Información de la conferencia
POST 2018: International Conference on Principles of Security and Trust
Por favor Iniciar para ver el sitio web del congreso
Día de Entrega: |
2017-10-13 |
Fecha de Notificación: |
2017-12-22 |
Fecha de Conferencia: |
2018-04-14 |
Ubicación: |
Thessaloniki, Greece |
Años: |
7 |
Vistas: 15964 Seguidores: 1 Asistentes: 0
Solicitud de Artículos
Principles of Security and Trust is a broad forum related to the theoretical and foundational aspects of security and trust.
POST was created in 2012 to combine and replace a number of successful and longstanding workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name Theory of Security and Applications (TOSCA).
We seek submissions on the foundations of information security, privacy, and trust, relevant for computer science and different application disciplines. This includes results on cryptographic and logical foundations, reasoning methods, tools, and applications. Case studies that reflect the strengths and limitations of existing foundations, methods, and their supporting tools are also welcome, as are more exploratory presentations on open questions.
Areas of interest include:
Access control
Accountability
Anonymity
Authentication
Availability
Cloud security
Confidentiality
Covert channels
Crypto foundations
Database security
Distributed systems security
Economic issues
Embedded systems security
Hardware security
Information flow
Integrity
Languages for security
Malicious code
Mobile security and privacy
Models and policies
Privacy and privacy-preserving systems
Provenance
Reputation and trust
Resource usage
Risk assessment
Security architectures
Security protocols
Trust management
Web security and privacy
POST was created in 2012 to combine and replace a number of successful and longstanding workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name Theory of Security and Applications (TOSCA).
We seek submissions on the foundations of information security, privacy, and trust, relevant for computer science and different application disciplines. This includes results on cryptographic and logical foundations, reasoning methods, tools, and applications. Case studies that reflect the strengths and limitations of existing foundations, methods, and their supporting tools are also welcome, as are more exploratory presentations on open questions.
Areas of interest include:
Access control
Accountability
Anonymity
Authentication
Availability
Cloud security
Confidentiality
Covert channels
Crypto foundations
Database security
Distributed systems security
Economic issues
Embedded systems security
Hardware security
Information flow
Integrity
Languages for security
Malicious code
Mobile security and privacy
Models and policies
Privacy and privacy-preserving systems
Provenance
Reputation and trust
Resource usage
Risk assessment
Security architectures
Security protocols
Trust management
Web security and privacy
Última Actualización Por Xin Yao en 2017-08-21
Conferencias Relacionadas
| CCF | CORE | QUALIS | Abreviación | Nombre Completo | Entrega | Notificación | Conferencia |
|---|---|---|---|---|---|---|---|
| c | b2 | PST | International Conference on Privacy, Security and Trust | 2026-04-10 | 2026-06-01 | 2026-08-26 | |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2026-02-12 | 2026-05-19 | 2026-08-23 |
| b | a* | a1 | PODS | ACM SIGMOD Conference on Principles of DB Systems | 2025-12-03 | 2026-03-01 | 2026-05-31 |
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | c | NSPW | New Security Paradigms Workshop | 2025-04-25 | 2025-05-30 | 2025-08-24 | |
| b2 | OPODIS | International Conference on Principles of Distributed Systems | 2022-08-26 | 2022-10-21 | 2022-12-13 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 |
Revistas Relacionadas
| CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| IEEE Security & Privacy | 3.0 | IEEE | 1540-7993 | |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd | 2475-6725 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |