SSR 2014: Security Standardisation Research

Call for Papers (extended deadline)

A text version of this call for papers is available here.


Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series has become the internationally adopted basis for managing corporate information security.

Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new domains. The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. Indeed, many security standards bodies are only beginning to address the issue of transparency, so that the process of selecting security techniques for standardisation can be seen to be as scientific and unbiased as possible.

Conference scope

This conference is intended to cover the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST), security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific security standards (e.g. those produced by the payments, telecommunications and computing industries for such things as payment protocols, mobile telephony and trusted computing).

Topics for papers

Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2014 conference.

Papers may present theory, applications or practical experience in the field of security standardisation , including, but not necessarily limited to:

Instructions for authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration for publication. Papers must be written in English; they should be at most 15 pages (excluding bibliography and appendices). Accepted papers will be presented at the conference and published in the conference proceedings in the Springer LNCS series (see In addition, a special issue of the International Journal of Information Security (published by Springer) is planned, to contain extended versions of selected papers.

At least one author of each accepted paper is required to register for the conference and present the paper.

All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords.

Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers. Authors are strongly recommended to submit their papers in the standard LNCS format (see the Springer web page for details).

Papers must be submitted using the EasyChair conference management system.

Please send any enquiries to: webmaster [insert the at symbol]

Important dates

Conference organisation

General Chair

Programme Committee Chair

Programme Committee