posted by user: jgalfaro || 21273 views || tracked by 29 users: [display]

DBSEC 2012 : 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Database Security
 
Link: http://conferences.telecom-bretagne.eu/dbsec2012/
 
When Jul 11, 2012 - Jul 13, 2012
Where Paris (France)
Submission Deadline Feb 26, 2012
Notification Due Apr 18, 2012
Final Version Due May 2, 2012
Categories    security   cryptography   access control   privacy
 

Call For Papers

Call For Papers DBSEC 2012

26th Annual WG 11.3 Conference on
Data and Applications Security and Privacy
DBSEC 2012
Paris, France, July 11-13, 2012

http://conferences.telecom-bretagne.eu/dbsec2012/


The 26th Annual WG 11.3 Conference on Data and Applications Security
and Privacy provides a forum for presenting original unpublished
research re-sults, practical experiences, and innovative ideas in data
and applications security and privacy. Both research papers and panel
proposals are solicited. Proceedings will be published by Springer as
the next volume in the Research Advances in Database and Information
Systems Security series (http://www.springeronline.com/lncs).

Papers may present theory, techniques, applications, or practical
experience on topics of relevance to IFIP WG 11.3:

- Access control
- Applied cryptography in data security and privacy
- Identity theft and countermeasures
- Integrity maintenance
- Intrusion detection
- Knowledge discovery and privacy
- Logics for security and privacy
- Organizational security
- Privacy-preserving data management
- Secure transaction processing
- Secure information integration
- Secure semantic web
- Secure sensor monitoring
- Secure web services
- Risk management
- Traceability and accountability
- Trust management

Additional topics of interest include (but are not limited to):
Critical Infrastructure Protection, Cyber Terrorism, Information
Warfare, Database Forensics, Electronic Commerce Security, and
Security in Digital Health Care.


* Submissions Guidelines:

Authors are invited to submit their contributions electronically to
the conference submission web site at
http://www.easychair.org/conferences/?conf=dbsec2012. Submission must
be in the form of a PDF file. Manuscripts must be in English, typed in
11-point font (minimum), and must not be more than 16 pages long.
Manuscripts must have a cover page with title, names and addresses
(including e-mail address) of authors, an abstract, and a set of
keywords. At least one author of each accepted paper is required to
register with the conference and present the paper. Accepted papers
will be published in the conference proceedings. The final copy of a
paper for the proceedings must use LaTeX, and must be laid out
according to the Camera Ready Copy format required by Springer. A
submitted paper must not be under review for inclusion in any other
conference or journal, and must be substantially different from
previously published work. Duplicate submissions will be automatically
rejected and without review.

* Award for the best student paper:

This award will be chosen by the program committee. The student must
be the first author to be eligible.

* Panel Proposals:

Proposals for panels should be e-mailed to the PC chair
(dbsec2012@easychair.org). Proposals should include a one-page
description of the subject matter, the name and address (including
e-mail address) of the organizer, and a list of proposed panelists.

* Important Dates:

- Paper submission due: February 13, 2012
- Notification to authors: April 8, 2012
- Camera ready due: May 2, 2012


* Committees:

General Chair

- David Sadek, Institut TELECOM, France

PC Chairs

- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France

IFIP WG 11.3 Chair

- Vijay Atluri, Rutgers University, USA

Publication and Publicity Chair

- Joaquin Garcia-Alfaro, TELECOM Bretagne, France

Local Arrangement

- Ghislaine Le Gall, TELECOM Bretagne, France

Web Chair

- Said Oulmakhzoune, TELECOM Bretagne, France

Program Committee

- Kamel Adi, Universite du Quebec en Outaouais, Canada
- Gail-Joon Ahn, Arizona State University, USA
- Claudio A. Ardagna, Universita degli Studi di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- Steve Barker, King's College London, UK
- Joachim Biskup, Technische Universitat Dortmund, Germany
- Marina Blanton, University of Notre Dame, USA
- David Chadwick, University of Kent, UK
- Jason Crampton, Royal Holloway, UK
- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France
- Mourad Debbabi, Concordia University, Canada
- Sabrina De Capitani, Universita degli Studi di Milano, Italy
- Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
- Eduardo B. Fernandez, Florida Atlantic University, USA
- Simone Fischer-Hubner, Karlstad University, Sweden
- Simon Foley, University College Cork, Ireland
- Sara Foresti, Universit‡ degli Studi di Milano, Italy
- Alban Gabillon, University of French Polynesia, France
- Ehud Gudes, Ben-Gurion University, Israel
- Ragib Hasan, University of Alabama at Birmingham, USA
- Sushil Jajodia, George Mason University, USA
- Sokratis Katsikas, University of Piraeus, Greece
- Adam J. Lee, University of Pittsburgh, USA
- Yingjiu Li, Singapore Management University
- Peng Liu, Pennsylvania State University, USA
- Jorge Lobo, IBM Research T.J. Watson, USA
- Javier Lopez, University of Malaga, Spain
- Emil Lupu, Imperial College London, UK
- Martin Olivier, University of Pretoria, South Africa
- Stefano Paraboschi, Universita di Bergamo, Italy
- Wolter Pieters, University of Twente, Netherlands
- Indrajit Ray, Colorado State University, USA
- Indrakshi Ray, Colorado State University, USA
- Kui Ren, Illinois Institute of Technology, USA
- Mark Ryan, University of Birmingham, UK
- Kouchi Sakurai, Kyushu University, Japan
- Pierangela Samarati, Universita degli Studi di Milano, Italy
- Anoop Singhal, NIST, USA
- Traian Marius Truta, Northern Kentucky University, USA
- Leon van der Torre, University of Luxemburg, Luxemburg
- Vijay Varadharajan, Macquarie University, Australia
- Jaideep Vaidya, Rutgers University, USA
- Lingyu Wang, Concordia University, Canada
- Meng Yu, Virginia Commonwealth University, USA
- Xinwen Zhang, Samsung Information Systems, USA
- Jianying Zhou, Institute for Infocomm Research, Singapore
- Zutao Zhu, Google Inc., USA

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
ACDSA 2025   2nd International Conference on Artificial Intelligence, Computer, Data Sciences and Applications
IJCSITY 2024   International Journal of Computational Science and Information Technology
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICITA 2025   19th International Conference on Information Technology and Applications
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IARIA Congress 2025   The 2025 IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications