24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2010)

Rome, Italy -- June 21-23, 2010
http://dbsec2010.dti.unimi.it

ICICS 2010 Twelfth International Conference on Information and Communications Security

Barcelona, Spain
15-17 December, 2010
http://www.icics2010.org

The Second International Conference on Network & Communications Security (NCS – 2010)

December 27~29, 2010 Chennai, India
http://coneco2009.com/ncs/ncs.html

ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning (PSDML 2010)

http://fias.uni-frankfurt.de/~dimitrakakis/workshops/psdml-2010/

1. Data privacy and security issues.
a) Privacy-preserving data publishing and anonymity.
b) Privacy-aware data fusion, integration and record linkage.
c) Privacy evaluation techniques and metrics.
d) Auditing and query execution over private data.
e) Privacy-aware access control.

2. Theoretical aspects of machine learning for security applications.
a) Adversarial classification, learning and hypothesis testing.
b) Learning in unknown and/or partially observable stochastic games.
c) Special learning problems in security applications (i.e. learning with distribution shifts,
semi-supervised learning, learning in large datasets).
d) Distributed inference and decision making for security.
e) Game-theoretic topics related to security applications.

3. Privacy-preserving data mining, machine learning and applications.
a) Emerging research domains in privacy-preserving mining and learning
(e.g., stream mining, social network analysis, graph analysis).
b) Application-specific privacy preserving data mining and machine learning.
c) Knowledge hiding approaches for privacy preserving learning and mining.
d) Secure multiparty computation and cryptographic approaches.
e) Statistical approaches for privacy preserving data mining.

4. Security applications of machine learning.
a) Cryptographic applications of machine learning.
b) Intrusion detection and response.
c) Biometric authentication, fraud detection.
d) Statistical analysis and classification of malware.
e) Spam filtering and captchas.

ほほう。

Specification and Implementation of Dynamic Security Policies (DYSP) Workshop

http://sigappfr.acm.org/MEDES/10/index.php?option=com_content&view=article&id=70&Itemid=77

The 4th International Conference on Pairing-based Cryptography (Pairing 2010)

December 13-15, 2010
Yamanaka Onsen (Hot Spring), Ishikawa, Japan
http://www.pairing-conference.org/