posted by user: jgalfaro || 14719 views || tracked by 30 users: [display]

DBSEC 2012 : 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Database Security
 
Link: http://conferences.telecom-bretagne.eu/dbsec2012/
 
When Jul 11, 2012 - Jul 13, 2012
Where Paris (France)
Submission Deadline Feb 26, 2012
Notification Due Apr 18, 2012
Final Version Due May 2, 2012
Categories    security   cryptography   access control   privacy
 

Call For Papers

Call For Papers DBSEC 2012

26th Annual WG 11.3 Conference on
Data and Applications Security and Privacy
DBSEC 2012
Paris, France, July 11-13, 2012

http://conferences.telecom-bretagne.eu/dbsec2012/


The 26th Annual WG 11.3 Conference on Data and Applications Security
and Privacy provides a forum for presenting original unpublished
research re-sults, practical experiences, and innovative ideas in data
and applications security and privacy. Both research papers and panel
proposals are solicited. Proceedings will be published by Springer as
the next volume in the Research Advances in Database and Information
Systems Security series (http://www.springeronline.com/lncs).

Papers may present theory, techniques, applications, or practical
experience on topics of relevance to IFIP WG 11.3:

- Access control
- Applied cryptography in data security and privacy
- Identity theft and countermeasures
- Integrity maintenance
- Intrusion detection
- Knowledge discovery and privacy
- Logics for security and privacy
- Organizational security
- Privacy-preserving data management
- Secure transaction processing
- Secure information integration
- Secure semantic web
- Secure sensor monitoring
- Secure web services
- Risk management
- Traceability and accountability
- Trust management

Additional topics of interest include (but are not limited to):
Critical Infrastructure Protection, Cyber Terrorism, Information
Warfare, Database Forensics, Electronic Commerce Security, and
Security in Digital Health Care.


* Submissions Guidelines:

Authors are invited to submit their contributions electronically to
the conference submission web site at
http://www.easychair.org/conferences/?conf=dbsec2012. Submission must
be in the form of a PDF file. Manuscripts must be in English, typed in
11-point font (minimum), and must not be more than 16 pages long.
Manuscripts must have a cover page with title, names and addresses
(including e-mail address) of authors, an abstract, and a set of
keywords. At least one author of each accepted paper is required to
register with the conference and present the paper. Accepted papers
will be published in the conference proceedings. The final copy of a
paper for the proceedings must use LaTeX, and must be laid out
according to the Camera Ready Copy format required by Springer. A
submitted paper must not be under review for inclusion in any other
conference or journal, and must be substantially different from
previously published work. Duplicate submissions will be automatically
rejected and without review.

* Award for the best student paper:

This award will be chosen by the program committee. The student must
be the first author to be eligible.

* Panel Proposals:

Proposals for panels should be e-mailed to the PC chair
(dbsec2012@easychair.org). Proposals should include a one-page
description of the subject matter, the name and address (including
e-mail address) of the organizer, and a list of proposed panelists.

* Important Dates:

- Paper submission due: February 13, 2012
- Notification to authors: April 8, 2012
- Camera ready due: May 2, 2012


* Committees:

General Chair

- David Sadek, Institut TELECOM, France

PC Chairs

- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France

IFIP WG 11.3 Chair

- Vijay Atluri, Rutgers University, USA

Publication and Publicity Chair

- Joaquin Garcia-Alfaro, TELECOM Bretagne, France

Local Arrangement

- Ghislaine Le Gall, TELECOM Bretagne, France

Web Chair

- Said Oulmakhzoune, TELECOM Bretagne, France

Program Committee

- Kamel Adi, Universite du Quebec en Outaouais, Canada
- Gail-Joon Ahn, Arizona State University, USA
- Claudio A. Ardagna, Universita degli Studi di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- Steve Barker, King's College London, UK
- Joachim Biskup, Technische Universitat Dortmund, Germany
- Marina Blanton, University of Notre Dame, USA
- David Chadwick, University of Kent, UK
- Jason Crampton, Royal Holloway, UK
- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France
- Mourad Debbabi, Concordia University, Canada
- Sabrina De Capitani, Universita degli Studi di Milano, Italy
- Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
- Eduardo B. Fernandez, Florida Atlantic University, USA
- Simone Fischer-Hubner, Karlstad University, Sweden
- Simon Foley, University College Cork, Ireland
- Sara Foresti, Universit‡ degli Studi di Milano, Italy
- Alban Gabillon, University of French Polynesia, France
- Ehud Gudes, Ben-Gurion University, Israel
- Ragib Hasan, University of Alabama at Birmingham, USA
- Sushil Jajodia, George Mason University, USA
- Sokratis Katsikas, University of Piraeus, Greece
- Adam J. Lee, University of Pittsburgh, USA
- Yingjiu Li, Singapore Management University
- Peng Liu, Pennsylvania State University, USA
- Jorge Lobo, IBM Research T.J. Watson, USA
- Javier Lopez, University of Malaga, Spain
- Emil Lupu, Imperial College London, UK
- Martin Olivier, University of Pretoria, South Africa
- Stefano Paraboschi, Universita di Bergamo, Italy
- Wolter Pieters, University of Twente, Netherlands
- Indrajit Ray, Colorado State University, USA
- Indrakshi Ray, Colorado State University, USA
- Kui Ren, Illinois Institute of Technology, USA
- Mark Ryan, University of Birmingham, UK
- Kouchi Sakurai, Kyushu University, Japan
- Pierangela Samarati, Universita degli Studi di Milano, Italy
- Anoop Singhal, NIST, USA
- Traian Marius Truta, Northern Kentucky University, USA
- Leon van der Torre, University of Luxemburg, Luxemburg
- Vijay Varadharajan, Macquarie University, Australia
- Jaideep Vaidya, Rutgers University, USA
- Lingyu Wang, Concordia University, Canada
- Meng Yu, Virginia Commonwealth University, USA
- Xinwen Zhang, Samsung Information Systems, USA
- Jianying Zhou, Institute for Infocomm Research, Singapore
- Zutao Zhu, Google Inc., USA

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ADAH 2017   Advanced Data Analytics in Health
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
DBSec 2017   31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
SACMAT 2018   23rd ACM Symposium on Access Control Models and Technologies
IJMSA 2017   International Journal of Modeling, Simulation and Applications
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services