Pre-Conference Workshops (October 17, 2011)
- Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
- Workshop on Scalable Trusted Computing (STC)
- Workshop on Privacy in the Electronic Society (WPES)
Recognizing smartphone security and privacy as the emerging area, this workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas, thus to deepen our understanding to various security and privacy issues on smartphones. This workshop will seek presentations on a number of topics related to smartphone security and privacy, including emerging smartphone threats, rogue mobile application detection, smartphone-centric regulatory compliance issues and mechanisms, mobile application sandboxing and virtualization, and others.
ACM STC 2011 focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. Topics of interests include but not limited to fundamental security principles of trusted computing (root of trust, trust measurement, storage, reporting, and attestation), hardware and software based trusted computing, architecture and implementation challenges, trusted computing for cloud, trusted mobile and smartphone devices, trusted emerging digital infrastructures such as smart grid, power grid, and Internet of Things, trusted social networks..
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2011 Workshop, held in conjunction with the ACM CCS 2011 conference, is the tenth in a yearly forum for papers on all the different aspects of privacy in today's electronic society. The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues.
Last modified: 2011-04-28 12:12:39 EDT