<div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr">Call for papers:<br>
       <br>
The 11th International conference on  S<font face="Verdana"><span style="float:none;word-spacing:0px;color:black;background:white" lang="EN-US">ecurity, Privacy and Anonymity in Computation, Communication and Storage</span></font>

 (SpaCCS 2018), 11-13 Dec. 2018, Melbourne, Australia.<br>
         <br>
Website: <a href="http://www.swinflow.org/confs/2018/spaccs/" target="_blank">http://www.swinflow.<wbr>org/confs/2018/spaccs/</a><br>
        <br>
Key dates:<br>
Submission Deadline: August 31, 2018 (11:59pm UTC/GMT, firm) <br>
Notification: September 30, 2018<br>
Final Manuscript Due: October 15, 2018<br>
         <br>
Submission site: <a href="http://www.swinflow.org/confs/2018/spaccs/submission.htm" target="_blank">http://www.swinflow.org/<wbr>confs/2018/spaccs/submission.<wbr>htm</a><br>
        <br>
Publication:<br>
Proceedings will be published by IEEE CS Press.<br>
         <br>
Special issues:<br>Distinguished papers will be selected for special issues in Information Sciences, Future Generation Computer Systems, Journal of Parallel and Distributed Computing, Concurrency and Computation: Practice and Experience<div>
      <br>
===========<br>
Introduction<br>
     <br><font face="Verdana">
<font face="Verdana"><span style="float:none;word-spacing:0px;color:black;background:white" lang="EN-US">The SpaCCS 2018 conference is the 
                                                                                        11th event in the series of 
                                                                                        conferences which are devoted to 
                                                                                        security, privacy and anonymity in 
                                                                                        computation, communication and 
                                                                                        storage. SpaCCS is now recognized as 
                                                                                        the main regular event of the world 
                                                                                        that is covering many dimensions 
                                                                                        including security algorithms and 
                                                                                        architectures, privacy-aware 
                                                                                        policies, regulations and 
                                                                                        techniques, anonymous computation 
                                                                                        and communication, encompassing 
                                                                                        fundamental theoretical approaches, 
                                                                                        practical experimental projects, and 
                                                                                        commercial application systems for 
                                                                                        computation, communication and 
                                                                                        storage. As applications of computer 
                                                                                        systems and networks have permeated 
                                                                                        in every aspect of our daily life, 
                                                                                        the issues of security, privacy, and 
                                                                                        anonymity have become increasingly 
                                                                                        critical. The conference will 
                                                                                        provide a forum for the world-class 
                                                                                        researchers to gather and share 
                                                                                        their research achievements, 
                                                                                        emerging ideas and trends in the 
                                                                                        highly challenging research fields.</span></font>

 </font></div><div><font face="Verdana"><br></font></div><div><font face="Verdana"><font face="Verdana" style="margin:0px;padding:0px">
<font face="Verdana"><span style="float:none;word-spacing:0px;color:black;background:white" lang="EN-US">The conference aims at 
                                                                                        bringing together researchers and 
                                                                                        practitioners in the world working 
                                                                                        in the research fields of 
                                                                                        computation, communication and 
                                                                                        storage, with regard to security, 
                                                                                        privacy, and anonymity aspects of 
                                                                                        computer systems and networks. SpaCCS will focus on three 
                                                                                        broad areas of computation, 
                                                                                        communication, and storage, i.e. 
                                                                                        architectures, algorithms, 
                                                                                        techniques, and applications for 
                                                                                        security, privacy and anonymity.</span></font>

</font>


<br></font>   <br><p><span lang="en-au"><font face="Verdana">
</font></span></p><p><font face="Verdana">
                                                                                        <b>
                                                                                        <span style="font-family:Verdana">
                                                                                        <span lang="en-us">S</span>cope and Topics</span></b></font></p><font face="Verdana">
                                                                                        </font>Track 1: Security<br><br>1.1 Computation<br>          (1) Security Model and Architecture<br>          (2) Software and System Security<br>          (3) Secure Computing Platform<br>          (4) Secure Network Computing<br>          (5) Security in Cloud Computing and Pervasive/Ubiquitous Computing<br>          (6) Risk Analysis and Management<br>   <p></p><p><span lang="en-au">1.2 Communication<br></span></p><p><span lang="en-au">          (1) Network Security<br>          (2) Malware and Botnets<br>          (3) Intrusion Detection<br>          (4) Security in Web Services<br>          (5) Security in Mobile Social Networks<br>          (6) Security in Mobile and Wireless Communications<br>          (7) Fraud and Cyber-Crime<br>   <br>1.3 Storage<br>          (1) Access Control<br>          (2) Applied Cryptography<br>          (3) Database Security<br>          (4) Data Protection and Data Integrity<br>          (5) Digital Content Protection and Digital Forensics<br>          (6) Information Hiding<br>          (7) Security in Big Data and its Applications<br>   <br>Track 2: Privacy<br>   <br>2.1 Computation<br>          (1) Measuring and Quantifying Privacy<br>          (2) Privacy Modelling and Analysis<br>          (3) Software and System Privacy<br>          (4) Privacy-preserving Computing Platform<br>          (5) Privacy-enhanced Network Computing<br>          (6) Obfuscation-based Privacy<br>          (7) Cryptographic Tools for Privacy<br>          (8) Building and Deploying Privacy-enhancing Systems<br>          (9) Reliability, Robustness, and Abuse Prevention in Privacy Systems<br>   <br>2.2 Communication<br>          (1) Privacy in Web Services<br>          (2) Privacy Metrics and Policies<br>          (3) Crowdsourcing for Privacy<br>          (4) Location and Mobility Privacy<br>          (5) Privacy in Cloud and Big Data Applications<br>          (6) Privacy in Ubiquitous Computing and Mobile Devices<br>          (7) Privacy in Social Networks and Microblogging Systems<br>          (8) Privacy-enhanced Access Control, Authentication, and Identity Management<br>   <br>2.3 Storage<br>          (1) Data Protection Technologies<br>          (2) Differential Privacy<br>          (3) Privacy in Big Data and its Applications<br>          (4) Policy Languages and Tools for Privacy<br>          (5) Privacy and Human Rights<br>          (6) Interdisciplinary Research Connecting Privacy to Other Fields<br>          (7) Privacy in Cloud Computing and Pervasive/Ubiquitous Computing<br>          (8) Information Leakage, Data Correlation and Generic Attacks to Privacy<br>          (9) Privacy-Preserving Data Mining, Data Release and Publishing<br>   <br>Track 3: Anonymity<br><br>3.1 Computation<br>          (1) Anonymous Data Mining and Data Sharing<br>          (2) Parallelism Exploitation Techniques for Anonymity<br>          (3) Anonymity in Big Data Analytics<br>          (4) Anonymous Management in Trust Relationships<br>          (5) Anonymous Video Analytics Technology<br>          (6) Anonymity Metrics, Measures and Evaluations<br>          (7) Anonymity Models, Hardware/Device of Anonymity<br>   <br>3.2 Communication<br>          (1) Anonymity in Wireless Communication Systems<br>          (2) Anonymous Communication Protocols<br>          (3) Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks<br>          (4) Anonymous Proxy Software<br>          (5) Anonymous Communication and Internet<br>          (6) Anonymous Social Networks, Structural k-Anonymity in Social Networks<br>          (7) Authentication Protocol Providing User Anonymity<br>   <br>3.3 Storage<br>          (1) Distributed Anonymous Information Storage and Management<br>          (2) Private and Anonymous Data Storage<br>          (3) Anonymity-Preserving Data Collection and Database<br>          (4) Anonymity, Pseudonymity & Identity Management<br>          (5) Anonymity in Big Data and Cloud Scenarios<br>          (6) Anonymity in Health and Medical Databases</span></p>         <br>
Submission Guidelines<br>


<font face="Verdana"><span style="word-spacing:0px;color:black" lang="EN-US">Submitted papers must not 
                                                                                        substantially overlap with papers 
                                                                                        that have been published or that are 
                                                                                        simultaneously submitted to a 
                                                                                        journal or a conference with 
                                                                                        proceedings. Papers must be clearly 
                                                                                        presented in English, </span>
                                                                                        
                                                                                        <font color="#000000"><span style="word-spacing:0px" lang="EN-US">
                                                                                        must not 
                                                                                        exceed 14 pages</span><span style="word-spacing:0px" lang="EN-US">
                                                                                        in
                                                                                        <a href="http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0" target="_blank">
                                                                                        <u>
                                                                                        Springer LNCS format </u></a>
                                                                                        </span>
                                                                                        
                                                                                        <span style="word-spacing:0px" lang="EN-US">
                                                                                        (or up to 18 pages with the pages 
                                                                                        over length charge)</span><span style="word-spacing:0px" lang="EN-US">, </span></font><span style="word-spacing:0px;color:black" lang="EN-US">including 
                                                                                        tables, figures, references and 
                                                                                        appendices. Papers will be selected 
                                                                                        based on their originality, 
                                                                                        significance, relevance, and clarity 
                                                                                        of presentation assessed by at least 
                                                                                        two reviewers. Submission of a paper 
                                                                                        should be regarded as a commitment 
                                                                                        that, should the paper be accepted, 
                                                                                        at least one of the authors will 
                                                                                        register and attend the conference 
                                                                                        to present the work. All accepted 
                                                                                        papers will be published by Springer 
                                                                                        LNCS (EI Indexed). Two outstanding 
                                                                                        papers will be selected to receive 
                                                                                        the Best Paper Awards. </span>
                                                                                        </font>
                                                                                        <span style="font-family:Verdana">
                                                                                         </span> </div><div><br></div><div>
<p class="MsoNormal" style="margin:3pt" align="justify">
                                                                                        <span style="font-family:Verdana">
                                                                                        Submit your paper(s) in PDF file at 
                                                                                        the submission site:</span></p>
                                                                                        <p class="MsoNormal" style="margin:3pt" align="justify">
                                                                                        <font face="Verdana">
                                                                                        <a href="http://www.swinflow.org/confs/2018/spaccs/submission.htm" target="_blank">http://www.swinflow.org/confs/<span lang="en-us"><wbr>2018/spaccs/</span>submission.ht<span lang="en-au">m</span></a>.</font></p>


   <br>Publications<br>

<span style="font-family:Verdana">Accepted and presented papers will 
                                                                                        be included into the 
                                                                                        <span lang="en-au">symposium 
                                                                                        proceedings.</span></span> Distinguished papers will be selected for special issues in Information Sciences, Future Generation Computer Systems, Journal of Parallel and Distributed Computing, Concurrency and Computation: Practice and Experience.<br>       <br>Honorary Chairs<br>Robert Deng, Singapore Management University, Singapore<br>Colin Fidge, Queensland University of Technology, Australia<br>                    <br>General Chairs<br>Willy Susilo, University of Wollongong, Australia<br>Kui Ren, State University of New York at Buffalo, USA<br>   <br>Program Chairs<br>Hua Wang, Victoria University, Australia<br>Ron Steinfeld, Monash University, Australia<br>Tianqing Zhu, Deakin University, Australia<br>                 <br>Program Vice Chairs<br>Shui Yu, Deakin University, Australia<br>Zeeshan Pervez, University of the West of Scotland, UK<br>Christian Esposito, University of Salerno, Italy<br>   <br>Workshop Chairs<br>Arne Wilston, OC Tech, Australia<br>Xuyun Zhang, The University of Auckland, New Zealand<br></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><br></div>