Workshops and Special Sessions


All accepted Special Session and Workshop papers will be published in the conference proceedings

Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2014)

Second International Workshop on Trust and Privacy in Cyberspace (CyberTrust'14)

Second International Workshop on Security in Self-Organising Networks (SelfNet'14)

Second International Workshop on Intelligence and Security Informatics for International Security (IIS'14)

Special Session: Security in Cloud Computing

Special Session: Digital Identity Management

Special Session: Digital Forensics

Special Session: Secure Network Protocols


Special Session: Security in Cloud Computing

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. Security has emerged as arguably the most significant barrier to faster and more widespread adoption of cloud computing. This special session aims to bring together researchers and practitioners in all security aspects of cloud computing.

Topics: Availability, recovery and auditing, Business and security risk models and clouds, Cloud access control and key management, Failure detection and prediction, Identification and privacy in cloud, Integrity and verifiable computation, Practical cryptographic protocols for cloud security, Secure cloud architecture, Secure data management, Secure identity management, Secure management of virtualized resources, Secure mobile cloud, Security for emerging cloud programming models, Trust and policy management in clouds.


Special Session: Digital Identity Management

Identity management (IdM) is an integrated system of policies, business processes and technologies that enables organizations to deal with the identities of its users. Identity management also involves issues related to certification and management of the lifecycle of digital identities, together with the legal aspects. Identity management is an active research topic and is tending to be for many years. This special session aims to be a forum for discussions and technical presentations of recent works about the state of art in the identity management.

Topics:Applied Cryptography for Identity Management, Attribute Based Authentication and Access Control, Biometric Identity, Federated Identity Management, Identity in Cloud Computing, Identity in Social Networks, Identity Management and the Internet of Things, Identity Management Anonymity Challenges, Identity Management Audit, Identity Management for Mobile Computing, Identity Management in e-Government, Identity Management in Grid Computing, Identity Management Privacy Challenges, Identity Management Reference Model and Frameworks, Identity Theft Prevention In Face of Malware and Phishing, Interoperability in Identity Management Systems, Privacy-Enhancing Technologies, Single Sign On, Social Networks and Identity Management, Trust Management in Identity Management, User-Centric Identity Management.


Special Session: Digital Forensics

Digital forensics is a rapidly evolving field primarily focused on the extraction, preservation and analysis of digital evidence obtained from electronic devices in a manner that is legally acceptable. Research into new methodologies tools and techniques within this domain is necessitated by an ever-increasing dependency on tightly interconnected, complex and pervasive computer systems and networks. The special session focuses on various research issues on digital forensics.

Topics:Anti-Forensics, Cyber Crime, Cyber Terrorism, Data Hiding Techniques and Steganography, Digital Evidence, Digital Forensic Information Visualization, Fraud Investigations Involving Technology, Log Analysis, Network Forensics, Novel Data Recovery Techniques, Physical Memory Acquisition and Analysis, Portable Devices, Risk and Incident Management.


Special Session: Secure Network Protocols

Secure Network protocols define the processes and methodology to secure network data from any illegitimate attempt to review or extract the contents of data. The special session on Secure Network Protocols aims to bring together all the key researchers in related fields to present their cutting edge work and discuss the future directions of research.

Topics:Vulnerabilities of existing protocols and applications, Design of new secure or resilient network protocols, Security enhancements to existing networking protocols, Deployment study of secure protocols on the Internet, Security in future Internet architectures, Key distribution/management, Intrusion detection and response, Incentive systems for P2P systems and MANET routing, Secure protocol configuration and deployment, Challenges and security protocols for social networks, Secure channel establishment in disadvantaged networks, Network forensics.