- From: Fulvio Frati <fulvio.frati@unimi.it>
- Date: Fri, 29 Oct 2010 16:05:46 +0200
- To: semantic-web@w3.org
- Message-id: <011e01cb7772$623504d0$269f0e70$@unimi.it>
**************************************************************************** ********** Please accept our apologies if you receive multiple copies of this CFP. **************************************************************************** ********** SAR/SSI-2011 CALL FOR PAPERS International Conference on Network and Information Systems Security La Rochelle, France - 18-21 May 2011 http://sarssi-conf.org The SAR-SSI conference series provides a forum for presenting novel research results, practical experiences and innovative ideas in network and information systems security. The goal of SAR-SSI-2011 is fostering exchanges among academic researchers, industry and a wider audience interested in network and information system security. The conference will offer a broad area of events, ranging from panels, tutorials, technical presentations and informal meetings. Prospective authors are encouraged to submit papers describing novel research contributions as well as proposals for tutorials and panels. Submissions can address theoretical issues in network and information system security or provide practical and operational experiences in security management. Languages for papers and presentations can be French or English, both languages being used in SAR-SSI. TOPICS Authors are invited to submit research papers, papers presenting a practical experience or new industrial applications, panel and tutorial proposals on topics related to network and information systems security. Topics of interest include, but are not limited to: Network Security - Security of new network architectures (e.g. VoIP, MAN/WAN, Giga-Ethernet) - Security in wireless and adhoc networks, - Security of communications (e.g. VPN, IPsec, SSL, MPLS) - Security in backbone and IPv6 networks - Multicast security - Security in peer-to-peer systems - Security in embedded networks Formal methods and models for computer security - Applied cryptography - Authentication and access control - Anonymity and privacy - Metrology and security measurement - Public Key Infrastructures (PKI) - Security protocols - Security assessment and certification - Trust representation and management Computer Forensics and Incident Response - Intrusion detection systems, honeypots - Worms, Viruses, Botnets, Malware and Spyware - Security assessment Software and Systems Security - Reverse engineering and software protection - Methodology, ethics, legislation and regulation - Biometry and watermarking - E-commerce security - Security in vehicular communications XML, Web Services and Cloud Security - Web services and GRID computing security - Security on Untrusted Clouds - Frameworks for managing inter-organizational trust relationships - Web services exploitation of Trusted Computing - Secure orchestration of Web services PAPER SUBMISSIONS Submissions should not exceed 15 pages must include on the cover page the paper title, author(s) name(s) and affiliation, a full address (Phone, fax, e-mail), an abstract of the paper (150 words max) and no more than 5 keywords. Authors must submit an electronic version of their paper (PDF / A4 format). Authors are requested to use the sarssi.cls type and use the alpha style for the bibliography. For the final version the sources of the contribution in LaTeX will also be required. All accepted papers will also be published in the conference proceeding by IEEE, and will be indexed by IEEE Xplore Digital Library. The submission of papers must be done through the EasyChair Conference system using the following page: http://www.easychair.org/conferences/?conf=sarssi2011 PANEL PROPOSALS The conference may include panel sessions addressing topics of interest to the computer security community. Proposals for panels should list possible panellists, specifying those who have confirmed participation. Please submit panel proposals by email to the TPC co-chairs. JOURNAL PUBLICATION Authors of the best papers selected by the technical program committee will be invited to publish an extended version of their paper in a journal of international audience. TUTORIALS The conference will include a tutorial and prominent invited speakers session. The tutorials will address hot research and/or industry topics relating to network and information systems security. Please submit tutorial proposals by email to the TPC co-chairs. IMPORTANT DATES Submission: February 14th, 2011 Notification: March 29th, 2011 Camera Ready Version: April 25th, 2011 Registration: April 18th 2011 (reduced fare) Conference: May 18th-21st, 2011 COMMITTEES General Chairs - Ahmed Serhrouchni, Télécom ParisTech, France Steering Committee - Abdelmajid Bouabdallah, UTC, France - Danielle Boulanger, Univ. Lyon-Jean Moulin, France - Isabelle Chrisment, Université Nancy I, France - Alban Gabillon, Université de la Polynésie Française - Ludovic Mé, Supélec, France Technical Program Committee Chair - Ernesto Damiani, Università degli Studi di Milano, Italy Organizing Committee - Ibrahim Hajjeh, Ineovation, France - Jean Leneutre, Télécom ParisTech, France - Radwan Saâd - Ahmed Serhrouchni, Télécom ParisTech, France Technical Program Committee - Anas Abou El Kalam, ENSEEIHT, France - Mohammed Achemlal, France Telecom / Orange, France - Hossam Afifi, Telecom Sud Paris, France - Claudio Agostino Ardagna, Univ. degli Studi di Milano, Italy - Gildas Avoine, Université catholique de Louvain, Belgique - Nadia Bennani, INSA-Lyon, France - Christophe Bidan, Supélec, France - Karima Boudaoud, Ecole Polytechnique de l'Université de Nice - Sophia Antipolis, France - Adel Bouhoula, Higher School of Comm. of Tunis, Tunisie - Lionel Brunie, INSA-Lyon, France - Laurent Bussard, Eur. Microsoft Innovation Center, Germany - Laurent Butti, France Télécom/Orange Division R&D, France - Marco Casassa-Mont, HPLabs, UK - Yacine Challal, Univ. de Technologie de Compiègne, France - Ken Chen, Université de Paris 13, France - Yves Correc, DGA/CELAR, France - Bernard Cousin, IRISA, France - Mathieu Couture, Carleton University, Canada - Frederic Cuppens, Telecom Bretagne, France - Nora Cuppens-Boulahia, Telecom Bretagne, France - Hervé Debar, Telecom Sud Paris, France - Rachida Dssouli, Concordia University, Canada - Laurent Gallon, Univ. de Pau et des Pays de l'Adour, France - Sihem Guemara, Higher School of Comm. of Tunis, Tunisie - Gilles Guette, University of Rennes 1, France - Gaétan Hains, Université Paris-Est, France - Ibrahim Hajjeh, Ineovation, France - Artur Hecker, Télécom ParisTech, France - Guillaume Hiet, Supélec, Campus de Rennes, France - Mathieu Jaume, Lab. d'Informatique de Paris 6, France - Djamel Khadraoui, CRP Henri Tudor, Luxembourg - Jean-Louis Lanet, University of Limoges, France - Maryline Laurent, Telecom Sud Paris, France - Jean Leneutre, Télécom ParisTech, France - Daniel Le Métayer, INRIA Grenoble - Rhône-Alpes, France - Bruno Martin, Université de Nice Sophia Antipolis, France - Fabio Martinelli, IIT-CNR, Italy - Ludovic Mé, Ecole Sup. d'Electricité, Campus de Rennes, France - Farid Naït-Abdesselam, Univ. of Paris Descartes, France - Philippe Owezarski, LAAS-CNRS, France - Guillaume Piolle, Supélec, Campus de Rennes, France - Fabien Pouget, CERTA, France - Nicolas Prigent, Supélec, Campus de Rennes, France - Guy Pujolle, Laboratoire d'Informatique de Paris 6, France - Jean-Luc Richier, Lab. d'Informatique de Grenoble, France - Etienne Riviere, NTNU Trondheim, Norway - Jean-Marc Robert, École de Tech. Supérieure, Canada - Yves Roudier, Institut Eurécom, France - Jörg Schwenk, University of Bochum, Germany - Eric Totel, Supélec, Campus de Rennes, France - Frederic Tronel, Supélec, Campus de Rennes, France - Valerie Viet Triem Tong, Supélec, Campus de Rennes, France ____________________________________________ SESAR Lab - Dipartimento Tecnologie dell'Informazione Università degli Studi di Milano 26013 Crema (CR) – ITALY http://sesar.dti.unimi.it ____________________________________________
Received on Friday, 29 October 2010 14:06:22 UTC