| |||||||||||||||
ISSE/SICHERHEIT 2010 : Information Security Solutions Europe - Sicherheit, Schutz und Zuverlässigkeit | |||||||||||||||
Link: http://www.sicherheit2010.de | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Berlin, 5.-7. Oktober 2010
organized by Gesellschaft für Informatik e.V. in cooperation with eema, TeleTrusT, ENISA http://isse.eu.com/ http://www.sicherheit2010.de *** Submission deadline: March 29, 2010 *** Call for Papers The fifth issue of the conference "Sicherheit, Schutz und Zuverlässigkeit" (SICHERHEIT) will take place in October 2010 in Berlin. SICHERHEIT is the German forum for experts from academia and industry to discuss both aspects of the German term "Sicherheit", meaning the combination of safety (protection from catastrophic events of technical systems) and security (protection of confidentiality and integrity of information in technical systems). In 2010, SICHERHEIT is co-located with the conference Information Security Solutions Europe (ISSE). The conference language is English and so SICHERHEIT also welcomes participants and submissions from non-German-speaking countries. SICHERHEIT is organized by Gesellschaft für Informatik e.V, the German non-profit organization of computing professionals with around 25.000 members. ISSE/SICHERHEIT is jointly organized by Gesellschaft für Informatik e.V., eema, TeleTrusT and ENISA . Topics of Interest The organizers seek submissions from the broad range of safety and security, for example on the following topics: * biometrics, privacy, data protection * e-commerce, e-government * certification of safe and secure systems * cryptography, digital signatures, steganography * development and maintenance of safe and secure systems * formal methods for safe and secure systems * management of safe and secure systems, management of information security * network security * reactive security ("Reaktive Sicherheit") * reliability and availability Rules of Submission The language of the conference and all conference presentations is English. Papers can be submittin in both German and English. Three types of papers can be submitted to the conference: * Academic papers describing novel research results. Papers will be reviewed by the program committee. Accepted papers will be published in the conference proceedings. The proceedings will appear in the series Lecture Notes in Informatics (LNI) published by Gesellschaft für Informatik. Submissions should not entirely overlap with already published papers or papers concurrently submitted to other conferences or workshops. Papers should have at most 12 pages and should be formatted according to the LNI style. Submission is performed in pdf format through the conference management system at http://www.sicherheit2010.de. Prerequisite for publication is the registration of at least one author to the conference and the presentation of the paper at the conference. * Special Sessions are organized by Special Interest Groups within Gesellschaft für Informatik and are reviewed mainly by members of those Special Interest Groups that are also members of the program committee of SICHERHEIT. Apart from that, submissions to Special Sessions are treated just like academic papers (see above). Authors of submissions to special sessions should indicate the particular special session during submission. For the list of Special Sessions see http://www.sicherheit2010.de SICHERHEIT 2010 will feature the following special sessions: * Biometrics and digital signatures (Special Interest Group BIOSIG) * Dependability and fault-tolerance (Special Interest Group FERS) * Multimedia security (Special Interest Group STEWA) * Reactive security: Detection and management of security incidents (Special Interest Group SIDAR) * Theory and practice of cryptography (Special Interest Group KRYPTO) * Submissions to Workshops as part of SICHERHEIT 2010: Workshops are organized by Special Interest Groups within Gesellschaft für Informatik. Submitted papers are reviewed by separate program committees. Accepted papers are not published in the proceedings of SICHERHEIT. SICHERHEIT 2010 will feature one workshop: * Services Security (Special Interest Group NETSEC), see http://clawslab.nds.rub.de/WS210/ Industrial Papers For papers from industry please see the Call for Papers of ISSE 2010 available at http://isse.eu.com. The program committee of SICHERHEIT may forward submissions to ISSE after asking the authors for permission. Important Dates March 29, 2010 Electronic submission of academic papers and submissions to special sessions May 19, 2010 Notification of acceptance via email June 16, 2010 Electronic submission of camera ready copy October 5.-7., 2010 ISSE/SICHERHEIT 2010 in Berlin Further Submission Information Latest information on the submission process can be found at http://www.sicherheit2010.de The formatting instructions for LNI can be found at http://www.gi-ev.de/service/publikationen/lni/ Organization Committee of SICHERHEIT 2010 * Ammar Alkassar, Sirrix AG, Saarbrücken, Germany * Ulrich Flegel, SAP Research, Karlsruhe, Germany * Felix C. Freiling, University of Mannheim, Germany (committee chair) Program Committee of SICHERHEIT 2010 Ammar Alkassar (Sirrix AG) Frederik Armknecht (Universität Bochum) Michael Backes (Universität des Saarlandes) Thomas Beige (SuSE) Fevzi Belli (Universität Paderborn) Zinaida Benenson (Universität Mannheim) Erik-Oliver Blaß (Institut EURECOM, France) Rainer Böhme (ICSI, USA) Wolfgang Böhmer (TU Darmstadt) Jens Braband (Siemens) Arslan Brömme (GI SIG BIOSIG) Christoph Busch (Hochschule Darmstadt) Jana Dittmann (Universität Magdeburg) Falko Dressler (Universität Erlangen) Thomas Dübendorfer (Google Switzerland GmbH, Switzerland) Peter Ebinger (Fraunhofer IGD) Klaus Echtle (Universität Duisburg-Essen) Claudia Eckert (TU München) Wolfgang Ehrenberger (Hochschule Fulda) Bernhard Fechner (FernUniversität Hagen) Hannes Federrath (Universität Regensburg) Simone Fischer-Hübner (Karlstad University, Sweden) Marc Fischlin (TU Darmstadt) Ulrich Flegel (SAP Research) Felix C. Freiling (Universität Mannheim, Chair) Willi Geiselmann (Universität Karlsruhe) Sabine Glesner (TU Berlin) Dieter Gollmann (TU Hamburg-Harburg) Christian Gorecki (Universität Mannheim) Ulrich Greveler (FH Münster) Rüdiger Grimm (Universität Koblenz) Karl-Erwin Großpietsch (Fraunhofer AIS) Bernhard Hämmerli (Hochschule Luzern, Switzerland) Maritta Heisel (Universität Duisburg-Essen) Eckehard Hermann (FH Hagenberg, Austria) Florian Heß (TU Berlin) Thorsten Holz (TU Wien, Austria) Detlef Hühnlein (Secunet) Dieter Hutter (DFKI) Luigi Lo Iacono (NEC Labs Europe) Jan Jürjens (TU Dortmund) Jörg Kaiser (Universität Magdeburg) Stefan Katzenbeisser (TU Darmstadt) Jörg Keller (FernUniversität Hagen) Dogan Kesdogan (Universität Siegen) Matthias Krause (Universität Mannheim) Ioannis Krontiris (Universität Mannheim) Ulrich Kühn (DZ Bank AG) Ralf Küsters (Universität Trier) Hanno Langweg (eQ-3 Entwicklung GmbH) Pavel Laskov (Universität Tübingen) Kerstin Lemke-Rust (FH Bonn-Rhein-Sieg) Stefan Lucks (Universität Weimar) Erik Mähle (Universität Lübeck) Heiko Mantel (TU Darmstadt) Mark Manulis (TU Darmstadt) Michael Meier (Universität Dortmund) Ulrike Meyer (RWTH Aachen) Martin Mink (TU Darmstadt) Holger Morgenstern (Sachverständigenbüro Morgenstern) Günter Müller (Universität Freiburg) Isabel Münch (BSI) Jens Nedon (ConSecur GmbH) Edgar Nett (Universität Magdeburg) Alexander Nouak (Fraunhofer IGD) Michael Nüsken (Universität Bonn) Rolf Oppliger (eSecurity, Schweiz) Daniel Pähler (Universität Koblenz) Günther Pernul (Universität Regensburg) Andreas Pfitzmann (TU Dresden) Norbert Pohlmann (FH Gelsenkirchen) Joachim Posegga (Universität Passau) Kai Rannenberg (Universität Frankfurt) Rolf Reinema (Vodaphone) Konrad Rieck (TU Berlin) Heiko Roßnagel (Fraunhofer IAO) Ahmad-Reza Sadeghi (Universität Bochum) Francesca Saglietti (Universität Erlangen) Dirk Schadt (SPOT Consulting) Werner Schindler (BSI) Sebastian Schmerl (Universität Cottbus) Guido Schryen (RWTH Aachen) Jörg Schwenk (Universität Bochum) Jean-Pierre Seifert (TU Berlin und T-Labs) Peter Sobe (Universität Lübeck) Hans von Sommerfeld (Rohde und Schwarz) Martin Steinebach (Fraunhofer SIT) Werner Stephan (DFKI) Helmut G. Stiegler (STI Consulting) Bernhard Tellenbach (ETH Zürich, Switzerland) Roland Vogt (DFKI) Melanie Volkamer (TU Darmstadt) Horst Wedde (Universität Dortmund) Andreas Westfeld (HTW Dresden) Carsten Willems (CWSE GmbH) Bernhard C. Witt (it.sec GmbH) Christopher Wolf (Universität Bochum) Xuebing Zhou (Fraunhofer IGD) Further Information * ISSE/SICHERHEIT 2010 conference website (English): http://isse.eu.com/ * SICHERHEIT 2010 conference website (German): http://www.sicherheit2010.de/ * Conference organization and sponsoring opportunities: http://isse.eu.com/contactus.htm |
|