what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

3rd Workshop On Security And Privacy In Social Networks Call For Papers

3rd Workshop On Security And Privacy In Social Networks Call For Papers
Posted May 2, 2012
Site spsn12.media.mit.edu

The Call For Papers for the Third International Workshop on Security and Privacy in Social Networks 2012 (SPSN-2012) in conjunction with IEEE SocialCom has been announced. It will take place in Amsterdam, The Netherlands, September 3rd through the 6th, 2012.

tags | paper, conference
SHA-256 | d8dd8eecb352999a6245086ea97d7579e6c7f9b6b6b16f35bdc8d24549e25291

3rd Workshop On Security And Privacy In Social Networks Call For Papers

Change Mirror Download
3rd Workshop on Security and Privacy in Social Networks

Call for Papers

Third International Workshop on Security and Privacy in Social Networks 2012 (SPSN-2012) in conjunction with IEEE SocialCom 2012, Amsterdam, The Netherlands, September 3-6, 2012
http://spsn12.media.mit.edu/index.html

Scope of Workshop:

The workshop aims to bring to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, we need to create a common language between the researchers and practitioners of this new area, spanning from the theory of computational social sciences to conventional security and network engineering.

Objectives:

The guiding goal of the workshop is to bring together researchers and practitioners who deal with the design and analysis of online social networking side by side with those who design security and privacy protocols, in order to:

1. Survey and discuss the current state of research that deals with security and privacy in social networks.
2. Create a community of researchers and practitioners who are interested in enabling current social networks to incorporate dedicated security methods.
3. Create new opportunities and set the ground for future collaboration between participants, generating insights that can be carried forward into future work.
4. Foster creativity and imagine the underlying technological changes in the way we network and communicate that will take place over the next 5-10 years.

Submission:

Authors are invited to submit original, unpublished research papers that are not being considered in another forum. We welcome work in progress in addition to more mature work. Submission could be made in the form of either
• A short position paper of up to 4 proceedings pages in length.
• A full-length technical paper of up to 8 proceedings pages in length.

Submission must be in PDF format, in accordance with the IEEE conference paper style (http://www.ieee.org/conferences_events/conferences/publishing/templates.html).

Submissions should be done via the submissions website at http://www.easychair.org/conferences/?conf=spsn2012).

All submitted papers will be reviewed and judged on originality, technical correctness, relevance, and quality of presentation by the Technical Program Committee.

Should the paper be accepted, at least one of the authors must attend the workshop to present the work in order for the paper to be published by IEEE and included in the IEEE Digital Library.

Accepted papers will be included in the IEEE Social Computing proceedings.
Topics:

The proposed topics for the workshop include but are not limited to the following:

• Malware propagation in social networks
• Information leakage via social networks
• Social currency mechanisms – potential and risks
• Privacy management in social networks - access controls, permissions
• Stealing Reality (malicious application of Reality Mining)
• Identity theft in social networks
• Collaborative detection of distributed network attacks
• Peer-to-peer based security mechanisms
• Trust and reputation in social networks
• Socially inspired network security architectures
• Socially aware network security protocols
• Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.)
• Configuring security protocol parameters based on social information
• Privacy-preserving methods for data access and data mining.


Important Dates
• Paper Submission: 26 May 2012
• Authors Notification: 3 July 2012
• Final Manuscript: 18 July 2012
• Workshop Date: 3-6 September 2012


Organizing Committee

• Yuval Elovici, Telekom Innovation Laboratories at Ben-Gurion University of the Negev
• Yaniv Altshuler, MIT Media Lab
• Alex ("Sandy") Pentland, MIT Media Lab
• Armin Cremers, University of Bonn


Technical Program Committee

• Bruno Lepri, MIT / FBK, Trento, Italy
• Christian Bauckhage, Fraunhofer Institute
• V.S Subrahmanian, University of Maryland
• Rami Puzis, University of Maryland
• Max Little, MIT / Oxford University
• Yves-Alexandre de Montjoye, MIT
• Arie Matsliah, IBM Research
• Manuel Cebrian, UCSD
• Wei Pan, MIT
• Muli Ben-Yehuda, Technion and IBM Research
• Jean-Pierre Seifert, Technical University of Berlin
• Bernhard Loehlein, Deutsche Telekom

NOTICE: This e-mail correspondence is subject to Public Records Law and may be disclosed to third parties.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close