posted by user: ffulvio || 5083 views || tracked by 10 users: [display]

SAR-SSI 2011 : The 6th International Conference on Network and Information Systems Security


When May 18, 2011 - May 21, 2011
Where La Rochelle, France
Submission Deadline Mar 1, 2011
Notification Due Mar 29, 2011
Final Version Due Apr 25, 2011
Categories    network security   information security

Call For Papers

International Conference on Network and Information Systems Security
La Rochelle, France - 18-21 May 2011

The SAR-SSI conference series provides a forum for presenting novel research results, practical experiences and innovative ideas in network and information systems security.
The goal of SAR-SSI-2011 is fostering exchanges among academic researchers, industry and a wider audience interested in network and information system security. The conference will offer a broad area of events, ranging from panels, tutorials, technical presentations and informal meetings. Prospective authors are encouraged to submit papers
describing novel research contributions as well as proposals for tutorials and panels. Submissions can address theoretical issues in network and information system security or provide practical and operational experiences in security management. Languages for papers and presentations can be French or English, both languages being used in

Authors are invited to submit research papers, papers presenting a practical experience or new industrial applications, panel and tutorial proposals on topics related to network and information systems security.
Topics of interest include, but are not limited to:

+Network Security
- Security of new network architectures (e.g. VoIP, MAN/WAN, Giga-Ethernet)
- Security in wireless and adhoc networks,
- Security of communications (e.g. VPN, IPsec, SSL, MPLS)
- Security in backbone and IPv6 networks
- Multicast security
- Security in peer-to-peer systems
- Security in embedded networks
+Formal methods and models for computer security
- Applied cryptography
- Authentication and access control
- Anonymity and privacy
- Metrology and security measurement
- Public Key Infrastructures (PKI)
- Security protocols
- Security assessment and certification
- Trust representation and management
+Computer Forensics and Incident Response
- Intrusion detection systems, honeypots
- Worms, Viruses, Botnets, Malware and Spyware
- Security assessment
+Software and Systems Security
- Reverse engineering and software protection
- Methodology, ethics, legislation and regulation
- Biometry and watermarking
- E-commerce security
- Security in vehicular communications
+XML, Web Services and Cloud Security
- Web services and GRID computing security
- Security on Untrusted Clouds
- Frameworks for managing inter-organizational trust relationships
- Web services exploitation of Trusted Computing
- Secure orchestration of Web services

Submissions should not exceed 15 pages must include on the cover page the paper title, author(s) name(s) and affiliation, a full address (Phone, fax, e-mail), an abstract of the paper (150 words max) and no more than 5 keywords.
Authors must submit an electronic version of their paper (PDF / A4 format). Authors are requested to use the sarssi.cls type and use the alpha style for the bibliography. For the final version the sources of the contribution in LaTeX will also be required. All accepted papers will also be published in the conference proceeding by IEEE, and will be indexed by IEEE Xplore Digital Library.

The submission of papers must be done through the EasyChair Conference system using the following page:

The conference may include panel sessions addressing topics of interest to the computer security community.
Proposals for panels should list possible panellists, specifying those who have confirmed participation. Please submit panel proposals by email to the TPC co-chairs.

Authors of the best papers selected by the technical program committee will be invited to publish an extended version of their paper in a journal of international audience.

The conference will include a tutorial and prominent invited speakers session. The tutorials will address hot research and/or industry topics relating to network and information systems security. Please submit tutorial proposals by email to the TPC co-chairs.

Submission: February 14th, 2011
Notification: March 29th, 2011
Registration: April 18th, 2011 (reduced fare)
Camera Ready Version: April 25th, 2011
Conference: May 18th - 21st, 2011


General Chairs
- Ahmed Serhrouchni, Télécom ParisTech, France

Steering Committee
- Abdelmajid Bouabdallah, UTC, France
- Danielle Boulanger, Univ. Lyon-Jean Moulin, France
- Isabelle Chrisment, Université Nancy I, France
- Alban Gabillon, Université de la Polynésie Française
- Ludovic Mé, Supélec, France
- Ahmed Serhrouchni, Télécom ParisTech, France

Technical Program Committee Chair
- Ernesto Damiani, Università degli Studi di Milano, Italy

Organizing Committee
- Ibrahim Hajjeh, Ineovation, France
- Jean Leneutre, Télécom ParisTech, France
- Radwan Saâd, Télécom ParisTech, France
- Ahmed Serhrouchni, Télécom ParisTech, France
- Youcef Begriche, IEEE, France
- Rim Moalla, Télécom ParisTech, France

Technical Program Committee

- Mhamed Abdallah, Telecom Sud Paris, France
- Mohammed Achemlal, France Telecom / Orange, France
- Hossam Afifi, Telecom Sud Paris, France
- Claudio Agostino Ardagna, Univ. degli Studi di Milano, Italy
- Gildas Avoine, Université catholique de Louvain, Belgique
- Mohammed Badra, Limos CNRS, Clermont Ferrand, France
- Youcef Begriche, IEEE, France
- Patrick Bellot, Télécom ParisTech, France
- Nadia Bennani, INSA-Lyon, France
- Abdelmalek Benzekri, IRIT, Toulouse, France
- Christophe Bidan, Supélec, France
- Karima Boudaoud, Université de Nice, France
- Adel Bouhoula, SUPCOM of Tunis, Tunisie
- Lionel Brunie, INSA-Lyon, France
- Laurent Bussard, Microsoft Innovation Center, Germany
- Laurent Butti, Orange R&D, France
- Marco Casassa-Mont, HPLabs, HK
- Yacine Challal, UTC, France
- Claude Chaudet, Télécom ParisTech, France
- Ken Chen, Université de Paris 13, France
- Yves Correc, DGA/CELAR, France
- Bernard Cousin, IRISA, France
- Mathieu Couture, Carleton University, Canada
- Frederic Cuppens, Telecom Bretagne, France
- Nora Cuppens-Boulahia, Telecom Bretagne, France
- Hervé Debar, Telecom Sud Paris, France
- Rachida Dssouli, Concordia University, Canada
- Anas Abou El Kalam, ENSEEIHT, France
- Robert Erra, ESIEA, Paris, France
- Mounir Frikha, SUPCOM of Tunis, Tunisie
- Laurent Gallon, Université de Pau, France
- Sihem Guemara, SUPCOM of Tunis, Tunisie
- Gilles Guette, University of Rennes 1, France
- Vincent Guyot, ESIEA, Paris, France
- Gaétan Hains, Université Paris-Est, France
- Ibrahim Hajjeh, Ineovation, France
- Artur Hecker, Télécom ParisTech, France
- Guillaume Hiet, Supélec, France
- Mathieu Jaume, Lab. d'Informatique de Paris 6, France
- Rida Khatoun, UTT, Troyes, France
- Abou Khaled Omar, HES.SO, Fribourg, Switzerland
- Djamel Khadraoui, CRP Henri Tudor, Luxembourg
- Houda Labiod, Télécom ParisTech, France
- Mohamed Lambarki, ESIEA, Paris, France
- Jean-Louis Lanet, University of Limoges, France
- Maryline Laurent, Telecom Sud Paris, France
- Daniel Le Métayer, INRIA Grenoble - Rhône-Alpes, France
- Jean Leneutre, Télécom ParisTech, France
- Bruno Martin, Université de Nice Sophia Antipolis, France
- Fabio Martinelli, IIT-CNR, Italy
- Ludovic Mé, Supélec, France
- Mohamed Mosbah, Labri, Bordeaux, France
- Elena Mugellini, HES.SO, Fribourg, Swizertland
- Farid Naït-Abdesselam, Univ. of Paris Descartes, France
- Philippe Owezarski, LAAS, CNRS, France
- Guillaume Piolle, Supélec, France
- Fabien Pouget, CERTA, France
- Nicolas Prigent, Supélec, France
- Guy Pujolle, Laboratoire d'Informatique de Paris 6, France
- Jean-Luc Richier, Lab. d'Informatique de Grenoble, France
- Etienne Riviere, Université de Neuchâtel, Switzerland
- Jean-Marc Robert, École de Tech. Supérieure, Canada
- Yves Roudier, Institut Eurécom, France
- Jörg Schwenk, University of Bochum, Germany
- Eric Totel, Supélec, France
- Frederic Tronel, Supélec, France
- Pascal Urien, Télécom ParisTech, France
- Valerie Viet Triem Tong, Supélec, France

Related Resources

NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
CCNET 2020   7th International Conference on Computer Networks & Communications
CANS 2020   Cryptology and Network Security
IEEE HotICN--Ei, scopus 2020   2020 3rd IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN 2020)--Ei Compendex, scopus
ICoCNS 2021   2021 International Conference on Communication and Network Security (ICoCNS 2021)
SCOPUS-CCISP 2020   The 5th International Conference on Communication, Image and Signal Processing (CCISP 2020)
AISCA 2020   4th International Conference on Artificial Intelligence, Soft Computing And Applications
ICISSP 2021   7th International Conference on Information Systems Security and Privacy