| |||||||||||||||
SePTIS 2008 : Security and Privacy in Telecommunications and Information Systems | |||||||||||||||
Link: http://septis.istase.fr | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
SITIS'08 Workshop on
Security and Privacy in Telecommunications & Information Systems ___________ in conjunction with The 4th International IEEE Conference on SIGNAL-IMAGE TECHNOLOGY & INTERNET- BASED SYSTEMS (SITIS'08) Sponsored by the IEEE and in Cooperation with ACM SIGAPP November 30th - December 3rd, 2008 Bali Dynasty Resort Bali, Indonesia The security of digital exchanges and its counterpart, the management of digital identities, is the main issue concerning the concept of global security applied to the world of information systems. Moreover, the advent of web technologies modify every day our vision of information systems security. The SePTIS workshop main topics encompass research advances around digital identities and secure exchanges between information systems, and focuses on web technologies. *** The main topics of SePTIS include, but are not limited to, the following - Security with Web Technologies & Web Services Security - Security Models, Architectures and Protocols - Formal Methods for Web Applications - E-Commerce and E-Government Security - Identity Management and New Ideas & Paradigms for the Security of Digital Identities - Authentication - Authorization and Access Control - Security, Anonymity & User Privacy - Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs - Information System Paradigms - Trust Negotiation, Establishment and Management - Intrusion Avoidance, Detection, Response and Prevention - Security Management and Strategy - Digital Rights Management and Intellectual Property Protection *** Submission and publication SePTIS seeks high-quality research contributions in the form of original and well-developed full papers on the topics described below. All submitted papers will be peer-reviewed by at least two reviewers for technical merit, originality, significance and relevance to track topics. Papers must be up to 8 pages and follow IEEE double columns publication format according to the genreal guidelines of the SITIS conference. Accepted papers will be included in the conference proceedings and published by the IEEE Computer Society and referenced in IEEE Xplore and major indexes. The proceedings will be mailed by the IEEE CS press directly to registered authors after the conference. CD copies of the proceeding will be available during the conference. Selected accepted papers will be considered for publication in major journal. Paper proposals should be submitted to jacques.fayolle@univ-st-etienne.fr and mikael.ates@univ-st-etienne.fr. Acceptable file formats are: Postscript and PDF. Hard copy submissions are not permitted. More information on http://septis.istase.com. *** Important Dates Paper Submission: August 22nd, 2008 Notification of Acceptance: September 12th, 2008 Camera Ready: October 3rd, 2008 Author Registration Due Date: October 10th, 2008 Conference Dates: November 30th - December 3rd, 2008 *** Program Committee Christophe Gravier, ISTASE - University of Saint-Etienne, France Djamal Benslimane, Claude Bernard Lyon 1 University, France Gongliang Chen, Shanghai Jiaotong University, China Jacques Fayolle, ISTASE - University of Saint-Etienne, France Jeremy Lardon, ISTASE - University of Saint-Etienne, France Lee Byung-Gil, ETRI - Information Security Research Division, Korea Li Xiang, Shanghai Jiaotong University, China Lionel Brunie, INSA - University of Lyon 1, France Philippe Jaillon, ENSM - Ecole Nationale Superieure des Mines de Saint-Etienne, France Richard Chbeir, University of Bourgogne, France Yinghua Ma, Shanghai Jiaotong University, China *** SePTIS Worhshop Organizer Jacques Fayolle, ISTASE - University of Saint-Etienne, France (jacques.fayolle@univ-st-etienne.fr) Mikael Ates, ISTASE - University of Saint-Etienne, France (mikael.ates@univ-st-etienne.fr) |
|