infosec-news February 2011 archive
Main Archive Page > Month Archives  > infosec-news archives
infosec-news: [ISN] CfP: CRiSIS 2011: Risks and Security of Inte

[ISN] CfP: CRiSIS 2011: Risks and Security of Internet and Systems

From: InfoSec News <alerts_at_nospam>
Date: Tue Feb 01 2011 - 06:55:45 GMT
To: isn@infosecnews.org

Forwarded from: Marius Minea <marius (at) cs.upt.ro>

                          CALL FOR PAPERS
 [ PDF version at: http://crisis2011.cs.upt.ro/CRiSIS2011-CfP.pdf ]

                The Sixth International Conference on
             Risks and Security of Internet and Systems
                            CRiSIS 2011
             Timisoara, Romania, 26-28 September 2011
                  http://www.crisis-conference.org/

     IEEE Computer Society technical co-sponsorship (expected)

The International Conference on Risks and Security of Internet and
Systems 2011 will be the 6th in a series dedicated to security issues in
Internet-related applications, networks and systems.
The CRiSIS conference offers an effective forum for computer and network
security researchers from industry, academia and government to meet,
exchange ideas and present recent advances on Internet-related security
threats and vulnerabilities, and on the solutions that are needed to
counter them.

The topics addressed by CRiSIS range from the analysis of risks, attacks
to networks and system survivability, passing through security models,
security mechanisms and privacy enhancing technologies. Prospective
authors are invited to submit research results as well as practical
experiment or deployment reports. Industrial papers about applications
and case studies, such as telemedicine, banking, e-government and
critical infrastructure, are also welcome. The list of topics includes
but is not limited to:

* Analysis and management of risk
* Attacks and defences
* Attack data acquisition and network monitoring
* Cryptography, Biometrics, Watermarking
* Dependability and fault tolerance of Internet applications
* Distributed systems security
* Embedded system security
* Intrusion detection and Prevention systems
* Hardware-based security and Physical security
* Trust management
* Organizational, ethical and legal issues
* Privacy protection and anonymization
* Security and dependability of operating systems
* Security and safety of critical infrastructures
* Security and privacy of peer-to-peer system
* Security and privacy of wireless networks
* Security models and security policies
* Security of new generation networks, security of VoIP and multimedia
* Security of e-commerce, electronic voting and database systems
* Traceability, metrology and forensics
* Use of smartcards and personal devices for Internet applications
* Web security

IMPORTANT DATES
---------------
Submission deadline : May 10, 2011
Notification to Authors : July 15, 2011
Camera-Ready Due : August 15, 2011

PAPER SUBMISSIONS
-----------------
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings.
Papers must be written in English and must be submitted electronically
in PDF format. Maximum paper length will be 8 printed pages for full
papers or 4 pages for short papers, in IEEE 2-column style.
Authors of accepted papers must guarantee that their papers will be
presented at the conference. All papers selected for presentation at the
conference will be published in the hard-copy proceedings distributed to
all conference participants and will also be available on-line in
IEEE Xplore: http://ieeexplore.ieee.org.

The authors of the best conference papers will be invited to submit an
extended version to a special issue of the International Journal of
Information and Computer Security (IJICS).

All paper submissions will be handled through the Easy Chair conference
management system. Follow the instructions given here:
http://www.easychair.org/conferences/?conf=crisis2011

CALL FOR TUTORIALS
------------------
We solicit tutorials on state-of-the-art technologies relevant to the
conference themes. We are particularly interested in tutorials that
foster knowledge exchange among the different research communities
present at the conference. The intended length of each tutorial is 2 to
3 hours.
A tutorial proposal should include a brief summary and outline, specific
goals and objectives, the intended audience and the expected background
of the audience as well as a biographical sketch of the
presenter(s). The length of tutorial proposals should not exceed 5
pages.
Tutorial proposals should be submitted to the tutorial program chair:
Anas Abou el Kalam by email: anas(dot)abouelkalam(at)enseeiht(dot)fr
before May 10, 2011.

COMMITTEES
----------
GENERAL CHAIR
Marius Minea, Politehnica University of Timisoara, Romania

PC CHAIR
Frederic Cuppens, TELECOM Bretagne, France

PC CO-CHAIR
Simon Foley, University College Cork, Ireland

TUTORIAL CHAIR
Anas Abou ElKalam, Universite de Toulouse, IRIT-INP, France

FINANCE CHAIR
Yannick Chevalier, Universite de Toulouse, IRIT, France

PUBLICATIONS CHAIR
Bogdan Groza, Politehnica University of Timisoara

PROGRAM COMMITTEE (to be completed)

Anas Abou ElKalam, Universite de Toulouse, IRIT-INP, France
Christophe Bidan, SupElec, France
Joachim Biskup, T.U. Dortmund, Germany
Gilles Brassard, Universite de Montreal, Canada
Yannick Chevalier, Universite de Toulouse, IRIT, France
Gouenou Coatrieux, TELECOM Bretagne, France
Cas Cremers, ETH Zurich, Switzerland
Nora Cuppens-Boulahia, TELECOM Bretagne, Rennes, France
Geert Deconinck, Katholieke Universiteit Leuven, Belgium
Yves Deswarte, LAAS-CNRS, France
Catalin Dima, Universite Paris 12, France
Khalil Drira, LAAS-CNRS, France
Samuel Dubus, Alcatel-Lucent, France
Jose M. Fernandez, Ecole Polytechnique de Montreal, Canada
Alban Gabillon, Universite de la Polynesie Francaise, Tahiti
Joaquin Garcia-Alfaro, TELECOM Bretagne, Rennes, France
Bogdan Groza, Politehnica University of Timisoara, Romania
Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, USA
Corrado Leita, Symantec, France
Javier Lopez, Universidad de Malaga, Spain
Fatma Mili, Oakland University, USA
Ludovic Me, SupElec, France
Mohamed Mosbah, LaBRI, France
Raja Natarajan, Tata Institute of Fundamental Research, India
Stephen Neville, University of Victoria, Victoria, Canada
Claudio Pastrone, ISMB, Italy
Kai Rannenberg, Goethe Universitaet Frankfurt, Germany
Michael Rusinowitch, LORIA, France
Thierry Sans, Carnegie Mellon, Doha, Qatar
Ethan Singleton, University of Tulsa, USA
Syrine Tlili, Ministry of Communication Technologies, Tunisia
Amit Vasudevan, CyLab, Carnegie Mellon University, USA
Bogdan Warinschi, University of Bristol, United Kingdom

___________________________________________________________
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery
Network, Cisco Switches, SAS 70 Type II Datacenter.
Find peace of mind, Defend your Critical Infrastructure.
http://www.tegataiphoenix.com/