2008-03-14

[Mycolleagues] [GC '08 CCNS] NEW SUBMISSION DUE DATE: MARCH 31. 2008


Dear all,

March 31. 2008 is the new paper submission due date for the CCNS symposium at
Globecom '08. We kindly are inviting you to submit your papers.
If you need a *.txt, *.doc, or *.pdf version of the CFP, please do not
hesitate to get in contact.

With best regards,

Abderrahim Benslimane, Jiankun Hu, Peter Mueller

************************************************************************


                               Call for Papers

                                GLOBECOM 2008
           Computer and Communications Network Security Symposium
                       http://www.ieee-globecom.org/2008
 
                       30. November – 4. December 2008
                            New Orleans, LA, USA


Brief description:
The IEEE GLOBECOM 2008 Computer and Communications Network Security Symposium
(CCNS) will be held in New Orleans, USA, November 2008.
With the advent of pervasive computer applications and due to the proliferation
of heterogeneous wired and wireless computer networks, computer and network
security has become paramount. The Computer and Communications Network Security
Symposium will address all aspects of the modeling, design, implementation,
deployment, and management of computer/network security algorithms, protocols,
architectures, and systems. Furthermore, contributions devoted to the
evaluation, optimization, or enhancement of security mechanisms for current
technologies as well as devising efficient security and privacy solutions for
emerging technologies are solicited.
Original papers are invited in the area of computer and network security.
Papers must represent high-quality and previously unpublished work.
Contributions in CCNS symposium target wired networks as well as wireless
networks:
3G/ 4G, Satellite, IEEE 802.11, Bluetooth, Ad hoc, vehicular, Sensor and RFID
networks, WiMAX/ 802.16, 802.16e and Peer-to-peer systems.


Topics of interest:
Topics of interest include, but are not limited to, the following:
- Secure PHY, MAC, Routing and upper layer protocols
- Secure Cross layer design
- Authentication protocols and services authorization
- Confidentiality
- Data and system integrity
- Availability of secure services
- Key Distribution and management
- PKI and security management
- Trust models and Trust establishment
- Identity management and access control
- Deployment and management of computer/network security policies
- Monitoring Design for security
- Distributed Intrusion Detection Systems & Countermeasures
- Traffic filtering and Firewalling
- IPv6 security, IPSec
- Virtual Private Networks (VPNs)
- Prevention, Detection and Reaction Design
- Revocation of malicious parties
- Light-weight cryptography
- Quantum Cryptography and QKD
- Applications of Cryptography and Cryptanalysis in communications security
- Security and mobility
- Mobile code security        
- Network traffic analysis techniques
- Secure naming and addressing (Privacy and anonymity)
- Application/network penetration testing
- Advanced Cryptographic Testbeds
- Network security metrics and performance evaluation
- Operating System (OS) security and log analysis tools
- Security modeling and protocol design
- Security specification techniques
- Self-healing networks
- Smart cards and secure hardware
- Biometric security: technologies, risks and vulnerabilities
- Information hiding and watermarking
- Vulnerability, exploitation tools, and virus/worm analysis
- Distributed Denial-Of-Service (DDOS) attacks and countermeasures
- DNS spoofing and security
- Critical infrastructure security
- Single- and multi-source intrusion detection and response (automation)
- Web, e-commerce, m-commerce, and e-mail security
- New design for unknown attacks detection


Important Dates:
Manuscript submission: 31. March 2008
Acceptance notification: 28. June 2008
Revised and camera ready: 15. August 2008        


Instructions for Authors:
Papers must represent high-quality and previously unpublished work. Original
research papers are solicited in all areas of computer and communications
network security. All submissions will be handled electronically through the
EDAS conference management system at
http://edas.info  
and must be in pdf format, with a maximum length of five pages. A formatting
template may be found at  
http://www.ieee.org/web/publications/authors/transjnl/index.html.


Sponsoring Technical Committees:
IEEE ComSoc Communications and Information Security (CISTC)
IEEE ComSoc Radio Communications (RCC)


IEEE Gobecom 2008 Security Symposium co-Chairs:
Abderrahim Benslimane, LIA/CERI, France abderrahim.benslimane@univ-avignon.fr
Jiankun Hu, RMIT University, Australia jiankun@cs.rmit.edu.au
Peter Mueller, IBM Zurich Research Laboratory, Switzerland pmu@zurich.ibm.com

No comments: