CFP
DBSec2019: Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy Charleston, SC, United States, July 15-17, 2019 |
Conference website | https://dbsec2019.cse.sc.edu/ |
Submission link | https://easychair.org/conferences/?conf=dbsec2019 |
Submission deadline | March 13, 2019 |
DBSec is an annual international conference covering research in data and applications security and privacy. The 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2019) will be held in Charleston, SC, USA. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, and applications security.
Submission Guidelines
Submitted papers should be at most 16 pages in the LNCS format excluding bibliography and well-marked appendices, and at most 20 pages in total. Committee members are not required to read the appendices, and therefore the paper should be intelligible without them. Submissions are to be made to the submission web site at
https://easychair.org/conferences/?conf=dbsec2019
All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of the accepted papers). The final version of the accepted papers must be in the format required for publications in the LNCS series. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of March 13, 2019 (11:59 PM American Samoa Time).
Authors of accepted papers must guarantee that their papers will be presented at the conference. Accepted papers will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
A paper submitted to DBSec 2019 cannot be under review for any other conference or journal during the time it is being considered for DBSec 2019. Furthermore, after you submit to DBSec 2019, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before/after submission of the paper to DBSec 2019, we will reject your paper without review and will notify the other conference/journal as well. This restriction applies to identical as well as to substantially similar papers.
IFIP author code of conduct
IFIP referee code of conduct
https://easychair.org/conferences/?conf=dbsec2019
All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of the accepted papers). The final version of the accepted papers must be in the format required for publications in the LNCS series. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of March 13, 2019 (11:59 PM American Samoa Time).
Authors of accepted papers must guarantee that their papers will be presented at the conference. Accepted papers will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
A paper submitted to DBSec 2019 cannot be under review for any other conference or journal during the time it is being considered for DBSec 2019. Furthermore, after you submit to DBSec 2019, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before/after submission of the paper to DBSec 2019, we will reject your paper without review and will notify the other conference/journal as well. This restriction applies to identical as well as to substantially similar papers.
IFIP author code of conduct
IFIP referee code of conduct
List of Topics
- - access control
- - anonymity
- - applied cryptography in data security
- - authentication
- - big data security
- - data and system integrity
- - data protection
- - database security
- - digital rights management
- - distributed and decentralised security
- - identity management
- - intrusion detection
- - knowledge discovery and privacy
- - methodologies for data and application security
- - network security
- - organisational and social aspects of security
- - privacy
- - secure cloud computing
- - secure distributed systems
- - secure information integration
- - security and privacy in crowdsourcing
- - security and privacy in IT outsourcing
- - security and privacy in the Internet of Things
- - security and privacy in location-based services
- - security and privacy in P2P scenarios and social networks
- - security and privacy in pervasive/ubiquitous computing
- - security and privacy policies
- - security management and audit
- - security metrics
- - threats, vulnerabilities, and risk management
- - trust and reputation systems
- - trust management
- - Web security
- - wireless and mobile security
Committees
Program Committee
Vijay Atluri | (Rutgers University) |
Frederic Cuppens | (IMT Atlantique) |
Nora Cuppens-Boulahia | (IMT Atlantique) |
Sabrina De Capitani di Vimercati | (University of Milan) |
Giovanni Di Crescenzo | (Perspecta Labs) |
Wenliang Du | (Syracuse University) |
Sara Foresti | (Universita degli Studi di Milano) |
Joaquin Garcia-Alfaro | (Telecom SudParis) |
Stefanos Gritzalis | (University of the Aegean) |
Ehud Gudes | (Ben-Gurion University) |
Yuan Hong | (Illinois Institute of Technology) |
Sokratis Katsikas | (Center for Cyber and Information Security, NTNU) |
Florian Kerschbaum | (University of Waterloo) |
Barbara Kordy | (INSA Rennes, IRISA) |
Adam J. Lee | (University of Pittsburgh) |
Yingjiu Li | (Singapore Management University) |
Giovanni Livraga | (University of Milan) |
Javier Lopez | (University of Malaga) |
Brad Malin | (Vanderbilt University) |
Fabio Martinelli | (IIT-CNR) |
Sjouke Mauw | (University of Luxembourg) |
Catherine Meadows | (NRL) |
Charles Morisset | (Newcastle University) |
Martin Olivier | (University of Pretoria) |
Stefano Paraboschi | (Universita di Bergamo) |
Gunther Pernul | (Universitat Regensburg) |
Andreas Peter | (University of Twente) |
Silvio Ranise | (Fondazione Bruno Kessler) |
Indrajit Ray | (Colorado State University) |
Kui Ren | (State University of New York at Buffalo) |
Pierangela Samarati | (University of Milan) |
Andreas Schaad | (WIBU-Systems) |
Scott Stoller | (Stony Brook University) |
Tamir Tassa | (The Open University of Israel) |
Mahesh Tripunitara | (University of Waterloo) |
Jaideep Vaidya | (Rutgers University) |
Vijay Varadharajan | (The University of Newcastle) |
Wendy Hui Wang | (Stevens Institute of Technology) |
Lingyu Wang | Concordia University |
Attila A Yavuz | (Oregon State University) |
Ting Yu | (Qatar Computing Research Institute) |
Nicola Zannon | (Eindhoven University of Technology) |
Organizing committee
- Csilla Farkas (General co-Chair) University of South Carolina, Columbia, SC, USA
- Mark Daniels (General co-Chair) Medical University of South Carolina, Charleston SC, USA
- Simon Foley (Program Chair) Rennes, France