2009-01-19

[N2S] Call For Paper

===================================================================
Our apologies if you receive multiple copies of this CFP
===================================================================

-------------------------------------------------------------------
CALL FOR PAPERS

IFIP International Conference on
Network and Service Security

June 24 - 26, 2009 - Paris - France

http://www.n2s-conf.org/

-------------------------------------------------------------------

N2S'2009 is the First International Conference on Network and Service
Security that will be held from 24 to 26 June, 2009 in Paris, France.
N2S'2009 conference is technically sponsored by IFIP TC6 WG and IEEE
Section France.

The proliferation of heterogeneous and distributed computer networks
and the advanced deployment of pervasive applications have led to an
urgent need for constructing reliable and efficient approaches where
both applications and networking security issues are addressed
jointly. The N2S International Conference will address all the
security aspects of design, implementation, deployment, architectures
and modelling of heterogeneous wired and wireless computer networks,
of the virtualization technology, as well as of the pervasive computer
applications. It will also provide dynamic forums for researchers,
students and professionals to present their research results and
development in these areas and will offer the opportunity for a more
focused exchange of ideas and presentation of on-going research
relevant to information and system security.

Original papers are invited in the area of computer and network
security. Papers must represent high-quality and previously
unpublished work. The research sessions will include presentations of
latest research projects, papers, posters, tutorials, panels, demos,
industrial track and exhibitions around, but not limited to, the
following topics:

- Authentication protocols and services authorization
- Data and system integrity and confidentiality
- Availability of secure services
- Key Distribution and management, PKI and security management
- Trust models and Trust establishment
- Identity management, authentication and access control
- Deployment and management of computer/network security policies
- Monitoring Design for security, Traffic filtering and firewalling
- Distributed Intrusion Detection Systems & Countermeasures
- Single and multi-source intrusion detection and response
- IPv6 security, IPSec, Virtual Private Networks (VPNs)
- Privacy, contract agreements, and payment systems
- XML, Query Processing & Optimization, Storage Structures & Indexing
- Quantum Cryptography and QKD
- Applications of Cryptography & Cryptanalysis in communications
security
- Cryptographic Hardware and Embedded Systems.
- Component based software engineering
- Software verification & analysis
- Agents and Middleware, Agent Computing and Agent Applications
- Distributed Denial-of-Service (DDoS) attacks and countermeasures
- Web Commerce & Services, Data models, Web searching & querying
- Prevention, Detection and Reaction Design
- Revocation of malicious parties
- Grid and cluster computing & Context aware computing
- Adaptation software development
- Next generation systems & Service-oriented techniques
- Web Mining & Web Semantic, Network traffic analysis techniques
- Pervasive, Ubiquitous and Mobile Computing
- Mobile code security & Security management
- Secure PHY, MAC, Routing and upper layer protocols
- Secure Cross layer design
- Secure naming and addressing, Privacy and anonymity
- Application/network penetration testing
- Network security metrics and performance evaluation
- Security modelling and protocol design
- Self-healing networks
- Light-weight cryptography
- Smart cards, secure hardware, and biometric security
- Information hiding and watermarking
- Vulnerability, exploitation tools, and virus/worm analysis

IMPORTANT DATES
---------------
Full paper submission due: February 15, 2009
Notification of acceptance: March 30, 2009
Camera ready due: April 10, 2009
Tutorial & Workshop (Instructor) Submission due: February 25, 2009
Notification of Tutorial & Workshop Acceptance: March 10, 2009

SUBMISSION
----------
Submission Formatting Full papers (not solely abstracts) must be
submitted for review. Only original papers, neither unpublished nor
submitted for publication elsewhere, can be submitted.

Papers need to be uploaded to the EDAS system. Papers should be in
English, not exceeding 6 double-column pages, and should follow IEEE
paper templates available at
http://www.ieee.org/web/publications/authors/transjnl/index.html

All paper submissions will be carefully reviewed by at least three
experts and returned to the author(s) with comments to ensure the high
quality of accepted papers. The authors of accepted papers must
guarantee that their paper will be presented at the conference. At
least one author of each accepted paper must be duly registered for
the conference in order for the paper to appear in the proceedings and
be scheduled in the conference program.

To access the full list of topics, submission guidelines, as well as
venue and travel information please visit: http://www.n2s-conf.org

Steering Committee
--------------------
Jacques Stern, ENS, France
Raouf Boutaba, University of Waterloo, Canada

General Co-Chairs
-----------------
Pascal Urien, TELECOM ParisTech, France
Guy Pujolle, LIP6, France

Tutorials chair
-----------------------------
Bertrand du Castel, Schlumberger, USA
Pierre Paradinas, INRIA Rocquencourt, France

Sponsorships Chair
------------------
Vincent Guyot, ESIEA, France

Program Co-Chairs
-----------------
Mohamad Badra, LIMOS-CNRS, France
Nicolas Sklavos, Technological Educational Institute of Patras, Greece

Program Members
---------------
Randall Atkinson - Exreme Networks, USA
Feng Bao - Institute for Infocomm Research, Singapore
Azzedine Boukerche - University of Ottawa, Canada
Stefano Campadello - Nokia, Finland
Zhenfu Cao - SJTU, China
Georg Carle - University of Tübingen, Germany
Serge Chaumette - University of Bordeaux, France
Yu Chen - State University of New York, Binghamton
Herve Debar - France Telecom R&D, France
Eric Filiol - ESAT, France
Mario Freire - University of Beira Interior, Portugal
Steven Furnell - Univ. of Plymouth, United Kingdom
Dominique Gaiti - University of Troyes, France
Adam Grzech - Wroclaw Univ of Technology, Poland
Mohsen Guizani - WMU, USA
Peter Honeyman - Univ. of Michigan, USA
Russell Housley - Vigil Security, LLC, USA
Stamatis Karnouskos - SAP Research, Germany
Stamatios Kartalopoulos - Univ. of Oklahoma, USA
Marek Klonowski - TU Wroclaw, Poland
Odysseas Koufopavlou - Univ. of Patras, Greece
Xuejia Lai - Shanghai Jiao Tong University, China
Dong Hoon Lee - Korea University, Korea
Albert Levi - Sabanci University, Turkey
Pascal Lorenz - Univ. of Haute Alsace, France
Fabio Massacci - Univ. of Trento, Italy
Madjid Merabti - Liverpool John Moores Univ., UK
Refik Molva - Insitut Eurecom, France
Peter Mueller - IBM Zurich Research Lab, Switzerland
Jose Neuman - UFC, Brazil
Ramon Puigjaner - Baleares Island University
Jean-Jacques Quisquater - Univ. Catholique De Louvain
Serugudi Raghavan - IIT Madras, India
Haidar Safa - American Univ. of Beirut, Lebanon
Ping Shum - Nanyang Technological Univ., Singapore
Wanqing Tu - University College Cork, Ireland
Otto Spaniol - RWTH Aachen Univ., Germany
Theodore Stergiou - Intracom Telecom, Greece
Thomas Walter - DoCoMo Euro-Lab, Germany
Sherali Zeadally - Univ. of the District of Columbia, USA
Bin Zhu - Microsoft Research Asia, China

No comments: