Version: GnuPG v1.4.9 (MingW32)
iEYEARECAAYFAkueT/EACgkQE5f5cImnZrsIuQCgij5vxEPUZJK7QJIlhMCQrRTw
qRAAoOpTWKIxTHmS93ardynJvIZLotZm
=SQpG
-----END PGP SIGNATURE-----
Posted for yingfei@hawaii.edu
Joe (TCCC Chair)
-----------------------------------
++ We apologize if you receive multiple copies of this CFP. ++
*********************************************************************
* C A L L F O R P A P E R *
* *
* IEEE GLOBECOM 2010 *
* Communication and Information System Security Symposium *
* *
* December 6-10, 2010, Miami, Florida, USA *
*********************************************************************
1. IMPORTANT DATES
* Paper Submission: March 15, 2010
* Paper Acceptance: July 1, 2010
* Camera-ready Paper: August 1, 2010
2. SUBMISSION
Link: http://www.edas.info/newPaper.php?c=7413
* A submitted paper should present high-quality and previously
unpublished work, and should not be submitted to other conferences or
journals in the same time.
3. SYMPOSIUM CO-CHAIRS
* Yingfei Dong, University of Hawaii, USA (Email: yingfei@hawaii.edu)
* Nidal Nasser, University of Guelph, Canada (Email: nnasser@uoguelph.ca)
* Yanchao Zhang, New Jersey Institute of Technology, USA (Email:
yczhang@njit.edu)
* Kejie Lu, University of Puerto Rico, USA (Email: kejie.lu@upr.edu)
4. SCOPE
The Communication and Information System Security (CISS) Symposium aims
at addressing all security issues in analysis, design, implementation,
deployment, and management of information security systems. Computer and
network security has become vitally important to our society, industry
and governments, as various security breaches and attacks happen every
day. Although many security solutions have been developed and deployed,
many issues are still open, such as botnets, spam and DDoS attacks. In
addition, many other important issues such as usability and privacy have
not been adequately addressed in the past. Therefore, we are looking for
new ideas, models, theory, and practical solutions to be presented and
discussed in the symposium. We will also solicit various developments in
evaluation and improvement of current security technologies.
5. TOPICS OF INTEREST
+ Authorization, Access Control, and Accounting
+ Availability of Secure Services and Systems
+ Authentication Protocols and Services
+ Active Defense Mechanisms
+ Auditing of Services, Systems, and Applications
+ Anonymous Communication and Applications
+ Biometric Security: Technologies, Risks and Vulnerabilities
+ Botnets Detection and Defense
+ Confidentiality and Integrity Protection
+ Critical Infrastructure Security
+ Cryptography, Cryptanalysis, and Cryptographic Systems
+ Distributed Denial-Of-Service (DDOS) Attacks and Countermeasures
+ Deployment and Management of Computer/Network Security Policies
+ Distributed Intrusion Detection Systems & Countermeasures
+ Detection of Unknown Attacks
+ Device Security
+ Fighting E-crime and Forensics
+ Firewall Technologies
+ Identity Management
+ Information Hiding and Watermarking
+ Key Distribution and management
+ Light-Weight Cryptography Mobile Communications Security
+ Mobile Code Security
+ Monitoring Design for Security
+ Network Penetration Testing
+ Network Security Metrics and Performance Evaluation
+ Network Traffic Analysis Techniques
+ Operating System (OS) Security and Analysis Tools
+ PKI and security management
+ Packet Inspection Techniques
+ Prevention, Detection and Reaction Design
+ Privacy in services, systems and applications
+ Social Network Security and Privacy Issues
+ Network Resilience & Self-Healing Networks
+ Secure Physical, MAC, Routing and Upper Layer Protocols
+ Secure Cross-Layer Design
+ Secure Naming and Addressing
+ Secure System Implementation Techniques
+ Secure Hardware Design
+ Secure Optical networks
+ Security Modeling and Protocol design
+ Security Specification Techniques
+ Security in Ad-hoc, Sensor, and Mesh Networks
+ Security in RFID systems
+ Security in Vehicular Networks
+ Security in Cellular Networks
+ Security in Cloud Computing
+ Security in Delay Tolerant Networks
+ Security in Cyber-Physical Systems
+ Trust models and Trust establishment
+ Traffic Accountability
+ Usability of Security Systems
+ Vulnerability, Exploitation Tools, and Virus/Worm Analysis
+ Web, Email, E-Commerce, and M-Commerce Security

No comments:
Post a Comment