www 2009 Madrid

General CFP
| Data Mining | Industrial Practice and Experience | Internet Monetization |
Performance, Scalability and Availability | Rich Media | Search | Security and Privacy |
| Semantic / Data Web | Social Networks and Web 2.0 | User Interfaces and Mobile Web |
|Web Engineering | WWW in Ibero-America | XML and Web Data |

| Developers Track | Panels | Posters | Tutorials | Workshops |

Security and Privacy

The flexibility and richness of the Web architecture have come at the price of increasing complexity and lack of a sound overall security architecture. The movement toward Web-based services, and the increasing dependency on the Web, have also made reliability a first-rate security concern. From malware and spyware, drive-by downloads, typo squatting, denial of service attacks, to phishing and identity theft, a variety of threats make the Web an increasingly hostile and dangerous environment. By undermining user trust, these problems are hampering e-commerce and the growth of online communities.

This track promotes the view that security, privacy, reliability, and sound guiding ethics must be part of the texture of a successful World Wide Web. In addition to devising practical tools and techniques, it is the duty of the research community to promote and guide business adoption of security technology for the Web and to help inform related legislation. We seek novel research (both theoretical and practical) in security, privacy, reliability, and ethics as they relate to the Web, including but not limited to the following areas:

  • Authentication, authorization, and auditing on the web
  • Availability and reliability of Web servers and services
  • Browser security issues, including attacks, defenses, and policy models
  • Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
  • User interfaces and usability as they relate to use of cryptography in the web and online scams such as phishing and pharming
  • Applications of cryptography to the web, including PKI and supporting concepts like digital signatures, certification, etc.
  • Electronic commerce, particularly security mechanisms for e-cash, auctions, payment, and fraud detection
  • Economic / business analysis of Web security and privacy
  • Legal and legislative approaches to issues of Web security and privacy
  • Secure and robust management of server farms
  • Dealing with client-side risks
  • Security for new web services (blogs, web feed, wikis, social networks, etc.)
  • Wireless web security (including RFID, sensors, and mobile phones)
  • Content protection and abuse on the web (DRM, web/blog spam, etc.)

Paper formatting requirements are provided on the Submission page.

Track Chairs

  • Gail-Joon Ahn, Arizona State University, USA
  • Ninghui Li, Purdue University, USA

Program committee

  • Ben Adida (Harvard University, USA)
  • Adam Barth (University of California Berkeley, USA)
  • Nikita Borisov (University of Illinois at Urbana-Champaign, USA)
  • Andrew Bortz (Stanford University, USA)
  • Barbara Carminati (University of Insubria, Italy)
  • Shuo Chen (Microsoft Research Redmond, USA)
  • Marc Dacier (Symantec Research Labs Europe, France)
  • Rachna Dhamija (Harvard University, USA)
  • Ulfar Erlingsson (Reykjavík University, Iceland)
  • J. Alex Halderman (Princeton University, USA)
  • Weili Han (Fudan University, China)
  • Mizuho Iwaihara (Kyoto University, Japan)
  • Collin Jackson (Stanford University, USA)
  • Markus Jakobsson (Palo Alto Research Center, USA)
  • Xuxian Jiang (North Carolina State University, USA)
  • Christopher Kruegel (University of California Santa Barbara, USA)
  • Ben Laurie (Google Inc., UK)
  • Michael Locasto (Dartmouth College, USA)
  • Fabio Martinelli (CNR, Italy)
  • Dongwan Shin (New Mexico Tech, USA)
  • Mohamed Shehab (University of North Carolinia at Charlotte, USA)
  • Michael Steiner (IBM TJ Watson Research Center, USA)
  • Zhendong Su (University of California Davis, USA)
  • V.N. Venkatakrishnan (University of Illinios at Chicago, USA)
  • Helen Wang (Microsoft Research Redmond, USA)
  • Xiaofeng Wang (Indiana University at Bloomington, USA)
  • Tao Xie (North Carolina State University, USA)
  • Ting Yu (North Carolina State University, USA)