ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development
The work described in this website has been conducted within the project NeCS. This project has received funding from the European Union’s Horizon 2020 (H2020) research and innovation programme under the Grant Agreement no 675320. This website and the content displayed in it do not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of its content.
After the summer break we are going to hold our next Weber seminar on September the 6th at 15:00 CEST.
The speaker will be Mario Faiella from ATOS and the title of his talk is "Secure and Trusted Threat Intelligence Platform”.
The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.
ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
The International School on Foundations of Security Analysis and Design FOSAD is a one-week yearly school on cyber-security held in Bertinoro (Italy) in August-September. The main aim of the FOSAD school is to offer a good spectrum of current research in foundations of security - ranging from programming languages to analysis of protocols, from cryptographic algorithms to access control policies and trust management - that can be of help for graduate students and young researchers from academia or industry that intend to approach the field.
New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision of high quality services all over the world. All these developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competitive in the global marketplace.
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time.
Cloud computing is transforming the way large-scale computation is performed. Dynamic scalability or -elasticity- provided by the cloud make high-performance computing accessible to everyone. However, cloud computing introduces new challenges with respect to security and privacy. Although virtualization addresses some of these concerns, it has a significant impact on performance: the actual gains in performance depend heavily on the predictability of physical and virtualized resources.
We are going to have our next Webex seminar next Wednesday the 5th of July at 15:00 (CEST). Oleksii Osliak (CNR) is going to be the speaker this time.
Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors.