2009-12-01

[Tccc] Deadline Approaching: Fourth Workshop in Information Security Theory and Practice (WISTP 2010) - Security and Privacy of Pervasive Systems and Smart Devices

******************************************************
Due to several requests, the deadline is extended to December 4, 2009
******************************************************

[Apologies if you receive multiple copies of this message]

*****************
CALL FOR PAPERS
*****************

FOURTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2010):
Security and Privacy of Pervasive Systems and Smart Devices
April 13-14, Passau, Germany - http://www.wistp.org/

WISTP 2010 BACKGROUND AND GOALS
The impact of pervasive and smart devices on our daily lives is ever
increasing, and the rapid technological development of information
technologies ensures that this impact is constantly changing. It is
imperative that these complex and resource constrained technologies
are not vulnerable to attack. This workshop will consider the full
impact of the use of pervasive and smart technologies on individuals,
and society at large, with regard to the security and privacy of the
systems that make use of them.

The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of security
and privacy of pervasive systems and smart devices, as well as
experimental studies of fielded systems.
We encourage submissions that address the application of security
technology, the implementation of systems, and lessons learned. We
encourage submissions from other communities such as law and business
that present these communities' perspectives on technological issues.
Topics of interest include, but are not limited to:

* Access control
* Ad hoc networks security
* Anonymity
* Biometrics, national ID cards
* Data and application security and privacy
* Data protection
* Delay-tolerant network security
* Digital rights management (DRM) in pervasive environments
* Domestic network security
* Embedded systems security and TPMs
* Human and psychological aspects of security
* Human-computer interaction and human behavior impact for security
* Identity management
* Information assurance and trust management
* Interplay of TPMs and smart cards
* Intrusion detection and information filtering
* Mobile codes security
* Mobile commerce security
* Mobile devices security
* New applications for secure RFID systems
* Peer-to-peer security
* Privacy enhancing technologies
* RFID and NFC systems security
* Secure self-organization and self-configuration
* Security in location services
* Security issues in mobile and ubiquitous networks
* Security metrics
* Security models and architecture
* Security of GSM/GPRS/UMTS systems
* Security policies
* Security protocols
* Sensor networks security
* Smart card security
* Smart devices applications
* Vehicular network security
* Wireless communication security
* Wireless sensor node security

IMPORTANT DATES
Paper submission due: December 4, 2009 (midnight Samoa time) *FIRM DEADLINE*
Notification to authors: January 17, 2010
Author registration: February 1, 2010
Camera-ready due: February 1, 2010

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, a
conference, or a workshop with proceedings. Papers should be at most
15 pages including the bibliography and well-marked appendices (using
11-point font and reasonable margins), and should be in single-column
format. Committee members are not required to read the appendices,
and so the paper should be intelligible without them. All submissions
should be appropriately anonymized (i.e., papers should not contain
author names or affiliations, or obvious citations). Submissions are
to be made to the submission web site
(http://www.wistp.org/submission-details/). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of November 20, 2009. Accepted papers will be published by
Springer in the Lecture Notes in Computer Science series. The
camera-ready version of the accepted papers must follow Springer
guidelines (a Latex source file will be required).

If a submitted paper is mainly the result of the work of a student
author, this paper could have the chance to be selected as "Best
student paper" (even if the paper has been written with senior
co-authors). To participate to this selection process, please add the
word "STUDENT" in the affiliation field in the submission form.

Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted paper
is required to register with the workshop and present the paper. For
authors presenting multiple papers, one normal registration is valid
for up to two papers.

WISTP 2010 COMMITTEES AND CHAIRS

General Chairs
* Joachim Posegga, University of Passau, Germany
* Konstantinos Markantonakis, Royal Holloway University of
London, UK

Program Chairs
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Michael Tunstall, University of Bristol, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, University of Limoges, France

Publicity Chairs
* Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
* Ioannis G. Askoxylakis, FORTH-ICS, Greece
* Gerhard Hancke, ISG, Royal Holloway University of London, UK

Local Organization
* Joachim Posegga, University of Passau, Germany

Program Committee
* Rafael Accorsi, IIG, University of Freiburg, Germany
* Claudio A. Ardagna, Department of Information Technologies,
Universita' degli Studi di Milano, Italy
* Francois Arnault, XLIM, University of Limoges, France
* Ioannis G. Askoxylakis, FORTH-ICS, Greece
* Gildas Avoine, Catholic University of Louvain, Belgium
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Carlo Blundo, University of Salerno, Italy
* Marco Casassa Mont, HP Labs, UK
* Serge Chaumette. LaBRI, University Bordeaux 1, France
* Sabrina De Capitani di Vimercati, Department of Information
Technologies, Universita' degli Studi di Milano, Italy
* Jan de Meer, Brandenburg Technical University (BTU), Germany
* Estibaliz Delgado, European Software Institute (ESI), Spain
* Tassos Dimitriou, Athens Information Technology, Greece
* Sara Foresti, Department of Information Technologies,
Universita' degli Studi di Milano, Italy
* Flavio Garcia, Radboud University Nijmegen, Netherlands
* Stefanos Gritzalis, Info-Sec-Lab, University of the Aegean, Greece
* Yong Guan, Iowa State University, USA
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Ragib Hasan, University of Illinois at Urbana Champaign, USA
* Olivier Heen, INRIA, France
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Sotiris Ioannidis, FORTH-ICS & University of Crete, Greece
* Sokratis Katsikas, Dept. of Technology Education & Digital Systems,
University of Piraeus, Greece
* Evangelos Kranakis, Carleton University, Canada
* Michiharu Kudo, IBM Research, Japan
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway
University of London, UK
* Olivier Markowitch, ULB, Belgium
* Fabio Martinelli, Information Security Group, IIT-CNR, Italy
* Sjouke Mauw, SATOSS of Compute Science and Communications,
University of Luxembourg, Luxembourg
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK
* Carlos Maziero, Pontifical Catholic University of Parana State
Curitiba PR, Brazil
* Chris Mitchell, ISG, Royal Holloway University of London, UK
* Stefaan Motte, NXP Semiconductors, Belgium
* Jose Onieva. Computer Science Department, University of Malaga, Spain
* Rolf Oppliger, eSECURITY Technologies, Switzerland
* Dan Page, Department of Computer Science, University of Bristol, UK
* Stefano Paraboschi, University of Bergamo, Italy
* Pierre Paradinas, INRIA & CNAM, France
* Gerardo Pelosi, University of Bergamo, Italy
* Erik Poll, SOS (Security of Systems) group of the Radboud
University Nijmegen, Netherlands
* Konstantinos Rantos, GSPAEG at the Hellenic Ministry of Interior,
Public Administration and Decentralisation, Greece
* Kui Ren, Illinois Institute of Technology, USA
* Vincent Rijmen, Katholieke Universiteit Leuven, Belgium
* Rei Safavi-Naini, Center for Information Security and Cryptography,
University of Calgary, Canada
* Damien Sauveron, University of Limoges, France
* Daniel Schreckling, Institute for IT Security and Security Law,
University of Passau, Germany
* Byron Thomas, SiVenture, UK
* Erik Zenner, Technical University of Denmark, Danemark
* Bo Zhu, Computer Security Laboratory, University of Concordia, Canada

WISTP Steering Committee
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands
* Konstantinos Markantonakis, Royal Holloway University of
London, UK
* Chris Mitchell, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, Catholic University of Louvain,
Belgium
* Damien Sauveron, University of Limoges, France

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr
--
Damien Sauveron
http://damien.sauveron.fr/

_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: