![]() |
| |||||||||||||||
CRISIS 2010 : 5th International Conference on Risks ans Security of Internet and SystemsConference Series : Conference on Risks and Security of Internet and Systems | |||||||||||||||
Link: http://www.crisis2010.org/index.htm | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
5th International Conference on Risks ans Security of Internet and Systems
Montreal Quebec Canada October 10-13 2010 http://www.crisis2010.org/index.htm IMPORTANT DATES Submission deadline : April 26, 2010 Notification to Authors : June 26, 2010 Camera-Ready Due : September 1, 2010 SCOPE The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, elearning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to: * Analysis and management of risk * Attacks and defences * Attack data acquisition (honeypots) and network monitoring * Cryptography, Biometrics, Watermarking * Dependability and fault tolerance of Internet applications * Distributed systems security * Embedded system security * Intrusion detection and Prevention systems * Hardware-based security and Physical security * Key management Infrastructure (PKI) and trust management * Organizational, ethical and legal issues * Privacy protection, anonymization, PETs * Security and dependability of operating systems * Security and safety of critical infrastructures * Security and privacy of peer-to-peer system * Security and privacy of wireless networks * Security models and security policies * Security of new generation networks, security of VoIP and multimedia * Security of e-commerce, electronic voting and database systems * Traceability, metrology and forensics * Use of smartcards and personal devices for Internet applications * Web security |
|