The 2008 IEEE International Workshop on Cyberspace Safety and Security (CSS 2008)
December 12, 2008, Sydney, Australia
To be held in conjunction with The 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-08)
News: Final camera-ready paper instruction can be found at http://www.ieeeconfpublishing.org/cpir/AuthorKit.asp?Community=CPS&Facility=CPS_Dec&ERoom=ISPA2008. Please note that the due date is 26 September 2008.
News: Registration information can be found at http://www.cs.usyd.edu.au/~ispa2008/ISPA08-reg-instruction.htm. Please note that the due date is 26 September 2008.
A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace.
In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.
In this context, we focus our program on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. The aim of this workshop is to provide a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area.
The publications of this workshop will be IEEE Computer Society Proceedings (EI, ISTP, and INSPEC indexed). Selected best papers will be published in international journals.
Contributions are solicited in all areas of cyberspace safety and security research and applications. Topics include, but not limited to:
- Access Control and Trust Management
- Active Defense Techniques and Systems
- Attack Containment
- Attack Recovery
- Benchmark, Analysis and Evaluation of Cybersecurity
- Digital Rights Management
- Distributed Intrusion Detection/Prevention Systems
- Denial-of-Service Attacks and Countermeasures
- Identity Management and Authentication
- Implementation, Deployment and Management of Cybersecurity
- Intelligent Defense Systems
- Internet and Network Forensics
- Risk Assessment in Cybersecurity
- Secure Design and Testing
- Secure Network Architectures
- Security for Large-scale Systems and Critical Infrastructures
- Security for P2P systems and Grid Systems
- Security for Ad-Hoc and Sensor Networks
- Security in Web Services
- Security in Pervasive and Embedded Systems
- Security Theory and Tools
- Spam Detection and Prevention
- Social and Legal Issues in Cybersecurity
- Software and System Assurance
- Viruses, Worms, and Other Malicious Code