2010-04-24

[Tccc] ACM Press - CALL FOR CONTRIBUTIONS - 3rd International Conference on Security of Information and Networks (SIN 2010)

[Apologies for cross postings. Please circulate to colleagues and
prospective interested parties.]

CALL FOR CONTRIBUTIONS
======================

3rd International Conference on Security of Information and Networks (SIN
2010)
7-11 September 2010
Taganrog, Rostov-on-Don, Russia

www.sinconf.org

In Technical Cooperation with ACM Special Interest Group on Security,
Audit and Control (SIGSAC)
-------------------------
Proceedings by ACM Press; all papers will be inserted into the ACM Digital
Library.
-------------------------

In succession to the successful SIN 2007 and SIN 2009, the 3rd
International Conference on Security of Information and Networks (SIN
2010) provides an international forum for presentation of research and
applications of security in information and networks. SIN 2010 conference
features contributed as well as invited papers, special sessions,
workshops, and tutorials on theory and practice.

SIN 2010 will feature the following keynote papers and talks:
- Elisa Bertino -- Professor of Computer Science and Research Director of
the Center for Education and Research in Information Assurance and
Security at Purdue University, USA;
- Erdal Cayirci -- Professor, NATO JWC & University of Stavanger, Norway;
- Sorin Alexander Huss -- Professor & Vice-President of CASED Research
Center for IT Security, Darmstadt, Germany;
- Josef Pieprzyk -- Professor, Macquarie U, Australia;
- Lyudmila Babenko -- Professor & Director of SFedU Educational and
Research Center for Contemporary Security Technologies, Taganrog, Russia;
- Alexander Tereshkin -- Principal Researcher, Invisible Things Lab.,
Rostov-on-Don, Russia.

Future SIN Conferences are scheduled to take place in Australia (2011) and
Germany (2012).

PROPOSALS
==================

Papers addressing all aspects of security in information and networks are
being sought. Researchers working on the following and related subjects
are especially encouraged: realization of security schemes, new
algorithms, experimenting with existing approaches; secure information
systems, especially distributed control and processing applications, and
security in networks; interoperability, service levels and quality issues
in such systems; information assurance, security, and public policy.
Doctoral students are encouraged to propose papers on ongoing research.

Original papers will be considered; submissions must not substantially
duplicate work that any of the authors has published elsewhere or has
submitted in parallel to any other conference or workshop that has
proceedings. All submitted papers will be reviewed by at least three
members of the program committee judging its originality, significance,
correctness, presentation and relevance. Authors are also encouraged to
propose position papers on practical studies and experiments, critique of
existing work, emerging issues, and novel ideas under development.

Enterprises and research centers developing, implementing, or using
security tools and frameworks are encouraged to propose application / tool
demo.

Half-day tutorials on fundamental to advanced subjects covering practical
implementation aspects of security are welcome.

Proposals of special session(s) to be held in the main conference are
welcome.

Proposals are invited for workshops to be held in conjunction with SIN
2010 Conference. The workshop proposal theme should be closely related to
the conference topics.

Broad areas of interest in security theory, technology and applications
will include, but are not limited to, the following:

* Access control and intrusion detection
* Autonomous and adaptive security
* Cryptographic techniques and key management
* Information assurance
* Network security and protocols
* Security in information systems
* Security tools and development platforms
* Security ontology, models, protocols & policies
* Secure ontology-based systems
* Standards, guidelines and certification
* Security-aware software engineering
* Trust and privacy

Following is a non-exhaustive list of subtopics of interest:

* Agent & MAS security
* Authentication & authorization
* Cryptographic hardware design
* Cryptography and cryptanalysis (symmetrical and asymmetrical)
* Digital signature
* Executables security
* Information security development processes
* Intrusion & fraud detection
* Malicious codes
* Mobile code and agent security
* Privacy
* Scripts and languages
* Side-channel attacks
* Signals & security
* Securing storage: SAN/NAS security
* Security ontology, models, protocols & policies
* Semantics of security
* Software security and testing
* Spam counter measures
* Steganography
* Vulnerability analysis
* Web security
* Wireless security

SUBMISSION OF PROPOSALS
=======================

Papers must be submitted electronically via the SIN 2010 Submission Site
at https://cmt.research.microsoft.com/SIN2010/. Title, author's name(s),
affiliation, mailing address, telephone, fax and email of the principal
author should be included. Maximum length for the proceedings is 10 pages
for full paper, 6 pages for short paper, 4 pages for fast abstract and
position statement, and 4 pages for demo and tutorial proposals. Extra
page charges apply. All papers should be written according to
double-column ACM conference format
(http://www.acm.org/sigs/publications/proceedings-templates).

All proposals for organizing workshops, tutorials, demos, and special
sessions are expected at the conference e-mail sin2010@sinconf.org.

All accepted papers will be published by ACM Press in a conference
proceedings and placed into ACM Digital Library. Extended versions of
selected papers will be invited for possible publication in a special
issue of an archival journal (TBA). Each accepted paper must be registered
to be included in the proceedings.

IMPORTANT DATES
===============

Please consult www.sinconf.org site for the most up-to-date info on the
following:

Workshop / Special Session Proposals: open.
Paper Submission by: 20 April 2010 (extended to 11 May 2010)
Tutorial Proposal by: 10 May 2010 (extended to 1 June 2010)
Tutorial Notification: 20 May 2010 (extended to 10 June 2010)
All Author Notification: 17 May 2010 (extended to 4 June 2010)
All Papers Camera Ready by: 1 June 2010 (extended to 22 June 2010)
Author Registration due date: 1 June 2010 (extended to 22 June 2010)
Tutorial Dates: 7-8 September 2010
Conference Dates: 9?10 September 2010
Workshops Date: 11 September 2010

ORGANIZATION & SPONSORS
=======================

Organized by
------------
-Dept. of Security of Information Technologies, South-Russian Regional
Scientific-Educational Center for Information Security Problems, Southern
Federal University, Taganrog, Rostov, Russia
-Internet Technologies Research Center, Eastern Mediterranean University,
North Cyprus
-The Information and Networked Systems Security (INSS) & The Intelligent
Systems Group (ISG), Dept. of Computing, Macquarie University, Australia
-CASED Research Center for IT Security, Technische Universität Darmstadt,
Germany

Supported by
------------
Russian Foundation for Basic Research
Taganrog Institute of Technology - Southern Federal University, Russia
National Research Institute of Electronics and Cryptology (UEKAE), Turkey
European University of Lefke, North Cyprus

Sponsored by
------------
(some pending)
Microsoft Russia
Sun Russia
Oracle Russia
EC-Council, USA
Dymera Strategies, USA
TBD further

Hosted by
---------
-Dept. of Security of Information Technologies, South-Russian Regional
Scientific-Educational Center for Information Security Problems, Southern
Federal University, Taganrog, Rostov-on-Don, Russia.

ORGANIZATION COMMITTEE
=====================

Honorary Chair: Vladislav Zakharevich (Rector of Southern Federal U,
Russia)

Conference Chair: Oleg Makarevich (Southern Federal U, Russia)
Conference Co-Chair: Atilla Elci (Middle East Technical U, Northern Cyprus
Campus, North Cyprus)
Conference Co-Chair: Mehmet Orgun (Macquarie U, Australia)
Conference Co-Chair: Sorin Alexander Huss (Technische Universität
Darmstadt, Germany)

Steering Committee Members:
Alexander Sukhinov (Southern Federal U, Russia)
Bülent Örencik (TUBITAK Marmara Research Center, Turkey)
Bart Preneel (Katholieke U Leuven, Belgium)
Elisa Bertino (Purdue U, USA)
Dervis Deniz (Eastern Mediterranean U, North Cyprus)

Program Chair: Ludmila Babenko (Southern Federal U, Russia)
Program Co-Chair: Vijay Varadharajan (Macquarie U, Australia)
Program Co-Chair: Alexander Chefranov (EMU, North Cyprus)

Tutorials Chair: Olga Peskova (Southern Federal U, Russia)
Tutorials Co-Chair: Behnam Rahnama (European University of Lefke, North
Cyprus)
Tutorials Co-chair: Christophe Doche (Macquarie U, Australia)

Workshops Chair: Evgeny Tumoian (Southern Federal U, Russia)
Workshops Co-chair: Rajan Shankaran (Macquarie U, Australia)

Publication Chair: Atilla Elci (Middle East Technical U, Northern Cyprus
Campus, North Cyprus)
Publication Co-Chair: Ekaterina Maro (Southern Federal U, Russia)

Treasurer: Vladimir Strukov (Southern Federal U, Russia)
Finance co-chair: Michael Hitchens (Macquarie U, Australia)

Registration Chair: Ekaterina Pakulova (Southern Federal U, Russia)
Registration Co-Chair: Duygu Çelik (EMU, North Cyprus)

Local Arrangements Chair: Maxim Anikeev (Southern Federal U, Russia)

e-Presence Chair: Igor Sidorov (Southern Federal U, Russia)

Promotion Chair: Georgy Evstafiev (Southern Federal U, Russia)
Promotion Co-Chair: Yi Mu (University of Wollongong, Australia)
Promotion Co-Chair: Zeki Bayram (EMU, North Cyprus)

Liaison for Americas: Carlos Becker Westphall (Federal University of Santa
Catarina, Brazil)

Volunteers Team: Students of IT-Security Department (Southern Federal U,
Russia)

INTERNATIONAL PROGRAM COMMITTEE
===============================

Full list of the IPC is available at www.sinconf.org.

GENERAL INQUIRIES
=================

For updated information, please refer to www.sinconf.org or the Conference
e-mail sin2010@sinconf.org.

No comments: