posted by user: simonfoley || 9941 views || tracked by 18 users: [display]

CRiSIS 2012 : Seventh International Conference on Risks and Security of Internet and Systems

FacebookTwitterLinkedInGoogle


Conference Series : Conference on Risks and Security of Internet and Systems
 
Link: http://www.crisis-conference.org
 
When Oct 10, 2012 - Oct 12, 2012
Where Cork, Ireland
Submission Deadline Jun 18, 2012
Notification Due Jul 25, 2012
Final Version Due Aug 20, 2012
Categories    security   trust   privacy
 

Call For Papers

***Early Registration closes September 10, 2012.

***Technical Programme published http://www.crisis-conference.org***

***Extended deadline June 18***

IEEE Computer Society technical co-sponsorship.

The International Conference on Risks and Security of Internet and Systems 2012 is the seventh in a series dedicated to security challenges related to Internet applications, networks and systems. In recent years, the Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing security and privacy risks, due to the development increasingly sophisticated online attacks, the growth of Cybercrime, etc. Contemporary attackers are motivated and are increasingly experienced. To compound matters, sophisticated tools that facilitate attacks are readily available. Moreover, the increasing complexity and the vulnerabilities in newer technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges. In this context, new security mechanisms and techniques are needed to achieve an acceptable level of assurance for critical domains such as transportation, health, defence, banking, critical infrastructures, embedded systems and networks and avionics systems. The CRiSIS conference offers an effective forum for computer and network security researchers from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them.


== Scope ==

The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies. Prospective authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications and case studies, such as telemedicine, banking, e-government and critical infrastructure, are also welcome. The list of topics includes but is not limited to:

- Analysis and management of risk
- Attacks and defences
- Attack data acquisition and network monitoring
- Cryptography, Biometrics, Watermarking
- Dependability and fault tolerance of Internet applications
- Distributed systems security
- Embedded system security
- Empirical methods for security and risk evaluation
- Hardware-based security and Physical security
- Intrusion detection and Prevention systems
- Organizational, ethical and legal issues
- Privacy protection and anonymization
- Risk-aware access and usage control
- Security and risk assessment
- Security and risks metrics
- Security and dependability of operating systems
- Security and safety of critical infrastructures
- Security and privacy of peer-to-peer system
- Security and privacy of wireless networks
- Security models and security policies
- Security of new generation networks, security of VoIP and multimedia
- Security of e-commerce, electronic voting and database systems
- Security of social networks
- Traceability, metrology and forensics
- Trust management
- Use of smartcards and personal devices for Internet applications
- Web and cloud security

== IMPORTANT DATES ==

- Submission deadline : June, the 5th,, 2012
- Notification to Authors : July, the 25th, 2012
- Camera-Ready Due : August, the 20th, 2012

== Paper Submissions ==

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must be submitted electronically in PDF format. Maximum paper length will be 8 printed pages for full papers or 4 pages for short papers, in IEEE 2-column style. Authors of accepted papers must guarantee that their papers will be presented at the conference. All papers selected for presentation at the conference will be published on-line by IEEE Xplore http://ieeexplore.ieee.org.

All paper submissions will be handled through the Easy Chair conference management system. Follow the instructions given here:
http://www.easychair.org/conferences/?conf=crisis2012

A special issue is under negotiation in an international journal.

== Call for Tutorials ==

We solicit tutorials on state-of-the-art technologies relevant to the conference themes. We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference. The intended length of each tutorial is 2 to 3 hours.

A tutorial proposal should include a brief summary and outline, specific goals and objectives, the intended audience and the expected background of the audience as well as a biographical sketch of the presenter(s). The length of tutorial proposals should not exceed 5 pages.

Tutorial proposals should be submitted to the tutorial program chair:
Nora Cuppens-Boulahia by email :
Nora(dot)Cuppens(at)telecom-bretagne(dot)eu before June 5, 2012.

== GENERAL CHAIR ==

Simon Foley, University of Cork, Cork, Ireland

== PC CHAIRS ==

Jean-Louis Lanet, University of Limoges, France
Fabio Martinelli, CNR, Italy

== TUTORIAL CHAIR ==

Nora Cuppens-Boulahia, TELECOM Bretagne, France

== PUBLICATIONS CHAIR ==

William Fitzgerald, University College Cork, Ireland

== PROGRAM COMMITTEE ==

Anas Abou ElKalam, Université de Toulouse, IRIT-INP, France
Joachim Biskup, T.U. Dortmund, Germany
Andrea Bondavalli, University of Florence, Italy
Samia Bouzefrane, CNAM Paris, France
Yannick Chevalier, IRIT, France
Bruno Crispo, University of Trento, Italy
Jorge Cuellar, SIEMENS, Germany
Frédéric Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, TELECOM Bretagne, France
Roberto Di Pietro, University of Roma Tre, Italy
Khalil Drira, LAAS-CNRS, France
Samuel Dubus, Alcatel-Lucent, France
Jose M. Fernandez, Ecole Polytechnique de Montréal, Canada
Bogdan Groza, Politehnica University of Timişoara, Romania
Olivier Heen, Technicolor, France
Julien Iguchi-Cartigny, University of Limoges, France
Wouter Joosen, KUL, Belgium
Igor Kotenko, SPIIRAS, Russia
Javier Lopez, Universitad de Malaga, Spain
Masahiro Mambo, Kanazawa University, Japan
Fatma Mili, Oakland University, USA
Ludovic Mé, SupElec, France
Raja Natarajan, Tata Institute of Fundamental Research, India
Stephen Neville, University of Victoria, Victoria, Canada
Joachim Posegga, University of Passau, Germany
Kai Rannenberg, Goethe Universitaet Frankfurt, Germany
Michael Rusinowitch, LORIA, France
Thierry Sans, Carnegie Mellon, Doha, Qatar
George Spanaudakis, Open University, United Kingdom
Ketil Stoelen, SINTEF ICT, Oslo, Norway
Amit Vasudevan, CyLab/CMU, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

Related Resources

ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
LAJC 2024   Latin-American Journal of Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CrossMED 2024   International Conference Landscapes Across the Mediterranean
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
JoL 2024   International Journal of Law