Print

Print


*****  To join INSNA, visit http://www.insna.org  *****

################################################################################
13th International Conference on Security, Privacy and Anonymity in 
Computation,
Communication and Storage (SpaCCS 2020)

Nanjing, China. October 23-25, 2020
################################################################################

URL: https://urldefense.proofpoint.com/v2/url?u=http-3A__www.spaccs2020.com_&d=DwICaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=YzAiflTe8bWzWQdgjcevUTvylu8buTj7n4lvqIv7OOU&s=tROfQFw-U4iQCBl-kNBZP_r6fL7NdI6NLWeiLdlE6mQ&e= 


IMPORTANT DATES

* Submission Deadline: May 23, 2020
* Authors Notification Due: July 23, 2020
* Final Version Due: August 23, 2020


CALL FOR PAPERS

The SpaCCS 2020 conference is the 13th event in the series of 
conferences which are devoted to security, privacy and anonymity in 
computation, communication and storage. SpaCCS is now recognized as the 
main regular event of the world that is covering many dimensions 
including security algorithms and architectures, privacy-aware policies, 
regulations and techniques, anonymous computation and communication, 
encompassing fundamental theoretical approaches, practical experimental 
projects, and commercial application systems for computation, 
communication and storage. As applications of computer systems and 
networks have permeated in every aspect of our daily life, the issues of 
security, privacy, and anonymity have become increasingly critical. The 
conference will provide a forum for the world-class researchers to 
gather and share their research achievements, emerging ideas and trends 
in the highly challenging research fields. Areas of interest include but 
are not limited to:

Track1: Security

Security Model and Architecture
- Software and System Security
- Secure computation
- Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
- Artificial Intelligence
- Secure Network Computing
- Risk Analysis and Management
- Network Security
- Malware and Botnets
- Intrusion Detection
- Security in Web Services
- Security in Mobile Social Networks
- Security in Mobile and Wireless Communications
- Fraud and Cyber-Crime
- Access Control
- Accounting and Audit
- Applied Cryptography
- Database Security
- Authentication
- Computer forensics
- Data Protection and Data Integrity
- Digital Content Protection and Digital Forensics
- Information Hiding
- Security in Big Data and its Applications

Track 2: Privacy

- Measuring and Quantifying Privacy
- Privacy Modelling and Analysis
- Software and System Privacy
- Privacy-preserving Computing
- Differential Privacy
- Blockchain
- Privacy-enhanced Network Computing
- Obfuscation-based Privacy
- Cryptographic Tools
- Building and Deploying Privacy-enhancing Systems
- Reliability, Robustness, and Abuse Prevention in Privacy Systems
- Privacy in Web Services
- Privacy Metrics and Policies
- Crowdsourcing for Privacy
- Location and Mobility Privacy
- Privacy in Cloud and Big Data Applications
- Quantum Communications
- Privacy in Ubiquitous Computing and Mobile Devices
- Privacy in Social Networks and Microblogging Systems
- Privacy-enhanced Access Control, Authentication, and Identity Management
- Policy Languages and Tools for Privacy
- Interdisciplinary Research Connecting Privacy to Other Fields
- Information Leakage, Data Correlation and Generic Attacks to Privacy
- Privacy-Preserving Data Mining, Data Release and Publishing

Track 3: Anonymity

- Anonymous Data Mining and Data Sharing
- Parallelism Exploitation Techniques for Anonymity
- Anonymity in Big Data Analytics
- Anonymous Management in Trust Relationships
- Anonymous Video Analytics Technology
- Anonymity Metrics, Measures and Evaluations
- Anonymity Models, Hardware/Device of Anonymity
- Anonymity in Wireless Communication Systems
- Anonymous Communication Protocols
- Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
- Anonymous Proxy Software
- Anonymous Communication and Internet
- Anonymous Social Networks, Structural k-Anonymity in Social Networks
- Authentication Protocol Providing User Anonymity
- Anonymous Information Storage and Management
- Private and Anonymous Data Storage
- Forensics
- Anonymity-Preserving Data Collection and Database
- Anonymity, Pseudonymity & Identity Management
- Anonymity in Big Data and Cloud Scenarios
- Anonymity in Health and Medical Databases

-- 
Marco Guazzone, PhD
Computer Science Institute, DiSIT
University of Piemonte Orientale
address: Viale T. Michel 11, 15121 Alessandria, Italy
phone: +39-0131-360484
web: https://urldefense.proofpoint.com/v2/url?u=http-3A__people.unipmn.it_sguazt&d=DwICaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=YzAiflTe8bWzWQdgjcevUTvylu8buTj7n4lvqIv7OOU&s=1iqNuc2pRkRxn-aDSJXvXBNRoKl_GAxZEIoO53POMnk&e= 

_____________________________________________________________________
SOCNET is a service of INSNA, the professional association for social
network researchers (http://www.insna.org). To unsubscribe, send
an email message to [log in to unmask] containing the line
UNSUBSCRIBE SOCNET in the body of the message.