Friday, June 26, 2015

dmanet Digest, Vol 88, Issue 23

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. Postdoctoral positions at the Institute of Computer Science,
Prague (Diana Piguet)
2. TU Graz: One 3-Year Postdoc Position in Random Graphs on
Surfaces (Mihyun Kang)
3. [short/position papers: july 10] DPM 2015 - Data Privacy
Management (co-located with ESORICS 2015), LNCS, Sept. 2015,
Vienna (Data Privacy)
4. GraMSec'15 CALL FOR PARTICIPATION (Barbara Kordy)


----------------------------------------------------------------------

Message: 1
Date: Wed, 24 Jun 2015 15:42:20 +0200
From: Diana Piguet <diana.piguet@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Postdoctoral positions at the Institute of Computer
Science, Prague
Message-ID:
<CAK_z8sHvJhjSY-Ndr0heVra9w87+S4VbNvU0XO_+mM05Sz=yjQ@mail.gmail.com>

The Institute of Computer Science of The Czech Academy of Sciences invites
outstanding and enthusiastic junior researchers, PhD holders, to apply for
a postdoctoral position in one of the areas close to the research interests
of the members of the Institute (www.cs.cas.cz
<http://www.ustavinformatiky.cz/?id_jazyk=en&id_stranky=>).

One position is for candidates who have obtained a PhD during the last 2
years. For more details see http://www.ustavinformatiky.cz/docs/inzerat1.pdf
Application deadline: 30 August 2015

The other position is for candidates who have obtained a PhD during the
last 7 years. For more details see
http://www.ustavinformatiky.cz/docs/inzerat2.pdf
Application deadline: 30 September 2015

For further information and informal enquiries please contact ics@cs.cas.cz.
With best regards,
Diana Piguet
Institute of Computer Science
Czech Academy of Sciences
piguet@cs.cas.cz

------------------------------

Message: 2
Date: Thu, 25 Jun 2015 08:37:46 +0200
From: Mihyun Kang <kang@math.tugraz.at>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] TU Graz: One 3-Year Postdoc Position in Random
Graphs on Surfaces
Message-ID: <558BA1BA.2020209@math.tugraz.at>
Content-Type: text/plain; charset=utf-8; format=flowed

-------------------------------------------------------------------------------------------------
TU Graz: One 3-Year Postdoc Position in Random Graphs on Surfaces
-------------------------------------------------------------------------------------------------

We are seeking outstanding candidates with expertise and proficiency in
random graphs, triangulations and graphs on surfaces.

The successful candidate will be employed as a postdoc for three years
at the Institute of Optimisation and Discrete Mathematics at Graz
University of Technology (TU Graz), Austria,
http://www.math.tugraz.at/mathb/. The preferred starting date is 1
November 2015, but negotiable.

The basic salary is specified in the FWF standard personnel costs and
salaries https://www.fwf.ac.at/en/research-funding/personnel-costs/.

Condition of employment:
- Qualified candidates must hold a PhD degree in mathematics or
theoretical computer science

Application documents:
- Cover letter of application including research interests
- Curriculum vitae including the list of publications
- A list of contact information of two references who can submit letters
of recommendation

All application documents should be electronically submitted in a
single PDF file by 15 August 2015 to Ms Sandra Wissler,
sandra.wissler@tugraz.at.

For further details, please contact
Mihyun Kang
kang@math.tugraz.at
http://www.math.tugraz.at/~kang/postdoc2.pdf


------------------------------

Message: 3
Date: Thu, 25 Jun 2015 15:18:27 +0200
From: Data Privacy <dpm.privacy@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] [short/position papers: july 10] DPM 2015 - Data
Privacy Management (co-located with ESORICS 2015), LNCS, Sept. 2015,
Vienna
Message-ID:
<CAE8P9eM-o_5xooGdBfuT77NvfZ_qBu0Af43AG683Fvvz8RC=OQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

=======================================================================
Call for Papers

DPM 2015, 10th International Workshop on
DATA PRIVACY MANAGEMENT,

http://deic.uab.cat/conferences/dpm/dpm2015/

Vienna, Austria, September 21-22, 2015
(co-located with ESORICS'2015)
Springer LNCS Proceedings

** Deadline for short/position papers: July 10, 2015 (11:59pm UTC-11) **
========================================================================

========================================================================
Important Dates

* Deadline Short/Position Papers (Extended): July 10, 2015
* Deadline Full Papers: June 21, 2015
* Acceptance Notification: August 15, 2015
* Camera Ready Version: September 5, 2015

========================================================================

Scope: Organizations are increasingly concerned about the privacy of
information that they manage (several people have filed lawsuits
against organizations violating the privacy of customer's data). Thus,
the management of privacy-sensitive information is very critical and
important for every organization. This poses several challenging
problems, such as how to translate the high-level business goals into
system-level privacy policies, administration of privacy-sensitive
data, privacy data integration and engineering, privacy access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers.

Topics: The aim of this workshop is to discuss and exchange the ideas
related to privacy data management. We invite papers from researchers
and practitioners working in privacy, security, trustworthy data
systems and related areas to submit their original papers in this
workshop. The main topics, but not limited to, include:

* Privacy Information Management
* Privacy Policy-based Infrastructures and Architectures
* Privacy-oriented Access Control Languages and Models
* Privacy in Trust Management
* Privacy in Digital Currencies
* Privacy Data Integration
* Privacy Risk Assessment and Assurance
* Privacy Services
* Cryptography and Cryptanalysis
* Privacy Policy Analysis
* Query Execution over Privacy Sensitive Data
* Privacy Preserving Data Mining
* Hippocratic and Water-marking Databases
* Privacy for Integrity-based Computing
* Privacy Monitoring and Auditing
* Privacy in Social Networks
* Privacy in Ambient Intelligence (AmI) Applications
* Individual Privacy vs. Corporate/National Security
* Privacy in computer networks
* Privacy and RFIDs
* Privacy and Big Data
* Privacy in sensor networks

========================================================================

Submission guidelines: Full papers should be at most 16
pages (using 11-point font), including the bibliography. Position
papers, as well as shoort papers, should be at most 8
pages (using 11-point font), including the bibliography. Authors
should indicate whether their paper is a position paper to
differentiate them from regular ones (just mention /position paper/
in the title). Program Committee members are not required to read
the appendices, so the paper should be intelligible without them.
All submissions must be written in English.

Authors must submit their papers by the deadline indicated below,
using the EasyChair web site (at easychair.org/conferences/?conf=dpm2015)
and following the requirements stated there.

The submitted paper (in PDF format) should follow the template
indicated by Springer (see http://springer.de/comp/lncs/authors.html).
It must start with a title, a short abstract, names and affiliations
of the authors, and a list of keywords.

All papers will be refereed. Accepted papers should be presented at
the Workshop. At least one author of each accepted paper must register
to the workshop, by the early date indicated by the organizers, and
present the paper.

As in previous editions, the proceedings are expected to be published
in a volume of the Lecture Notes in Computer Science series of Springer.

Submissions by PhD students as well as controversial ideas are
encouraged. Case studies (successful or not) are also encouraged.

========================================================================

General Chairs:

* Josep Domingo-Ferrer (Universitat Rovira i Virgili)
* Vicenc Torra (University of Skovde)

Program Committee Chairs:

* Joaquin Garcia-Alfaro (Telecom SudParis)
* Guillermo Navarro-Arribas (Autonomous University of Barcelona)

Program Committee:

* Rainer Bohme (University of Munster)
* Jordi Castella-Roca (Universitat Rovira i Virgili)
* Jordi Casas-Roma (Universitat Oberta de Catalunya)
* Frederic Cuppens (Telecom Bretagne)
* Nora Cuppens (Telecom Bretagne)
* David Evans (University of Derby)
* Nicola Dragoni (Technical University of Denmark)
* Sara Foresti (University of Milan)
* Sebastien Gambs (University of Rennes)
* Paolo Gasti (New York Institute of Technology)
* Stefanos Gritzalis (University of the Aegean)
* Marit Hansen (Unabhangiges Landeszentrum fur Datenschutz)
* Jordi Herrera-Joancomarti (Universitat Autonoma de Barcelona)
* Sokratis Katsikas (University of Piraeus)
* Evangelos Kranakis (Carleton University)
* Fabio Martinelli (IIT-CNR)
* Chris Mitchell (Royal Holloway)
* Anna Monreale (University of Pisa)
* Maryline Laurent (Telecom SudParis)
* Georgios Lioudakis (National Technical University of Athens)
* Giovanni Livraga (University of Milan)
* Javier Lopez (University of Malaga)
* Sotirios Maniatis (Hellenic Authority for Communications Privacy)
* Refik Molva (EURECOM)
* Melek Onen (EURECOM)
* Cristina Perez-Sola (Autonomous University of Barcelona)
* Silvio Ranise (FBK, Security and Trust Unit, Trento)
* Kai Rannenberg (Goethe University)
* David Rebollo-Monedero (Technical University of Catalonia)
* Yves Roudier (EURECOM)
* Pierangela Samarati (University of Milan)
* David Sanchez (Universitat Rovira i Virgili)
* Claudio Soriente (ETH Zurich)
* Alessandro Sorniotti (IBM Research)
* Traian Marius-Truta (Northern Kentucky University)
* Yasuyuki Tsukada (NTT Communication Science Laboratories)
* Alexandre Viejo (Universitat Rovira i Virgili)
* Jens Weber (University of Victoria)
* Lena Wiese (University of Gottingen)
* Nicola Zannone (Eindhoven University of Technology)

=======================================
FURTHER INFORMATION
=======================================

Additional information about paper submission and conference topics and
events can be found at the DPM 2015 web site:
http://deic.uab.cat/conferences/dpm/dpm2015/


------------------------------

Message: 4
Date: Thu, 25 Jun 2015 16:25:19 +0200
From: Barbara Kordy <barbara.kordy@irisa.fr>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] GraMSec'15 CALL FOR PARTICIPATION
Message-ID: <558C0F4F.5080400@irisa.fr>
Content-Type: text/plain; charset=utf-8; format=flowed

************************************************************
GraMSec 2015
The Second International Workshop on Graphical Models for Security

Verona, Italy - July 13, 2015
http://gramsec.uni.lu/

Co-located with
28th IEEE Computer Security Foundations Symposium (CSF)
************************************************************


GraMSec REGISTRATION IS NOW OPEN

To register please follow the instructions given at
http://www.gramsec.uni.lu/registration.php


ABOUT GraMSec

Graphical security models provide an intuitive but systematic
methodology to analyze security weaknesses of systems and to evaluate
potential protection measures. Such models have been subject of
academic research and they have also been widely accepted by the
industrial sector, as a means to support and facilitate threat
analysis and risk management processes. The objective of GraMSec is to
contribute to the development of well-founded graphical security
models, efficient algorithms for their analysis, as well as
methodologies for their practical usage.


PROGRAM

8:30 – 9:15 REGISTRATION

9:20 – 9:30 OPENING

9:35 – 10:30 STAST INVITED LECTURE

* Simone Fischer-Hübner (Karlstad University, Sweden)
Eliciting Requirements for Privacy-enhancing Transparency Tool

10:30 – 11:00 COFFEE BREAK

11:00 – 12:30 REPRESENTATION AND ANALYSIS SESSION

* Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard
Renners, Thomas Rossow, and Ralf Steuerwald
Integrated Visualization of Network Security Metadata from
Heterogeneous Data Sources

* Laurent Cuennet, Marc Pouly and Sasa Radomirovic
Guided Specification and Analysis of a Loyalty Card System

* Ludovic Apvrille and Yves Roudier
SysML-Sec Attack Graphs: Compact Representations for Complex Attacks

12:30 – 14:00 LUNCH BREAK

14:00 – 15:00 GraMSec INVITED LECTURE

* Marc Bouissou (École Centrale Paris, EDF R&D, France)
Dynamic Graphical Models for Security and Safety Joint Modeling

15:00 – 15:30 TOOL SESSION

* Sophie Pinchinat, Mathieu Acher and Didier Vojtisek
ATSyRa: An Integrated Environment for Synthesizing Attack Trees

15:30 – 16:00 COFFEE BREAK

16:00 – 17:00 GENERATION SESSION

* Marieta Georgieva Ivanova, Christian W. Probst, Rene Rydhof Hansen and
Florian Kammueller
Transforming Graphical System Models to Graphical Attack Models

* Olga Gadyatskaya
How to Generate Security Cameras: Towards Defence Generation for
Socio-Technical Systems

17:00 – 17:10 CLOSING

In the evening, we plan to have an informal dinner with the participants
of the workshop


GENERAL CHAIR
Sushil Jajodia, George Mason University, USA

PC CO-CHAIRS
Sjouke Mauw, University of Luxembourg, LU
Barbara Kordy, INSA Rennes, IRISA, FR

CONTACT
For inquiries please send an e-mail to gramsec@uni.lu


------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 88, Issue 23
**************************************

No comments:

Post a Comment