Home page logo

securecoding logo Secure Coding mailing list archives

Re: CFP: W2SP 2013 - Web 2.0 Security and Privacy workshop
From: Jeffrey Walton <noloader () gmail com>
Date: Mon, 17 Dec 2012 20:20:32 -0500

For someone looking for a topic, I would encourage exploration of
"Trustworthy cloud-based services" via license agreements and terms of

If the license agreements or terms of service states a provider is
indemnified by the user; or the provider is allowed to loose, sell, or
give away your data without making you whole (Apple's ToS), then I
would question the platform's trustworthiness.

Giving data to law enforcement still qualifies as a threat to data in
my opinion. I don't discriminate between "good" bad guys and "bad" bad
guys - they are threats to the data. There are no shades of grey.

I suspect there are no trustworthy platforms after factoring in
license agreements and terms of service.


On Sun, Dec 16, 2012 at 11:37 AM, Larry Koved <koved () us ibm com> wrote:
On behalf of the workshop co-chairs and program chair, we would like to
invite you participate in the seventh Web 2.0 Security and Privacy workshop.

Web 2.0 Security and Privacy workshop is co-located with
The 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013)

and is an event of
The IEEE Computer Society's Security and Privacy Workshops (SPW 2013)

W2SP brings together researchers, practitioners, web programmers, policy
makers, and others interested in the latest understanding and advances in
the security and privacy of the web, browsers and their eco-system. We have
had six years of successful W2SP workshops.

W2SP is held in conjunction with the IEEE Symposium on Security and privacy,
which will take place from May 19-22, 2013, at the Westin St. Francis Hotel
in San Francisco. W2SP will continue to be open-access: all papers will be
made available on the workshop website, and authors will not need to forfeit
their copyright.

We are seeking both short position papers (2–4 pages) and longer papers (a
maximum of 10 pages). Papers must be formatted for US letter (not A4) size
paper with margins of at least 3/4 inch on all sides. The text must be
formatted in a two-column layout, with columns no more than 9 in. high and
3.375 in. wide. The text must be in Times font, 10-point or larger, with
12-point or larger line spacing. Authors are encouraged to use the IEEE
conference proceedings templates.

The scope of W2SP 2013 includes, but is not limited to:

- Trustworthy cloud-based services
- Privacy and reputation in social networks
- Security and privacy as a service
- Usable security and privacy
- Security for the mobile web
- Identity management and psuedonymity
- Web services/feeds/mashups
- Provenance and governance
- Security and privacy policies for composible content
- Next-generation browser technology
- Secure extensions and plug-ins
- Advertisement and affiliate fraud
- Measurement study for understanding web security and privacy

Any questions should be directed to the program chair: kapil () us ibm com 


Larry Koved (IBM Research)
Matt Fredrikson (University of Wisconsin - Madison)

Kapil Singh (IBM Research)

Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]