posted by user: ka_ti_bo || 13833 views || tracked by 32 users: [display]

IFIP SEC 2010 : 25th IFIP International Information Security Conference Security & Privacy − Silver Linings in the Cloud

FacebookTwitterLinkedInGoogle

Link: http://www.wcc2010.com/SEC2010
 
When Sep 20, 2010 - Sep 23, 2010
Where Brisbane, Australia
Submission Deadline Feb 15, 2010
Notification Due Apr 23, 2010
Final Version Due May 15, 2010
Categories    security   privacy
 

Call For Papers

Call for papers

25th IFIP International Information Security Conference
Security & Privacy − Silver Linings in the Cloud

www.wcc2010.com/SEC2010


Conference Topics:

SEC-2010 is the 25th in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP World Congress celebrating both the Golden Jubilee of IFIP and the Silver Jubilee of SEC. Papers offering novel and mature research contributions, in any aspect of information security and privacy, are solicited for submission to the conference. Papers may present theory, applications, or practical experiences on topics including but not limited to: (Authors of the best submissions will be invited to submit updated and significantly extended versions of their papers into Computers & Security.)

Access Control
Anonymity
Applications of Cryptography
Attacks and Malicious Software
Authentication and Authorization
Biometrics and Applications
Critical ICT Resources Protection
Data and Systems Integrity
Data Protection
ECommerce Security
Enterprise Security
Identity Management
Information Hiding
Information Warfare
Internet and Web Security
Intrusion Detection
Mobile Computing Security
Mobile Networks Security
Network Security Protocols
Multilateral Security
Peer-to-Peer Security
Privacy Enhancing Technologies
RFID Security
Risk Analysis and Management
Secure Electronic Voting
Secure Sensor Networks
Secure Systems Development
Security Architectures
Security Economics
Security Education
Security Management
Security Metrics
Smart Cards
Software Security
Spam, SPIT, SPIM
Trust Management and Models
Trusted Computing
Ubiquitous Security


Programme Committee Chairs:

Kai Rannenberg, Goethe University Frankfurt, Germany
Vijay Varadharajan, Macquarie University, Australia

Publication Chair:

Christian Weber, Goethe University Frankfurt, Germany

Programme Committee Members:

A. Aldini, University of Urbino, Italy
C. J. Armstrong, Curtin University, Australia
V. Atluri, Rutgers University, USA
T. Aura, Microsoft Research, UK
R. L. Baskerville, Georgia State University, USA
J. Benaloh, Microsoft Research, USA
C. Benzmüller, International University, Germany
J. Biskup, T.U. Dortmund, Germany
R. Botha, NMMU, South Africa
L. Bussard, Microsoft EMIC, Germany
J. Camenisch, IBM Research, Switzerland
K. Cameron, Microsoft, USA
L. Chen, Hewlett-Packard Labs, UK
M. Christodorescu, IBM TJ Watson Research Center, USA
R. Clarke, Xamax Consultancy Pty Ltd, ANU and UNSW, Australia
C.J.F. Cremers, ETH Zurich, Switzerland
M. Crompton, Information Integrity Solutions and NICTA
N. Cuppens-Boulahia, TELECOM Bretagne, France
E. Dawson, QUT, Australia
S. De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
B. de Decker, K.U. Leuven, Belgium
M. de Soete, Security4Biz, Belgium
Y. Deswarte, LAAS-CNRS, France
G. Dhillon, Virginia Commonwealth University, USA
R. Dodge, U.S. Military Academy, USA
J. Eloff, University of Pretoria, South Africa
A. Escudero-Pascual, it46.se, Sweden
H. Federrath, University of Regensburg, Germany
S. Fischer, University of Lübeck, Germany
S. Fischer-Huebner, Karlstad University, Sweden
S. N Foley, University College Cork, Ireland
A. Fuchsberger, Microsoft Corp, USA
S. Furnell, University of Plymouth, UK
M. Gasson, University of Reading, UK
D. Gollmann, TU Hamburg-Harburg, Germany
R. Grimm, University of Koblenz, Germany
D. Gritzalis, Athens University of Economics & Business, Greece
M. Hansen, Independent Centre for Privacy Protection, Germany
M. Heisel, University Duisburg-Essen, Germany
U. Helmbrecht, ENISA, EU
A. Hevia, Universidad de Chile, Chile
M. Hoelbl, Maribor University, Slovenia
J.-H. Hoepman, TNO & Radboud University Nijmegen, the Netherlands
E. Humphreys, XISEC, UK
C. Irvine, Naval Postgraduate School, Monterey, USA
L. Janczewski, Univ. of Auckland, New Zealand
D.-O. Jaquet-Chiffelle, Bern Univ. of Applied Sciences, Switzerland
A. Jøsang, University of Oslo, Norway & QUT, Australia
M.C. Kang, ISO/IEC JTC 1/SC 27/WG 4
S. Katsikas, University of Piraeus, Greece
D. Kesdogan, University of Siegen, Germany
H. Kikuchi, Tokai University, Japan
V. Kisimov, University of World and National Economy, Sofia, Bulgaria
S. Knapskog, NTNU/Q2S, Norway
B. LaMacchia, Microsoft, USA
C. E. Landwehr, University of Maryland, USA
H. Leitold, Graz University, Austria
A. Levi, Sabanci University, Istanbul, Turkey
T. Levin, Naval Postgraduate School, Monterey, USA
J. Lopez, University of Malaga, Spain
V. Lotz, SAP Research, France
N. Luttenberger, Kiel University, Germany
M. Marhöfer, Nokia Siemens Networks, Germany
S. Marsh, Communications Research Centre, Canada
F. Martinelli, National Research Council, Italy
V. Matyas, Masaryk University Brno, Czech Republic
S. Mauw, Uni Luxembourg, Luxembourg
C. Maziero, PUCPR, Brazil
C. A. Meadows, Naval Research Laboratory, USA
M. Meints, Dataport, Germany
N. Miloslavskaya, The National Research Nuclear Institute MEPhI, Russia
C. Mitchell, Royal Holloway, University of London, UK
R. Molva, EURECOM, France
G. Mueller, Freiburg University, Germany
Y. Murayama, Iwate Prefectural University, Japan
M. Ohlin, FMV, Sweden
E. Okamoto, University of Tsukuba, Japan
R. Oppliger, eSECURITY Technologies, Switzerland
J. I. Pagter, Alexandra Instituttet, Denmark
C. Palmer, IBM Research; Dartmouth College, USA
A. Pasic, ATOS Origin, Spain
P. Peleties, USB BANK PLC, Cyprus
G. Pernul, University of Regensburg, Germany
G. L. Peterson, Air Force Institute of Technology, USA
M. Petkovic, Philips Research / Eindhoven University of Technology, Netherlands
A. Pfitzmann, Dresden University of Technology, Germany
U. Pinsdorf, Microsoft EMIC, Germany
H. Pohl, Univ. of Applied Sciences Bonn-Rhein-Sieg, Germany
M. Pollitt, University of Central Florida, USA
R. Posch, TU Graz, Austrian Federal Government
J. Posegga, University of Passau, Germany
B. Preneel, K.U. Leuven, Belgium
G. Price, Royal Holloway, University of London, UK
C. W Probst, Technical University of Denmark
S. Qing, Chinese Academy of Sciences, China
C. Rieder, Lucerne Univ. of Applied Sciences & Arts, Switzerland
M. Riguidel, ENST, France
P. Samarati, University of Milan, Italy
A. Sarma, NEC Laboratories Europe, Germany
R Sasaki, Dendai University, Japan
D. Sauveron, University of Limoges, France
I. Schaumüller-Bichl, Univ. of Applied Sciences Hagenberg, Austria
A. B. Seip, Kredittilsynet, Norway
S. Shenoi, University of Tulsa, USA
E. Snekkenes, Gjøvik University College, Norway
R. von Solms, NMMU, South Africa
H. von Sommerfeld, Rohde & Schwarz SIT, Germany
S. Steinbrecher, Dresden University of Technology, Germany
R. K Subramaniam, Valiant Technologies, India
S. Teufel, University of Fribourg, Switzerland
M. Ullmann, BSI & Univ. of AS Bonn-Rhein-Sieg, Germany
P.M. Barbosa Veiga, Universidade de Lisboa, Portugal
T. Virtanen, Finland
J. Vyskoc, VaF, Slovakia
G. Weck, INFODAS GmbH, Germany
N. Weiler, Sensaco, Switzerland
T. Welzer, University of Maribor, Slovenia
S. Wohlgemuth, National Institute of Informatics, Japan
S. Wolthusen, Royal Holloway, University of London, UK
J. Zhou, I2R, Singapore
A. Zugenmaier, DoCoMo Research, Germany


Submission of papers: January 31, 2010
Notification to authors: April 23, 2010
Camera-ready copies: May 15, 2010
Instructions for paper submission
Papers must not substantially overlap with papers that have been published or are simultaneously submitted to a journal or another conference with proceedings.
Papers must be written in English; they should be at most 12 pages in total, including bibliography and well-marked appendices. Papers should be intelligible without appendices, if any.
Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer.
Submitted and accepted papers must follow the publisher’s guidelines for the IFIP AICT Series (www.springer.com/series/6102, Author templates, Manuscript preparation in Word).
At least one author of each accepted paper must register for the conference and present the paper. Inclusion of the paper will be dependent upon one registration for the paper.
All papers must be submitted in electronic form through the web via www.wcc2010.com by January 15, 2010.

Related Resources

ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
IFIP SEC 2025   40th International Conference on ICT Systems Security and Privacy Protection
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)