Monday, February 23, 2015

dmanet Digest, Vol 84, Issue 23

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. InfoSec 2015: registration deadline 3 March (GRLMC)
2. NetSys 2015: Last Call for Participation (Andreas Paul)
3. CfP Journal of Revenue and Pricing Management (Catherine Cleophas)


----------------------------------------------------------------------

Message: 1
Date: Sat, 21 Feb 2015 22:42:22 +0100
From: "GRLMC" <grlmc@urv.cat>
To: <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] InfoSec 2015: registration deadline 3 March
Message-ID: <D59C7DFA21A24F8396B8BF9E4C962C5D@Carlos1>
Content-Type: text/plain; charset="iso-8859-1"

**********************************************************************

INTERNATIONAL SUMMER SCHOOL ON INFORMATION SECURITY

InfoSec 2015

Bilbao, Spain
(please notice the change of location)

July 6-10, 2015

Organized by
Deusto University
Rovira i Virgili University

http://grammars.grlmc.com/InfoSec2015/

**********************************************************************

--- 3rd registration deadline: March 3, 2015 ---

**********************************************************************

AIM:

InfoSec 2015 will be a major research training event addressed to graduates
and postgraduates in the first steps of their academic career. With a global
scope, it aims at updating them about the most recent advances in the
critical and fast developing area of information security, which covers a
large spectrum of current exciting academic research and industrial
innovation. It refers to procedures to defend information from unauthorized
access, use, modification, recording or destruction, with a critical role to
play in order to avoid or minimize risks in the digital world. Renowned
academics and industry pioneers will lecture and share their views with the
audience.

Most information security subareas will be displayed, namely: computer
security, cryptography, privacy, cyber security, mobile security, network
security, world wide web security, fraud prevention, data protection, etc.
Main challenges of information security will be identified through 4 keynote
lectures, 33 six-hour courses, and 1 round table, which will tackle the most
active and promising topics. The organizers believe outstanding speakers
will attract the brightest and most motivated students. Interaction will be
a main component of the event.

ADDRESSED TO:

Graduates and postgraduates from around the world. There are no formal
pre-requisites in terms of academic degrees. However, since there will be
differences in the course levels, specific background knowledge may be
required for some of them.

InfoSec 2015 is also appropriate for more senior people who want to keep
themselves updated on recent developments and future trends. They will
surely find it fruitful to listen and discuss with major researchers,
industry leaders and innovators.

REGIME:

In addition to keynotes, 4 courses will run in parallel during the whole
event. Participants will be able to freely choose the courses they will be
willing to attend as well as to move from one to another.

VENUE:

InfoSec 2015 will take place in Bilbao, the capital of the Basque Country
region, famous for its gastronomy and the seat of the Guggenheim Museum. The
venue will be:

DeustoTech, School of Engineering
Deusto University
Avda. Universidades, 24
48014 Bilbao

KEYNOTE SPEAKERS:

Jan Camenisch (IBM Research, Zurich), Privacy in a Digital World: a Lost
Cause?

Hao Chen (University of California, Davis), (In)security of Mobile Apps in
Untrusted Networks

Jennifer Seberry (University of Wollongong), The Global Village: the
Beginning of the Need for Computer Security [via videoconference]

Gene Tsudik (University of California, Irvine), Off-line Proximity-based
Social Networking

PROFESSORS AND COURSES:

N. Asokan (Aalto University), [intermediate] Mobile Security: Overview of
Hardware Platform Security and Considerations of Usability

Jan Camenisch (IBM Research, Zurich), [introductory/intermediate]
Technologies to Protect Online Privacy

Hao Chen (University of California, Davis), [intermediate/advanced] Security
of the Mobile App Ecosystem

Nicolas T. Courtois (University College London), [introductory/intermediate]
Security of ECDSA in Bitcoin and Crypto Currency

Claude Cr?peau (McGill University, Montr?al), [introductory/intermediate]
Quantum Computation, Cryptography and Cryptanalysis

Joan Daemen (ST Microelectronics Belgium, Diegem),
[introductory/intermediate] Sponge Functions, Keccak and SHA-3

Sajal K. Das (Missouri University of Science and Technology, Rolla),
[intermediate/advanced] Securing Cyber-Physical Systems: Challenges and
Opportunities

Sabrina De Capitani di Vimercati (University of Milan),
[introductory/intermediate] Security and Privacy in the Cloud

Herv? Debar (T?l?com SudParis), [introductory/intermediate] Detection and
Reaction to Attacks: from Intrusion Detection to Cyber-Defense

David Evans (University of Virginia, Charlottesville),
[introductory/intermediate] Secure Multiparty Computation: Techniques,
Theory, and Tools for Building Privacy-Preserving Applications

Rosario Gennaro (City University of New York), [intermediate/advanced] A
Survey of Verifiable Delegation of Computation

Trent Jaeger (Pennsylvania State University, University Park),
[intermediate/advanced] How to Add Security Enforcement to Legacy Programs

Somesh Jha (University of Wisconsin, Madison), [intermediate/advanced]
Analysis Techniques in Information Security

Antoine Joux (Pierre et Marie Curie University, Paris),
[introductory/intermediate] Discrete Logarithms in Finite Fields

Marc Joye (Technicolor R&I, Los Altos), [introductory/intermediate] Secure
Public-Key Cryptosystems

Lars R. Knudsen (Technical University of Denmark, Lyngby),
[introductory/intermediate] Block Ciphers: the Workhorses in Cryptography

Songwu Lu (University of California, Los Angeles),
[introductory/intermediate] Cellular Network Security: Issues and Defenses

Catherine Meadows (Naval Research Laboratory, Washington DC),
[introductory/intermediate] Formal Analysis of Cryptographic Protocols

Nasir Memon (New York University), [introductory/intermediate] User
Authentication

Ethan L. Miller (University of California, Santa Cruz),
[intermediate/advanced] Securing Stored Data in a Connected World

Stefano Paraboschi (University of Bergamo), [introductory/intermediate] Data
Protection in Network-enabled Systems

Bart Preneel (KU Leuven), [introductory/intermediate] Cryptology: State of
the Art and Research Challenges

Jean-Jacques Quisquater (Catholic University of Louvain),
[introductory/intermediate] The History of RSA: from Babylon to Smart Cards

Shantanu Rane (Palo Alto Research Center), [introductory/intermediate]
Privacy-preserving Data Analytics: Problems, Solutions and Challenges

Mark Ryan (University of Birmingham), [introductory/intermediate] Designing
Security Protocols: Electronic Voting, and Electronic Mail

Rei Safavi-Naini (University of Calgary), [introductory/intermediate]
Information-theoretically Secure Communication

Stefan Saroiu (Microsoft Research, Redmond), [advanced] Protecting Data on
Smartphones and Tablets Using Trusted Computing

Milind Tambe (University of Southern California, Los Angeles),
[introductory/intermediate] Introduction to the Emerging Science of Security
Games

Gene Tsudik (University of California, Irvine), [intermediate/advanced]
Security and Privacy in Candidate Future Internet Architectures

Yang Xiao (University of Alabama, Tuscaloosa), [introductory/advanced]
Security in Smart Grids

Wenyuan Xu (University of South Carolina, Columbia), [intermediate] Security
and Privacy Analysis of Embedded Systems

Yuliang Zheng (University of North Carolina, Charlotte), [introductory]
Cryptography and the Future of Money

ORGANIZING COMMITTEE:

Adrian Horia Dediu
Carlos Mart?n-Vide (co-chair)
Borja Sanz (co-chair)
Florentina Lilica Voicu

REGISTRATION:

The registration form can be found at:

http://grammars.grlmc.com/InfoSec2015/registration.php

The selection of up to 8 courses requested in the registration template is
only tentative and non-binding. For the sake of organization, it will be
helpful to have an approximation of the respective demand for each course.

Since the capacity of the venue is limited, registration requests will be
processed on a first come first served basis. The registration period will
be closed and the on-line registration facility disabled when the capacity
of the venue will be complete. It is much recommended to register prior to
the event.

FEES:

Fees are a flat rate covering the attendance to all courses during the week.
There are several early registration deadlines. Fees depend on the
registration deadline.

ACCOMMODATION:

Suggestions of accommodation will be provided in due time.

CERTIFICATE:

Participants will be delivered a certificate of attendance.

QUESTIONS AND FURTHER INFORMATION:

florentinalilica.voicu@urv.cat

ACKNOWLEDGEMENTS:

Deusto University
Rovira i Virgili University


---
Este mensaje no contiene virus ni malware porque la protecci?n de avast! Antivirus est? activa.
http://www.avast.com




------------------------------

Message: 2
Date: Fri, 20 Feb 2015 13:50:09 +0100
From: Andreas Paul <andreas.paul@tu-cottbus.de>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] NetSys 2015: Last Call for Participation
Message-ID: <54E72D81.2040409@TU-Cottbus.DE>
Content-Type: text/plain; charset=UTF-8


========================================================================
CALL FOR PARTICIPATION - ONLINE REGISTRATION DEADLINE IS APPROACHING

NetSys 2015
2nd International Conference on Networked Systems
http://www.netsys2015.com

Cottbus, Germany, March 9-12, 2015
========================================================================

* Registration: https://www.netsys2015.com/registration/
* Online registration deadline: February 28th, 2015

========================================================================

The Conference on Networked Systems ? NetSys 2015 ? provides an
international forum for engineers and scientists in academia, industry,
and government to discuss recent innovations in the realm of networked
systems - including aspects of networking, distributed systems,
communications, middleware, and applications. NetSys is a biennial
conference that originates from the major scientific event on networked
systems in German-speaking countries KiVS (Kommunikation in Verteilten
Systemen) - a series of conferences that was founded more than 30 years
ago. In 2013 NetSys was first organized on an international scale in
Stuttgart. NetSys is organized by the special interest group
"Communication and Distributed Systems" (KUVS) of the German
Informatics Society (GI).

NetSys 2015 is sponsored by GI and VDE-ITG.
The conference receives Technical Co-Sponsorship from the IEEE.

Conference Highlights:
----------------------
This year's conference highlights include an outstanding technical
program on recent advances in computer communications and networking
comprising:

* Keynote addresses by Klara Nahrstedt (University of Illinois at
Urbana-Champaign, USA) and Marc Dacier (Qatar Computing Research
Institute)

* Poland is the NetSys?15 Guest of Honour. We look forward to keynotes
by Maciej Stroinski and Norbert Meyer (Poznan? Supercomputing and
Networking Center) as well as Tadeusz Czachorski (Polish Academy of
Sciences)

* 22 technical papers reporting original research on networking,
distributed systems, middleware, security and privacy aspects as well
as networked applications

* Two half-day workshops:
- Workshop on Middleware for a Smarter Use of Electric Energy
(MidSEE 2015)
- Workshop on Software-Defined Networking and Network Function
Virtualization for Flexible Network Management (SDNFlex 2015)

* Five half-day tutorials:
- Algorithmic Methods for Complex Network Analysis
- Communications Security and Privacy of Smart Grid and Microgrid
Optimization
- Machine-to-Machine Communications and Internet of Things as
enablers of Smart City
- Software???defined Networking
- Vehicular Networking

* An excursion to the power station Schwarze Pumpe

* Software demonstrations and the Communication Software Award

* Doctoral forum with poster session

========================================================================

Organizing Committee:
---------------------
* General Chairs:
- H. Koenig, BTU Cottbus-Senftenberg, Germany
- P. Langendoerfer, IHP Frankfurt (Oder), Germany

* Program Co-chairs:
- K. Zielinski, AGH Krakow, Poland
- H. Koenig, BTU Cottbus-Senftenberg, Germany

* Workshop and Tutorial Chair:
- P. Langendoerfer, IHP Frankfurt (Oder), Germany

* Doctoral Forum Chairs:
- C. Becker, Univ. of Mannheim, Germany
- K. Wehrle, RWTH Aachen, Germany

* Demonstration Chair:
- H. Hellbrueck, Univ. of Applied Sciences Luebeck, Germany

* Local Organization Chair:
- M. Kirsche, K. Willhoeft, BTU Cottbus-Senftenberg, Germany

* Publication Chair:
- M. Brzozowski, IHP Frankfurt (Oder), Germany

* Publicity Chair:
- A. Paul, BTU Cottbus-Senftenberg, Germany

========================================================================

We look forward to welcome you in Cottbus!


------------------------------

Message: 3
Date: Mon, 23 Feb 2015 09:04:16 +0100
From: Catherine Cleophas <cleophas@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] CfP Journal of Revenue and Pricing Management
Message-ID:
<CACY4d5v7UP-n8dQ+BNKHhN8s9BSpMEmjUtpJ1S5mV1rhfyTWQA@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

CfP Journal of Revenue and Pricing Management:
Special Issue on Robust Revenue Management
=============================================
Guest Editor: Prof. Catherine Cleophas, RWTH Aachen University

In 2016, a special issue of the Journal of Revenue & Pricing Management
will publish a series of papers on Robust Revenue Management.

Beyond classically considered uncertain demand, sources of uncertainty
motivating robust revenue management include capacity changes, revenue
assigned to booking classes, technical or organizational constraints
affecting the implementation of dynamic pricing, service blackouts leading
to spill between physical products, changes in the competitive situation,
or economic shocks rendering historical data obsolete. As revenue
management is applied to novel application areas, new and adapted process
requirements may create new sources of uncertainty.

The research challenge motivating this call for papers is threefold: 1.
Research is needed to identify sources of uncertainty in revenue management
beyond demand. 2. The short- and long-term impacts of uncertainty depending
on the applied revenue management concept have to be quantified. 3. Making
revenue management more robust calls for new forecast and optimization
algorithms as well as process designs.

In considering robust approaches to revenue management, authors should
explore solutions that reduce uncertainty as well as those that strive to
make the best of uncertain outcomes through increased flexiblity.
Contributors are also particularly encouraged to consider the implications
of designing robust revenue management concepts and information flows with
a view toward human decision makers and behavioral operations research.

Find the call for papers here:
http://www.palgrave-journals.com/rpm/cfp-robust_revenue_management.pdf

Deadline for submissions is 15 April 2015. Papers should be submitted by
email to catherine.cleophas@rwth-aachen.de.
The subject line of the email should read "Robust Revenue Management".



------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 84, Issue 23
**************************************

No comments:

Post a Comment