posted by user: ka_ti_bo || 8076 views || tracked by 32 users: [display]

IFIP SEC 2010 : 25th IFIP International Information Security Conference Security & Privacy − Silver Linings in the Cloud

FacebookTwitterLinkedInGoogle

Link: http://www.wcc2010.com/SEC2010
 
When Sep 20, 2010 - Sep 23, 2010
Where Brisbane, Australia
Submission Deadline Feb 15, 2010
Notification Due Apr 23, 2010
Final Version Due May 15, 2010
Categories    security   privacy
 

Call For Papers

Call for papers

25th IFIP International Information Security Conference
Security & Privacy − Silver Linings in the Cloud

www.wcc2010.com/SEC2010


Conference Topics:

SEC-2010 is the 25th in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP World Congress celebrating both the Golden Jubilee of IFIP and the Silver Jubilee of SEC. Papers offering novel and mature research contributions, in any aspect of information security and privacy, are solicited for submission to the conference. Papers may present theory, applications, or practical experiences on topics including but not limited to: (Authors of the best submissions will be invited to submit updated and significantly extended versions of their papers into Computers & Security.)

Access Control
Anonymity
Applications of Cryptography
Attacks and Malicious Software
Authentication and Authorization
Biometrics and Applications
Critical ICT Resources Protection
Data and Systems Integrity
Data Protection
ECommerce Security
Enterprise Security
Identity Management
Information Hiding
Information Warfare
Internet and Web Security
Intrusion Detection
Mobile Computing Security
Mobile Networks Security
Network Security Protocols
Multilateral Security
Peer-to-Peer Security
Privacy Enhancing Technologies
RFID Security
Risk Analysis and Management
Secure Electronic Voting
Secure Sensor Networks
Secure Systems Development
Security Architectures
Security Economics
Security Education
Security Management
Security Metrics
Smart Cards
Software Security
Spam, SPIT, SPIM
Trust Management and Models
Trusted Computing
Ubiquitous Security


Programme Committee Chairs:

Kai Rannenberg, Goethe University Frankfurt, Germany
Vijay Varadharajan, Macquarie University, Australia

Publication Chair:

Christian Weber, Goethe University Frankfurt, Germany

Programme Committee Members:

A. Aldini, University of Urbino, Italy
C. J. Armstrong, Curtin University, Australia
V. Atluri, Rutgers University, USA
T. Aura, Microsoft Research, UK
R. L. Baskerville, Georgia State University, USA
J. Benaloh, Microsoft Research, USA
C. Benzmüller, International University, Germany
J. Biskup, T.U. Dortmund, Germany
R. Botha, NMMU, South Africa
L. Bussard, Microsoft EMIC, Germany
J. Camenisch, IBM Research, Switzerland
K. Cameron, Microsoft, USA
L. Chen, Hewlett-Packard Labs, UK
M. Christodorescu, IBM TJ Watson Research Center, USA
R. Clarke, Xamax Consultancy Pty Ltd, ANU and UNSW, Australia
C.J.F. Cremers, ETH Zurich, Switzerland
M. Crompton, Information Integrity Solutions and NICTA
N. Cuppens-Boulahia, TELECOM Bretagne, France
E. Dawson, QUT, Australia
S. De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
B. de Decker, K.U. Leuven, Belgium
M. de Soete, Security4Biz, Belgium
Y. Deswarte, LAAS-CNRS, France
G. Dhillon, Virginia Commonwealth University, USA
R. Dodge, U.S. Military Academy, USA
J. Eloff, University of Pretoria, South Africa
A. Escudero-Pascual, it46.se, Sweden
H. Federrath, University of Regensburg, Germany
S. Fischer, University of Lübeck, Germany
S. Fischer-Huebner, Karlstad University, Sweden
S. N Foley, University College Cork, Ireland
A. Fuchsberger, Microsoft Corp, USA
S. Furnell, University of Plymouth, UK
M. Gasson, University of Reading, UK
D. Gollmann, TU Hamburg-Harburg, Germany
R. Grimm, University of Koblenz, Germany
D. Gritzalis, Athens University of Economics & Business, Greece
M. Hansen, Independent Centre for Privacy Protection, Germany
M. Heisel, University Duisburg-Essen, Germany
U. Helmbrecht, ENISA, EU
A. Hevia, Universidad de Chile, Chile
M. Hoelbl, Maribor University, Slovenia
J.-H. Hoepman, TNO & Radboud University Nijmegen, the Netherlands
E. Humphreys, XISEC, UK
C. Irvine, Naval Postgraduate School, Monterey, USA
L. Janczewski, Univ. of Auckland, New Zealand
D.-O. Jaquet-Chiffelle, Bern Univ. of Applied Sciences, Switzerland
A. Jøsang, University of Oslo, Norway & QUT, Australia
M.C. Kang, ISO/IEC JTC 1/SC 27/WG 4
S. Katsikas, University of Piraeus, Greece
D. Kesdogan, University of Siegen, Germany
H. Kikuchi, Tokai University, Japan
V. Kisimov, University of World and National Economy, Sofia, Bulgaria
S. Knapskog, NTNU/Q2S, Norway
B. LaMacchia, Microsoft, USA
C. E. Landwehr, University of Maryland, USA
H. Leitold, Graz University, Austria
A. Levi, Sabanci University, Istanbul, Turkey
T. Levin, Naval Postgraduate School, Monterey, USA
J. Lopez, University of Malaga, Spain
V. Lotz, SAP Research, France
N. Luttenberger, Kiel University, Germany
M. Marhöfer, Nokia Siemens Networks, Germany
S. Marsh, Communications Research Centre, Canada
F. Martinelli, National Research Council, Italy
V. Matyas, Masaryk University Brno, Czech Republic
S. Mauw, Uni Luxembourg, Luxembourg
C. Maziero, PUCPR, Brazil
C. A. Meadows, Naval Research Laboratory, USA
M. Meints, Dataport, Germany
N. Miloslavskaya, The National Research Nuclear Institute MEPhI, Russia
C. Mitchell, Royal Holloway, University of London, UK
R. Molva, EURECOM, France
G. Mueller, Freiburg University, Germany
Y. Murayama, Iwate Prefectural University, Japan
M. Ohlin, FMV, Sweden
E. Okamoto, University of Tsukuba, Japan
R. Oppliger, eSECURITY Technologies, Switzerland
J. I. Pagter, Alexandra Instituttet, Denmark
C. Palmer, IBM Research; Dartmouth College, USA
A. Pasic, ATOS Origin, Spain
P. Peleties, USB BANK PLC, Cyprus
G. Pernul, University of Regensburg, Germany
G. L. Peterson, Air Force Institute of Technology, USA
M. Petkovic, Philips Research / Eindhoven University of Technology, Netherlands
A. Pfitzmann, Dresden University of Technology, Germany
U. Pinsdorf, Microsoft EMIC, Germany
H. Pohl, Univ. of Applied Sciences Bonn-Rhein-Sieg, Germany
M. Pollitt, University of Central Florida, USA
R. Posch, TU Graz, Austrian Federal Government
J. Posegga, University of Passau, Germany
B. Preneel, K.U. Leuven, Belgium
G. Price, Royal Holloway, University of London, UK
C. W Probst, Technical University of Denmark
S. Qing, Chinese Academy of Sciences, China
C. Rieder, Lucerne Univ. of Applied Sciences & Arts, Switzerland
M. Riguidel, ENST, France
P. Samarati, University of Milan, Italy
A. Sarma, NEC Laboratories Europe, Germany
R Sasaki, Dendai University, Japan
D. Sauveron, University of Limoges, France
I. Schaumüller-Bichl, Univ. of Applied Sciences Hagenberg, Austria
A. B. Seip, Kredittilsynet, Norway
S. Shenoi, University of Tulsa, USA
E. Snekkenes, Gjøvik University College, Norway
R. von Solms, NMMU, South Africa
H. von Sommerfeld, Rohde & Schwarz SIT, Germany
S. Steinbrecher, Dresden University of Technology, Germany
R. K Subramaniam, Valiant Technologies, India
S. Teufel, University of Fribourg, Switzerland
M. Ullmann, BSI & Univ. of AS Bonn-Rhein-Sieg, Germany
P.M. Barbosa Veiga, Universidade de Lisboa, Portugal
T. Virtanen, Finland
J. Vyskoc, VaF, Slovakia
G. Weck, INFODAS GmbH, Germany
N. Weiler, Sensaco, Switzerland
T. Welzer, University of Maribor, Slovenia
S. Wohlgemuth, National Institute of Informatics, Japan
S. Wolthusen, Royal Holloway, University of London, UK
J. Zhou, I2R, Singapore
A. Zugenmaier, DoCoMo Research, Germany


Submission of papers: January 31, 2010
Notification to authors: April 23, 2010
Camera-ready copies: May 15, 2010
Instructions for paper submission
Papers must not substantially overlap with papers that have been published or are simultaneously submitted to a journal or another conference with proceedings.
Papers must be written in English; they should be at most 12 pages in total, including bibliography and well-marked appendices. Papers should be intelligible without appendices, if any.
Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer.
Submitted and accepted papers must follow the publisher’s guidelines for the IFIP AICT Series (www.springer.com/series/6102, Author templates, Manuscript preparation in Word).
At least one author of each accepted paper must register for the conference and present the paper. Inclusion of the paper will be dependent upon one registration for the paper.
All papers must be submitted in electronic form through the web via www.wcc2010.com by January 15, 2010.

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
DISSECT 2018   IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
eCrime 2018   13th Symposium on Electronic Crime Research
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
WEIS 2018   Workshop on the Economics of Information Security
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems