Call for Papers

Full Papers - Technical Sessions

Topics of Interest

The symposium’s central theme is information and computational systems security, and within this framework completed scientific papers in one or more of the areas listed below are welcome for submission. The list is not exhaustive and papers in other related areas are also welcome for submission.

  • Algorithms, protocols and cryptographic techniques
  • System audit and analysis
  • Access control, authentication and identity management
  • Computational forensics and criminology
  • Attack, vulnerability, and intrusion detection and prevention
  • Digital l
  • Constrained hardware security: RFID tags, smart cards, wireless sensors
  • Confidence models
  • Security policies, standards and norms
  • Anonymity and privacy
  • Intellectual property protection and DRM
  • Security incident response
  • Adaptive security, security policy
  • Database privacy and security
  • Security and privacy in social networks
  • Security of applications (Digital TV, E-banking, etc)
  • Security in ubiquitous and pervasive computing
  • Security in mobile and embedded systems
  • Middleware security (Java RMI, J2EE, CorbaSec, .Net, etc)
  • Network security: P2P networks, virtual networks, wireless networks
  • Security of web services, distributed systems and operating systems
  • Security of smart grids, smart meters and smart houses
  • Cloud computing security
  • Software security: development, tests and certification
  • Biometric systems and techniques
  • Fault and intrusion tolerance
  • Electronic voting
  • Cryptographic Hardware
  • Grid Computing Security
  • Smart card security

Important Dates and Deadlines

  • Registration and Paper Submission: June 24, 2014 - July 4, 2014
  • Acceptance Notification: August 23, 2014
  • Final Version Deadline: September 9, 2014

Instructions for Authors

Only full papers will be accepted. Papers must be the product of developed research that produced original and relevant results that were properly analyzed and validated. Furthermore, the paper presentation must contain grounded and detailed descriptions of the research as well as consistent conclusions based on the obtained results.

Submitted papers must include description of research activity and methodology, as well as reports on relevant experiences (observations/background information) and on related case studies. Papers will only be accepted electronically, through SBC’s JEMS portal (https://submissoes.sbc.org.br/). Papers must be submitted anonymously, i.e. avoid placing identifying information in the headers, in the paper’s text, or in any references which could link the paper to its authors and affiliated institutions.

Papers may be written in Portuguese or English. Only PDF copies of papers will be accepted. The paper’s text format and layout must follow SBC’s guidelines for formatting. For more information on SBC’s guidelines please visit www.sbc.org.br (select the English version of the website on the top banner, then on the left side menu select “Documents”, then select “Templates for Articles and Book Chapters”). Papers are limited to 14 pages including figures, tables, references and appendices.

All papers will be initially evaluated by a review committee followed by two anonymous peer reviews (no identifying information about the authors, reviewers, and affiliated institutions will be shared). Accepted papers must be presented at the symposium by one of the authors, as they will be included in XIV SBSeg’s official proceedings. At the symposium, an evaluation committee will then select the best paper presented.

Coordination

Extended Abstracts - Technical Sessions

The symposium’s central theme is information and computational systems security, and within this framework completed scientific papers in one or more of the areas listed below are welcome for submission. The list is not exhaustive and papers in other related areas are also welcome for submission.

  • Algorithms, protocols and cryptographic techniques
  • System audit and analysis
  • Access control, authentication and identity management
  • Computational forensics and criminology
  • Attack, vulnerability, and intrusion detection and prevention
  • Digital l
  • Constrained hardware security: RFID tags, smart cards, wireless sensors
  • Confidence models
  • Security policies, standards and norms
  • Anonymity and privacy
  • Intellectual property protection and DRM
  • Security incident response
  • Adaptive security, security policy
  • Database privacy and security
  • Security and privacy in social networks
  • Security of applications (Digital TV, E-banking, etc)
  • Security in ubiquitous and pervasive computing
  • Security in mobile and embedded systems
  • Middleware security (Java RMI, J2EE, CorbaSec, .Net, etc)
  • Network security: P2P networks, virtual networks, wireless networks
  • Security of web services, distributed systems and operating systems
  • Security of smart grids, smart meters and smart houses
  • Cloud computing security
  • Software security: development, tests and certification
  • Biometric systems and techniques
  • Fault and intrusion tolerance
  • Electronic voting
  • Cryptographic Hardware
  • Grid Computing Security
  • Smart card security

Important Dates and Deadlines

  • Registration and Paper Submission: Setember 08, 2014
  • Acceptance Notification: September 19, 2014

Instructions For Authors

This call contemplates extended abstracts only, which must present research producing preliminary results and suggesting future work consistent with these results. The goal of this category is foster the discussion of ideas, even if not yet fully developed or validated.

Submitted extended abstracts must include description of research activity and methodology, as well as reports on relevant experiences (observations/background information) and on related case studies. Papers will only be accepted electronically, through SBC’s JEMS portal (https://submissoes.sbc.org.br/). Extended abstracts must be submitted anonymously, i.e. avoid placing identifying information in the headers, in the abstracts’s text, or in any references which could link the paper to its authors and affiliated institutions.

Extended abstracts may be written in Portuguese or English. Only PDF copies of papers will be accepted. The abstract’s text format and layout must follow SBC’s guidelines for formatting. For more information on SBC’s guidelines please visit www.sbc.org.br (select the English version of the website on the top banner, then on the left side menu select “Documents”, then select “Templates for Articles and Book Chapters”). Extended abstracts are limited to 4 pages including figures, tables, references and appendices.

All extended abstracts will be initially evaluated by a review committee followed by anonymous peer reviews (no identifying information about the authors, reviewers, and affiliated institutions will be shared). Accepted extended abstracts must be presented at the symposium by one of the authors, as they will be included in XIV SBSeg’s official proceedings. At the symposium, an evaluation committee will then select the best paper presented.

Coordination

  • Diego F. Aranha (UNICAMP)
  • Marinho P Barcellos (UFRGS)

CTDSeg - III Contest of Theses and Dissertations in Security

Important Dates and Deadlines

  • Paper Submission: July 14, 2014 - 23, 2014
  • Acceptance Notification: August 27, 2014
  • Final Version Deadline: to be determined
  • Contest Date: November 3, 2014

Call for Submission

The Contest of Theses and Dissertations on Information and Computational Systems Security (CTDSeg), part of SBSeg, aims to acknowledge and reward the best doctoral theses and best post-graduate dissertations in the security field. Researchers are invited to submit a summary paper which describes and summarizes the results concluded in their thesis or dissertation. Theses and dissertations completed between August 2012 to June 2014 are eligible for submission. The contest will award the determined three best doctoral theses and the three best post-graduate dissertations.

Article Submission and Formatting

Submitted paper summaries must be written in either Portuguese or English with a maximum page limit of 8 pages. Paper summaries will only be accepted in PDF file form. Paper summaries should be formatted based on SBC’s formatting guidelines. For more information on SBC’s guidelines please visit http://www.sbc.org.br/template (select the English version of the website on the top banner, then on the left side menu select “Documents”, then select “Templates for Articles and Book Chapters”).

Paper summaries in PDF file form must be submitted through SBC’s JEMS portal at (submissoes.sbc.org.br). Please note, that there are actually two separate items that must be combined into one PDF file for submission (see paragraphs below for more details).

First Document for Submission:

In the paper summary (8 page maximum length), the author must discuss the thesis’s or dissertation’s contribution to its intended academic field as well as it’s thematic originally. The summary must also include the following items: the title of the thesis or dissertation, the author’s name, name of supervisor(s) and their affiliations, the original abstract, motivations, goals, achievements, associated scientific work, and the web address where an official copy of the thesis or dissertation is published and available for view

Second Document for Submission:

Along with the paper summary, each submission must also contain a scanned copy of the Declaration of Completion for the related thesis or dissertation. The statement must explicitly state that the candidate’s work was approved and successfully defended. The statement must also indicate the location and date of the defense, the supervisor’s name, and database location.

Topics of Interest

In order to be eligible for consideration, submitted theses and dissertations must be related to a topic in the field of Information and Computational Systems Security.

Evaluation

The paper summaries for an applicant’s thesis or dissertation will undergo an initial evaluation by three research experts on SBSeg’s Program Committee. The paper summaries accepted from the initial evaluation stage will be published in the SBSeg symposium proceedings. Furthermore, the principal author must present their thesis or dissertation at the CTDSeg on November 3, 2014. At CTDSeg, the contest’s Evaluation Committee will review the completed thesis or dissertation and evaluate the applicant’s oral presentation in order to determine the three best doctoral thesis and post-graduate dissertation contestants.

STDSeg 2014 Coordination

Tutorials proposals

Important Dates and Deadlines

  • Proposal Submission: July 11, 2014 - 18, 2014
  • Acceptance notification: August 10, 2014 - August 14, 2014
  • Completed Lesson Plan and Presentation Deadline: September 15, 2014

About the Tutorials

OSBSeg’s tutorials aim to cover relevant topics not generally covered at the undergraduate level, as well as to spark interest in and develop connections between academics and professionals in the security field. Tutorials will be considered based on thematic relevancy and attractiveness to students and professionals in relation to current academic research areas and labor market needs. Each tutorials should be planned for a three and a half hour time block, which may also include laboratory exercises.

Topics of Interest

The symposium’s central theme and thus of the tutorials is information and computational systems security, and within this framework tutorials may cover one or more of the following topics:

  • Algorithms, protocols and cryptographic techniques
  • System audit and analysis
  • Access control, authentication and identity management
  • Computational forensics and criminology
  • Attack, vulnerability, and intrusion detection and prevention
  • Digital law
  • Constrained hardware security: RFID tags, smart cards, wireless sensors
  • Confidence models
  • Security policies, standards and norms
  • Anonymity and privacy
  • Intellectual property protection and DRM
  • Security incident response
  • Adaptive security, security policy
  • Database privacy and security
  • Security and privacy in social networks
  • Security of applications (Digital TV, E-banking, etc)
  • Security in ubiquitous and pervasive computing
  • Security in mobile and embedded systems
  • Middleware security (Java RMI, J2EE, CorbaSec, .Net, etc)
  • Network security: P2P networks, virtual networks, wireless networks
  • Security of web services, distributed systems and operating systems
  • Security of smart grids, smart meters and smart houses
  • Cloud computing security
  • Software security: development, tests and certification
  • Biometric systems and techniques
  • Fault and intrusion tolerance
  • Electronic voting
  • Cryptographic Hardware
  • Grid Computing Security
  • Smart card security

The list is not exhaustive and tutorials may cover other topics related to Information and Computational Systems Security.

Tutorials Proposal Submission

Professors or researchers interested in teaching a tutorials must submit a proposal, written in Portuguese, between 3 to 5 pages (excluding CVs, item 6 below), with the following information:

  • Identification Information: tutorials title, author(s) and affiliated institution(s), and indicate which author(s) will present the tutorials at the symposium;
  • General Information: tutorials objectives, desired audience profile, and thematic approach (i.e. theoretical or practical course; discussing general summary of findings or conducting an in-depth investigation on specific aspects; giving a presentation on or holding a comparative discussion on technology; providing a training session for new skills or information, etc.);
  • Anticipated structure of supporting text (topic areas and/or chapters to be developed);
  • For each anticipated topic area / chapter (from item 3), write a summary of its content and provided an estimation of the number of pages for each topic area / chapter;
  • Bibliography for principal sources used in tutorials preparation;
  • CV for each of the tutorials authors (maximum one page per author) (CVs do not count towards the 3 to 5 page written proposal limit).

Please note that all the information listed above must be submitted as one document (in PDF format only).

Proposals can only be submitted in electronic form (as one PDF file) via SBC’s JEMS portal (https://submissoes.sbc.org.br).

Evaluation Process

Each tutorials proposal submitted to SBSeg 2014 will be evaluated by three or more members of the Evaluation Committee. Tutorials proposals will be reviewed on the following criteria: thematic relevancy, technical quality, and experience of the tutorials author(s) in the topic area. The best proposals in different topic areas will be accepted for presentation and publication.

In an effort to provide a diverse selection of tutorials, only one proposal per topic area will be accepted. Therefore, if two or more submitted proposals cover the same topic or significantly overlap, only the best proposal will be selected at the discretion of the evaluation committee.

Tutorials Supporting Text

The author(s) of accepted tutorials proposals must produce a supporting text for the course between 40 to 50 pages in length. The supporting text must be written in Portuguese; other languages will not be accepted. The supporting text for each selected tutorials will be published as a chapter in the symposium’s catalog “Tutorials of SBSeg 2014”. Tutorials authors are expected to format the supporting text based on SBC’s formatting guidelines. For more information on SBC’s guidelines please visit (www.sbc.org.br) (select the English version of the website on the top banner, then on the left side menu select “Documents”, then select “Templates for Articles and Book Chapters”).

Coordination

WFC - III Workshop on Computational Forensics

Important Dates and Deadlines

  • Paper Submission: September 4, 2014 - September 11, 2014
  • Acceptance Notification: October 1, 2014
  • Final Version Deadline: to be determined
  • Workshop Date: November 6, 2014

Call for Submission

The Brazilian Symposium on Information and Computational Security Systems (SBSeg) opened its doors to the interdisciplinary field of Computational Forensics in 2012 and the annual Workshop on Computational Forensics is convening for the third time! The past workshops in 2012 (Curitiba, PR) and in 2013 (Manaus, AM) were a success thanks to the speakers, technical sessions, and submitted articles.

The upcoming WFC III in Belo Horizonte will focus on improving the training and motivation within the computational forensics community. This theme is a result of a last year’s workshop report which highlighted the lack of computational forensics experts and its effect in the legal arena, especially as the “TJMG admits that there are large number of stalled legal processes” in part to the lack of experts.

The WFC III will not resolve all of the issues, but will encourage discussion on the problems and possible technical and scientific solutions that can assist experts in their everyday activities. It is important to note, that the Public Ministry of Minas Gerais created the State Coordinator for Combating Cyber Crime (Coeciber). This office is part of the Center for Operational Support for Criminal Prosecutors, for prosecutors working in Criminal Enforcement, Juried Trial, and under Military Authority (Caocrim). The State Coordinator for Combating Cyber Crime (Coeciber) works, in conjunction with public prosecutors, to expand and reform judicial and extrajudicial measures necessary to effectively combat cyber crime under state jurisdiction.

Moreover, another important issue to review is the current labor demand for specialized experts, as the Institute for General Skills (IGP) reported that “investigation for both common and technologically sophisticated crimes require specialized expertise.”

The WFC III facilitates knowledge transfer and best practice exchange between experts in the Computer Science and Law fields. By bringing together technical experts working in the computer forensics realm with those in relevant legal fields, important legal aspects affecting legislation arising from unlawful acts can be appropriately dealt with while minimizing implications on Brazilian society.

The computational forensics field is continuously growing more important and necessary as the virtual online environment continuously becomes part of everyday society and societal interactions. This transformation in societal interaction is facilitating the movement of traditional societal problems, once common in the real world, into the virtual world. With this movement, new technical and legal problems are emerging, including issues related to: invasion of privacy; breaches of contracts made over the internet; dissemination of slanderous or defamatory e-mails; child pornography; cyber bullying; illegal copy right infringement of software, music, and movies; and many more issues becoming an everyday reality in Brazilian and worldwide society.

Given the context and state of affairs, the SBSeg organizing committee invites potential workshop participants to submit papers related to the topics listed below. The workshop organizing committee recognizes that the items below are not a complete list and encourages individuals interested in submitting papers in relevant fields not list below to contact the workshop coordinators for consultation.

Formatting and Submission of Papers

Those interested in submitting papers for the workshop must submit the initial drafts in PDF file form. The papers should be formatted based on SBC’s formatting guidelines. For more information on SBC’s guidelines please visit www.sbc.org.br/en/index.php?option=com_jdownloads&task=view.download&catid=32&cid=38&Itemid=195.

Papers must be submitted through SBC’s JEMS portal at (submissoes.sbc.org.br).

Topics of Interest

  • Forensic Analysis of Digital Documents
  • Forensic Aspects of Computer Networks and Security
  • Legal Aspects of Computational Forensics
  • Biometrics and Attacks on Biometric Systems (Spoofing)
  • Electronic Crimes
  • Detection of Pornography and Child Pornography
  • Detection of Violence
  • Theoretical Foundations for Computational Forensics
  • Management of Information Security
  • Collection of Digital Evidence
  • Masking Information (Steganography and Steganalysis)
  • Security and Investigative Procedures in Cloud Computing
  • Surveillance (Pedestrian detection, object tracking, re-identification of people, facial recognition, recognition of actions and activities).

Program Committee

To be determined.

Coordination of WFC 2014

WGID - IV Workshop on Digital Identity Management

Important Dates and Deadlines

  • Submission (registration and paper upload): August 1 to 11, 2014 - August 1 to 19, 2014
  • Acceptance Notification: September 1, 2014 - September 5, 2014
  • Final Version Deadline: September 8, 2014 - September 12, 2014

Presentation

Management of digital identities (IdM-Identity Management) consists of an integrated system of policies, processes, and technologies that enable organizations to treat and manipulate the identities of its users and objects (devices) in authentication, authorization, accounting, and auditing.

This is an active research topic and due to its complexity and relevance it is expected to remain important for some time. This outlook stems from the numerous technical issues that identity management systems must consider, such as: ease of use, user privacy and anonymity, security, single authentication, scalability, fine granularity access control (based on attributes), interoperability, and systems costs (total cost of ownership).

The 4th Workshop on Digital Identity Management (WGID) will provide a forum for technical paper discussions and presentations on the state of the art technologies related to identity management. Furthermore, a workshop goal is to identify research challenges as well as empower workshop participants.

Topics of Interest

Authors are invited to submit original papers on identity management. Topics of interests for the workshop include (but are not limited to):

  • Federated mobile access and mobile certification
  • Attribute aggregation
  • Integrated environments for attribute aggregation management
  • Anonymity in IdM systems
  • Reference architectures and frameworks for IdM
  • Auditing IdM systems
  • Single sign on authentication
  • Object authentication (devices or things)
  • Attribute based authentication and access control
  • Authentication and access control federated in non-web applications and mobile computing
  • Digital certification
  • Atribute certificates
  • Lifecycle of digital identities (provision and administration)
  • Attribute based access control (ABAC)
  • Developing application using A&A infrastructure provided by federations
  • Scalability in identity management technologies
  • Academic network federations
  • Tools for managing and monitoring federations
  • Trust management in IdM system
  • Attribute Management
  • A&A management in interinstitutional projects
  • User centered identity management
  • Identity and cloud computing management
  • Identity and access management
  • Identity and Egovernment management
  • Identity and grid computing management
  • Identity and IoT (Internet of Things) management
  • Federated identity management
  • Interoperability between IdM systems
  • Levels of Assurance in IdM
  • New approaches to authentication and access control (e.g., based on context, reputation etc.)
  • Standards for digital identity in the academic community
  • Privacy and Anonymity in IdM systems
  • Authentication and authorization protocols
  • Social networks and digital identities
  • Civil Identity Registry (RIC) of Brazil
  • Prevention techniques for fraud and identity theft
  • Technologies to strengthen privacy
  • Technology usability in Identity Management

Workshop Format

The WGID will be held on November 6, 2014 and will include the presentation of papers accepted for publication, a guest lecturer and a panel discussion.

Information for Authors

Articles can be submitted in two categories:

  • Full papers should present research has been developed to the point of producing original and relevant results that have been appropriately validated and analyzed. Submitted completed articles are limited to 10 pages.
  • Short papers should describe a research paper in progress, a computational tool and/or practical experiments. The short articles should be between 4 to 6 pages in length. In the case of tools and/or experiments, the article must contain the following information: description and motivation of the problem addressed by the tool; solution architecture and description of the main features; URL where the tool is available; URL tool documentation and description of the planned demonstration.

The summaries should be formatted based on SBC’s formatting guidelines. For more information on SBC’s guidelines please visit www.sbc.org.br (select the English version of the website on the top banner, then on the left side menu select “Documents”, then select “Templates for Articles and Book Chapters”). Paper summaries must be submitted through SBC’s JEMS portal at (submissoes.sbc.org.br). Paper summaries must be submitted in PDF format and may be written in Portuguese of English.

Papers submitted to WGID will be evaluated by a board of reviewers and selected papers will be invited for presentation and published in the Conference Proceedings. At least one author of each selected paper must register for and attend the Symposium on Information Security and Computer Systems (SBSeg) to present their work at the workshop.

All submitted manuscripts must be anonymized, that is, the authors must remove from the head, body and references in the paper any information that may be linked to the authors or their institutions.

Organizing Committee

Coordenadores Gerais do Sbseg

  • Jeroen van de Graaf (UFMG)
  • José Marcos Nogueira (UFMG)
  • Leonardo B. Oliveira (UFMG)

WGID Coordinator

Program Committee

  • Adilson Eduardo Guelfi (Unoeste)
  • Aldri Santos (UFPR)
  • Altair Olivo Santin (PUC-PR)
  • Débora Christina Muchaluat Saade (UFF)
  • Emerson Ribeiro de Mello (IFSC)
  • Joni da Silva Fraga (UFSC)
  • Marco Aurélio Amaral Henriques (Unicamp)
  • Michelle Silva Wangham (Univali)
  • Noemi Rodriguez (PUC-RJ)
  • Ricardo Custódio (UFSC)
  • Roberto Samarone (UFPA)
  • Vinod Rebello (UFF)

WTE - I Workshop on Electoral Technology

The Workshop in Election Technology (WTE) will be held on November 3, 2014, in Belo Horizonte in conjunction with SESeg 2014.

Call for Papers

Brazil has been increasingly adopting automation of its elections since the deployment of voting machines in 1996, reaching the current scenario where integration with biometric identification is planned for all voting equipment. However, participation of academia in this initiative, in particular of the information security segment, has been not expressive.

The Workshop on Electoral Technology is a scientific venue organized as a satellite event of the XIV Brazilian Symposium on Security of Information and Computer Systems (SBSeg 2014). The main objective of the event is to promote research in electoral technology and to establish collaboration with the international research community, integrating experts in academia and industry with interest on the security of electronic voting. In this context, papers are solicited for submission in any work aligned with the main goal, with emphasis on the following items:

  • Auditing of electronic voting systems
  • Cryptographic protocols and primitives for electronic voting
  • Design of new voting systems
  • Experiences with systems in production or development
  • Formal or informal security or requirements analysis
  • Legal aspects and standardization in electronic voting
  • Mechanisms for protecting ballot secrecy and integrity
  • Mechanisms for verifying election results
  • Security analysis and attacks on existing systems
  • Security of paper and remote voting
  • Usability and accessibility issues
  • Voter registration and authentication

Important Dates

  • Registration and Submission: September 8, 2014
  • Notification of Decision: September 19, 2014
  • Final Version: September 29, 2014

Instructions to the Authors

Submitted papers should present original research results, event if preliminary. Each submission should provide proper context in the introduction, rigorous treatment of the research subject or case study, and conclusions consistent with the results.

Submission will be exclusively electronic, through the JEMS system (submissoes.sbc.org.br). Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references.

Papers can be written in Portuguese or English and must submitted in PDF format. Formatting should follow the Brazilian Computer Society template and fit between 5 and 12 pages, including pictures, tables, references and appendices. Longer papers are expected to have more definite results. For more information on the formatting guidelines please visit www.sbc.org.br (select the English version of the website on the top banner, then on the left side menu select "Documents", then select "Templates for Articles and Book Chapters").

All submissions will be evaluated by a body of reviewers, following a standard double-blind process (no identification of authors, reviewers and their affiliations). Accepted papers must be presented by one of the authors, in order to be included in the final proceedings. The length assigned to each presentation will depend on the number of accepted papers and depth of each individual contribution.

Program Committee

  • Diego de Freitas Aranha (UNICAMP)
  • Jeroen van de Graaf (UFMG)
  • Mario Gazziro (UFABC)
  • Roberto Samarone Araújo (UFPA)
  • Ruy J. Guerra B. de Queiroz (UFPE)

WTICG - VIII Workshop on Scientific Initiation and Undergraduate Papers

Important Dates and Deadlines

  • Paper Submission (registration and uploading): July 7 to 18, 2014 - 7 to 25, 2014
  • Acceptance Notification: August 23, 2014
  • Final Version Deadline: September 9, 2014
  • Workshop Date: November 3, 2014

Call for Submission

The Workshop on Scientific Initiation and Undergraduate Papers (WTICG), a joint event with SBSeg, aims to encourage new graduates and undergraduates to participate in the production and dissemination of scientific papers on topics related to information and computational systems security. WTICG 2014 will be held in conjunction with SBSed 2014 (www.sbseg2014.dcc.ufmg.br/) November 3 to 6, 2014 in Belo Horizonte, MG.

Undergraduate students currently enrolled in university and recent graduates who completed their undergraduate course work in 2013 are invited to participate in WTICG 2014. Participants are required to provide documentation to the event coordinator indicating their enrollment status at a university or indicating their recent and successful completion of studies.

Authors are invited to submit papers for Scientific Initiation (IC), completion of course work (TCC), software implementations , and independent projects completed in the years 2013 and 2014 or that are in the final stages of completion. The following criteria will be used in the evaluation of submitted work: originality, relevance, technical quality, and presentation. Submissions selected by the Program Committee will be published (in digital form), provided that at least one of the papers’ authors is registered for the workshop. All papers selected for publication must be presented during the workshop’s technical session by one of the authors.

Article Submission and Formatting

Submitted papers should be formatted based on SBC’s formatting guidelines. For more information on SBC’s guidelines please visit www.sbc.org.br (select the English version of the website on the top banner, then on the left side menu select “Documents”, then select “Templates for Articles and Book Chapters”).

Papers must be submitted through SBC’s JEMS portal at (submissoes.sbc.org.br). Papers must be submitted in PDF format and may be written in Portuguese or English with a maximum length of 10 pages.

Topics of Interest

The list of topics of interest includes (but is not excluded to):

  • Algorithms, protocols and cryptographic techniques
  • System anonymity, auditing and analysis
  • Access control, authentication, identity management, biometrics
  • Computational Forensics
  • Detecting and preventing intrusions, attacks and vulnerabilities
  • Digital Law
  • Cryptographic hardware, RFID, smart cards and biometric systems
  • Trust Models
  • Security standardization and normalization
  • Privacy
  • Intellectual property protection and DRM
  • Response to security incidents
  • Adaptive security, security policies
  • Security in applications (digital TV, e-banking, etc.)
  • Security in ubiquitous / pervasive computing
  • Security on mobile devices and embedded systems
  • Security in grid and cloud computing
  • Security middleware (Java RMI, J2EE, CORBASec,. Net, etc.)
  • Security in networks, overlay networks, virtual networks and wireless networks
  • Security in smart grids, smart meters and smart houses
  • Security in web services, distributed systems and operating systems
  • Database security and privacy
  • Social network privacy and security
  • Secure systems and software: developing, testing and certification
  • Fault/intrusion tolerance
  • Electronic Voting

Program Committee

  • Aldri dos Santos (UFPR)
  • Altair Santin (PUCPR)
  • Anderson Nascimento (UnB)
  • André Santos (UECE)
  • Bruno Barros (LARC/USP)
  • Bruno Rodrigues Silva (UFMG)
  • Carla Merkle Westphall (UFSC)
  • Carlos Maziero (UTFPR)
  • Cristian Cleder Machado (URI)
  • Edna Canedo (UnB)
  • Eduardo Feitosa (UFAM)
  • Eduardo Souto (UFAM)
  • Eduardo Viegas (PUCPR)
  • Ewerton Andrade (USP)
  • Gilbert Martins (UFAM)
  • Gustavo Vieira (UFMG)
  • Jim Lau (UFSC)
  • Joéo Eugenio Marynowski (UFPR)
  • Jose Antonio Xexeo (IME)
  • Lau Cheuk Lung (UFSC)
  • Leandro Magnabosco (UFSC)
  • Luis Knob (UFRGS)
  • Marcos Silva (USP)
  • Marinho Barcellos (UFRGS)
  • Marlon Domenech (Univali)
  • Mateus Rutzig (UFSM)
  • Márcio Carvalho (UFRGS)
  • Paulo Barreto (USP)
  • Paulo de Geus (Unicamp)
  • Paulo Mafra (UFSC)
  • Paulo André da Silva Goncalves (UFPE)
  • Pedro Heleno Isolani (UFRGS)
  • Rafael Obelheiro (UDESC)
  • Raul Ceretta Nunes (UFSM)
  • Ricardo Custódio (UFSC)
  • Ricardo Dahab (Unicamp)
  • Rick Lopes de Souza (UFSC)
  • Rossana Andrade (UFC)
  • Routo Terada (USP)
  • Vilmar Abreu (PUCPR)
  • Vitor Paisante (UFMG)
  • William de Souza (Royal Holloway)

Prizes

The top three entries will receive awards.

WTICG 2014 Coordination