| |||||||||||||||
ESORICS 2009 : 14th European Symposium on Research in Computer SecurityConference Series : European Symposium on Research in Computer Security | |||||||||||||||
Link: http://www.esorics.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
***********************************************************************
14th European Symposium on Research in Computer Security (ESORICS 2009) September 21-25, 2009, Saint Malo, France http://www.esorics.org *********************************************************************** Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Fourteenth European Symposium on Research in Computer Security (ESORICS 2009). Organized in a series of European countries, ESORICS is confirmed as the leading European research event in computer security. The symposium started in 1990 and has been held on alternate years in different European countries and attracts an international audience from both the academic and industrial communities. From 2002 it has been held yearly. The Symposium has established itself as one of the premiere, international gatherings on Information Assurance. Papers may present theory, technique, applications, or practical experience on topics including, but not limited to: - access control - anonymity - authentication - authorization and delegation - cryptographic protocols - data integrity - dependability - information flow control - smartcards - systems security - digital right management - accountability - applied cryptography - covert channels - cybercrime - denial of service attacks - formal methods in security - inference control - information warfare - steganography - transaction management - data and application security - intellectual property protection - intrusion tolerance - peer-to-peer security - language-based security - network security - non-interference - privacy-enhancing technology - pseudonymity - subliminal channels - trustworthy user devices - identity management - security as quality of service - secure electronic commerce - security administration - security evaluation - security management - security models - security requirements engineering - security verification - survivability - information dissemination control - trust models and trust management policies The primary focus is on high-quality original unpublished research, case studies and implementation experiences. We encourage submissions of papers discussing industrial research and development. Proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science (LNCS) series. PAPER SUBMISSIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using 11-point font and reasonable margins), and at most 20 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Papers must be submitted using the conference web site and following the requirements stated there. Authors of accepted papers must be prepared to sign a copyright statement and must guarantee that their paper will be presented at the conference. Additionally, they must follow the Springer Information for Authors? guidelines for the preparation of the manuscript and use the templates provided there. IMPORTANT DATES - Paper submissions due: April 17, 2009 - Acceptance notifications: June 8, 2009 - Camera-ready papers due: June 29, 2009 COMMITTEES GENERAL CHAIRS - Fr?d?ric Cuppens, TELECOM Bretagne, France - Nora Cuppens-Boulahia, TELECOM Bretagne, France PROGRAM COMMITTEES CHAIRS - Michael Backes, Saarland University and MPI-SWS, Germany - Peng Ning, North Carolina State University, USA PROGRAM COMMITTEE - Mike Atallah, Purdue University, USA - Michael Backes, Saarland University and MPI-SWS, Germany (co-chair) - David Basin, ETH Zurich, Switzerland - Nikita Borisov, University of Illinois at Urbana-Champaign, USA - Srdjan Capkun, ETH Zurich, Switzerland - Marc Dacier, EURECOM, France - Anupam Datta, Carnegie Mellon University, USA - Herve Debar, France TELECOM R&D, France - Roger Dingledine, The Freehaven Project, USA - Wenliang Du, Syracuse University, USA - C?dric Fournet, Microsoft Research Cambridge, UK - Virgil Gligor, Carnegie Mellon University, USA - Carl A. Gunter, University of Illinois at Urbana-Champaign, USA - Dieter Gollmann, Hamburg University of Technology, Germany - Sushil Jajodia, George Mason University, USA - Xuxian Jiang, North Carolina State University, USA - Peeter Laud, University of Tartu, Estonia - Wenke Lee, Georgia Institute of Technology, USA - Donggang Liu, University of Texas at Arlington, USA - Michael Locasto, George Mason University, USA - Matteo Maffei, Saarland University, Germany - Heiko Mantel, University of Darmstadt, Germany - Catherine Meadows, Naval Research Laboratory, USA - John Mitchell, Stanford University, USA - Peng Ning, North Carolina State University, USA (co-chair) - Alina Oprea, RSA, USA - Radia Perlman, Sun Microsystems, USA - Adrian Perrig, Carnegie Mellon University, USA - Mark Ryan, University of Birmingham, UK - Pierangela Samarati, Universita degli Studi di Milano, Italy - Vitaly Shmatikov, University of Texas at Austin, USA - Wade Trappe, Rutgers University, USA - Patrick Traynor, Georgia Institute of Technology, USA - Dominique Unruh, Saarland University, Germany - Dan S. Wallach, Rice University, USA - Andreas Wespi, North Carolina State University, USA - Ting Yu, IBM Research, Switzerland - Yanyong Zhang, Rutgers University, USA |
|