Security Standardisation Research 2017

SSR 2017


Computer Security & Cryptography Security & Trust & Testing



Conference scope
SSR covers the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST), security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific security standards (e.g. those produced by the payments, telecommunications and computing industries for such things as payment protocols, mobile telephony and trusted computing).
Background
A wide range of standards now cover many of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series has become the internationally adopted basis for managing corporate information security.
Still, new security standards are proposed very frequently, and existing security standards need revision often. Security standards are one of the most active areas for many standards bodies. There is currently intense attention on the methods for ensuring security within standardisation.
SSR is a forum for identifying the conclusions from this process, and proposing improvements to achieve transparency, more unbiased results, and higher scientific quality.
Topics for papers
Papers offering research contributions to all aspects of security standardisation are solicited for submission to the SSR 2017 conference.
Papers may present theory, applications or practical experience in the field of security standardisation, including, but not necessarily limited to:
access control
biometrics
cloud computing
CNI protection
critiques of standards
cryptanalysis
cryptographic protocols
cryptographic techniques
evaluation criteria
formal analysis of standards
identity management
industrial control systems security
internet security
intrusion detection
key management and PKIs
mobile security
network security
payment system security
privacy
RFID tag security
risk analysis
security controls
security management
security protocols
security services
security tokens
smart cards
telecommunications security
trusted computing
web security
Instructions for authors
Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration for publication. Papers must be written in English. Each submitted paper should begin with a title, a short abstract, and a list of keywords. Papers should be at most 16 pages (excluding bibliography and appendices) in the standard LNCS format (see the Springer web page for details). Reviewers are not obliged to read appendices, so the paper must be self-contained without them.
Papers that do not adhere to these requirements will be rejected without consideration of their merits.
Papers must be submitted using the EasyChair conference management system.
Accepted papers will be presented at the conference and published in the conference proceedings in the Springer LNCS series (see www.springer.com/lncs). At least one author of each accepted paper is required to register for the conference and present the paper.
Instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers.
Please send any enquiries to: webmaster [insert the at symbol] ssresearch.eu, or to the chairs at ssr2017 [insert the at symbol] easychair.org.
Important dates
Deadline for submissions: Friday 14 July 2017 (anywhere on earth)
Notifications to authors: Friday 15 September 2017
Camera-ready due: Friday 29 September 2017
Conference: Monday and Tuesday 18-19 December 2017
Conference organisation
General Chair
Chris Mitchell, RHUL, UK
Programme Committee Co-chairs
Joshua Guttman, MITRE and WPI, USA
William Whyte, USA
Programme Committee
to be confirmed