posted by user: eursecu || 4812 views || tracked by 10 users: [display]

SAR-SSI 2010 : 5th Conference on Network Architectures and Information Systems Security

FacebookTwitterLinkedInGoogle

Link: http://www.hds.utc.fr/sarssi2010/
 
When May 18, 2010 - May 21, 2010
Where Menton, France
Submission Deadline Jan 29, 2010
Notification Due Mar 1, 2010
Categories    security   network security   communications   networking
 

Call For Papers

======================================================================

CALL FOR PAPERS - SAR-SSI 2010
5th Conference on Network Architectures
and Information Systems Security
May 18-21, Menton, France.
http://www.hds.utc.fr/sarssi2010/


SAR-SSI'2010 is the next edition of the SAR-SSI series, a continuation
of the SAR and SSI conferences which merged in 2006. It aims at
fostering the presentation of high quality research work in network
and system security. The goal of this event is to provide a framework
for exchanges among academic researchers, industry, graduate students
and a broader audience interested in network and system security.
The conference will offer a broad area of events, ranging from panels,
tutorials, technical presentations and informal meetings. SAR-SSI will
take place in the very nice area of Cap Martin, located between Menton
and Nice, in Southern France.

Authors are invited to submit research papers, papers presenting an
experiment or industrial applications, or a tutorial. Topics of
interest include, but are not limited to the following:

* Security of new network architectures (e.g. VoIP, MAN/WAN,
Gigaethernet),
* Security in wireless networks,
* Security in adhoc networks,
* Security of communications (IPsec, SSL, MPLS VPN),
* Security in backbone networks,
* Security of GIS (Geographic Information Systems),
* IPv6 security,
* Intrusion detection, honeypots,
* Reverse engineering and software protection,
* Security in peer-to-peer systems,
* Security in embedded networks,
* E-commerce security,
* Formal methods for computer security,
* Applied cryptography,
* Authentication, access control,
* Security protocols,
* Metrology and security measurement,
* Worms, Viruses, Botnets, Malware and Spyware,
* Computer Forensics and Incident Response,
* Security assessment,
* Multicast security,
* Public Key Infrastructures (PKI), trust management,
* Methodology, ethics, legislation, regulation,
* Security assessment for information technologies and
certification,
* XML, Web Services, and Security,
* Biometry, watermarking,
* Anonymity and privacy,
* Security in vehicular communication

Prospective authors are encouraged to submit papers offering novel
research contributions in network and system security as well as
proposals for tutorials and panels. Submissions can address both
theoretical issues in network and system security or provide practical
and operational experiences in security management. Languages for
papers and presentations can be French or English, both languages
being used in SAR-SSI.


Panel proposals

The conference may include panel sessions addressing topics of
interest to the computer and network security community. Proposals
for panels should include possible panelists and an indication of
which of those panelists have confirmed participation. Please submit
panel proposals by email to the TPC chairs.


Important dates

* Submission deadline: January 29th, 2010
* Acceptance notification: March 1st, 2010
* Conference: May 18th-21st, 2010


Paper submissions

Submissions should not exceed 15 pages and must include a cover page
with the paper title, author(s) name(s) and affiliation, a full
address (Phone, fax, e-mail), an abstract of the paper (150 words
max), and at most 5 keywords. Authors must submit an electronic
version of their paper (PDF / A4 format).

For the final version, a LaTeX source file for the paper will also
be required.

Style sheet can be downloaded from the following links:

* LaTeX Style:
http://www.hds.utc.fr/sarssi2010/wp-content/assets
/SARSSI2008_Latex.zip
Authors must follow the sarssi.cls type and use the alpha style
for bibliography.
* Word Style:
http://www.hds.utc.fr/sarssi2010/wp-content/assets
/SARSSI2008_Word.doc

Camera Ready Style Sheet

For the final version, a LaTeX source file is required.
A style sheet can be downloaded from the following link:

* LaTeX Style:
http://www.hds.utc.fr/sarssi2010/wp-content/assets/sarssi.cls

Authors of the best papers selected by the technical program committee
will be invited to publish an extended version of their paper in a
journal of international audience.


Steering Committee:

* Abdelmadjid. Bouabdallah, UTC
* Danielle Boulanger, Univ.f Lyon 3
* Isabelle Chrisment, LORIA - Univ. Nancy I
* Alban Gabillon, UPF
* Ahmed Serhrouchni, Telecom ParisTech

Technical Program Committee Chairs:

* Hakima Chaouchi, Telecom SudParis, France
* Yves Roudier, EURECOM, France

Program Committee:

* Anas Abou El Kalam, IRIT / INP, France
* Hossam Afifi, Telecom SudParis, France
* Gildas Avoine, UCL, Louvain-la-Neuve, Belgium
* Nadjib Badache, CERIST Alger, Algeria
* Mohamad Badra, ISIMA, France
* Francois Barrere, IRIT / Universite Paul Sabatier, France
* Martine Bellaiche, Ecole Polytechnique de Montreal, Canada
* Salem Benferhat, CRIL / CNRS / Universite d'Artois, France
* Christophe Bidan, SUPELEC, France
* Alexis Bonnecaze, ESIL, Universite de la Mediterranee,
Marseille, France
* Karima Boudaoud, Universite de Nice, France
* Adel Bouhoula, SupCom, Tunisie
* Azzedine Boukerche, Universite d'Ottawa, Canada
* Laurent Bussard, European Microsoft Innovation Center, Germany
* Laurent Butti, Orange, France
* Claude Castelluccia, INRIA, France
* Yacine Challal, Universite de Technologie de Compiegne, France
* Yves Correc, MoD, DGA/CELAR, France
* Bernard Cousin, IRISA / Universite de Rennes 1, France
* Mathieu Couture, CRC, Canada
* Frederic Cuppens, Telecom Bretagne, France
* Nora Cuppens-Boulahia, Telecom Bretagne, France
* Herve Debar, Telecom SudParis, France
* Eric Disson, Universite de Lyon 3, France
* Rachida Dssouli, CIISE Concordia University / CIT UAEU, Canada
* Robert Erra, ESIEA, France
* Mohammed Erradi, ENSIAS, Morocco
* Laurent Gallon, LIUPPA, France
* Gilles Guette, IUT de Lannion, France
* Gaetan Hains, LACL, Paris XII, France
* Olivier Heen, detache Thomson a l'INRIA, France
* Mathieu Jaume, SPI-Lip6 Universite Paris 6, France
* Djamel Khadraoui, CRP Henri Tudor, Luxembourg
* Rida Khatoun, Universite de Technologie de Troyes, France
* Jean-Louis Lanet, Universite de Limoges, France
* Daniel Le Metayer, INRIA, France
* Jean Leneutre, Telecom Paristech, France
* Maryline Maknavicius, Telecom SudParis, France
* Bruno Martin, Universite de Nice, France
* Ludovic Me, SUPELEC, France
* Philippe Owezarski, LAAS, France
* Olivier Paul, Telecom SudParis, France
* Fabien Pouget, ANSSI/COSSI, France
* Nicolas Prigent, SUPELEC, France
* Guy Pujolle, LIP6, Universite Paris 6, France
* Jean-Luc Richier, Laboratoire d'Informatique de Grenoble, CNRS,
France
* Etienne Riviere, Universite de Neuchatel, Switzerland
* Jean-Marc Robert, Ecole de Technologie Superieure, Universite
du Quebec, Canada
* Isabelle Simplot-Ryl, Universite Lille 1/INRIA Lille-Nord
Europe, France

Organization Committee:

* A. Bouabdallah, UTC
* Y. Challal, UTC


======================================================================

Related Resources

IWCC 2020   9th International Workshop on Cyber Crime
CCCIOT 2020   International Conference on Cloud Computing and IOT (CCCIOT 2020)
CANS 2020   Cryptology and Network Security
SP 2020   IEEE Symposium on Security and Privacy
CIKM 2020   29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT
CDKP 2020   9th International Conference on Data Mining & Knowledge Management Process
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
SPTM 2020   8th International Conference of Security, Privacy and Trust Management