| |||||||||||||
JNS 2013 : 3rd Edition of National Days of Security | |||||||||||||
Link: http://www.ensias.ma/jns3/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
After the success of the first two editions of JNS, the Moroccan Society of Digital Trust (Association Marocaine de confiAnace Numérique: AMAN), the initiator of these days, has the pleasure to be associated with ENSIAS represented by ISeRT (Information Security Research Team) to renew the experience and organize on 26 and 27 April 2013, the third edition of the JNS at ENSIAS.
JNS3 will provide a high-level, international forum for scientists, researchers, industrial professionals, and students who will present state-of-the-art research results, address new challenges, and discuss trends in Computational Intelligence, Cybernetics, General Systems Theory, and their applications in diverse fields. http://www.ensias.ma/jns3/index_en.html Topics: This third edition JNS 3 includes four tracks : Track 1 : Security Policies Formalization & Security and Trust Management Chair : Khalid EL YASSINI - Security Policies, Formal methods & verification, - Digital Identity, - Access Control Models, - Trust management systems, Public-Key Infrastructures (PKI), Reputation systems - Risk Analysis, threats and vulnerabilities - Métrologie, mesure de la sécurité - Privacy Protection - Organizational, juridical and ethical Aspects of Security - Information Systems Security and Governance - … Track 2 : Network and Application Security Chair : Ahmed BATTAS - Security of e-commerce, e-government, e-healt, … - Web Applications Security - Intrusion Detection, Honeypots, Malware prevention - Embedded Systems Security , smart cards, ... - Authentication and biometric Access Control - Wired , Mobile and Next Generation Networks Security - … Track 3 : Cloud Computing and Collaborative Systems Security Chair : Bouabid EL OUAHIDI - Cloud Computing Security - Web Services, midellewares and Security - Peer to Peer and distributed systems Security - Social Networks Security and Privacy - Workflow and Collaborative Systems Security - … Track 4 : Cryptology, Watermarking & Steganography Chair : Said EL HAJJI - Steganography, Watermarking - Secret-key & à public-key Cryptography (Encryption, Hash functions, electronic signatures, ..) - Elliptic Curve Cryptography - Quantic Cryptography - Cryptanalysis, security proofs - Cryptographic Protocols - … This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged. Submissions from both industry and institutional circles will be considered with particular interest. Paper Submission and publication Authors wishing to participate in JNS3 are requested to write an original and high quality paper in English or French according to IEEE double column template. Papers must be submitted via Easychair (http://www.easychair.org/conferences/?conf=jns3). All submitted papers will be peer-reviewed by at least two reviewers for technical merit, originality and relevance to track topics. Papers must not exceed 6 pages total (including the references and appendices) and must be in Portable Document or Microsoft Word Format (.pdf, .doc). Conference Proceedings, Special Issues All accepted papers will be included in the conference proceedings. English versions of accepted and presented papers will be submitted to IEEE for potential publication in the IEEE Xplore. IEEE reserves the right to not publish any proceedings not meeting its quality standards. A selection of accepted papers will be submitted for publication (as extended versions) in the open access electronic journal e-TI (http://www.revue-eti.net). |
|