会议名称(中文): 第27届IEEE计算机安全基础研讨会 会议名称(英文): 27th IEEE Computer Security Foundations Symposium (CSF'14) 所属学科: 计算机科学理论,信息安全 开始日期: 2014-07-19 结束日期: 2014-07-22 所在国家: 奥地利 所在城市: 奥地利 具体地点: Vienna, Austria 主办单位: IEEE Computer Society、维罗纳大学
[ 重要日期 ] 摘要截稿日期: 2014-02-03 全文截稿日期: 2014-02-10
[ 会务组联系方式 ] 联系人: Anupam Datta E-MAIL: csf2014@easychair.org 会议网站: http://csf2014.di.univr.it/index 会议背景介绍: The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF.
The program includes papers and panels. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area. See the Call for Papers and Panels for more information. 征文范围及要求: Topics New results in computer security are welcome. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware- based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.
|