Symp 03-SECOTS 2014

Fourth International Symposium on Security in Collaboration Technologies and Systems

(SECOTS 2014)

Call for Papers and Participation

As part of

The 2014 International Conference on Collaboration Technologies and Systems

(CTS 2014)

May 19-23, 2014

The Commons Hotel

Minneapolis, Minnesota, USA

In Cooperation with ACM, IEEE, and IFIP


Extended Submission Deadline: January 30, 2014


Collaboration relies on distributed systems that combine different resources, often provisioned on-demand for the duration of the mission or project, and that typically interact through the Internet. Security is a fundamental aspect of collaboration systems in order to ensure normal un-interruptible reliable operation. Nowadays, collaborative systems use new technologies such as mobile devices, smartcards, wireless networks, high performance networks, cloud and grid computing, multi-agent systems. These environments introduce new needs, requirements and difficulties related to security. Hence, besides the well known threats of systems exposed on the internet, collaborative systems and technologies face several challenges in the field of security.

This Symposium on Security in Collaboration Technologies and Systems, to be held as part of the 2014 International Conference on Collaboration Technologies and Systems (CTS 2014), will focus on security issues related to collaboration systems with emphasis on secure and trustworthy distributed environments, Grid and Cloud based resource virtualization and on-demand provisioning, multi-agent systems, mobile and wireless cooperation, cybersecurity and encryption for collaboration. The aim is to have a dedicated forum that fosters closer interactions among researchers and users communities, providing an excellent opportunity for them to meet and discuss their ideas. The symposium will address issues related to the security infrastructure and services design, implementation and operation. It intends to address new security challenges and present new ideas and solutions addressing modern security requirements, specific methods of access control that should allow large scale multi-organizational cooperation, use of mobile technologies and smartcards, enabling intrusion detection, system recovery and healing in the context of cooperative systems.

We invite original contributions from researchers in academia, research institutions and industry on these emerging and important areas of information technology.

Selected papers will be solicited from the best papers of SECOTS 2014 sessions for submitting an extended version of their papers to a special issue in a leading international journal.

The SECOTS Symposium topics include (but are not limited to) the following:

  • Fundamentals and Frameworks for Security in Collaboration Systems

  • Intrusion and Attacks Prevention and Detection in Collaboration Systems

  • Access and Usage Control in Collaboration Environments

  • Reputation and Trust Management

  • Cross Domain Identity and User Attributes Management Systems

  • Security Standards

  • Encryption and Cryptography Systems Supporting Cooperative Systems

  • Privacy Protection for Collaboration Systems

  • Trusted Operating Systems for Distributed Environments

  • Middleware Security

  • Security Metrics and Measures

  • Collaborative Security Monitoring Schemes and Systems

  • Usability, Social Engineering, and Security

  • Security and Information Assurance Education and Curriculum Issues

  • Security in Cloud Computing

  • Security in Collaborative Multi Agent Systems

  • Security Using Collaborative Agents

  • Botnet Analysis

  • Biologically Inspired Cyber Security and Defense

  • Security of Grid and Cluster Architectures Supporting Cooperative Applications

  • Security in Workflow Management Systems

  • Policy Driven SLA Negotiation

  • Security in Mobile and Wireless Networks for Collaboration

  • Security Models for Coalition Networks

  • Security in Social Networks

  • Virtual Organizations and Dynamic Security Associations

  • Web Services Security

  • Web Vulnerability Analysis

  • Use of Smartcards in the Context of Collaboration


You are invited to submit original and unpublished research works on above and other topics related to security in collaboration systems. Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words.

Submitted papers may correspond to full or short papers. Full paper should be at most 8 pages and short paper at most 4 pages. The standard IEEE two-column conference format should be used for all submissions (see Additional pages will be charged at additional fee. Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments.

Authors are invited to submit a PDF copy of their manuscript to the Symposium paper submission link at If the submission is for a short paper, indicate that as well.

Only PDF files will be accepted, uploaded using the link above. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, contributions, technical clarity, and presentation. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. Authors of accepted papers must guarantee that their papers will be registered and presented at the Symposium.

Accepted papers will be published in the CTS 2014 conference proceedings. Instructions for final manuscript format and requirements will be posted on the conference web site. It is our intent to have the proceedings formally published in hard and soft copies and be available at the time of the conference. The proceedings will be included in the IEEE Digital Library and indexed by IEEE Xplore and DBLP as well as other major indexing services.

If you have any questions about paper submission or the Symposium, please contact the organizers.


Extended Paper Submissions: -------------------------------- January 30, 2014

Acceptance Notification: -------------------------------------- February 17, 2014

Camera Ready Papers and Registration Due: --------------- March 10, 2014

Conference Dates: ------------------------------------------- May 19 - 23, 2014


Paolo Mori

Istituto di Informatica e Telematica

Consiglio Nazionale delle Ricerche (CNR)

Via G. Moruzzi, 1

56124 - Pisa - Italy

Phone: +39 050 315 2069


Anna Cinzia Squicciarini

College of Information Sciences and Technology

The Pennsylvania State University - University Park, Pennsylvania, USA

Phone: +1 (814) 863-7614


International Program Committee:

All submitted papers will be reviewed by the Symposium technical program committee members following similar criteria used in CTS 2014.

  • Benjamin Aziz, University of Portsmouth, U.K.

  • Farag Azzedin, King Fahd University of Petroleum and Minerals, Saudi Arabia

  • Lorenzo Blasi, HP IIC, Italy

  • Barbara Carminati, Universita' dell'Insubria, Italy

  • Herve Chabanne, Morpho, France

  • Francois Charoy, INRIA Lorraine, France

  • Michel Cukier, University of Maryland, Maryland, USA

  • Stefano Guarino, Università Roma 3, Italy

  • Jens Jensen, STFC, U.K.

  • Wael Kanoun, Alcatel-Lucent, France

  • Nizar Kheir, Orange, France

  • Adam Lee, University of Pittsburgh, USA

  • Jean Leneutre, IT Telecom ParisTech, France

  • Javier Lopez, University of Malaga, Spain

  • Fabio Martinelli, National Research Council Pisa, Italy

  • Federica Paci, University of Trento, Italy

  • Joon Park, Syracuse University, New York, USA

  • Marinella Petrocchi, National Research Council, Italy

  • Indrakshi Ray, Colorado State University, Colorado, USA

  • Kui Ren, University of SUNY Buffalo, New York, USA

  • Abdullatif Shikfa, Alcatel-Lucent, France

  • Mahesh Tripunitara, University of Waterloo, Ontario, Canada

  • Luca Vigano, King's College London, U.K.

(* Committee formation is pending and will be finalized shortly.)

For information or questions about Conference's paper submission, tutorials, posters, workshops, special sessions, exhibits, demos, panels and forums organization, doctoral colloquium, and any other information about the conference location, registration, paper formatting, etc., please consult the Conference’s web site at URL: or contact one of the Conference's organizers or Co-Chairs.