
Nora Cuppens-Boulahia (Polytechnique Montreal)
Mila Dalla Preda (University of Verona)
Sabrina De Capitani di Vimercati (Universita degli Studi di Milano)
Jose M. De Fuentes (Universidad Carlos III de Madrid)
Josep Domingo-Ferrer (Universitat Rovira i Virgili)
Sebastien Gambs (Université du Québec à Montréal)
Lorena González Manzano (Universidad Carlos III de Madrid)
M. Emre Gursoy (Koç University)
Guy-Vincent Jourdan (University of Ottawa)
Marc Juarez (University of Edinburgh)
Christos Kalloniatis (University of the Aegean)
Bruce Kapron (University of Victoria)
Sokratis Katsikas (Norwegian University of Science and Technology)
Christophe Kiennert (Telecom SudParis)
Romain Laborde (University Paul Sabatier Toulouse III)
Patrick Lacharme (Ensicaen)
Giovanni Livraga (University of Milan)
Brad Malin (Vanderbilt University)
Lukas Malina (Brno University of Technology)
David Megias (Universitat Oberta de Catalunya)
Chris Mitchell (Royal Holloway, University of London)
Gerardo Pelosi (Politecnico di Milano)
Cristina Perez-Sola (Universitat Utonoma de Barcelona)
Kai Rannenberg (Goethe University Frankfurt)
Isabel Praça (GECAD / ISEP)
Ruben Rios (Universidad de Malaga)
Pierangela Samarati (Universita degli Studi di Milano)
Vicenç Torra (Umeå University)
Alexandre Viejo (Universitat Rovira i Virgili)
Isabel Wagner (University of Basel)
Jens Weber (University of Victoria)
Lena Wiese (University of Göttingen)
Nicola Zannone (Eindhoven University of Technology)
==================
VENUE/FORMAT
==================
The workshop will be held in Bydgoszcz, Poland, in conjunction with the 29th
annual European Symposium on Research in Computer Security, ESORICS. More
information on accommodation and venue available from the ESORICS 2024
website
at https://esorics2024.org/
This call for papers and additional information about DPM 2024
can be found at https://deic.uab.cat/dpm/dpm2024/
Kinldy contact dpm2024(a)easychair.org in case of doubts or questions.