Conference Information
POST 2018: International Conference on Principles of Security and Trust
http://www.etaps.org/index.php/2018/postSubmission Date: |
2017-10-13 |
Notification Date: |
2017-12-22 |
Conference Date: |
2018-04-14 |
Location: |
Thessaloniki, Greece |
Years: |
7 |
Viewed: 14388 Tracked: 1 Attend: 0
Call For Papers
Principles of Security and Trust is a broad forum related to the theoretical and foundational aspects of security and trust. POST was created in 2012 to combine and replace a number of successful and longstanding workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name Theory of Security and Applications (TOSCA). We seek submissions on the foundations of information security, privacy, and trust, relevant for computer science and different application disciplines. This includes results on cryptographic and logical foundations, reasoning methods, tools, and applications. Case studies that reflect the strengths and limitations of existing foundations, methods, and their supporting tools are also welcome, as are more exploratory presentations on open questions. Areas of interest include: Access control Accountability Anonymity Authentication Availability Cloud security Confidentiality Covert channels Crypto foundations Database security Distributed systems security Economic issues Embedded systems security Hardware security Information flow Integrity Languages for security Malicious code Mobile security and privacy Models and policies Privacy and privacy-preserving systems Provenance Reputation and trust Resource usage Risk assessment Security architectures Security protocols Trust management Web security and privacy
Last updated by Xin Yao in 2017-08-21
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2025-02-13 | 2025-05-12 | 2025-08-10 |
| c | c | NSPW | New Security Paradigms Workshop | 2025-04-25 | 2025-05-30 | 2025-08-24 | |
| b | a* | a1 | PODS | ACM SIGMOD Conference on Principles of DB Systems | 2025-12-03 | 2026-03-01 | 2026-05-31 |
| b2 | OPODIS | International Conference on Principles of Distributed Systems | 2022-08-26 | 2022-10-21 | 2022-12-13 | ||
| c | b2 | PST | International Conference on Privacy, Security and Trust | 2025-04-04 | 2025-06-01 | 2025-08-26 |
| Short | Full Name | Conference |
|---|---|---|
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| ISC | Information Security Conference | 2025-10-20 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| INSCRYPT | International Conference on Information Security and Cryptology | 2025-10-19 |
| ICISC | International Conference on Information Security and Cryptology | 2015-11-25 |
| SOUPS | International Symposium On Usable Privacy and Security | 2025-08-10 |
| NSPW | New Security Paradigms Workshop | 2025-08-24 |
| PODS | ACM SIGMOD Conference on Principles of DB Systems | 2026-05-31 |
| OPODIS | International Conference on Principles of Distributed Systems | 2022-12-13 |
| PST | International Conference on Privacy, Security and Trust | 2025-08-26 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| ACM Transactions on Privacy and Security | 3.000 | ACM | 2471-2566 | |
| Journal of Internet Security | DDSecure.Net Inc. | 1206-4890 | ||
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | International Journal of Information and Computer Security | Inderscience | 1744-1765 | |
| Information Security Technical Report | Elsevier | 1363-4127 | ||
| b | Computers & Security | 4.800 | Elsevier | 0167-4048 |
| a | IEEE Transactions on Information Forensics and Security | 6.300 | IEEE | 1556-6013 |
| Journal of Cyber Security and Mobility | River Publishers | 2245-1439 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| ACM Transactions on Privacy and Security | 3.000 | ACM |
| Journal of Internet Security | DDSecure.Net Inc. | |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |
| International Journal of Information and Computer Security | Inderscience | |
| Information Security Technical Report | Elsevier | |
| Computers & Security | 4.800 | Elsevier |
| IEEE Transactions on Information Forensics and Security | 6.300 | IEEE |
| Journal of Cyber Security and Mobility | River Publishers |