2009-03-13

[Tccc] IEEE Globecom 09: CIS Security Symposium: SUBMISSION DEADLINE EXTENDED: MARCH 31th, 2009

Our apologies if you received multiple copies of this email.
Thank you to distribute!
=====================================================================

CALL-FOR-PAPERS

IEEE Globecom 2009: Communication and Information System Security Symposium
www.ieee-globecom.org/2009

November 30th- December 4th, 2009
Honolulu, Hawaii, USA

SUBMISSION DEADLINE EXTENDED: MARCH 31th, 2009
=====================================================================

Scope and Motivation
With the advent of pervasive computer applications and due to the
proliferation of heterogeneous wired/wireless networks and ubiquitous
computing, computer and network security has become a primary concern
for individuals, industry and governments. For example, sensitive
information can potentially be copied, altered or injected for malicious
purposes, e.g. taking advantage of sensitive information or
stealing/abusing digital identities. There is also a growing risk that
computer and network attacks will be deployed to disturb or even
severely impact important infrastructure components like communication
systems, power grids, or traffic control systems in order to cause
significant economic damages. In addition to this, there is a growing
awareness of privacy concerns, regarding individual users as well as
corporate and/or governmental organizations. Therefore, new approaches
to information security, availability protection and privacy management
are required to be tightly integrated into IT- and communication
systems. The Computer and Communications Network Security Symposium
(CCNS) will address all aspects of modeling, design, implementation,
deployment, and management of computer/network security algorithms,
protocols, architectures, and systems. Envisaged contributions to CCNS
symposium target all security aspects of wired networks
(electrical/optical) as well as wireless networks: 3G/ 4G, Satellite,
WLAN, WiMAX, Bluetooth, Ad hoc, Vehicular, Sensor and RFID networks,
considering all layers from the physical to the application layer
(including middleware and peer-to-peer systems). Furthermore,
contributions devoted to the evaluation, optimization, or enhancement of
security mechanisms for current technologies as well as novel security
and data privacy solutions for emerging technologies are solicited.
Papers should represent high-quality and previously unpublished work,
and may not be submitted in parallel to other conferences or publications.

Topic of Interest
Topics of interest include, but are not limited to, the following:

· Confidentiality and Integrity Protection
· Authentication Protocols and Services
· Key Distribution and management
· PKI and security management
· Trust models and Trust establishment
· Certificate Revocation & Exclusion of Compromised Entities
· Identity Management
· Social Network Security Issues
· Authorization and Access Control
· Availability of Secure Services
· Distributed Denial-Of-Service (DDOS) Attacks and Countermeasures
· Critical Infrastructure Security
· Network Resilience & Self-Healing Networks
· Light-Weight Cryptography
· Quantum Cryptography and QKD
· Chaos & Chaotic Cryptographic Systems
· Information Hiding and Watermarking
· Applications of Cryptography and Cryptanalysis in Communications
Security
· Secure Physical, MAC, Routing and Upper Layer Protocols
· IPSec and Virtual Private Networks (VPNs)
· Secure Socket Layer VPN
· Integrated Security Gateway Systems
· Secure Cross Layer Design
· Mobile Communications Security
· Security in Adhoc & Sensor Networks
· Deployment and Management of Computer/Network Security Policies
Firewall Technologies and Configuration
· Network Security Metrics and Performance Evaluation
· Network Traffic Analysis Techniques
· Anonymous Communication
· Secure Naming and Addressing
· Prevention, Detection and Reaction Design
· Monitoring Design for Security
· Distributed Intrusion Detection Systems & Countermeasures
· Single- and Multi-Source Intrusion Detection and Response (Automation)
· Deep Packet Inspection Techniques
· Detection of Unknown Attacks
· Active Defence Mechanisms
· Secure System Implementation Techniques
· Security Modelling and Protocol design
· Security Specification Techniques
· Application/Network Penetration Testing
· Vulnerability, Exploitation Tools, and Virus/Worm Analysis
· Operating System(OS) Security and Log Analysis Tools
· Mobile Code Security
· Web, Email, E-Commerce, and M-Commerce Security
· Smart Cards and Secure Hardware
· Security Protocols for Auto-ID Systems
· Biometric Security: Technologies, Risks and Vulnerabilities

Submission and deadline
Prospective authors are invited to submit original technical papers by
the deadline 15 March 2009 for publication in the IEEE GLOBECOM 2009
Conference Proceedings and for oral or poster presentation(s) for the
symposia listed below. For more information about each symposium, click
on the title.

All submissions should be written in English with a maximum paper length
of six (6) printed pages (10-point font) including figures, without
incurring additional page charges (maximum 2 additional pages, with
overlength page fee). Standard IEEE Transactions templates for Microsoft
Word or LaTeX formats found at
http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html.

Alternatively you can follow the sample instructions in template.pdf:
click here for pdf
Only PDF files will be accepted for the review process and all
submissions must be done through EDAS at http://edas.info/

Symposium Chairs
- Abderrahim Benslimane, LIA/CERI, France,
abderrahim.benslimane@univ-avignon.fr
- Stamatios V. Kartalopoulos, University of Oklahoma, USA,
kartalopoulos@ou.edu
- Qingming Ma, Juniper Networks, USA, qma@juniper.net
- Guenter Schaefer, Technical University of Ilmenau, Germany,
g.schaefer@ieee.org


--
______________________________________________________________

Professor Abderrahim BENSLIMANE, IEEE SM
LIA/Univ. Avignon, 339 Chemin des Meinajaries
BP 1228 - 84911 AVIGNON CEDEX 9
Tél : (+33/0) 4 90 84 35 61
-------------------------------------------------------------
General Chair of Fifth IEEE WiMob 2009, Marrakech, Morocco, 12-14 October.
http://conferences.computer.org/WiMob2009
Co-chair
of the Communication and Information System Security Symposium
http://www.comsoc.org/confs/globecom/2009/
_____________________________________________________________


_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: