征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Welcome to participate in SpaCCS 2017, Guangzhou, China, December 12-15, 2017! Guangzhou, a city in spring forever, is the capital city of Guangdong Province. Guangzhou is also the third largest city in China, located in the north of the Pearl River Delta, close to Hong Kong and Macau. With evergreen plants and flowers blooming all year round, the city has an alias of "City of Flowers". Guangzhou is one of the first batch of 24 historical and cultural cities released by the State Council, with more than 2200 years of history and profound cultural heritage, and also a major terminus of the maritime Silk Road. Guangzhou is one of the most famous tourist resorts in China, with a lot of tourist sites, such as Baiyun Mountain, Guangzhou Tower, and Yuexiu Park.

The SpaCCS 2017 conference is the 10th event in the series of conferences which are devoted to security, privacy and anonymity in computation, communication and storage. SpaCCS is now recognized as the main regular event of the world that is covering many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. As applications of computer systems and networks have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The conference will provide a forum for the world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.

征稿信息

重要日期

2017-07-15
摘要截稿日期
2017-07-15
初稿截稿日期

征稿范围

Scope and Interests
Track 1: Security
1.1 Computation
(1) Security Model and Architecture
(2) Software and System Security
(3) Secure Computing Platform
(4) Secure Network Computing
(5) Security in Cloud Computing and Pervasive/Ubiquitous Computing
(6) Risk Analysis and Management
1.2 Communication
(1) Network Security
(2) Malware and Botnets
(3) Intrusion Detection
(4) Security in Web Services
(5) Security in Mobile Social Networks
(6) Security in Mobile and Wireless Communications
(7) Fraud and Cyber-Crime
1.3 Storage
(1) Access Control
(2) Applied Cryptography
(3) Database Security
(4) Data Protection and Data Integrity
(5) Digital Content Protection and Digital Forensics
(6) Information Hiding
(7) Security in Big Data and its Applications
Track 2: Privacy
2.1 Computation
(1) Measuring and Quantifying Privacy
(2) Privacy Modelling and Analysis
(3) Software and System Privacy
(4) Privacy-preserving Computing Platform
(5) Privacy-enhanced Network Computing
(6) Obfuscation-based Privacy
(7) Cryptographic Tools for Privacy
(8) Building and Deploying Privacy-enhancing Systems
(9) Reliability, Robustness, and Abuse Prevention in Privacy Systems
2.2 Communication
(1) Privacy in Web Services
(2) Privacy Metrics and Policies
(3) Crowdsourcing for Privacy
(4) Location and Mobility Privacy
(5) Privacy in Cloud and Big Data Applications
(6) Privacy in Ubiquitous Computing and Mobile Devices
(7) Privacy in Social Networks and Microblogging Systems
(8) Privacy-enhanced Access Control, Authentication, and Identity Management
2.3 Storage
(1) Data Protection Technologies
(2) Differential Privacy
(3) Privacy in Big Data and its Applications
(4) Policy Languages and Tools for Privacy
(5) Privacy and Human Rights
(6) Interdisciplinary Research Connecting Privacy to Other Fields
(7) Privacy in Cloud Computing and Pervasive/Ubiquitous Computing
(8) Information Leakage, Data Correlation and Generic Attacks to Privacy
(9) Privacy-Preserving Data Mining, Data Release and Publishing
Track 3: Anonymity
3.1 Computation
(1) Anonymous Data Mining and Data Sharing
(2) Parallelism Exploitation Techniques for Anonymity
(3) Anonymity in Big Data Analytics
(4) Anonymous Management in Trust Relationships
(5) Anonymous Video Analytics Technology
(6) Anonymity Metrics, Measures and Evaluations
(7) Anonymity Models, Hardware/Device of Anonymity
3.2 Communication
(1) Anonymity in Wireless Communication Systems
(2) Anonymous Communication Protocols
(3) Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
(4) Anonymous Proxy Software
(5) Anonymous Communication and Internet
(6) Anonymous Social Networks, Structural k-Anonymity in Social Networks
(7) Authentication Protocol Providing User Anonymity
3.3 Storage
(1) Distributed Anonymous Information Storage and Management
(2) Private and Anonymous Data Storage
(3) Anonymity-Preserving Data Collection and Database
(4) Anonymity, Pseudonymity & Identity Management
(5) Anonymity in Big Data and Cloud Scenarios
(6) Anonymity in Health and Medical Databases

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月12日

    2017

    12月15日

    2017

  • 07月15日 2017

    摘要截稿日期

  • 07月15日 2017

    初稿截稿日期

  • 12月15日 2017

    注册截止日期

主办单位
广州大学
中南大学
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询