Conference Information
POST 2018: International Conference on Principles of Security and Trust
http://www.etaps.org/index.php/2018/postSubmission Date: |
2017-10-13 |
Notification Date: |
2017-12-22 |
Conference Date: |
2018-04-14 |
Location: |
Thessaloniki, Greece |
Years: |
7 |
Viewed: 15052 Tracked: 1 Attend: 0
Call For Papers
Principles of Security and Trust is a broad forum related to the theoretical and foundational aspects of security and trust. POST was created in 2012 to combine and replace a number of successful and longstanding workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name Theory of Security and Applications (TOSCA). We seek submissions on the foundations of information security, privacy, and trust, relevant for computer science and different application disciplines. This includes results on cryptographic and logical foundations, reasoning methods, tools, and applications. Case studies that reflect the strengths and limitations of existing foundations, methods, and their supporting tools are also welcome, as are more exploratory presentations on open questions. Areas of interest include: Access control Accountability Anonymity Authentication Availability Cloud security Confidentiality Covert channels Crypto foundations Database security Distributed systems security Economic issues Embedded systems security Hardware security Information flow Integrity Languages for security Malicious code Mobile security and privacy Models and policies Privacy and privacy-preserving systems Provenance Reputation and trust Resource usage Risk assessment Security architectures Security protocols Trust management Web security and privacy
Last updated by Xin Yao in 2017-08-21
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | a* | a1 | PODS | ACM SIGMOD Conference on Principles of DB Systems | 2025-12-03 | 2026-03-01 | 2026-05-31 |
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | c | NSPW | New Security Paradigms Workshop | 2025-04-25 | 2025-05-30 | 2025-08-24 | |
| c | b2 | PST | International Conference on Privacy, Security and Trust | 2025-04-04 | 2025-06-01 | 2025-08-26 | |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2025-02-13 | 2025-05-12 | 2025-08-10 |
| b2 | OPODIS | International Conference on Principles of Distributed Systems | 2022-08-26 | 2022-10-21 | 2022-12-13 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 |
| Short | Full Name | Conference |
|---|---|---|
| PODS | ACM SIGMOD Conference on Principles of DB Systems | 2026-05-31 |
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| INSCRYPT | International Conference on Information Security and Cryptology | 2025-10-19 |
| ISC | Information Security Conference | 2025-10-20 |
| NSPW | New Security Paradigms Workshop | 2025-08-24 |
| PST | International Conference on Privacy, Security and Trust | 2025-08-26 |
| SOUPS | International Symposium On Usable Privacy and Security | 2025-08-10 |
| OPODIS | International Conference on Principles of Distributed Systems | 2022-12-13 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| ICISC | International Conference on Information Security and Cryptology | 2015-11-25 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| IEEE Security & Privacy | 3.0 | IEEE | 1540-7993 | |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd | 2475-6725 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| IEEE Transactions on Information Forensics and Security | 8.0 | IEEE |
| Computers & Security | 5.4 | Elsevier |
| Journal of Information Security and Applications | 3.7 | Elsevier |
| International Journal of Information Security | 3.2 | Springer |
| IEEE Security & Privacy | 3.0 | IEEE |
| ACM Transactions on Privacy and Security | 2.8 | ACM |
| EURASIP Journal on Information Security | 2.1 | Springer |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |