| |||||||||||||||
CRiSIS 2009 : International Conference on Risks and Security of Internet and SystemsConference Series : Conference on Risks and Security of Internet and Systems | |||||||||||||||
Link: http://www.crisis2009.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
==============================================
CRiSIS'2009 International Conference on Risks and Security of Internet and Systems IEEE technical co-sponsorship in cooperation with "ACM SIGSAC" Supported by SEE 19-22 October 2009 Toulouse - France ============================================== *** www.crisis2009.org *** The International Confernece on Risks and Security of Internet and Systems (CRiSIS'09) will be held on 19-22 October 2009, Toulouse - France. CRiSIS'09 is dedicated to security issues in Internet-related applications, networks and systems. The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to: -------------------------------------------------- * Access controls and security mechanisms * Analysis and management of risk, attacks and vulnerabilities * Attacks and defenses * Attack data acquisition (honeypots) and network monitoring * Authentication, authorization and audit * Cryptography, Biometrics, watermarking * Dependability and fault tolerance of Internet applications * Distributed systems security * Embedded system security * Firewalls and intrusion detection / prevention systems (IDS/IPS) * Formal methods, verification and certification * Hardware-based security * Key management Infrastructure (PKI) and trust management * Metrology, security evaluation, and security management * network security, security protocols, Security architectures * Organizational, ethical and legal issues * Physical security * Privacy protection, anonymization, PETs * Recovery * System security * Security and dependability of operating systems and network components * Security and safety of critical infrastructures * Security and privacy of peer-to-peer system * Security and privacy of embedded systems * Security and privacy of wireless networks * Security models and security policies * Security of new generation networks, security of VoIP and multimedia * Security of e-commerce, electronic voting and database systems * Traceability and forensics * Use of smartcards and personal devices for Internet applications * Viruses, worms and malicious codes * Web security, Web services and enterprise security. ********************* * Paper Submissions * ********************* Papers must be written in English and must be submitted electronically in PDF format. Maximum paper length will be 8 printed pages for full papers or 4 pages for short papers, in IEEE 2-column style . The authors of the best conference papers will be invited to submit an extended version to a special issue of the International Journal of Information and Computer Security (IJICS). ********************** * Call for Tutorials * ********************** We solicit tutorials on state-of-the-art technologies relevant to the conference themes. We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference. Each tutorial will be 4 hours long. The tutorial proposal should include a brief summary and outline, specific goals and objectives, the intended audience and the expected background of the audience as well as a biographical sketch of the presenter(s). The length of tutorial proposals should not exceed 5 pages. They should be submitted to the tutorial program chair: Nora Cuppens by email: nora(dot)cuppens(at)enst-bretagne(dot)fr before May 15, 2009. ******************* * Important Dates * ******************* * Submissions due : May 25, 2009 * Notification : July 1, 2009 * Camera-Ready due : September 1, 2009 * General chair --------------- Yves Deswarte (LAAS) * PC co-chairs -------------- Anas Abou El Kalam José M. Fernandez * Program Committee ------------------- Jocelyn Aubert, Centre de Recherche Henri Tudor, Luxembourg Rahma Ben Ayad, ENIT, Tunisia Elisa Bertino, Purdue University, USA Joachim Biskup, T.U. Dortmund, Germany Gilles Brassard, Université de Montréal, Canada Frédéric Cuppens, Telecom Bretagne, France Michel Cukier, University of Maryland, USA Merouane Debbah, Alcatel-Lucent –SupElec, France Geert Deconinck, Katholieke Universiteit Leuven, Belgium Theo Dimitrakos, Centre for Information and Security Systems Research, BT Innovate, UK Khalil Drira, LAAS–CNRS, France James P. Early, State University of New York at Oswego, USA Mahmoud El-Hadidi, Cairo University, Egypt Simone Fischer-Huebner, Karlstad University, Sweden Dimitris Gritzalis, Athens University of Economics & Business, Greece Noureddine Idboufker, ENSA, Morocco Lech J. Janczewski, University of Auckland, New Zealand Mohamed Jmaiel, Université de Sfax, Tunisia Zbigniew Kalbarczyk, University of Illinois, USA Corrado Leita, Symantec, France Javier Lopez, University of Málaga, Spain Fabio Massacci, Università di Trento, Italy Catherine Meadows, Naval Research Laboratory, USA Ludovic Mé, SupElec Rennes, France Fatma Mili, Oakland University, USA Mohamed Mosbah, LaBRI, France Raja Natarajan, Tata Institute of Fundamental Research, India Claudio Pastrone, ISMB, Italy Kai Rannenberg, Goethe Universität Frankfurt, Germany Peter Ryan, University of Newcastle, UK Mickael Rusinowitch, INRIA, France Pierangela Samarati, Universitá Degli Studi di Milano, Italy Damien Sauveron, Université de Limoges – CNRS, France Virendra Singh, Supercomputer Education and Research Centre, India Ethan Singleton, University of Tulsa, USA Paulo Vérissimo, Universitade de Lisboa, Portugal Vijay Varadharajan, Macquarie University, Australia Amit Vasudevan, CyLab/CMU, USA Jinpeng Wei, Georgia Institute of Technology, USA Belhassen Zouari, National Agency of Security, Tunisia Youssef Zaz, Université Ibn Zohr, Morocco ******************************************************** More information is available on the CRiSIS'09 web site (http://www.crisis2009.org). ******************************************************** |
|