posted by system || 2493 views || tracked by 12 users: [display]

ESORICS 2009 : 14th European Symposium on Research in Computer Security


Conference Series : European Symposium on Research in Computer Security
When Sep 21, 2009 - Sep 25, 2009
Where Saint Malo, France
Submission Deadline Apr 17, 2009
Notification Due Jun 8, 2009
Final Version Due Jun 29, 2009
Categories    security

Call For Papers

14th European Symposium on Research in Computer Security (ESORICS 2009)
September 21-25, 2009, Saint Malo, France

Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Fourteenth European
Symposium on Research in Computer Security (ESORICS 2009). Organized in
a series of European countries, ESORICS is confirmed as the leading
European research event in computer security. The symposium started in
1990 and has been held on alternate years in different European
countries and attracts an international audience from both the academic
and industrial communities. From 2002 it has been held yearly. The
Symposium has established itself as one of the premiere, international
gatherings on Information Assurance.

Papers may present theory, technique, applications, or practical
experience on topics including, but not limited to:

- access control
- anonymity
- authentication
- authorization and delegation
- cryptographic protocols
- data integrity
- dependability
- information flow control
- smartcards
- systems security
- digital right management
- accountability
- applied cryptography
- covert channels
- cybercrime
- denial of service attacks
- formal methods in security
- inference control
- information warfare
- steganography
- transaction management
- data and application security
- intellectual property protection
- intrusion tolerance
- peer-to-peer security
- language-based security
- network security
- non-interference
- privacy-enhancing technology
- pseudonymity
- subliminal channels
- trustworthy user devices
- identity management
- security as quality of service
- secure electronic commerce
- security administration
- security evaluation
- security management
- security models
- security requirements engineering
- security verification
- survivability
- information dissemination control
- trust models and trust management policies

The primary focus is on high-quality original unpublished research, case
studies and implementation experiences. We encourage submissions of
papers discussing industrial research and development. Proceedings will
be published by Springer-Verlag in the Lecture Notes in Computer Science
(LNCS) series.

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 15 pages excluding
the bibliography and well-marked appendices (using 11-point font and
reasonable margins), and at most 20 pages total. Committee members are
not required to read the appendices, and so the paper should be
intelligible without them. Papers must be submitted using the conference
web site and following the requirements stated there. Authors of
accepted papers must be prepared to sign a copyright statement and must
guarantee that their paper will be presented at the conference.
Additionally, they must follow the Springer Information for Authors?
guidelines for the preparation of the manuscript and use the templates
provided there.

- Paper submissions due: April 17, 2009
- Acceptance notifications: June 8, 2009
- Camera-ready papers due: June 29, 2009


- Fr?d?ric Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France

- Michael Backes, Saarland University and MPI-SWS, Germany
- Peng Ning, North Carolina State University, USA

- Mike Atallah, Purdue University, USA
- Michael Backes, Saarland University and MPI-SWS, Germany (co-chair)
- David Basin, ETH Zurich, Switzerland
- Nikita Borisov, University of Illinois at Urbana-Champaign, USA
- Srdjan Capkun, ETH Zurich, Switzerland
- Marc Dacier, EURECOM, France
- Anupam Datta, Carnegie Mellon University, USA
- Herve Debar, France TELECOM R&D, France
- Roger Dingledine, The Freehaven Project, USA
- Wenliang Du, Syracuse University, USA
- C?dric Fournet, Microsoft Research Cambridge, UK
- Virgil Gligor, Carnegie Mellon University, USA
- Carl A. Gunter, University of Illinois at Urbana-Champaign, USA
- Dieter Gollmann, Hamburg University of Technology, Germany
- Sushil Jajodia, George Mason University, USA
- Xuxian Jiang, North Carolina State University, USA
- Peeter Laud, University of Tartu, Estonia
- Wenke Lee, Georgia Institute of Technology, USA
- Donggang Liu, University of Texas at Arlington, USA
- Michael Locasto, George Mason University, USA
- Matteo Maffei, Saarland University, Germany
- Heiko Mantel, University of Darmstadt, Germany
- Catherine Meadows, Naval Research Laboratory, USA
- John Mitchell, Stanford University, USA
- Peng Ning, North Carolina State University, USA (co-chair)
- Alina Oprea, RSA, USA
- Radia Perlman, Sun Microsystems, USA
- Adrian Perrig, Carnegie Mellon University, USA
- Mark Ryan, University of Birmingham, UK
- Pierangela Samarati, Universita degli Studi di Milano, Italy
- Vitaly Shmatikov, University of Texas at Austin, USA
- Wade Trappe, Rutgers University, USA
- Patrick Traynor, Georgia Institute of Technology, USA
- Dominique Unruh, Saarland University, Germany
- Dan S. Wallach, Rice University, USA
- Andreas Wespi, North Carolina State University, USA
- Ting Yu, IBM Research, Switzerland
- Yanyong Zhang, Rutgers University, USA

Related Resources

ETHE Blearning 2017   Blended learning in higher education: research findings
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
ECCV 2018   European Conference on Computer Vision
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ACMC 2017   Australasian Computer Music Conference
eCrime 2018   13th Symposium on Electronic Crime Research
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities