| |||||||||||||||||
N2S 2009 : IFIP International Conference on Network and Service Security | |||||||||||||||||
Link: http://www.n2s-conf.org/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Due to numerous requests from authors, the submission deadline of IFIP N2S
2009 has been extended to March 1st, 2009. ------------------------------------------------------------------- CALL FOR PAPERS IFIP International Conference on Network and Service Security June 24 - 26, 2009 - Paris - France http://www.n2s-conf.org/ ------------------------------------------------------------------- N2S'2009 is the First International Conference on Network and Service Security that will be held from 24 to 26 June, 2009 in Paris, France. N2S'2009 conference is technically sponsored by IFIP TC6 WG and IEEE Section France. The proliferation of heterogeneous and distributed computer networks and the advanced deployment of pervasive applications have led to an urgent need for constructing reliable and efficient approaches where both applications and networking security issues are addressed jointly. The N2S International Conference will address all the security aspects of design, implementation, deployment, architectures and modelling of heterogeneous wired and wireless computer networks, of the virtualization technology, as well as of the pervasive computer applications. It will also provide dynamic forums for researchers, students and professionals to present their research results and development in these areas and will offer the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to information and system security. Original papers are invited in the area of computer and network security. Papers must represent high-quality and previously unpublished work. The research sessions will include presentations of latest research projects, papers, posters, tutorials, panels, demos, industrial track and exhibitions around, but not limited to, the following topics: - Authentication protocols and services authorization - Data and system integrity and confidentiality - Availability of secure services - Key Distribution and management, PKI and security management - Trust models and Trust establishment - Identity management, authentication and access control - Deployment and management of computer/network security policies - Monitoring Design for security, Traffic filtering and firewalling - Distributed Intrusion Detection Systems & Countermeasures - Single and multi-source intrusion detection and response - IPv6 security, IPSec, Virtual Private Networks (VPNs) - Privacy, contract agreements, and payment systems - XML, Query Processing & Optimization, Storage Structures & Indexing - Quantum Cryptography and QKD - Applications of Cryptography & Cryptanalysis in communications security - Cryptographic Hardware and Embedded Systems. - Component based software engineering - Software verification & analysis - Agents and Middleware, Agent Computing and Agent Applications - Distributed Denial-of-Service (DDoS) attacks and countermeasures - Web Commerce & Services, Data models, Web searching & querying - Prevention, Detection and Reaction Design - Revocation of malicious parties - Grid and cluster computing & Context aware computing - Adaptation software development - Next generation systems & Service-oriented techniques - Web Mining & Web Semantic, Network traffic analysis techniques - Pervasive, Ubiquitous and Mobile Computing - Mobile code security & Security management - Secure PHY, MAC, Routing and upper layer protocols - Secure Cross layer design - Secure naming and addressing, Privacy and anonymity - Application/network penetration testing - Network security metrics and performance evaluation - Security modelling and protocol design - Self-healing networks - Light-weight cryptography - Smart cards, secure hardware, and biometric security - Information hiding and watermarking - Vulnerability, exploitation tools, and virus/worm analysis IMPORTANT DATES --------------- Full paper submission due: March 1st, 2009 Notification of acceptance: March 30, 2009 Camera ready due: April 10, 2009 Tutorial & Workshop (Instructor) Submission due: February 25, 2009 Notification of Tutorial & Workshop Acceptance: March 10, 2009 SUBMISSION ---------- Submission Formatting Full papers (not solely abstracts) must be submitted for review. Only original papers, neither unpublished nor submitted for publication elsewhere, can be submitted. Papers need to be uploaded to the EDAS system. Papers should be in English, not exceeding 6 double-column pages, and should follow IEEE paper templates available at http://www.ieee.org/web/publications/authors/transjnl/index.html. All paper submissions will be carefully reviewed by at least three experts and returned to the author(s) with comments to ensure the high quality of accepted papers. The authors of accepted papers must guarantee that their paper will be presented at the conference. At least one author of each accepted paper must be duly registered for the conference in order for the paper to appear in the proceedings and be scheduled in the conference program. To access the full list of topics, submission guidelines, as well as venue and travel information please visit: http://www.n2s-conf.org Steering Committee ------------------ Jacques Stern, ENS, France Raouf Boutaba, University of Waterloo, Canada General Co-Chairs ----------------- Pascal Urien, TELECOM ParisTech, France Guy Pujolle, LIP6, France Tutorials chair --------------- Bertrand du Castel, Schlumberger, USA Pierre Paradinas, INRIA Rocquencourt, France Sponsorships Chair ------------------ Vincent Guyot, ESIEA, France Program Co-Chairs ----------------- Mohamad Badra, LIMOS-CNRS, France Nicolas Sklavos, Technological Educational Institute of Patras, Greece Program Members --------------- Randall Atkinson - Exreme Networks, USA Feng Bao - Institute for Infocomm Research, Singapore Azzedine Boukerche - University of Ottawa, Canada Stefano Campadello - Nokia, Finland Zhenfu Cao - SJTU, China Georg Carle - University of Tübingen, Germany Serge Chaumette - University of Bordeaux, France Yu Chen - State University of New York, Binghamton Herve Debar - France Telecom R&D, France Eric Filiol - ESAT, France Mario Freire - University of Beira Interior, Portugal Steven Furnell - Univ. of Plymouth, United Kingdom Dominique Gaiti - University of Troyes, France Adam Grzech - Wroclaw Univ of Technology, Poland Mohsen Guizani - WMU, USA Peter Honeyman - Univ. of Michigan, USA Russell Housley - Vigil Security, LLC, USA Stamatis Karnouskos - SAP Research, Germany Stamatios Kartalopoulos - Univ. of Oklahoma, USA Marek Klonowski - TU Wroclaw, Poland Odysseas Koufopavlou - Univ. of Patras, Greece Xuejia Lai - Shanghai Jiao Tong University, China Dong Hoon Lee - Korea University, Korea Albert Levi - Sabanci University, Turkey Pascal Lorenz - Univ. of Haute Alsace, France Fabio Massacci - Univ. of Trento, Italy Madjid Merabti - Liverpool John Moores Univ., UK Refik Molva - Insitut Eurecom, France Peter Mueller - IBM Zurich Research Lab, Switzerland Jose Neuman - UFC, Brazil Ramon Puigjaner - Baleares Island University Jean-Jacques Quisquater - Univ. Catholique De Louvain Serugudi Raghavan - IIT Madras, India Haidar Safa - American Univ. of Beirut, Lebanon Ping Shum - Nanyang Technological Univ., Singapore Wanqing Tu - University College Cork, Ireland Otto Spaniol - RWTH Aachen Univ., Germany Theodore Stergiou - Intracom Telecom, Greece Thomas Walter - DoCoMo Euro-Lab, Germany Sherali Zeadally - Univ. of the District of Columbia, USA Bin Zhu - Microsoft Research Asia, China |
|