Forwarded from: Sven Dietrich <spock (at) cs.stevens.edu> Dear colleagues, as requested by many of you, we're extending the deadline for WECSR2010 to Oct 22, 2009, 11:59pm EDT. Best regards, Sven Dietrich -- (Apologies for any duplicates) Call for Papers Workshop on Ethics in Computer Security Research January 28-29, 2010 Tenerife, Canary Islands, Spain http://www.cs.stevens.edu/~spock/wecsr2010/<http://www.cs.stevens.edu/%7Espock/wecsr2010/> Computer security often leads to discovering interesting new problems and challenges. The challenge still remains to follow a path acceptable for Institutional Review Boards at academic institutions, as well as compatible with ethical guidelines for professional societies or government institutions. However, no exact guidelines exist for computer security research yet. This workshop will bring together computer security researchers, practitioners, policy makers, and legal experts. This workshop solicits submissions describing or suggesting ethical and responsible conduct in computer security research. While we focus on setting standards and sharing prior experiences and experiments in computer security research, successful or not, we tap into research behavior in network security, computer security, applied cryptography, privacy, anonymity, and security economics. This workshop will favor discussions among participants, in order to shape the future of ethical standards in the field. It will be co-located with the Fourteenth International Conference on Financial Cryptography and Data Security 2010. Submissions We solicit submissions in three categories. 1. Position papers. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Position paper submission should not exceed 6 pages in length, excluding bibliography and well-marked appendices. 2. Case studies. Submitted case studies must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Submitted case studies should not exceed 12 pages in length, excluding bibliography and well-marked appendices. 3. Panel proposals. Submitted panel proposals should list the panel topic, a moderator, and a list of confirmed panelists, along with a short biography of the participants. The composition should be adequately selected as to generate copious discussion. Panelists will be given an opportunity to submit a position statement for the final proceedings. The proceedings will be published in the Springer LNCS series. More information on how to submit your work via the EasyChair system can be found at http://www.cs.stevens.edu/~spock/wecsr2010/cfp.html<http://www.cs.stevens.edu/%7Espock/wecsr2010/cfp.html>or directly at: https://www.easychair.org/login.cgi?conf=wecsr2010 Program Chair Sven Dietrich, Stevens Institute of Technology Program Committee Aaron Burstein, UC Berkeley Elizabeth Buchanan, University of Wisconsin-Milwaukee Michael Bailey, University of Michigan Michael Collins, RedJack Marc Dacier, Symantec Research George Danezis, Microsoft Research Dorothy Denning, Naval Postgraduate School Roger Dingledine, The Tor Project Toralv Dirro, McAfee David Dittrich, University of Washington Engin Kirda, EURECOM Howard Lipson, CERT John McHugh,Dalhousie University Vern Paxson, ICIR Angela Sasse, University College London Important Dates Paper Submission: October 22, 2009 Author Notification: November 15, 2009 Camera-ready for Proceedings: December 15, 2009 Workshop Dates: January 28-29, 2010 ________________________________________ Did a friend send you this? From now on, be the first to find out! Subscribe to InfoSec News http://www.infosecnews.orgReceived on Fri Oct 09 2009 - 02:19:12 PDT
This archive was generated by hypermail 2.2.0 : Fri Oct 09 2009 - 02:26:45 PDT