Tuesday, September 9, 2014

dmanet Digest, Vol 79, Issue 4

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. [deadline approaching] SI on Critical Systems Modeling and
Security, Elsevier Computers & Electrical Engineering --
deadline: September 30, 2014 (Joaquin Garcia-Alfaro)
2. Call for Participation - DPM 2014 - 9th International
Workshop on Data Privacy Management, ESORICS'2014, Wroclaw,
Poland, September 10, 2014 (Joaquin Garcia-Alfaro)
3. BigDat 2015: registration deadline 23 September (GRLMC)
4. IFIP/IEEE IM 2015 in Ottawa, Canada - Submissions due in less
than 1 week (Giovane C. M. Moura)


----------------------------------------------------------------------

Message: 1
Date: Sun, 07 Sep 2014 09:18:40 +0200
From: Joaquin Garcia-Alfaro
<joaquin.garcia_alfaro@telecom-sudparis.eu>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] [deadline approaching] SI on Critical Systems
Modeling and Security, Elsevier Computers & Electrical Engineering --
deadline: September 30, 2014
Message-ID: <540C06D0.9080507@telecom-sudparis.eu>
Content-Type: text/plain; charset=windows-1252; format=flowed

Apologies for cross-posting
---------------------------

Special issue on Critical Systems Modeling and Security
Elsevier Computers & Electrical Engineering
Manuscript Due: September 30, 2014 (Extended deadline)


Aim and scope

Modeling is an essential tool for the study and analysis of
security and dependability of Critical Information
Infrastructures. It can be used to evaluate properties such as
disruption, disturbance and loss of information, and to
anticipate incidents that could lead to situations involving
economical, material and, even, human loss. This special issue is
intended to report the most recent research works related to
security threats, critical service malfunctioning or information
leakage targeting, among others, SCADA, Industrial Control
Systems and other Critical Scenarios, associated to both
government and industrial companies. It also seeks to report new
needs, approaches, methods and tools addressing this crucial
topic.

The objective is to bring together advances particularly in the
following fields:

- Attack and vulnerability analysis
- Benchmarking and statistical analysis tools
- Critical Infrastructure Protection (CIP)
- Cybersecurity and cyberwarfare modeling
- Continuity of services
- Dependable communication models
- Early Warning Systems
- Embedded Technologies Security
- Intrusion detection and prevention in Critical Scenarios
- Fault tolerance and incident response
- Risk analysis and management
- SCADA/DCS and Control System Security
- Secure information sharing
- Security and dependability logistic models
- Self-management architectures
- Situation awareness and response optimization
- Trust and reputation management in Critical Scenarios


Submission Guidelines

Papers will be evaluated based on their originality,
presentation, relevance and contribution to the topic associated
to the special issue, and for their overall quality. The
submitted papers have to describe original research which has not
been published nor currently under review by other journals or
conferences. Guest editors will make an initial determination of
the suitability and scope of all submissions. Papers that either
lack originality, clarity in presentation or fall outside the
scope of the special issue will not be sent for review and
authors will be promptly informed in such cases.

Author guidelines for preparation of manuscript can be found at
http://www.elsevier.com/wps/find/journaldescription.cws_home/367/authorinstructions

Papers should be submitted via the EES application that can be found at
http://ees.elsevier.com/compeleceng

To ensure that all manuscripts are correctly identified for
inclusion into the special issue, it is important that authors
select SI-sec4 when they reach the ?Article Type? step in the
submission process.

Schedule

Manuscript Due: September 30, 2014 (Extended deadline)
First Round of Reviews: November 31, 2014
Second Round of Reviews: January 15, 2015
Acceptance of Final papers: February 15, 2015
Final Manuscript Due: March 15, 2015
Publication Date: October 2015

Guest Editors

Joaquin Garcia-Alfaro
Institut Mines-Telecom, Telecom SudParis, France
Email: joaquin.garcia_alfaro@telecom-sudparis.eu

Francesco Longo
University of Calabria, Italy
Email: f.longo@unical.it

Gregorio Martinez Perez
University of Murcia, Spain
Email: gregorio@um.es






------------------------------

Message: 2
Date: Sun, 07 Sep 2014 09:43:03 +0200
From: Joaquin Garcia-Alfaro
<joaquin.garcia_alfaro@telecom-sudparis.eu>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Call for Participation - DPM 2014 - 9th
International Workshop on Data Privacy Management, ESORICS'2014,
Wroclaw, Poland, September 10, 2014
Message-ID: <540C0C87.3090804@telecom-sudparis.eu>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed

Apologies for multiple copies
------------------------------

DPM 2014, 9th International Workshop on
DATA PRIVACY MANAGEMENT

http://deic.uab.cat/conferences/dpm/dpm2014/

Wroclaw, Poland, September 10, 2014
(co-located with ESORICS'2014)
Springer LNCS Proceedings

Scope: Organizations are increasingly concerned about the privacy of
information that they manage (several people have filed lawsuits
against organizations violating the privacy of customer's data). Thus,
the management of privacy-sensitive information is very critical and
important for every organization. This poses several challenging
problems, such as how to translate the high-level business goals into
system-level privacy policies, administration of privacy-sensitive
data, privacy data integration and engineering, privacy access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers.

**Programme**:

10:00-10:15 Welcome & Opening Remarks

10:15-11:15 Keynote: Is bitcoin suitable as a research topic?
by Jordi Herrera-Joancomart? (Universitat Aut?noma de Barcelona)


11:15-11:45 Coffee Break


11:45-13:00 Session 1 - Cryptographic Solutions for Privacy

* Group Discounts Compatible with Buyer Privacy, by Josep
Domingo-Ferrer, Alberto Blanco-Justicia

* Towards an Image Encryption Scheme with Content-Based Image Retrieval
Properties, by Bernardo Ferreira, Joao Rodrigues, Joao Leitao and
Henrique Domingos

* The crypto-democracy and the Trustworthy, by Sebastien Gambs, Samuel
Ranellucci and Alain Tapp


13:00-14:30 Lunch Break


14:30-16:15 Session 2 - Emerging challenges

* Configuration Behavior of Restrictive Default Privacy Settings on
Social Network Sites, by Markus Tschersich

* Toward Inherent Privacy Awareness in Workflows, by Maria Koukovini,
Eugenia Papagiannakopoulou, Georgios Lioudakis, Nikolaos Dellas, Dimitra
I. Kaklamani, Iakovos S. Venieris

* Index Optimization for L-Diversified Database-as-a-Service, by Jens
Kohler and Hannes Hartenstein

* A-PPL: An Accountability Policy Language for Cloud Computing, by
Monir Azraoui, Kaoutar Elkhiyaoui, Melek Onen, Karin Bernsmed, Anderson
Santana De Oliveira and Jakub Sendor


16:15-16:45 Coffee Break


16:40-18:30 Session 3 - Privacy-Preserving, Protocols & Applications

* Privacy-preserving Loyalty Programs, by Alberto Blanco-Justicia and
Josep Domingo-Ferrer

* Secure Improved Cloud-Based RFID Authentication Protocol, by Sarah
Abughazalah, Konstantinos Markantonakis, and Keith Mayes

* Privacy-Preserving Electronic Toll System with Dynamic Pricing for Low
Emission Zones, by Roger Jardi-Cedo, Jordi Castella-Roca and Alexandre Viejo

* Association Rule Mining on Fragmented Database, by Amel Hamzaoui,
Qutaibah Malluhi, Riley Ryan and Clifton Chris





------------------------------

Message: 3
Date: Sun, 7 Sep 2014 09:52:30 +0200
From: "GRLMC" <grlmc@urv.cat>
To: <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] BigDat 2015: registration deadline 23 September
Message-ID: <B13858665E4848B3845B880743D16610@Carlos1>
Content-Type: text/plain; charset="iso-8859-1"

*****************************************************

INTERNATIONAL WINTER SCHOOL ON BIG DATA

BigDat 2015

Tarragona, Spain

January 26-30, 2015

Organized by
Rovira i Virgili University

http://grammars.grlmc.com/bigdat2015/

*****************************************************

--- 4th registration deadline: September 23, 2014 ---

*****************************************************

AIM:

BigDat 2015 is a research training event for graduates and postgraduates in
the first steps of their academic career. It aims at updating them about the
most recent developments in the fast developing area of big data, which
covers a large spectrum of current exciting research, development and
innovation with an extraordinary potential for a huge impact on scientific
discoveries, medicine, engineering, business models, and society itself.
Renowned academics and industry pioneers will lecture and share their views
with the audience.

All big data subareas will be displayed, namely: foundations,
infrastructure, management, search and mining, security and privacy, and
applications. Main challenges of analytics, management and storage of big
data will be identified through 4 keynote lectures and 24 six-hour courses,
which will tackle the most lively and promising topics. The organizers
believe outstanding speakers will attract the brightest and most motivated
students. Interaction will be a main component of the event.

ADDRESSED TO:

Graduate and postgraduates from around the world. There are no formal
pre-requisites in terms of academic degrees. However, since there will be
differences in the course levels, specific knowledge background may be
required for some of them.

BigDat 2015 is also appropriate for more senior people who want to keep
themselves updated on recent developments and future trends. They will
surely find it fruitful to listen and discuss with major researchers,
industry leaders and innovators.

REGIME:

In addition to keynotes, 3 courses will run in parallel during the whole
event. Participants will be able to freely choose the courses they will be
willing to attend as well as to move from one to another.

VENUE:

BigDat 2015 will take place in Tarragona, located 90 kms. to the south of
Barcelona. The venue will be:

Campus Catalunya
Universitat Rovira i Virgili
Av. Catalunya, 35
43002 Tarragona

KEYNOTE SPEAKERS:

Ian Foster (Argonne National Laboratory), tba

Geoffrey C. Fox (Indiana University, Bloomington), Mapping Big Data
Applications to Clouds and HPC

C. Lee Giles (Pennsylvania State University, University Park), Scholarly Big
Data: Information Extraction and Data Mining

William D. Gropp (University of Illinois, Urbana-Champaign), tba

COURSES AND PROFESSORS:

Hendrik Blockeel (KU Leuven), [intermediate] Decision Trees for Big Data
Analytics

Diego Calvanese (Free University of Bozen-Bolzano),
[introductory/intermediate] End-User Access to Big Data Using Ontologies

Jiannong Cao (Hong Kong Polytechnic University), [introductory/intermediate]
Programming with Big Data

Edward Y. Chang (HTC Corporation, New Taipei City), [introductory/advanced]
>From Design of Distributed and Online Algorithms to Hands-on Code Lab
Practice on Real Datasets

Ernesto Damiani (University of Milan), [introductory/intermediate] Process
Discovery and Predictive Decision Making from Big Data Sets and Streams

Gautam Das (University of Texas, Arlington), [intermediate/advanced] Mining
Deep Web Repositories

Maarten de Rijke (University of Amsterdam), tba

Geoffrey C. Fox (Indiana University, Bloomington), [intermediate] Using
Software Defined Systems to Address Big Data Problems

Minos Garofalakis (Technical University of Crete, Chania)
[intermediate/advanced], Querying Continuous Data Streams

Vasant G. Honavar (Pennsylvania State University, University Park)
[introductory/intermediate], Learning Predictive Models from Big Data

Mounia Lalmas (Yahoo! Research Labs, London), [introductory] Measuring User
Engagement

Tao Li (Florida International University, Miami),
[introductory/intermediate] Data Mining Techniques to Understand Textual
Data

Kwan-Liu Ma (University of California, Davis), [intermediate] Big Data
Visualization

Christoph Meinel (Hasso Plattner Institute, Potsdam),
[introductory/intermediate] New Computing Power by In-Memory and Multicore
to Tackle Big Data

David Padua (University of Illinois, Urbana-Champaign), [intermediate] Data
Parallel Programming

Manish Parashar (Rutgers University, Piscataway), [intermediate] Big Data in
Simulation-based Science

Srinivasan Parthasarathy (Ohio State University, Columbus), [intermediate]
Scalable Data Analysis

Evaggelia Pitoura (University of Ioannina), [intermediate] Online Social
Networks

Vijay V. Raghavan (University of Louisiana, Lafayette),
[introductory/intermediate] Visual Analytics of Time-evolving Large-scale
Graphs

Pierangela Samarati (University of Milan), [intermediate], Data Security and
Privacy in the Cloud

Peter Sanders (Karlsruhe Institute of Technology),
[introductory/intermediate] Algorithm Engineering for Large Data Sets

Johan Suykens (KU Leuven), [introductory/intermediate] Fixed-size Kernel
Models for Big Data

Domenico Talia (University of Calabria, Rende), [intermediate] Scalable Data
Mining on Parallel, Distributed and Cloud Computing Systems

Jieping Ye (Arizona State University, Tempe), [introductory/advanced]
Large-Scale Sparse Learning and Low Rank Modeling

ORGANIZING COMMITTEE:

Adrian Horia Dediu (Tarragona)
Carlos Mart?n-Vide (Tarragona, chair)
Florentina Lilica Voicu (Tarragona)

REGISTRATION:

It has to be done at

http://grammars.grlmc.com/bigdat2015/registration.php

The selection of up to 8 courses requested in the registration template is
only tentative and non-binding. For the sake of organization, it will be
helpful to have an approximation of the respective demand for each course.

Since the capacity of the venue is limited, registration requests will be
processed on a first come first served basis. The registration period will
be closed and the on-line registration facility disabled when the capacity
of the venue will be complete. It is much recommended to register prior to
the event.

FEES:

As far as possible, participants are expected to stay full-time. Fees are a
flat rate covering the attendance to all courses during the week. There are
several early registration deadlines. Fees depend on the registration
deadline.

ACCOMMODATION:

Suggestions of accommodation will be provided in due time.

CERTIFICATE:

Participants will be delivered a certificate of attendance.

QUESTIONS AND FURTHER INFORMATION:

florentinalilica.voicu@urv.cat

POSTAL ADDRESS:

BigDat 2015
Lilica Voicu
Rovira i Virgili University
Av. Catalunya, 35
43002 Tarragona, Spain

Phone: +34 977 559 543
Fax: +34 977 558 386

ACKNOWLEDGEMENTS:

Universitat Rovira i Virgili


---
Este mensaje no contiene virus ni malware porque la protecci?n de avast! Antivirus est? activa.
http://www.avast.com




------------------------------

Message: 4
Date: Tue, 09 Sep 2014 10:00:34 +0200
From: "Giovane C. M. Moura" <g.c.moreiramoura@tudelft.nl>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] IFIP/IEEE IM 2015 in Ottawa, Canada - Submissions
due in less than 1 week
Message-ID: <540EB3A2.6090004@tudelft.nl>
Content-Type: text/plain; charset=utf-8





************************************************************************************

IFIP/IEEE IM 2015

The 14th IFIP/IEEE International Symposium on Integrated Network Management

Ottawa, Ontario, Canada, 11-15 May 2015

http://www.ieee-im.org/

(Paper Submission Date: September 15, 2014)

"Integrated Management in the Age of Big Data"

************************************************************************************

The 14th IFIP/IEEE International Symposium on Integrated Network
Management
(IM 2015) will be held 11-15 May 2015 in Ottawa, Ontario, Canada and
hosted by
the Ottawa Convention Centre. Held in odd-numbered years since 1989,
IM 2015
follows the 27 years tradition of NOMS and IM as the primary IEEE
Communications
Society's forum for technical exchange on management of
information and
communication technology focusing on research, development,
integration,
standards, service provisioning, and user communities. IM 2015 will
focus on the
theme "Integrated Management in the Age of Big Data"
presenting recent,
emerging approaches and technical solutions for dealing with Big Data
as well as
using it for management solutions. IM 2015 will offer five
types of sessions:
technical, experience, poster, panel and dissertation. High quality
will be assured
through a well qualified Technical Program Committee and stringent
peer review
of paper submissions. A special call for demonstrations is
organized to allow
industry partners and researchers to demonstrate early products and
prototypes.

KEYNOTE SPEAKERS

We would like to highlight the four Keynote Addresses confirmed so far:
- Alberto Leon Garcia (University of Toronto, Canada)
- Dinesh Verma (IBM, USA)
- Ibrahim Gideon (Telus, Canada)
- Rich Friedrich (HP, USA)

CALL FOR SUBMISSIONS

Technical Papers (deadline: September 15, 2014)
http://www.ieee-im.org/content/technical-session-papers

Experience Papers (deadline: September 15, 2014)
http://www.ieee-im.org/content/experience-session-papers

Dissertation Papers (deadline: October 30, 2014)
http://www.ieee-im.org/content/dissertation-papers

Tutorials (deadline: October 17, 2014)
http://www.ieee-im.org/content/tutorials-0

Panels (deadline: October 31, 2014)
http://www.ieee-im.org/content/panels

Exhibits and Demos (deadline: January 30, 2015)
http://www.ieee-im.org/content/demos

More Information on Workshops
http://www.ieee-im.org/content/workshops-0

TOPICS OF INTEREST

Authors are invited to submit papers that fall into or are related to
the topic areas
that are listed below. In addition, we invite submissions of
proposals for
demonstrations, exhibits, technical panels, tutorials and workshops.
Papers can be
submitted as technical session full papers, technical session
short papers,
experience session papers and dissertation papers.

Network Management & Operational Experience
- Software Defined Networks (SDN)
- Smart Cities, Smart Grids
- Internet of Things (IoT)
- Future Internet
- Content Distribution Networks (P2P, CDN, ICN)
- Virtual and Overlay Networks
- Data Centers, Storage Area Networks
- Cyber-Physical Systems
- Wireless and Mobile Networks (Ad-Hoc, Mesh, Sensor, Vehicular)
- Smart Devices and Home Networks
- Broadband Access Networks
- Cognitive Radio Networks
- IP/MPLS Networks
- Optical Networks
- Heterogeneous Networks

Service Management
- Cloud Services (IaaS, PaaS, SaaS)
- IT Service Management
- Multimedia and Data Services
- QoE-Centric Management
- Service Discovery, Migration and Orchestration
- Resource Provisioning and Management
- Hosting and Virtualized Infrastructures
- OTT Service Management
- Management as a Service

Business Management
- Legal and Ethical Issues
- Process Management

Functional Areas
- Deployment
- Fault Management
- Diagnostics, Tracing, Troubleshooting
- Configuration Management
- Accounting and Billing Management
- Performance Management
- Service Level Management
- Security Management, IDS, IPS

Management Approaches
- Centralized management
- Distributed management
- Autonomic and self-management
- Policy-based management
- Federated Management
- Pro-Active Management
- Energy-Aware Management
- Management Architectures

Management Enablers & Technologies
- Network Programmability
- Cloud Computing
- Network Function Virtualization (NFV), Service Chaining
- (Big) Data, Information and Semantic Modeling
- Protocols and Languages
- Message and Software Buses
- Middleware, Grids
- Mobile Agents
- Social Networking
- Human-Machine Interactions
- Operations and Business Support Systems (OSS/BSS)

Methodologies for Network Operations and Management
- (Big) Data Analytics and Data Mining
- Monitoring and Measurements
- Control Theories
- Optimization Theories
- Economic Theories
- Machine learning and Genetic Algorithms
- Probability, Stochastic Processes, and Queuing Theory
- Design and Simulation
- Experimental Studies
- Visualization

GENERAL CO-CHAIRS

- Raouf Boutaba, University of Waterloo, Canada
- Wahab Almuhtadi, Algonquin College, Canada

TPC CO-CHAIRS

- Shingo Ata, Osaka City University, Japan
- Remi Badonnel, TELECOM Nancy - LORIA/INRIA, France
- Jin Xiao, IBM T.J. Watson, USA

STEERING COMMITTEE

- Raouf Boutaba, University of Waterloo, Canada
- Marcus Brunner, Swisscom, Switzerland
- Alex Clemm, Cisco, USA
- Olivier Festor, Telecom Nancy, France
- Nobuo Fujii, NTT, Japan
- Lisandro Zambenedetti Granville, UFRGS, Brazil
- Aiko Pras, University of Twente, Netherlands
- Doug Zuckerman, Applied Communication Sciences, USA

A PDF version of this call is available for download on:
http://im2015.ieee-im.org/call-for-submissions

For more information, please feel free to contact the TPC chairs
at im2015tpcchairs@gmail.com or visit http://www.ieee-im.org



------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 79, Issue 4
*************************************

No comments:

Post a Comment