posted by user: bhafsa || 4362 views || tracked by 5 users: [display]

JNS 2014 : 4th National Security Days

FacebookTwitterLinkedInGoogle

Link: http://www.uae.ma/jns4/call.html
 
When May 12, 2014 - May 13, 2014
Where Tetuan-Morocco
Submission Deadline Mar 10, 2014
Notification Due Apr 10, 2014
Final Version Due Apr 20, 2014
Categories    network security   information security   systems security   cryptology
 

Call For Papers

We have the real pleasure to invite you to submit a paper to the 4th National Security Days (Journées Nationales de la Sécurité : JNS) which is taking place in Tetuan-Morocco, in May 12-13, 2014.

We are planning that all accepted papers will be included in the conference proceedings. English versions of accepted and presented papers will be submitted to IEEE for potential publication in the IEEE Xplore. IEEE reserves the right to not publish any proceedings not meeting its quality standards.

JNS4 is organized with the objective to bring together researchers and practitioners working on the information systems security field. A wide range of topics is covered by JNS, ranging from security management to security policies formalization, while integrating trust management systems, network security solutions, crypto-systems, together with newer topics such as security issues in cloud computing, collaborative systems, mobile applications, critical infrastructures, etc.

TOPICS:
Security Policies Formalization & Security and Trust Management
- Security Policies, Formal methods & verification,
- Digital Identity,
- Access Control Models,
- Trust management systems, Public-Key Infrastructures (PKI), Reputation systems
- Risk Analysis, threats and vulnerabilities
- Metrology, measurement of security
- Privacy Protection
- Organizational, juridical and ethical Aspects of Security
- Information Systems Security and Governance, …

Network and Application Security
- Security of e-commerce, e-government, e-health,…
- Web Applications Security
- Intrusion Detection, Honeypots, Malware prevention
- Embedded Systems Security, smartcards security,...
- Authentication and biometric Access Control
- Wired, Mobile and Next Generation Networks Security,…
Cloud Computing and Collaborative Systems Security
- Cloud Computing Security
- Virtualization and Security
- Web Services, midellewares and Security
- Peer to Peer and distributed systems Security
- Social Networks Security and Privacy
- Workflow and Collaborative Systems Security, …

Cryptology, Watermarking & Steganography
- Steganography, Watermarking
- Secret-key & public-key Cryptography (Encryption, Hash functions, electronic signatures, ...)
- Elliptic Curve Cryptography
- Quantum Cryptography
- Cryptanalysis, security proofs
- Cryptographic Protocols
- etc.

This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged.
Submissions from both industry and institutional circles will be considered with particular interest.

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
NECO 2025   14th International Conference of Networks and Communications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-AIEA 2025   2025 6th International Conference on Artificial Intelligence and Electromechanical Automation-IEEE Xplore/EI/Scopus
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
NCWC 2025   11th International Conference of Networks, Communications, Wireless and Mobile Computing
Cine Bárbaras 2025   Last Days for Submission – Call for Papers | I Cine Bárbaras – International Conference on Cinema and Audiovisual
FCS 2025   The Eighth International Conference on Frontiers in Cyber Security (FCS 2025)
CSP--EI 2026   2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
SecITC 2025   The 18th International Conference on Security for Information Technology and Communications