posted by user: ka_ti_bo || 12142 views || tracked by 32 users: [display]

IFIP SEC 2010 : 25th IFIP International Information Security Conference Security & Privacy − Silver Linings in the Cloud


When Sep 20, 2010 - Sep 23, 2010
Where Brisbane, Australia
Submission Deadline Feb 15, 2010
Notification Due Apr 23, 2010
Final Version Due May 15, 2010
Categories    security   privacy

Call For Papers

Call for papers

25th IFIP International Information Security Conference
Security & Privacy − Silver Linings in the Cloud

Conference Topics:

SEC-2010 is the 25th in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP World Congress celebrating both the Golden Jubilee of IFIP and the Silver Jubilee of SEC. Papers offering novel and mature research contributions, in any aspect of information security and privacy, are solicited for submission to the conference. Papers may present theory, applications, or practical experiences on topics including but not limited to: (Authors of the best submissions will be invited to submit updated and significantly extended versions of their papers into Computers & Security.)

Access Control
Applications of Cryptography
Attacks and Malicious Software
Authentication and Authorization
Biometrics and Applications
Critical ICT Resources Protection
Data and Systems Integrity
Data Protection
ECommerce Security
Enterprise Security
Identity Management
Information Hiding
Information Warfare
Internet and Web Security
Intrusion Detection
Mobile Computing Security
Mobile Networks Security
Network Security Protocols
Multilateral Security
Peer-to-Peer Security
Privacy Enhancing Technologies
RFID Security
Risk Analysis and Management
Secure Electronic Voting
Secure Sensor Networks
Secure Systems Development
Security Architectures
Security Economics
Security Education
Security Management
Security Metrics
Smart Cards
Software Security
Trust Management and Models
Trusted Computing
Ubiquitous Security

Programme Committee Chairs:

Kai Rannenberg, Goethe University Frankfurt, Germany
Vijay Varadharajan, Macquarie University, Australia

Publication Chair:

Christian Weber, Goethe University Frankfurt, Germany

Programme Committee Members:

A. Aldini, University of Urbino, Italy
C. J. Armstrong, Curtin University, Australia
V. Atluri, Rutgers University, USA
T. Aura, Microsoft Research, UK
R. L. Baskerville, Georgia State University, USA
J. Benaloh, Microsoft Research, USA
C. Benzmüller, International University, Germany
J. Biskup, T.U. Dortmund, Germany
R. Botha, NMMU, South Africa
L. Bussard, Microsoft EMIC, Germany
J. Camenisch, IBM Research, Switzerland
K. Cameron, Microsoft, USA
L. Chen, Hewlett-Packard Labs, UK
M. Christodorescu, IBM TJ Watson Research Center, USA
R. Clarke, Xamax Consultancy Pty Ltd, ANU and UNSW, Australia
C.J.F. Cremers, ETH Zurich, Switzerland
M. Crompton, Information Integrity Solutions and NICTA
N. Cuppens-Boulahia, TELECOM Bretagne, France
E. Dawson, QUT, Australia
S. De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
B. de Decker, K.U. Leuven, Belgium
M. de Soete, Security4Biz, Belgium
Y. Deswarte, LAAS-CNRS, France
G. Dhillon, Virginia Commonwealth University, USA
R. Dodge, U.S. Military Academy, USA
J. Eloff, University of Pretoria, South Africa
A. Escudero-Pascual,, Sweden
H. Federrath, University of Regensburg, Germany
S. Fischer, University of Lübeck, Germany
S. Fischer-Huebner, Karlstad University, Sweden
S. N Foley, University College Cork, Ireland
A. Fuchsberger, Microsoft Corp, USA
S. Furnell, University of Plymouth, UK
M. Gasson, University of Reading, UK
D. Gollmann, TU Hamburg-Harburg, Germany
R. Grimm, University of Koblenz, Germany
D. Gritzalis, Athens University of Economics & Business, Greece
M. Hansen, Independent Centre for Privacy Protection, Germany
M. Heisel, University Duisburg-Essen, Germany
U. Helmbrecht, ENISA, EU
A. Hevia, Universidad de Chile, Chile
M. Hoelbl, Maribor University, Slovenia
J.-H. Hoepman, TNO & Radboud University Nijmegen, the Netherlands
E. Humphreys, XISEC, UK
C. Irvine, Naval Postgraduate School, Monterey, USA
L. Janczewski, Univ. of Auckland, New Zealand
D.-O. Jaquet-Chiffelle, Bern Univ. of Applied Sciences, Switzerland
A. Jøsang, University of Oslo, Norway & QUT, Australia
M.C. Kang, ISO/IEC JTC 1/SC 27/WG 4
S. Katsikas, University of Piraeus, Greece
D. Kesdogan, University of Siegen, Germany
H. Kikuchi, Tokai University, Japan
V. Kisimov, University of World and National Economy, Sofia, Bulgaria
S. Knapskog, NTNU/Q2S, Norway
B. LaMacchia, Microsoft, USA
C. E. Landwehr, University of Maryland, USA
H. Leitold, Graz University, Austria
A. Levi, Sabanci University, Istanbul, Turkey
T. Levin, Naval Postgraduate School, Monterey, USA
J. Lopez, University of Malaga, Spain
V. Lotz, SAP Research, France
N. Luttenberger, Kiel University, Germany
M. Marhöfer, Nokia Siemens Networks, Germany
S. Marsh, Communications Research Centre, Canada
F. Martinelli, National Research Council, Italy
V. Matyas, Masaryk University Brno, Czech Republic
S. Mauw, Uni Luxembourg, Luxembourg
C. Maziero, PUCPR, Brazil
C. A. Meadows, Naval Research Laboratory, USA
M. Meints, Dataport, Germany
N. Miloslavskaya, The National Research Nuclear Institute MEPhI, Russia
C. Mitchell, Royal Holloway, University of London, UK
R. Molva, EURECOM, France
G. Mueller, Freiburg University, Germany
Y. Murayama, Iwate Prefectural University, Japan
M. Ohlin, FMV, Sweden
E. Okamoto, University of Tsukuba, Japan
R. Oppliger, eSECURITY Technologies, Switzerland
J. I. Pagter, Alexandra Instituttet, Denmark
C. Palmer, IBM Research; Dartmouth College, USA
A. Pasic, ATOS Origin, Spain
P. Peleties, USB BANK PLC, Cyprus
G. Pernul, University of Regensburg, Germany
G. L. Peterson, Air Force Institute of Technology, USA
M. Petkovic, Philips Research / Eindhoven University of Technology, Netherlands
A. Pfitzmann, Dresden University of Technology, Germany
U. Pinsdorf, Microsoft EMIC, Germany
H. Pohl, Univ. of Applied Sciences Bonn-Rhein-Sieg, Germany
M. Pollitt, University of Central Florida, USA
R. Posch, TU Graz, Austrian Federal Government
J. Posegga, University of Passau, Germany
B. Preneel, K.U. Leuven, Belgium
G. Price, Royal Holloway, University of London, UK
C. W Probst, Technical University of Denmark
S. Qing, Chinese Academy of Sciences, China
C. Rieder, Lucerne Univ. of Applied Sciences & Arts, Switzerland
M. Riguidel, ENST, France
P. Samarati, University of Milan, Italy
A. Sarma, NEC Laboratories Europe, Germany
R Sasaki, Dendai University, Japan
D. Sauveron, University of Limoges, France
I. Schaumüller-Bichl, Univ. of Applied Sciences Hagenberg, Austria
A. B. Seip, Kredittilsynet, Norway
S. Shenoi, University of Tulsa, USA
E. Snekkenes, Gjøvik University College, Norway
R. von Solms, NMMU, South Africa
H. von Sommerfeld, Rohde & Schwarz SIT, Germany
S. Steinbrecher, Dresden University of Technology, Germany
R. K Subramaniam, Valiant Technologies, India
S. Teufel, University of Fribourg, Switzerland
M. Ullmann, BSI & Univ. of AS Bonn-Rhein-Sieg, Germany
P.M. Barbosa Veiga, Universidade de Lisboa, Portugal
T. Virtanen, Finland
J. Vyskoc, VaF, Slovakia
G. Weck, INFODAS GmbH, Germany
N. Weiler, Sensaco, Switzerland
T. Welzer, University of Maribor, Slovenia
S. Wohlgemuth, National Institute of Informatics, Japan
S. Wolthusen, Royal Holloway, University of London, UK
J. Zhou, I2R, Singapore
A. Zugenmaier, DoCoMo Research, Germany

Submission of papers: January 31, 2010
Notification to authors: April 23, 2010
Camera-ready copies: May 15, 2010
Instructions for paper submission
Papers must not substantially overlap with papers that have been published or are simultaneously submitted to a journal or another conference with proceedings.
Papers must be written in English; they should be at most 12 pages in total, including bibliography and well-marked appendices. Papers should be intelligible without appendices, if any.
Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer.
Submitted and accepted papers must follow the publisher’s guidelines for the IFIP AICT Series (, Author templates, Manuscript preparation in Word).
At least one author of each accepted paper must register for the conference and present the paper. Inclusion of the paper will be dependent upon one registration for the paper.
All papers must be submitted in electronic form through the web via by January 15, 2010.

Related Resources

ICCDA--Ei 2023   2023 The 7th International Conference on Computing and Data Analysis (ICCDA 2023)
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
DSN 2023   IEEE/IFIP International Conference on Dependable Systems and Networks
IoTBDS 2023   8th International Conference on Internet of Things, Big Data and Security
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CMC 2023   9th International Conference on Control, Modeling and Computing
IFIP SEC 2022   The 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2022)
IFIP Networking 2023   The International Federation for Information Processing (IFIP) Networking 2023 Conference