posted by system || 4934 views || tracked by 10 users: [display]

CRiSIS 2009 : International Conference on Risks and Security of Internet and Systems

FacebookTwitterLinkedInGoogle


Conference Series : Conference on Risks and Security of Internet and Systems
 
Link: http://www.crisis2009.org
 
When Oct 19, 2009 - Oct 22, 2009
Where Toulouse, France
Submission Deadline May 25, 2009
Notification Due Jul 1, 2009
Final Version Due Sep 1, 2009
Categories    security
 

Call For Papers

==============================================
CRiSIS'2009
International Conference on Risks and Security
of Internet and Systems

IEEE technical co-sponsorship
in cooperation with "ACM SIGSAC"
Supported by SEE

19-22 October 2009
Toulouse - France

==============================================
*** www.crisis2009.org ***

The International Confernece on Risks and Security of Internet and
Systems (CRiSIS'09) will be held on 19-22 October 2009, Toulouse - France.

CRiSIS'09 is dedicated to security issues in Internet-related applications,
networks and systems.

The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies.

The authors are invited to submit research results as well as practical experiment or deployment reports.

Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.).

The list of topics includes but is not limited to:
--------------------------------------------------
* Access controls and security mechanisms
* Analysis and management of risk, attacks and vulnerabilities
* Attacks and defenses
* Attack data acquisition (honeypots) and network monitoring
* Authentication, authorization and audit
* Cryptography, Biometrics, watermarking
* Dependability and fault tolerance of Internet applications
* Distributed systems security
* Embedded system security
* Firewalls and intrusion detection / prevention systems (IDS/IPS)
* Formal methods, verification and certification
* Hardware-based security
* Key management Infrastructure (PKI) and trust management
* Metrology, security evaluation, and security management
* network security, security protocols, Security architectures
* Organizational, ethical and legal issues
* Physical security
* Privacy protection, anonymization, PETs
* Recovery
* System security
* Security and dependability of operating systems and network components
* Security and safety of critical infrastructures
* Security and privacy of peer-to-peer system
* Security and privacy of embedded systems
* Security and privacy of wireless networks
* Security models and security policies
* Security of new generation networks, security of VoIP and multimedia
* Security of e-commerce, electronic voting and database systems
* Traceability and forensics
* Use of smartcards and personal devices for Internet applications
* Viruses, worms and malicious codes
* Web security, Web services and enterprise security.

*********************
* Paper Submissions *
*********************
Papers must be written in English and must be submitted electronically in PDF format.
Maximum paper length will be 8 printed pages for full papers or 4 pages for short papers, in IEEE 2-column style .
The authors of the best conference papers will be invited to submit an extended version to a special issue of the International Journal of Information and Computer Security (IJICS).

**********************
* Call for Tutorials *
**********************
We solicit tutorials on state-of-the-art technologies relevant to the conference themes.
We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference.
Each tutorial will be 4 hours long. The tutorial proposal should include a brief summary and outline, specific goals and objectives,
the intended audience and the expected background of the audience as well as a biographical sketch of the presenter(s).
The length of tutorial proposals should not exceed 5 pages. They should be submitted to the tutorial program chair: Nora Cuppens by email:
nora(dot)cuppens(at)enst-bretagne(dot)fr before May 15, 2009.


*******************
* Important Dates *
*******************
* Submissions due : May 25, 2009
* Notification : July 1, 2009
* Camera-Ready due : September 1, 2009

* General chair
---------------
Yves Deswarte (LAAS)

* PC co-chairs
--------------
Anas Abou El Kalam José M. Fernandez

* Program Committee
-------------------
Jocelyn Aubert, Centre de Recherche Henri Tudor, Luxembourg
Rahma Ben Ayad, ENIT, Tunisia
Elisa Bertino, Purdue University, USA
Joachim Biskup, T.U. Dortmund, Germany
Gilles Brassard, Université de Montréal, Canada
Frédéric Cuppens, Telecom Bretagne, France
Michel Cukier, University of Maryland, USA
Merouane Debbah, Alcatel-Lucent –SupElec, France
Geert Deconinck, Katholieke Universiteit Leuven, Belgium
Theo Dimitrakos, Centre for Information and Security Systems Research, BT Innovate, UK
Khalil Drira, LAAS–CNRS, France
James P. Early, State University of New York at Oswego, USA
Mahmoud El-Hadidi, Cairo University, Egypt
Simone Fischer-Huebner, Karlstad University, Sweden
Dimitris Gritzalis, Athens University of Economics & Business, Greece
Noureddine Idboufker, ENSA, Morocco
Lech J. Janczewski, University of Auckland, New Zealand
Mohamed Jmaiel, Université de Sfax, Tunisia
Zbigniew Kalbarczyk, University of Illinois, USA
Corrado Leita, Symantec, France
Javier Lopez, University of Málaga, Spain
Fabio Massacci, Università di Trento, Italy
Catherine Meadows, Naval Research Laboratory, USA
Ludovic Mé, SupElec Rennes, France
Fatma Mili, Oakland University, USA
Mohamed Mosbah, LaBRI, France
Raja Natarajan, Tata Institute of Fundamental Research, India
Claudio Pastrone, ISMB, Italy
Kai Rannenberg, Goethe Universität Frankfurt, Germany
Peter Ryan, University of Newcastle, UK
Mickael Rusinowitch, INRIA, France
Pierangela Samarati, Universitá Degli Studi di Milano, Italy
Damien Sauveron, Université de Limoges – CNRS, France
Virendra Singh, Supercomputer Education and Research Centre, India
Ethan Singleton, University of Tulsa, USA
Paulo Vérissimo, Universitade de Lisboa, Portugal
Vijay Varadharajan, Macquarie University, Australia
Amit Vasudevan, CyLab/CMU, USA
Jinpeng Wei, Georgia Institute of Technology, USA
Belhassen Zouari, National Agency of Security, Tunisia
Youssef Zaz, Université Ibn Zohr, Morocco

********************************************************
More information is available on the CRiSIS'09 web site
(http://www.crisis2009.org).
********************************************************

Related Resources

ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
LAJC 2024   Latin-American Journal of Computing
CSW 2024   2024 3rd International Conference on Cyber Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CrossMED 2024   International Conference Landscapes Across the Mediterranean
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust