Symposium 01- SECOTS 2011

International Symposium on Security in Collaboration Technologies and Systems

(SECOTS 2011)


As part of

The 2011 International Conference on Collaboration Technologies and Systems (CTS 2011)

May 23 - 27, 2011

The Sheraton University City Hotel

Philadelphia, PA, USA

Extended Submission Deadline: January 31, 2011


Collaboration relies on distributed systems that combine different resources, often provisioned on-demand for the duration of the mission or project. Security services are an important component of the collaboration infrastructure that ensures normal uninterruptible reliable operation of the collaborative systems. The open Internet and networking environment, over which many modern collaboration systems operate, impose a number of common and specific security threats and attacks (spamming, worms, session hijacking, buffer overflow, denial of service, social engineering, etc.). Collaborative organizations require better security properties (strong authentication, efficient encryption, Mandatory Access Control, integrity, non-repudiation and availability). Nowadays, collaborative organizations use new technologies such as mobile devices, smartcards, wireless networks, high performance networks, cloud and grid computing, multi-agent systems. These environments introduce new needs, requirements and difficulties related to security. Hence, collaborative organizations and technologies face several challenges in the field of security.

This Symposium on Security in Collaboration Technologies and Systems, to be held as part of the 2011 International Conference on Collaboration Technologies and Systems (CTS 2011), will focus on security issues related to collaboration systems with emphasis on secure and trustworthy distributed environments, Grid and Cloud based resource virtualization and on-demand provisioning, multi-agent systems, mobile and wireless cooperation. The aim is to have a dedicated forum that fosters closer interactions among researchers and users communities, providing an excellent opportunity for them to meet and discuss their ideas. The symposium will address issues related to the security infrastructure and services design, implementation and operation. It intends to address new security challenges and present new ideas and solutions addressing modern security requirements, specific methods of access control that should allow large scale multi-organizational cooperation, use of mobile technologies and smartcards, enabling intrusion detection, system recovery and healing in the context of cooperative systems.

We invite original contributions from researchers in academia, research institutions and industry on these emerging and important areas of information technology.

Selected papers will be solicited from the best papers of SECOTS 2011 sessions for submitting an extended version of their papers to a special issue in a leading international journal.

The Symposium topics include (but are not limited to) the following:

    • Fundamentals and Frameworks for Security in Collaboration Systems

    • Intrusion and Attacks Prevention and Detection in Collaboration Systems

    • Access Control in Collaboration Environments

    • Role Based Access Control, Reputation, and Trust

    • Cross Domain Identity and User Attributes Management Systems

    • Security Models for Emerging Cloud Computing and On-demand Infrastructure Services Provisioning

    • Security Models and Infrastructure for Complex Resource Provisioning in Distributed Collaboration Systems

    • Security of Grid and Cluster Architectures Supporting Cooperative Applications

    • Security Context Management in Scientific Workflow Applications

    • Relation between Infrastructure Security, Information Security and Security Management

    • Security Standards

    • Encryption and Cryptography Systems Supporting Cooperative Systems

    • Privacy Protection for Collaboration Systems

    • Trust Management in Dynamic Collaborative Environments

    • Trusted Operating Systems for Distributed Environments

    • Middleware Security

    • Security Metrics and Measures

    • Collaborative Security Monitoring Schemes and Systems

    • Detection and Self-Recovery Schemes and Strategies Supporting Cooperation

    • Disclosure and Integrity Issues

    • Resistance to Denial of Service

    • Honeypots for Collaboration Systems

    • Usability, Social Engineering, and Security

    • Security and Information Assurance Education and Curriculum Issues

    • Policy Driven SLA Negotiation

    • Security in Collaborative Multi Agent Systems

    • Security Using Collaborative Agents

    • Security in Mobile and Wireless Networks for Collaboration

    • Virtual Organizations and Dynamic Security Associations

    • Security in Social Networks

    • Use of Smartcards in the Context of Collaboration

    • Web Services Security

    • Security Models for Coalition Networks

    • Security for Specific Collaboration Domains (e.g., e-Government, e-Business, Public Services, P2P, e-Social Security, Medical Collaboration, etc.)


You are invited to submit original and unpublished research works on above and other topics related to security in collaboration systems. Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 450 words. The full manuscript should be at most 8 pages using the two-column IEEE format (see Additional pages will be charged at additional fee. Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments. Submit a PDF copy of your full manuscript to the Symposium submission website at EasyChair: . (You need to register first to submit a paper, or you can use your existing account if you already have one.)

Only PDF files will be accepted, sent by email to the symposium organizers. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, contributions, technical clarity and presentation. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. Authors of accepted papers must guarantee that their papers will be registered and presented at the symposium.

Accepted papers will be published in the CTS 2011 conference proceedings. Instructions for final manuscript format and requirements will be posted on the conference web site later. It is our intent to have the proceedings formally published in hard and soft copies and be available at the time of the conference. The proceedings is projected to be included in the IEEE Digital Library and indexed accordingly.

If you have any questions about paper submission or the workshop, please contact the symposium organizers.

Important Dates


Ravi Sandhu

University of Texas at San Antonio, TX, USA

Voice: +1 210-458-6081

Email: ravi.sandhu @ utsa DOT edu

Yuri Demchenko

University of Amsterdam, The Netherlands

Voice: + 31 63 185 7703

Email: y.demchenko @ uva DOT nl

International Program Committee:

All submitted papers will be reviewed by the symposium technical program committee members following similar criteria used in CTS 2011.

    • Farag Azzedin, King Fahd University of Petroleum and Minerals, Saudi Arabia

    • Kun Bai, IBM T.J. Watson Research, NY, USA

    • Julien Bourgeois, Université de Franche-Comté, France

    • François Charoy, INRIA Lorraine, France

    • Jorge R. Cuellar, Siemens AG Corporate Technology, Germany

    • Michel Cukier, University of Maryland, MD, USA

    • Jean-Bernard Fischer, Nagra, France

    • Mattijs Ghijsen, University of Amsterdam, Netherlands

    • Antonio F. Gómez Skarmeta, University of Murcia, Spain

    • Christopher Kruegel, University of California, Santa Barbara, CA, USA

    • Javier Lopez, University of Malaga, Spain

    • Volkmar Lotz, SAP, France

    • Philippe Mathieu, University of Lille, France

    • Paolo Mori, National Research Council – CNR, Pisa, Italy

  • Guido van ‘t Noordende, University of Amsterdam, The Netherlands

    • Oleksandr Otenko, Oracle, UK

    • Pierre Paradinas, CNAM Paris, France

    • Frank Piessens, Katholieke Universiteit Leuven, Belgium

    • Chunming Rong, University of Stavanger, Norway

    • Klaas Wierenga, Cisco System, CA, USA

For information or questions about Conference's paper submission, tutorials, posters, workshops, special sessions, exhibits, demos, panels and forums organization, doctoral colloquium, and any other information about the conference location, registration, paper formatting, etc., please consult the Conference’s web site at URL: or contact one of the Conference's organizers or Co-Chairs: Geoffrey C. Fox at and Waleed W. Smari at