posted by user: rjhawar || 4941 views || tracked by 7 users: [display]

ESTEL-SEC 2012 : ESTEL Security and Privacy Special Track


When Oct 2, 2012 - Oct 5, 2012
Where Rome, Italy
Submission Deadline Jul 15, 2012
Notification Due Aug 27, 2012
Final Version Due Sep 5, 2012
Categories    security   privacy   space satellite   communication

Call For Papers

Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012

The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications. In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT. The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited

- Access Control
- Applied Cryptography for Space Applications
- Authentication
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Homeland Security
- Human Factors and Human Behaviour Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Organizational Security Policies
- Peer-to-Peer Security
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Satellite-based Disaster Recovery
- Satellite Network Security
- Secure Cloud Computing
- Secure Software Development Methodologies
- Security Protocols
- Security and Privacy in Mobile Systems
- Security and Privacy in Complex Systems
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Satellite Surveillance
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
- Security Information Systems Architecture and Design and Security Patterns
- Security in e-Healthcare
- Security Issues of Satellite Communications
- Security Management
- Security Metrics and Measurement
- Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust Management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security

Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 15, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.

Paper submission due: July 15, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 27, 2012
Camera ready due: September 5, 2012

Pierangela Samarati
Universita' degli Studi di Milano, Italy


This call for papers and additional information about the conference
can be found at

Related Resources

CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
IJPLA 2022   International Journal of Programming Languages and Applications
SCOM 2022   10th International Conference on Soft Computing
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
PDCAT 2022   The 23rd International Conference on Parallel and Distributed Computing, Applications and Technologies