8-10 September 2008, Naples, Italy
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field.
Security Mechanisms for:
·Authentication and Identity Management
·Authorization and Access Control
·Trust Negotiation, Establishment and Management
·Anonymity and User Privacy
·Data Integrity and Privacy
·Network Security
·Operating System Security
·Database Security
·Intrusion Detection
·Security Attacks
·…
Security and System Architectures
·Web Services Security
·GRID Security
·Ubiquitous Computing Security
·Mobile Agent Security
·Internet Security
·…
Security Methodologies
·Security Oriented System Design
·Security and Performance trade-off
·Security Management and Strategy
·Security Verification, Evaluations and Measurements
·Secure Software Technologies
·New Ideas and Paradigms for Security
·…
Security Application on Critical Environments
·Intellectual Property Protection
·E-Commerce Security
·E-Government Security
·E-Health Security
·Home System Security
·Sensor Network Security
·Ad hoc network security
·Biometrics Security and Applications
·Secure Hardware and Smartcards
·…
Security Models
·Cryptography
·Cryptographic Protocols
·Key Management and Recover
Paper Submission
Papers should be original and contain contributions of theoretical, experimental or application nature, or be unique experience reports. Papers must be submitted no later than April 5, 2008 and electronic submission in PDF or Word is required. The page limit for a full-length paper is 6 pages. Short papers describing novel research visions, work-in-progress or less mature results are also welcome, with the limit of 4 pages. All submissions should be in the IEEE 8.5" x 11" two-column format. Papers should contain up to 5 keywords. Papers will be evaluated for originality, significance, clarity, and soundness, and will be reviewed by at least three independent reviewers.
Papers can be submitted to the EasyChair Management System at the following link:http://www.easychair.org/conferences/?conf=ias08
Conference Proceedings
Accepted papers will be published by IEEE Computer Society Press. Selected papers presented at the conference will be considered for publication in a special issue of the international Journal of Information Assurance and Security (JIAS).
Important Dates
Paper Submissions 5 April 2008
Author's Notification 30 April 2008
Author Registration Deadline 1 June 2008
Camera Ready 1 June 2008
Awards
The IAS'08 Program Committee will select one winner for the Best Paper Award (all regular papers are eligible) and one winner for the Best Student Paper Award (to be eligible, the student must be the sole author of the paper or the first author and primary contributor). A cover letter to the General Chair/Program Chair must identify the paper as a candidate for this competition at the time of submission. The award-winning papers will be considered for publication in the international Journal of Information Assurance and Security (JIAS).
Contact
Further enquiries regarding matters related to IAS 2008 can be sent to the Local Organising Committee.
E-mail: massimiliano.rak@unina2.it
Tel: +39 (0)81 5010336
Mobile:+39 3287113693
Fax: +39 (0)81 503742
--------------------------------------------------
You are reading ICST conference newsletter. To report any kind of abuse, please contact admin at icst.org.
To unsubscribe, please visit the following page: http://icstconferences.org/unsubscribe.php?p=sfdbytbctr and enter your email address.
No comments:
Post a Comment