Second Annual Conference on
Privacy, Security and Trust
Call For Participation________________________________PDF format
PST2004 is aimed at scientists, educators, business people, technologists, futurists, and others who have a vision and an understanding of the big challenges (and accompanying advances) that should shape the research agenda in privacy, security and trust.
We are seeking visionaries from all disciplines in academia, industry and the public sector who are pursuing fundamental advances to re-architect cyberspace - to create an information and communications infrastructure that is private, secure and trustworthy for researchers, businesses, government and our citizens. This new cyber environment will allow Canadians to take full advantage of advanced applications of technology in e-Government, e-Health, e-Learning and e-Commerce.
PST2004 will present a stimulating mix of keynote speakers, research papers, panel discussions and social events that will facilitate:
Meeting the Canadian PST community
Networking with fellow researchers and professionals
Posing important questions
Defining technical and social challenges
Exposing and sharing current research
Discussing the tools practitioners need researchers to develop
Identifying the gaps and tackling the big issues - the exciting, deep challenges yet to be met in PST research
Staying abreast of the threats and risks in cyberspace
PST2004 will be of special interest to:
PST researchers and research administrators
Decision makers in the private and public sectors
Public and private sector policy makers
Developers of IT Security Products
Representatives of Regulating Authorities and industry associations
IT and Information Security Specialists
Standards Specialists
Public sector Managers (government authorities enforcement agencies)
Policy Makers/Corporate Leaders
Legal community
Privacy officers
Military and Law Enforcement communities
Risk managers
Submissions of papers and posters are encouraged in areas as diverse as, but not limited to:
Privacy Preserving/Enhancing Technologies
Critical Infrastructure Protection
Identity and Trust management
Network and Wireless Security
Intrusion Detection Systems and Technologies
Security, eSecurity, Secure Software Development and Architecture
Representations and formalizations of Trust in electronic and physical social systems
PST challenges in eHealth, eLearning, eGovernment and eCommerce
Trust technologies, technologies for building trust
Observations of PST in practice, society, policy and legislation
Digital Rights Management
Human Computer Interaction and PST
Implications of, and technologies for, Lawful Surveillance
Information filtering, recommendation, reputation and delivery technologies, handling spam
Anonymity
Biometrics, National ID cards, identity theft
RFID and associated technologies
All accepted papers and abstracts will be published in conference proceedings. In addition, a new Journal of Privacy, Security and Trust is under negotiation and selected papers may be expanded for submission to its inaugural issue.The winner of the Best Student Paper completion will receive an award.
Submissions are encouraged as long papers (12 pages) short papers (4-5 pages) and posters. Submissions should be in the IEEE format, with the first page bearing authors' affiliations, names and contact details. Details are available at http://www.ieee.org/organizations/pubs/transactions/stylesheets.htm.