2010-02-02

[Tccc] CFP: IEEE Globecom 2010 Symposium on Communication and Information System Security

++ We apologize if you receive multiple copies of this CFP. ++

*********************************************************************

* C A L L F O R P A P E R *

* *

* IEEE GLOBECOM 2010 *

* Communication and Information System Security Symposium *

* *

* December 6-10, 2010, Miami, Florida, USA *

*********************************************************************

1. IMPORTANT DATES

* Paper Submission: March 15, 2010

* Paper Acceptance: July 1, 2010

* Camera-ready Paper: August 1, 2010

2. SUBMISSION

Link: <http://www.edas.info/newPaper.php?c=7413>
http://www.edas.info/newPaper.php?c=7413

* A submitted paper should present high-quality and previously unpublished
work, and should not be submitted to other conferences or journals in the
same time.

3. SYMPOSIUM CO-CHAIRS

* Yingfei Dong, University of Hawaii, USA (Email:
<mailto:yingfei@hawaii.edu> yingfei@hawaii.edu)

* Nidal Nasser, University of Guelph, Canada (Email:
<mailto:nnasser@uoguelph.ca> nnasser@uoguelph.ca)

* Yanchao Zhang, New Jersey Institute of Technology, USA (Email:
<mailto:yczhang@njit.edu> yczhang@njit.edu)

* Kejie Lu, University of Puerto Rico at Mayaguez, USA (Email:
<mailto:kejie.lu@upr.edu> kejie.lu@upr.edu)

4. SCOPE

The Communication and Information System Security (CISS) Symposium aims at
addressing all security issues in analysis, design, implementation,
deployment, and management of information security systems. Computer and
network security has become vitally important to our society, industry and
governments, as various security breaches and attacks happen every day.
Although many security solutions have been developed and deployed, many
issues are still open, such as botnets, spam and DDoS attacks. In addition,
many other important issues such as usability and privacy have not been
adequately addressed in the past. Therefore, we are looking for new ideas,
models, theory, and practical solutions to be presented and discussed in the
symposium. We will also solicit various developments in evaluation and
improvement of current security technologies.

5. TOPICS OF INTEREST

+ Authorization, Access Control, and Accounting

+ Availability of Secure Services and Systems

+ Authentication Protocols and Services

+ Active Defense Mechanisms

+ Auditing of Services, Systems, and Applications

+ Anonymous Communication and Applications

+ Biometric Security: Technologies, Risks and Vulnerabilities

+ Botnets Detection and Defense

+ Confidentiality and Integrity Protection

+ Critical Infrastructure Security

+ Cryptography, Cryptanalysis, and Cryptographic Systems

+ Distributed Denial-Of-Service (DDOS) Attacks and Countermeasures

+ Deployment and Management of Computer/Network Security Policies

+ Distributed Intrusion Detection Systems & Countermeasures

+ Detection of Unknown Attacks

+ Device Security

+ Fighting E-crime and Forensics

+ Firewall Technologies

+ Identity Management

+ Information Hiding and Watermarking

+ Key Distribution and management

+ Light-Weight Cryptography Mobile Communications Security

+ Mobile Code Security

+ Monitoring Design for Security

+ Network Penetration Testing

+ Network Security Metrics and Performance Evaluation

+ Network Traffic Analysis Techniques

+ Operating System (OS) Security and Analysis Tools

+ PKI and security management

+ Packet Inspection Techniques

+ Prevention, Detection and Reaction Design

+ Privacy in services, systems and applications

+ Social Network Security and Privacy Issues

+ Network Resilience & Self-Healing Networks

+ Secure Physical, MAC, Routing and Upper Layer Protocols

+ Secure Cross-Layer Design

+ Secure Naming and Addressing

+ Secure System Implementation Techniques

+ Secure Hardware Design

+ Secure Optical networks

+ Security Modeling and Protocol design

+ Security Specification Techniques

+ Security in Ad-hoc, Sensor, and Mesh Networks

+ Security in RFID systems

+ Security in Vehicular Networks

+ Security in Cellular Networks

+ Security in Cloud Computing

+ Security in Delay Tolerant Networks

+ Security in Cyber-Physical Systems

+ Trust models and Trust establishment

+ Traffic Accountability

+ Usability of Security Systems

+ Vulnerability, Exploitation Tools, and Virus/Worm Analysis

+ Web, Email, E-Commerce, and M-Commerce Security

_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: