Download the Call for Paper in Text Format, PDF Format.


Collaboration relies on distributed systems that combine different resources, often provisioned on-demand for the duration of the mission or project. Security services are an important component of the collaboration infrastructure that ensures normal uninterruptible reliable operation of the collaborative systems. The open Internet and networking environment, over which the modern collaborative systems operate, impose a number of common and specific security threats and attacks (spamming, worms, session hijacking, buffer overflow, denial of service, social engineering, etc.). Collaborative organizations require better security properties (strong authentication, efficient encryption, Mandatory Access Control, integrity, non-repudiation and availability). Nowadays, collaborative organizations use new technologies such as mobile devices, smartcards, wireless networks, high performance networks, cloud and grid computing, multi-agent systems. These environments introduce new needs, requirements and difficulties related to security. Hence, collaborative organizations and technologies face several challenges in the field of security.

This Workshop on Security and Collaboration, to be held as part of the 2010 International Symposium on Collaborative Technologies and Systems (CTS 2010), will focus on security issues related to collaborative systems with emphasis on distributed environments, Grid and cloud based resource virtualisation and on-demand provisioning, multi-agent systems, mobile and wireless cooperation. The aim is to have a dedicated workshop that fosters closer interactions among researchers and users communities, providing an excellent opportunity for them to meet and discuss their ideas. The workshop will address issues related to the security infrastructure and services design, implementation and operation. It intends to address new security challenges and present new ideas and solutions addressing modern security requirements, specific methods of access control that should allow large scale cooperation, use of mobile technologies and smartcards, enable intrusion detection, system recovery and healing in the context of cooperative systems.

We invite original contributions from researchers in academia, research institutions and industry on these emerging and important areas of information technology.

*Selected papers will be solicited from the best papers of COLSEC 2010 sessions for submitting an extended version of their papers to a special issue in a leading international journa

The Workshop topics include (but are not limited to) the following:

  1. Frameworks for Security in Collaborative Systems
  2. Security of Grid and Cluster Architectures Supporting Cooperative Applications
  3. Security Models for Emerging Cloud Computing
  4. Access Control in Collaborative Environments
  5. Role Based Access Control, Reputation, and Trust
  6. Cross Domain Identity and User Attributes Management Systems
  7. Security Context Management in Scientific Workflow Applications
  8. Security Models and Infrastructure for Complex Resource Provisioning in Distributed Collaborative Systems, Supporting the Whole Life-cycle of the Provisioned Resources
  9. Security Models for Coalition Networks Combining On-demand Provisioned Multilayer Infrastructure for Communications, Information Exchange, and Human Interaction
  10. Security Standards and Security Education
  11. Relation between Infrastructure Security, Information Security and Security Management
  12. Policy Driven SLA Negotiation
  13. Privacy Protection for Collaborative Systems
  14. Encryption and Cryptography Systems Supporting Cooperative Systems, including Group Oriented and Identity Based Cryptography
  15. Security for Specific Collaboration Domains (e.g., e-Government, e-Business, Public Services, P2P, e-Social Security, Medical
  16. Collaboration, etc.)
  17. Virtual Organizations and Dynamic Security Associations
  18. Trust and Reputation Management in Dynamic Environments
  19. Web Services Security
  20. Security in Collaborative Multi Agent Systems
  21. Secure Collaborative Agents
  22. Using Multi Agent Systems for Security
  23. Middleware Security
  24. Use of Smartcards in the Context of Collaboration
  25. Security in Mobile and Wireless Networks for Collaboration
  26. Usability, Social Engineering, and Security
  27. Security in Social Networks
  28. Trusted Operating Systems for Distributed Environments
  29. Honeypots for Collaborative Systems
  30. Intrusion and Attack Detection in Collaborative Systems
  31. Collaborative Security Monitoring Schemes and Systems
  32. Security Metrics
  33. Disclosure and Integrity Issues
  34. Resistance to Denial of Service
  35. Detection and Self-Recovery Schemes and Strategies Supporting Cooperation

Submission Instructions:

You are invited to submit original and unpublished research works on above and other topics related to security in collaboration systems. Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words. The full manuscript should be at most 10 pages using the two-column IEEE format. Additional pages will be charged at additional fee. Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments. Electronic submissions will be accepted only in PDF format uploaded at For other electronic formats, please check with the organizers.

Only PDF files will be accepted, sent by email to the workshop organizers. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, technical clarity and presentation. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop.

Accepted papers will be published in the Symposium proceedings. Instructions for final manuscript format and requirements will be posted on the CTS 2010 Symposium web site later. It is our intent to have the proceedings formally published in hard and soft copies and be available at the time of the conference. The proceedings is projected to be included in the IEEE Digital Library and indexed accordingly.

For information or questions about Symposium's paper submission, tutorials, posters, workshops, special sessions, exhibits, demos, panels and forums organization, doctoral consortium, and any other information about the conference location, registration, paper formatting, etc., please consult the Symposium's web site at URL: or contact one of the Symposium's Co-Chairs: Bill McQuay at and Waleed W. Smari at

Important Dates:

Event Date
Full paper submission deadline: January 25, 2010
Notification of Acceptance February 8, 2010
Registration and Camera-Ready Paper dueMarch 1, 2010


Dr. Patrice Clemente and Dr. Jean-Francois Lalande

Laboratoire d'Informatique Fondamentale d'Orleans (LIFO)
ENSI de Bourges
88 Bld Lahitolle
18020 Bourges cedex France
Phone +33 2 48 48 40 00
Fax +33 2 48 48 40 00

Dr. Yuri Demchenko

System and Network Engineering Group
University of Amsterdam
Science Park 107, 1098XG, Amsterdam