MM-INTEREST Archives

ACM SIGMM Interest List

MM-INTEREST@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0
Sender:
ACM SIGMM Interest List <[log in to unmask]>
X-To:
Date:
Thu, 12 Jul 2012 11:31:03 -0500
Content-Disposition:
inline
Reply-To:
Jeffrey McDonald <[log in to unmask]>
Subject:
From:
Jeffrey McDonald <[log in to unmask]>
X-cc:
Message-ID:
Content-Transfer-Encoding:
quoted-printable
Content-Type:
text/plain; charset=US-ASCII
Parts/Attachments:
text/plain (185 lines)
CALL FOR EXTENDED ABSTRACTS
CSIIRW-12
www.csiir.ornl.gov/csiirw 
October 30 - November 1, 2012
8th Annual Cyber Security and Information Intelligence 
Research Workshop 
Oak Ridge National Laboratory, Oak Ridge, TN  USA

CSIIRW-11 Proceedings
http://dl.acm.org/citation.cfm?id=2179298&coll=DL&dl=GUIDE 

___________________________________________________
IMPORTANT DATES in 2012:
  Aug 10:   Extended abstracts (up to 4 pages) submitted
  Aug 31:   Author notification
  Sep 14:   Early registration ($180); 
            Final draft and copyright release due
  Oct 26:   Publication of CSIIRW Proceedings in ACM Digital Library
            (including extended abstracts and presentations)
___________________________________________________
SYNOPSIS:
Today's cyberspace is a powerful, virtual environment enabled by our 
global digital infrastructure that provides a bright landscape for 
commerce, science, education, communication, and government. The 
future of America's prosperity hinges on rebalancing cyberspace to 
mitigate threats and maximize benefits, ensuring security and privacy
in a constantly changing adversarial environment. 

Recognizing this great need, we request original paper submissions in four
general areas derived from the Federal Cybersecurity R&D program thrusts:

- Designed-In-Security (DIS) - Builds the capability to design, develop, and 
  evolve high-assurance, software-intensive systems predictably and 
  reliably while effectively managing risk, cost, schedule, quality, 
  and complexity.

- Tailored Trustworthy Spaces (TTS) - Provides flexible, adaptive, distributed 
  trust environments that can support functional and policy requirements 
  arising from a wide spectrum of activities in the face of an evolving 
  range of threats--recognizing the user's context and evolves as the 
  context evolves.

- Moving Target (MT) - Enables us to create, analyze, evaluate, and deploy 
  mechanisms and strategies that are diverse and that continually shift 
  and change over time to increase complexity and cost for attackers, 
  limit the exposure of vulnerabilities and opportunities for attack, 
  and increase system resiliency.

- Cyber Economic Incentives (CEI) - develops effective incentives to make 
  cybersecurity ubiquitous, including incentives affecting individuals 
  and organizations. 

___________________________________________________
IMPORTANT GOALS:

The aim of this year's workshop is to discuss and publish novel 
theoretical and empirical research focused on one or more of the 
Federal Cybersecurity themes. The scope of interest to the workshop 
covers a wide range of topics related to cybersecurity and information 
intelligence.

Researchers from the Cyber Sciences Laboratory consisting of nine Department 
of Energy National Laboratories will be participating in CSIIRW-12.
We encourage all researchers and practitioners from among all 
communities involved with cybersecurity to also participate in the workshop
and gain better understanding of the needs, stakes, and context of the 
ever evolving problem of securing the cyber landscape. 

___________________________________________________
NON-EXCLUSIVE TOPICS

The goal of the workshop is to address problems and find solutions 
across the cyber community involving all stakeholders. Topics include
but are not limited to:
  
 - Security assurance/interoperability for critical infrastructure
 - Scalable/trusted control (cyber-physical) systems security
 - Visual Analytics for cybersecurity
 - Next-generation control systems vulnerability assessment
 - Wireless security
 - Testbeds and experimental environments
 - Use case modeling and attack scenarios
 - Wide-area monitoring, protection, and control
 - AMI, demand-response, and distribution grid management security
 - Electric transportation & distributed energy resources security
 - Policy/standards-driven architectures
 - Anti-tamper device architectures
 - Cryptographic key management
 - Security risk assessment and management
 - Trusted computing mechanisms and architectures
 - Software verification and assurance
 - Insider and life-cycle threats
 - Hardware and software provenance
 - Automated vulnerability detection
 - Semantic technologies in cybersecurity
 - Access control management and authentication services
 - Secure information exchange gateway and watchdog switches
 - Bio-inspired technologies for enhancing cybersecurity
 - Balancing privacy, confidentiality, and security
 - Next-generation security technologies

Other topics will be reviewed based upon their perceived 
contribution to the overall conference goals.
___________________________________________________
KEYNOTE SPEAKERS:

The list of keynote and invited speakers will be posted at:
www.csiir.ornl.gov/csiirw/12/keynotes.html 

Last year's keynote speakers:
www.csiir.ornl.gov/csiirw/11/keynotes.html 

___________________________________________________
TO BE ANNOUNCED:

Roll-out of Department of Energy (DOE) & National Nuclear Security 
Administration (NNSA) Cyber Sciences Laboratory (CSL)

___________________________________________________
SUBMISSION INSTRUCTIONS:

Participants are invited to submit extended abstracts of no 
more than four Pages (single-spaced) by August 2, 2012.
Read the full submission instructions at:
www.csiir.ornl.gov/csiirw/12/guidelines.html 

International Conference Proceedings Series published by ACM 

Easy Chair Submission Site:
www.easychair.org/conferences/?conf=csiirw8 

___________________________________________________
ORGANIZATION:

General Chairs:
  Frederick T. Sheldon and Joseph P. Trien
  Computational Sciences and Engineering Division
  Oak Ridge National Laboratory

Program Co-Chairs:
  Representatives from NNSA's Cyber Sciences Laboratory
  - Oak Ridge National Laboratory (ORNL)
  - Pacific Northwest National Laboratory (PNLL)
  - Argonne National Laboratory (ANL)
  - Idaho National Laboratory (INL)
  - Lawrence Berkeley National Laboratory (LBNL)
  - Nevada National Security Site (NNSS)
  - Los Alamos National Laboratory (LANL)
  - Sandia National Laboratory (SNL)
  - Lawrence Livermore National Laboratory (LLNL)

Steering Committee:
  Marco M Carvalho, Department of Computer Sciences
  Florida Institute of Technology
  Special Session Chair for Moving Target (MT)

  Michael R. Grimaila, Center for Cyberspace Research
  Air Force Institute of Technology
  Special Session Chair for Cyber Economic Incentives (CEI)

  J. Todd McDonald, School of Computing
  University of South Alabama
  Special Session Chair for Designed-In-Security (DIS)

  Thomas Morris, Electrical and Computer Engineering
  Mississippi State University
  Special Session Chair for Tailored Trustworthy Spaces (TTS)

  Jingshan Huang, School of Computing
  University of South Alabama

___________________________________________________
SPONSORS:

If you are interested in becoming a sponsor for CSIIRW-12, please
visit our sponsor information page:
www.csiir.ornl.gov/csiirw/12/sponsors.html 

############################

To unsubscribe from the MM-INTEREST list:
write to: mailto:[log in to unmask]
or click the following link:
http://listserv.acm.org/SCRIPTS/WA-ACMLPX.EXE?SUBED1=MM-INTEREST&A=1

ATOM RSS1 RSS2