posted by system || 5238 views || tracked by 12 users: [display]

ESORICS 2009 : 14th European Symposium on Research in Computer Security

FacebookTwitterLinkedInGoogle


Conference Series : European Symposium on Research in Computer Security
 
Link: http://www.esorics.org
 
When Sep 21, 2009 - Sep 25, 2009
Where Saint Malo, France
Submission Deadline Apr 17, 2009
Notification Due Jun 8, 2009
Final Version Due Jun 29, 2009
Categories    security
 

Call For Papers

***********************************************************************
14th European Symposium on Research in Computer Security (ESORICS 2009)
September 21-25, 2009, Saint Malo, France
http://www.esorics.org
***********************************************************************

Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Fourteenth European
Symposium on Research in Computer Security (ESORICS 2009). Organized in
a series of European countries, ESORICS is confirmed as the leading
European research event in computer security. The symposium started in
1990 and has been held on alternate years in different European
countries and attracts an international audience from both the academic
and industrial communities. From 2002 it has been held yearly. The
Symposium has established itself as one of the premiere, international
gatherings on Information Assurance.

Papers may present theory, technique, applications, or practical
experience on topics including, but not limited to:

- access control
- anonymity
- authentication
- authorization and delegation
- cryptographic protocols
- data integrity
- dependability
- information flow control
- smartcards
- systems security
- digital right management
- accountability
- applied cryptography
- covert channels
- cybercrime
- denial of service attacks
- formal methods in security
- inference control
- information warfare
- steganography
- transaction management
- data and application security
- intellectual property protection
- intrusion tolerance
- peer-to-peer security
- language-based security
- network security
- non-interference
- privacy-enhancing technology
- pseudonymity
- subliminal channels
- trustworthy user devices
- identity management
- security as quality of service
- secure electronic commerce
- security administration
- security evaluation
- security management
- security models
- security requirements engineering
- security verification
- survivability
- information dissemination control
- trust models and trust management policies

The primary focus is on high-quality original unpublished research, case
studies and implementation experiences. We encourage submissions of
papers discussing industrial research and development. Proceedings will
be published by Springer-Verlag in the Lecture Notes in Computer Science
(LNCS) series.

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 15 pages excluding
the bibliography and well-marked appendices (using 11-point font and
reasonable margins), and at most 20 pages total. Committee members are
not required to read the appendices, and so the paper should be
intelligible without them. Papers must be submitted using the conference
web site and following the requirements stated there. Authors of
accepted papers must be prepared to sign a copyright statement and must
guarantee that their paper will be presented at the conference.
Additionally, they must follow the Springer Information for Authors?
guidelines for the preparation of the manuscript and use the templates
provided there.

IMPORTANT DATES
- Paper submissions due: April 17, 2009
- Acceptance notifications: June 8, 2009
- Camera-ready papers due: June 29, 2009


COMMITTEES

GENERAL CHAIRS
- Fr?d?ric Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France

PROGRAM COMMITTEES CHAIRS
- Michael Backes, Saarland University and MPI-SWS, Germany
- Peng Ning, North Carolina State University, USA

PROGRAM COMMITTEE
- Mike Atallah, Purdue University, USA
- Michael Backes, Saarland University and MPI-SWS, Germany (co-chair)
- David Basin, ETH Zurich, Switzerland
- Nikita Borisov, University of Illinois at Urbana-Champaign, USA
- Srdjan Capkun, ETH Zurich, Switzerland
- Marc Dacier, EURECOM, France
- Anupam Datta, Carnegie Mellon University, USA
- Herve Debar, France TELECOM R&D, France
- Roger Dingledine, The Freehaven Project, USA
- Wenliang Du, Syracuse University, USA
- C?dric Fournet, Microsoft Research Cambridge, UK
- Virgil Gligor, Carnegie Mellon University, USA
- Carl A. Gunter, University of Illinois at Urbana-Champaign, USA
- Dieter Gollmann, Hamburg University of Technology, Germany
- Sushil Jajodia, George Mason University, USA
- Xuxian Jiang, North Carolina State University, USA
- Peeter Laud, University of Tartu, Estonia
- Wenke Lee, Georgia Institute of Technology, USA
- Donggang Liu, University of Texas at Arlington, USA
- Michael Locasto, George Mason University, USA
- Matteo Maffei, Saarland University, Germany
- Heiko Mantel, University of Darmstadt, Germany
- Catherine Meadows, Naval Research Laboratory, USA
- John Mitchell, Stanford University, USA
- Peng Ning, North Carolina State University, USA (co-chair)
- Alina Oprea, RSA, USA
- Radia Perlman, Sun Microsystems, USA
- Adrian Perrig, Carnegie Mellon University, USA
- Mark Ryan, University of Birmingham, UK
- Pierangela Samarati, Universita degli Studi di Milano, Italy
- Vitaly Shmatikov, University of Texas at Austin, USA
- Wade Trappe, Rutgers University, USA
- Patrick Traynor, Georgia Institute of Technology, USA
- Dominique Unruh, Saarland University, Germany
- Dan S. Wallach, Rice University, USA
- Andreas Wespi, North Carolina State University, USA
- Ting Yu, IBM Research, Switzerland
- Yanyong Zhang, Rutgers University, USA

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ESORICS 2024   European Symposium on Research in Computer Security
AGRIJ 2024   Agricultural Science: An International journal
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing