posted by user: rjhawar || 5213 views || tracked by 7 users: [display]

ESTEL-SEC 2012 : ESTEL Security and Privacy Special Track

FacebookTwitterLinkedInGoogle

Link: http://estel-sec.dti.unimi.it/
 
When Oct 2, 2012 - Oct 5, 2012
Where Rome, Italy
Submission Deadline Jul 15, 2012
Notification Due Aug 27, 2012
Final Version Due Sep 5, 2012
Categories    security   privacy   space satellite   communication
 

Call For Papers

Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================

The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications. In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT. The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:

- Access Control
- Applied Cryptography for Space Applications
- Authentication
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Homeland Security
- Human Factors and Human Behaviour Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Organizational Security Policies
- Peer-to-Peer Security
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Satellite-based Disaster Recovery
- Satellite Network Security
- Secure Cloud Computing
- Secure Software Development Methodologies
- Security Protocols
- Security and Privacy in Mobile Systems
- Security and Privacy in Complex Systems
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Satellite Surveillance
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
- Security Information Systems Architecture and Design and Security Patterns
- Security in e-Healthcare
- Security Issues of Satellite Communications
- Security Management
- Security Metrics and Measurement
- Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust Management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security


SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 15, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.


IMPORTANT DATES
Paper submission due: July 15, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 27, 2012
Camera ready due: September 5, 2012


SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita' degli Studi di Milano, Italy


PROGRAM COMMITTEE
tba


This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
S&P 2025   The 45th IEEE Symposium on Security and Privacy
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
CSW 2024   2024 3rd International Conference on Cyber Security
ICAASE 2024   The 6th Edition of the International Conference on Advanced Aspectsof Software Engineering
No Hat 2024   No Hat - COMPUTER SECURITY CONFERENCE
PrivateNLP 2024   ACL 2024 Workshop on Privacy and Natural Language Processing