posted by user: rossnage || 12571 views || tracked by 8 users: [display]

ISSE/SICHERHEIT 2010 : Information Security Solutions Europe - Sicherheit, Schutz und Zuverlässigkeit

FacebookTwitterLinkedInGoogle

Link: http://www.sicherheit2010.de
 
When Oct 5, 2010 - Oct 7, 2010
Where Berlin
Submission Deadline Mar 29, 2010
Notification Due May 19, 2010
Final Version Due Jun 16, 2010
Categories    security   safety   privacy
 

Call For Papers

Berlin, 5.-7. Oktober 2010

organized by Gesellschaft für Informatik e.V.
in cooperation with eema, TeleTrusT, ENISA

http://isse.eu.com/
http://www.sicherheit2010.de

*** Submission deadline: March 29, 2010 ***


Call for Papers

The fifth issue of the conference "Sicherheit, Schutz und
Zuverlässigkeit" (SICHERHEIT) will take place in October 2010 in
Berlin. SICHERHEIT is the German forum for experts from academia and
industry to discuss both aspects of the German term "Sicherheit",
meaning the combination of safety (protection from catastrophic events
of technical systems) and security (protection of confidentiality and
integrity of information in technical systems). In 2010, SICHERHEIT is
co-located with the conference Information Security Solutions Europe
(ISSE). The conference language is English and so SICHERHEIT also
welcomes participants and submissions from non-German-speaking
countries. SICHERHEIT is organized by Gesellschaft für Informatik e.V,
the German non-profit organization of computing professionals with
around 25.000 members. ISSE/SICHERHEIT is jointly organized by
Gesellschaft für Informatik e.V., eema, TeleTrusT and ENISA .

Topics of Interest

The organizers seek submissions from the broad range of safety and
security, for example on the following topics:

* biometrics, privacy, data protection
* e-commerce, e-government
* certification of safe and secure systems
* cryptography, digital signatures, steganography
* development and maintenance of safe and secure systems
* formal methods for safe and secure systems
* management of safe and secure systems, management of information security
* network security
* reactive security ("Reaktive Sicherheit")
* reliability and availability

Rules of Submission

The language of the conference and all conference presentations is
English. Papers can be submittin in both German and English. Three
types of papers can be submitted to the conference:

* Academic papers describing novel research results. Papers will be
reviewed by the program committee. Accepted papers will be published
in the conference proceedings. The proceedings will appear in the
series Lecture Notes in Informatics (LNI) published by Gesellschaft
für Informatik. Submissions should not entirely overlap with already
published papers or papers concurrently submitted to other
conferences or workshops.

Papers should have at most 12 pages and should be formatted
according to the LNI style. Submission is performed in pdf format
through the conference management system at
http://www.sicherheit2010.de. Prerequisite for publication is the
registration of at least one author to the conference and the
presentation of the paper at the conference.

* Special Sessions are organized by Special Interest Groups within
Gesellschaft für Informatik and are reviewed mainly by members of
those Special Interest Groups that are also members of the program
committee of SICHERHEIT. Apart from that, submissions to Special
Sessions are treated just like academic papers (see above). Authors
of submissions to special sessions should indicate the particular
special session during submission. For the list of Special Sessions
see http://www.sicherheit2010.de

SICHERHEIT 2010 will feature the following special sessions:

* Biometrics and digital signatures (Special Interest Group
BIOSIG)
* Dependability and fault-tolerance (Special Interest Group FERS)
* Multimedia security (Special Interest Group STEWA)
* Reactive security: Detection and management of security
incidents (Special Interest Group SIDAR)
* Theory and practice of cryptography (Special Interest Group
KRYPTO)

* Submissions to Workshops as part of SICHERHEIT 2010: Workshops are
organized by Special Interest Groups within Gesellschaft für
Informatik. Submitted papers are reviewed by separate program
committees. Accepted papers are not published in the proceedings of
SICHERHEIT. SICHERHEIT 2010 will feature one workshop:

* Services Security (Special Interest Group NETSEC),
see http://clawslab.nds.rub.de/WS210/


Industrial Papers

For papers from industry please see the Call for Papers of ISSE 2010
available at http://isse.eu.com. The program committee of SICHERHEIT
may forward submissions to ISSE after asking the authors for
permission.

Important Dates

March 29, 2010 Electronic submission of academic papers and
submissions to special sessions
May 19, 2010 Notification of acceptance via email
June 16, 2010 Electronic submission of camera ready copy
October 5.-7., 2010 ISSE/SICHERHEIT 2010 in Berlin

Further Submission Information

Latest information on the submission process can be found at
http://www.sicherheit2010.de The formatting instructions for LNI can
be found at http://www.gi-ev.de/service/publikationen/lni/

Organization Committee of SICHERHEIT 2010

* Ammar Alkassar, Sirrix AG, Saarbrücken, Germany
* Ulrich Flegel, SAP Research, Karlsruhe, Germany
* Felix C. Freiling, University of Mannheim, Germany (committee chair)

Program Committee of SICHERHEIT 2010

Ammar Alkassar (Sirrix AG)
Frederik Armknecht (Universität Bochum)
Michael Backes (Universität des Saarlandes)
Thomas Beige (SuSE)
Fevzi Belli (Universität Paderborn)
Zinaida Benenson (Universität Mannheim)
Erik-Oliver Blaß (Institut EURECOM, France)
Rainer Böhme (ICSI, USA)
Wolfgang Böhmer (TU Darmstadt)
Jens Braband (Siemens)
Arslan Brömme (GI SIG BIOSIG)
Christoph Busch (Hochschule Darmstadt)
Jana Dittmann (Universität Magdeburg)
Falko Dressler (Universität Erlangen)
Thomas Dübendorfer (Google Switzerland GmbH, Switzerland)
Peter Ebinger (Fraunhofer IGD)
Klaus Echtle (Universität Duisburg-Essen)
Claudia Eckert (TU München)
Wolfgang Ehrenberger (Hochschule Fulda)
Bernhard Fechner (FernUniversität Hagen)
Hannes Federrath (Universität Regensburg)
Simone Fischer-Hübner (Karlstad University, Sweden)
Marc Fischlin (TU Darmstadt)
Ulrich Flegel (SAP Research)
Felix C. Freiling (Universität Mannheim, Chair)
Willi Geiselmann (Universität Karlsruhe)
Sabine Glesner (TU Berlin)
Dieter Gollmann (TU Hamburg-Harburg)
Christian Gorecki (Universität Mannheim)
Ulrich Greveler (FH Münster)
Rüdiger Grimm (Universität Koblenz)
Karl-Erwin Großpietsch (Fraunhofer AIS)
Bernhard Hämmerli (Hochschule Luzern, Switzerland)
Maritta Heisel (Universität Duisburg-Essen)
Eckehard Hermann (FH Hagenberg, Austria)
Florian Heß (TU Berlin)
Thorsten Holz (TU Wien, Austria)
Detlef Hühnlein (Secunet)
Dieter Hutter (DFKI)
Luigi Lo Iacono (NEC Labs Europe)
Jan Jürjens (TU Dortmund)
Jörg Kaiser (Universität Magdeburg)
Stefan Katzenbeisser (TU Darmstadt)
Jörg Keller (FernUniversität Hagen)
Dogan Kesdogan (Universität Siegen)
Matthias Krause (Universität Mannheim)
Ioannis Krontiris (Universität Mannheim)
Ulrich Kühn (DZ Bank AG)
Ralf Küsters (Universität Trier)
Hanno Langweg (eQ-3 Entwicklung GmbH)
Pavel Laskov (Universität Tübingen)
Kerstin Lemke-Rust (FH Bonn-Rhein-Sieg)
Stefan Lucks (Universität Weimar)
Erik Mähle (Universität Lübeck)
Heiko Mantel (TU Darmstadt)
Mark Manulis (TU Darmstadt)
Michael Meier (Universität Dortmund)
Ulrike Meyer (RWTH Aachen)
Martin Mink (TU Darmstadt)
Holger Morgenstern (Sachverständigenbüro Morgenstern)
Günter Müller (Universität Freiburg)
Isabel Münch (BSI)
Jens Nedon (ConSecur GmbH)
Edgar Nett (Universität Magdeburg)
Alexander Nouak (Fraunhofer IGD)
Michael Nüsken (Universität Bonn)
Rolf Oppliger (eSecurity, Schweiz)
Daniel Pähler (Universität Koblenz)
Günther Pernul (Universität Regensburg)
Andreas Pfitzmann (TU Dresden)
Norbert Pohlmann (FH Gelsenkirchen)
Joachim Posegga (Universität Passau)
Kai Rannenberg (Universität Frankfurt)
Rolf Reinema (Vodaphone)
Konrad Rieck (TU Berlin)
Heiko Roßnagel (Fraunhofer IAO)
Ahmad-Reza Sadeghi (Universität Bochum)
Francesca Saglietti (Universität Erlangen)
Dirk Schadt (SPOT Consulting)
Werner Schindler (BSI)
Sebastian Schmerl (Universität Cottbus)
Guido Schryen (RWTH Aachen)
Jörg Schwenk (Universität Bochum)
Jean-Pierre Seifert (TU Berlin und T-Labs)
Peter Sobe (Universität Lübeck)
Hans von Sommerfeld (Rohde und Schwarz)
Martin Steinebach (Fraunhofer SIT)
Werner Stephan (DFKI)
Helmut G. Stiegler (STI Consulting)
Bernhard Tellenbach (ETH Zürich, Switzerland)
Roland Vogt (DFKI)
Melanie Volkamer (TU Darmstadt)
Horst Wedde (Universität Dortmund)
Andreas Westfeld (HTW Dresden)
Carsten Willems (CWSE GmbH)
Bernhard C. Witt (it.sec GmbH)
Christopher Wolf (Universität Bochum)
Xuebing Zhou (Fraunhofer IGD)


Further Information

* ISSE/SICHERHEIT 2010 conference website (English):
http://isse.eu.com/

* SICHERHEIT 2010 conference website (German):
http://www.sicherheit2010.de/

* Conference organization and sponsoring opportunities:
http://isse.eu.com/contactus.htm

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
LAJC 2024   Latin-American Journal of Computing
CSW 2024   2024 3rd International Conference on Cyber Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
JoL 2024   International Journal of Law
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)