(CSP EU FORUM) Brussels: 18-19 April 2013

Call for Cluster Workshops - 2013

CSPEF 2013 will host a number of focused security workshops during the two day event. This will provide an excellent opportunity for leading members of commercial and academic research communities to interact and view latest developments in on-going research projects.



The typical purpose of such a cluster group workshops is to cover a specific aspect of security and privacy in more detail, making it easy for the participants to attend CSP EU Forum 2013 and a specialised workshop at CSP EU Forum 2013 with just one trip. Furthermore, the co-location offers synergies for the organisers.

A quick overview for participants, including those responding to the calls for submissions, is available here.

We invite contributions from the Cross Topical Clusters, including the “Systems & Network Groups”, “Services & Cloud Groups”, and Special Interest Groups (policy & monitoring)  within the  security research sectors that will demonstrate innovative technologies, state of the art, research, standards, implementations, running experiments, applications, industrial case studies or researched works. Workshops will be selected by the organising committee based on submissions.

Proposals should be submitted via email by the:  13th February 2013

Important dates

  • Workshop proposal submissions due: 13th February 2013
  • Acceptance decision: will be informed by 18th February 2013

Please email: 

Workshop Proposals (Format)
There will be some interaction in deciding upon and setting up a workshop, but the initial proposal should already contain as much as possible of the following information:

Contact information of the workshop organizer.
Expected length of the workshop.

  • Technical proposal (1 page minimum): Topics to be addressed; importance of these topics; preliminary call for papers/posters/contributions; preliminary program committee; proposed review process.

Expected number of participants.

  • And other local meeting issues, such as the special requirements/equipment for the meeting room.

Biographies of workshop organizer(s).

  • Including workshop organization experience.

View "Submissions" page to download appropriate proposal template.

Please submit all proposals via email to:

All submitted demos and posters will be reviewed by the CSP EU Forum 2013 organising committee ( taking into account aspects such as the level of novelty, conference relevance and topics covered).

Organising Committee

The CSP EU Forum  2013 organising committee will be responsible for reviewing workshop submissions.

Committee members:

   Frances Cleary, TSSG, Waterford Institute of Technology
   Paul Malone, TSSG, Waterford Institute of Technology
   Michele Bezzi, SAP
   Massimo Felici, HP
   Fabio Massacci, UNITN
   Tom Curran TSSG, Waterford Institute of Technology


Topics include, but are not limited to:

Privacy and Data-protection     Trusted Systems
  • advances in authentication and identification
  • anonymity
  • identity management
  • biometrics – security and privacy
  • security and privacy metrics
  • data/system integrity
  • protection –information and infrastructure
  • operating systems security and privacy
  • security engineering
  • security architectures/security by design
  • security testing/ validation – formal methods
Security and Privacy in the cloud   Foundations (computer science)
  • ad hoc networks
  • e-services
  • mobile systems
  • monitoring systems – personal/domestic/public
  • pervasive/ubiquitous computing
  • semantics
  • ontology
  • formal methods for security and privacy
  • knowledge extraction/representation for security
Crypto   Legal and social
  • applied cryptography
  • advances in cryptography: smaller/faster/specialised/…
  • human and social implications of security and privacy
  • trust management
  • legal and ethical issues
  • policies for security and privacy
Real World    
  • cyber warfare and security
  • protection from cyber-attack: defence and response
  • intrusion detection and prevention
  • complex systems security
  • data and application security
  • critical infrastructure protection
  • middleware security
  • network security
  • robustness and resilience
  • secure interoperability of systems and policies
  • secure service composition
  • security and privacy in social applications and networks
  • security and trust in the internet of things
  • security management in complex scenarios
  • software assurance and certification
  • threats, vulnerabilities, and risk management
  • usable security for complex systems
  • web service security