Tag: metrics

May 31

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

May 29

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions should be at most 16 pages, including
the bibliography and well-marked appendices, and should follow the LNCS
style. Submissions are to be made to the submission web site at
https://www.easychair.org/account/signin.cgi?conf=stm2012. Only pdf files
will be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 16, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes
in Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: June 16, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: stm2012@unimi.it

Apr 18

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions should be at most 16
pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at (to be announced). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of May 25, 2012 ({11:59 p.m. American Samoa time}).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: May 25, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias    Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: tm2012@unimi.it

Apr 11

IEEE Transactions on Information Forensics and Security Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

CALL FOR PAPERS

IEEE Transactions on Information Forensics and Security

Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

 

Guest Editors

Karl Aberer – École Polytechnique Fédérale de Lausanne, Switzerland (karl.aberer@epfl.ch)
Sen-ching Samson Cheung – University of Kentucky, USA (cheung@engr.uky.edu)
Jayant Haritsa – Indian Institute of Science, India (jharitsa@gmail.com)
Bill Horne – Hewlett-Packard Laboratories, USA (william.horne@hp.com)
Kai Hwang – University of Southern California, USA (kaihwang@usc.edu)
Yan (Lindsay) Sun – University of Rhode Island, USA (yansun@ele.uri.edu)

With the increasing drive towards availability of data and services anytime anywhere, privacy risks have significantly increased. Unauthorized disclosure, modification, usage, or uncontrolled access to privacy-sensitive data may result in high human and financial costs. In the distributed computing environments, trust plays a crucial role in mitigating the privacy risk by guaranteeing meaningful interactions, data sharing, and communications. Trust management is a key enabling technology for security and privacy enhancement. While privacy preservation and trust management are already challenging problems, it is imperative to explore how privacy-oriented and trust-oriented approaches can integrate to bring new solutions in safeguarding information sharing and protecting critical cyber infrastructure. Furthermore, there are questions about whether existing trust models and privacy preserving schemes are robust against attacks. This Call for Papers invites researchers to contribute original articles that cover a broad range of topics related to privacy preservation and trust management in cloud and distributed systems, with a focus on emerging networking contexts such as social media, cloud computing, and power grid systems.

 

Example topics include but are not limited to

  • Privacy Enhanced Technology: privacy preserving data mining, publishing, and disclosure; access control, anonymity, audit, and authentication; applied cryptography, cryptanalysis, and digital signatures in PET; abuse cases and threat modeling; theoretical models and formal methods; application of physical security for privacy enhancement.
  • Trust and Reputation Management: trust management architectures and trust models; quantitative metrics and computation; security of trust management protocols/systems; evaluation and test bed; trust related privacy enhancement solutions.
  • Privacy and Trust in Emerging Complex Systems including: social networking; cloud computing; power grid systems; sensor networks; Internet of Things; multimedia surveillance networks.
  • Other Related Topics such as trust and privacy policies; human factors and usability; censorship; economics of trust and privacy; behavior modeling.

Submission Procedure: Manuscripts are to be submitted according to the Information for Authors at http://www.signalprocessingsociety.org/publications/periodicals/forensics/forensics-authors-info/ using the IEEE online manuscript system, Manuscript Central. Papers must not have appeared or under review elsewhere.

 

Schedule

Submission deadline:                 May 31, 2012

First Review:                            September 12, 2012

Revisions Due:                          October 31, 2012

Final Decision:                           January 15, 2012

Final manuscript due:               February 20, 2013

Tentative publication date:      June 1, 2013

Mar 28

Sixth International Conference “Mathematical Methods, Models, and Architectures for Computer Networks Security”

Sixth International Conference
“Mathematical Methods, Models, and Architectures
for Computer Networks Security”
(MMM-ACNS-2012) and
Second International Workshop
“Scientific Analysis and Policy Support for Cyber Security”
(SA&PS4CS-2012)

October 17-20, 2012, St. Petersburg, Russia

http://comsec.spb.ru/mmm-acns12/
http://www.comsec.spb.ru/saps4cs12/

Main sponsors
1. Office of Naval Research Global, USA
2. European Office of Aerospace Research and Development USAF, USA
3. Russian Foundation for Basic Research

Organizers
* St. Petersburg Institute for Informatics and Automation of the Russian
Academy of Sciences (SPIIRAS)
* Binghamton University (State University of New York)

Title and scope

The previous International Conferences “Mathematical Methods, Models
and Architectures for Computer Networks Security” (MMM-ACNS-2001
(http://space.iias.spb.su/mmm-acns01/), MMM-ACNS-2003
(http://space.iias.spb.su/mmm-acns03/), MMM-ACNS-2005
(http://space.iias.spb.su/mmm-acns05/), MMM-ACNS-2007
(http://www.comsec.spb.ru/mmm-acns07/ and MMM-ACNS-2010
(http://www.comsec.spb.ru/mmm-acns10/)) organized by St. Petersburg
Institute for Informatics and Automation, Binghamton University (SUNY)
and supported by the European Office of Aerospace Research and
Development USAF, Office of Naval Research Global, and Russian
Foundation for Basic Research were successful. These conferences
demonstrated the high interest of the international scientific community
to the theoretical and practical aspects of the computer network and
information security.
The goals of MMM-ACNS-2012 Conference
(http://www.comsec.spb.ru/mmm-acns12/) is to bring together leading
researchers from academia and governmental organizations as well as
practitioners to advance the states of the art and practice in the area
of computer networks and information security with a focus on novel
theoretical aspects of computer network security, facilitate personal
interactions and discussions on various aspects of information
technologies in conjunction with computer network and information
security problems arising in large-scale computer networks.

The MMM-ACNS-2012 Conference will be carried out together with the
Second International Workshop “Scientific Analysis and Policy Support
for Cyber Security” (SA&PS4CS-2012)
(http://www.comsec.spb.ru/saps4cs12/) dedicated to the methods of
scientific analysis and policy support for response to cyber intrusions
and attacks.

Topics of interest

Papers offering novel research contributions to the theoretical
aspects of the computer network and information security are solicited
for submission.
Papers may present theory, technique, and applications on topics
including but not restricted to:
* Adaptive security
* Anti-malware techniques: detection, analysis, prevention
* Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques
* Applied cryptography
* Authentication, authorization and access control
* Cloud Security
* Computer and network forensics
* Covert channels
* Critical infrastructure protection
* Data and application security
* Data mining, machine learning, and bio-inspired approaches for security
* Deception systems and honeypots
* Denial-of-service attacks and countermeasures
* Digital Rights Management
* eCommerce, eBusiness and eGovernment security
* Embedded system security
* Formal analysis of security properties
* Information warfare
* Internet and web security
* Intrusion prevention, detection, and response
* Language-based security
* Network survivability
* New ideas and paradigms for security
* Operating system security
* Reliability and dependability
* Risks metrics, risk analysis and risk management
* Security and privacy in pervasive and ubiquitous computing
* Security event and information management
* Security for large-scale systems and critical infrastructures
* Security in social networks
* Security of emerging technologies: sensor, wireless/mobile,
peer-to-peer and overlay networks
* Security of autonomous agents and multi-agent systems
* Security modeling and simulation
* Security policies
* Security protocols
* Security verification
* Security visualization
* Self-protecting and healing
* Smartphone security
* Software protection
* Trusted computing
* Trust and reputation management
* Vulnerability assessment

The main topics of the SA&PS4CS-2012 are detection, discrimination,
and attribution of various activities of malefactors and response to
cyber intrusions and attacks including national level information
operations as well as identifying emergent cyber technologies supporting
social and political activity management and trans-national distributed
computing management.

Objective of the MMM-ACNS-2012 Conference

The main objectives of the MMM-ACNS-2012 Conference are to discuss
state-of-the-art in mathematical methods and models for computer
networks and information security to promote a better understanding of
recent achievements and trends in the computer network security, as well
as making use of recent achievements in the area of advanced information
technologies for computer network and information assurance.
Security assurance of resident information and computer networks’
software is one of the important problems of the modern computer science
and information technology. The problem importance is confirmed by ever
increasing multiplicity and diversity of threads and vulnerabilities of
computer networks, permanently increasing significance and value of
information itself, and by potentially devastating consequences of
successful attacks on integrity, resource availability and information
confidentiality. Unauthorized access to computer network facilities and
network resources, especially in global networks participating in
real-time control operations, may be truly disastrous.
There are several reasons for the complexity of the problem under
study. The growing size of the network, its interconnectivity, large
number of users, increasing number of vulnerable targets within the
network (communication protocols, operating systems, servers,
applications, etc.), and the appearance of effective and previously
unknown types of attacks are among them.
An additional objective of the conference is to bring together
researchers and developers from academia, industry and governmental
organizations to exchange ideas in a broad range of topics among
researchers, security system developers and users from research and
commercial perspective.
Since the scope of the conference covers areas presenting specific
interest for basic and applied research organizations, information about
the conference will be distributed among the corresponding organizations
in Russia and worldwide. So far preliminary agreement to participate in
the conference is received from leading Russian Institutions doing basic
and applied research in Computer Science, Telecommunication and Computer
Security and from companies developing relevant industrial applications.

Objective of the SA&PS4CS-2012 Workshop

The Workshop is dedicated to the methods of scientific analysis and
policy support for response to cyber intrusions and attacks. The main
topics of the Workshop are detection, discrimination, and attribution of
various activities of malefactors and response to cyber intrusions and
attacks including national level information operations as well as
identifying emergent cyber technologies supporting social and political
activity management and trans-national distributed computing management.
The Workshop aims to bring together researchers and practitioners
involved in multiple disciplines concerning scientific analysis and
policy support for cyber security to exchange ideas and to learn the
latest developments in this important field.
This Workshop could promote internationally shared understanding of
the technically supportable indications and warnings for various types
of intrusions and attacks, from the isolated to the highly coordinated,
and from the forensic to strategic.
The Workshop is planned on the last day of MMM-ACNS-2012.

Submitting a paper

The MMM-ACNS-2012 welcomes original papers from academic, government,
and industry contributors on mathematical approaches and models,
state-of-the-art techniques, and novel applications in the above
proposed areas. All submissions will be subjected to a thorough review
by at least three reviewers.
Draft versions of original full papers up to 14 A4 pages (but not
less than 6 pages) in English prepared according to the instructions
provided by Springer (http://www.springer.com/comp/lncs/Authors.html),
including abstract (up to 300 words) and keywords (5 to 8), should be
submitted by
May 27, 2012
or sooner through the upload facilities at the MMM-ACNS-2012 web site
http://www.comsec.spb.ru/mmm-acns12/ .
Only electronic submissions in PDF format will be considered.
Authors must also indicate the conference track to which the paper is
submitted.
The Program Committee will make the final selection based on peer
reviewers’ evaluation.
The primary focus is on high-quality original unpublished research,
case studies and implementation experiences.
Notification of acceptance/rejection will be disseminated by June 29,
2012.
Camera-ready versions of accepted papers (see below) are due July 11,
2012.

The speakers of the SA&PS4CS-2012 Workshop will be personally
invited. We intend to invite for participation in the session a number
of worldwide recognized specialists in cyber security from the USA,
Europe, China, Russia and other countries.

Proceedings

Program Committee plans to publish the MMM-ACNS-2012 Proceedings in
Springer series “Lecture Notes in Computer Science” (LNCS). The final
decision will be made by Springer after finalizing the reviewing
process. Instructions for authors will be provided at the MMM-ACNS-2012
web site (http://www.comsec.spb.ru/mmm-acns12/).
Camera ready paper submission can be uploaded through the
MMM-ACNS-2012 web site at http://www.comsec.spb.ru/mmm-acns12/.

The Proceeding of the SA&PS4CS-2012 Workshop also will be prepared.

Conference Languages

The working language of MMM-ACNS-2012 is English.

The working languages of SA&PS4CS-2012 Workshop are English and
Russian. Presentations will be simultaneously translated.

Location of the Conference and Workshop

According to the preliminary agreement, the MMM-ACNS-2012 conference
and the SA&PS4CS-2012 Workshop will take place in the historical
building “Palace of Grand Prince Vladimir Romanov,” now “House of
Scientists,” located in the heart of St. Petersburg, address: 26,
Dvortsovaya emb., St.Petersburg, 191186, Russia.
This venue allows the conference organizers to arrange for the
conference itself, as well as for the associated events (informal
discussions, reception, breaks, etc.).

Contact us

Program Committee Co-Chairman
Prof. Igor Kotenko
Head of Laboratory of Computer Security Problems
St. Petersburg Institute for Informatics and Automation
of the Russian Academy of Sciences
39, 14th Liniya, St. Petersburg, 199178, Russia
Telephone: +7-(812)-328-2642
Fax: +7-(812)-328-4450
E-mail:  mmmacns[AT]comsec[DOT]spb[DOT]ru

Local contact person
Irina Podnozova
Phone: 7-(812)-328-4446   Fax:  +7(812)-328-06-85
E-mail: ipp[AT]mail[DOT]iias[DOT]spb[DOT]su

Mar 28

ESORICS 2012 : Deadline extended

*** Deadline extended to April 10, 2012 ***

CALL FOR PAPERS

******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy — September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

– access control
– accountability
– ad hoc networks
– anonymity
– applied cryptography
– authentication
– biometrics
– database security
– data protection
– digital content protection
– digital forensic
– distributed systems security
– electronic payments
– embedded systems security
– inference control
– information hiding
– identity management
– information flow control
– integrity
– intrusion detection
– formal security methods
– language-based security
– network security
– phishing and spam prevention
– privacy
– risk analysis and management
– secure electronic voting
– security architectures
– security economics
– security metrics
– security models
– security and privacy in cloud scenarios
– security and privacy in complex systems
– security and privacy in location services
– security and privacy for mobile code
– security and privacy in pervasive/ubiquitous computing
– security and privacy policies
– security and privacy in social networks
– security and privacy in web services
– security verification
– software security
– steganography
– systems security
– trust models and management
– trustworthy user devices
– web security
– wireless security

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of April 10, 2012 (11:59 p.m.
American Samoa time). Authors of accepted papers must guarantee that
their papers will be presented at the conference.

IMPORTANT DATES
Paper submission due: April 10, 2012 (11:59 p.m. American Samoa time) [extended]
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012

GENERAL CHAIR
Fabio Martinelli
National Research Council – CNR, Italy

PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy

Moti Yung
Google Inc.,  USA

PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs – Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/

Mar 23

The 2012 International Conference on Security and Management (SAM’12)

======================================================================
CALL  FOR  PAPERS

EXTENDED Paper Submission Deadline: March 27, 2012

SAM’12
The 2012 International Conference on
Security and Management

July 16-19, 2012, Las Vegas, USA
http://sam.udmercy.edu/sam12
======================================================================

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. The proceedings of the congress that SAM is part of,
enjoys a high number of citations; about 26,000 citations so far.

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
Security algorithms, mobile network security, security in CDN
(Contents Distribution Networks), Virtual Private Network (VPN),
tracing techniques in internet, active networks, security in Grid,
web monitoring, network security engineering, transport-level
security, wireless network security, IP security, electronic mail
security.
O  Cryptographic Technologies:
Security protocols, key management techniques, cryptographic
technologies, applications of block and stream ciphers, applications
of public key cryptology, message authentication and hash functions,
anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
Surveillance technologies, security policies, security for protocol
management, location management, QoS management, resource management,
channel management, mobility management, digital contents copyright
protection, system security management, network security management,
management in network equipment, Storage Area Networks (SAN)
management, information security management, government security
policy, web penetration testing, security operations,
vulnerabilities management.
O  Security Applications:
Security in e-Commerce and M-Commerce, secure OS, watermarking,
high-tech systems at airports, emerging technologies and
applications, Cloud computing security, database security, data
mining security, cyber security automation.
O  Biometrics and Forensics:
Novel biometric methods, forensics, biological security technologies,
face recognition systems, signature recognition systems, cyber
forensics, forensic analysis, biometric technologies for security,
feature extraction and matching algorithms.
O  Hardware Security:
Embedded systems security, cryptographic processors and co-processors,
security architectures, true and pseudorandom number generators,
side channel attacks, fault attacks, hardware tamper resistance,
smart card processors, secure storage devices.
O  Information Assurance:
Mission assurance, risk assessment and risk management, continuity
of operations and business impact analysis, cyber security compliance,
security auditing, security-savvy software development, disaster
recovery, business continuity analysis, access control, secure use
of software, secure performance.
O  Computer Security:
Firewall systems, hacking techniques and related issues, intrusion
detection system (IDS), honeypot, virus issues (detection,
prevention …), trusted computing, alert correlation, attack graphs,
incident responding, malware analysis, incident responding, malware
analysis, intrusion detection.
O  Security Education:
Computer security education, network security education, cyber
security education, cyber security body of knowledge, information
assurance education.

SUBMISSION OF PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam12
Submissions must be uploaded by March 27, 2012 and they must be in
either MS doc or pdf formats (about 7 pages including all figures,
tables, and references – single space, font size of 10 to 12). All
reasonable typesetting formats are acceptable (later, the authors of
accepted papers will be asked to follow a particular typesetting format
to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication
elsewhere. The first page of the paper should include: title of the
paper, name, affiliation, postal address, and email address for each
author. The first page should also identify the name of the Contact Author
and a maximum of 5 topical keywords that would best represent the content
of the paper. The name of the conference (ie, SAM) that the paper is
being submitted for consideration must be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final
Camera-Ready papers (if accepted) will be limited to 7 (two-column IEEE
style) pages.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee will be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees by using a double-blinded review
process. In addition, all papers whose authors include a member of the
conference program committee will be evaluated using the double-blinded
review process. (Essay/philosophical papers will not be refereed but may be
considered for discussion/panels).

Authors whose papers are accepted will be instructed to upload their papers
to a particular web site for publication – the uploaded papers to the
publication web site will only be checked for correct typesetting. At this
point, authors will be required to attest to the originality of their work
(ie, declaring that no part of the work is plagiarized and the paper does not
suffer from any acts of plagiarism.)

Proceedings of SAM will be published in printed conference books (ISBN)
and will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper (science citation databases such as: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (covers the core scientific
literature in Science; about 90% of inclusions are journals; only about 9%
are proceedings; worldcomp tracks are selected to be among the 9% – accessable
from INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN
International); and others. Though, there is no guarantee that the proceedings
will also be included in EI Compendex/Elsevier indexings, in the past, the
proceedings of SAM was included in these databases. Therefore, we will also
be sending the proceedings for indexing procedures to EI Compendex/Elsevier.
The printed proceedings/books will be available for distribution on site at
the conference.

In addition to the publication of the proceedings, selected authors will be
invited to submit extended versions of their papers for publication in a
number of research books contracted with various publishers – these books will
be composed after the conference. Also, many chairs of tracks will be forming
journal special issues to be published after the conference.

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except for the submission
is limited to 2 pages. On the first page, the author should state that “This
paper is being submitted as a poster”. Poster papers (if accepted) will be
published if and only the author of the accepted paper wishes to do so.

IMPORTANT DATES:

March 27, 2012:    Submission of full papers (about 7 pages)
April 26, 2012:    Notification of acceptance (+/- 2 days)
May 12, 2012:      Final papers + Copyright/Consent + Registration
July 16-19, 2012:  The 2012 International Conference on Security and
Management (SAM’12)

GENERAL INFORMATION:

SAM conference is being held jointly (same location and dates) with a
number of other research conferences, WORLDCOMP congress.
The congress is the largest annual gathering of researchers in computer
science, computer engineering and applied computing. We anticipate
to have 2,100 or more attendees from over 80 countries.
The congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), and many other distinguished speakers. To get a feeling
about the conferences’ atmosphere, see the 2011 delegates photos
available at: http://worldcomp.phanfare.com/5408606

An important mission of the congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines. 70148

MEASURABLE SCIENTIFIC IMPACT OF PROCEEDINGS:

The conference proceedings enjoy a high number of citations. As of
March 2012, papers published in each track of the proceedings have
received the following number of citations: 252 citations to BIOCOMP
papers; 116 to CDES papers; 65 to CGVR papers; 55 to CSC papers; 271 to
DMIN papers; 69 to EEE papers; 1,286 to ERSA papers; 504 to ESA papers;
176 to FCS papers; 9,408 to FECS papers; 157 to GCA papers; 75 to GEM
papers; 2,172 to ICAI papers; 1,529 to ICOMP papers; 1,247 to ICWN papers;
571 to IKE papers; 255 to IPCV papers; 137 to MSV papers; 5,239 to PDPTA
papers; 496 to SAM papers; 1,390 to SERP papers; and 177 to SWWS papers.
In total, over 25,600 citations have been made (so far) to papers
published in the proceedings of this federated joint conferences. Refer
to the URLs below to see the actual citation numbers (each is a link to
a live search and so it may take a few seconds for the data to pull up):

http://academic.research.microsoft.com/Conference/1816/biocomp-bioinformatics-&-computational-biology
http://academic.research.microsoft.com/Conference/1845/cdes-international-conference-on-computer-design/
http://academic.research.microsoft.com/Conference/1852/cgvr-international-conference-on-computer-graphics-and-virtual-reality/
http://academic.research.microsoft.com/Conference/1887/csc-international-conference-on-scientific-computing/
http://academic.research.microsoft.com/Conference/1920/dmin-int-conf-on-data-mining/
http://academic.research.microsoft.com/Conference/1891/csreaeee-international-conference-on-e-business-enterprise-information-systems-e-government/
http://academic.research.microsoft.com/Conference/679/ersa-engineering-of-reconfigurable-systems-and-algorithms/
http://academic.research.microsoft.com/Conference/681/esa-embedded-systems-and-applications/
http://academic.research.microsoft.com/Conference/1981/fcs-international-conference-on-foundations-of-computer-science/
http://academic.research.microsoft.com/Conference/1983/fecs-conference-on-frontiers-in-education/
http://academic.research.microsoft.com/Conference/1998/gca-international-conference-on-grid-computing-and-applications/
http://academic.research.microsoft.com/Conference/2467/gem-international-conference-on-genetic-and-evolutionary-methods/
http://academic.research.microsoft.com/Conference/7/ic-ai-international-conference-on-artificial-intelligence/
http://academic.research.microsoft.com/Conference/5/icomp-international-conference-on-internet-computing/
http://academic.research.microsoft.com/Conference/48/icwn-international-conference-on-wireless-networks/
http://academic.research.microsoft.com/Conference/65/ike-information-and-knowledge-engineering/
http://academic.research.microsoft.com/Conference/2114/ipcv-international-conference-on-image-processing-computer-vision-and-pattern-recognition/
http://academic.research.microsoft.com/Conference/2209/msv-int-conf-on-modeling-simulation-&-visualization-methods/
http://academic.research.microsoft.com/Conference/214/pdpta-parallel-and-distributed-processing-techniques-and-applications/
http://academic.research.microsoft.com/Conference/332/sam-security-and-management/
http://academic.research.microsoft.com/Conference/361/serp-software-engineering-research-and-practice/
http://academic.research.microsoft.com/Conference/2308/swws-conference-on-semantic-web-and-web-services/

USEFUL WEB LINKS:

1. Web site of SAM’12:
http://sam.udmercy.edu/sam12
2. The 2011 congress delegates photos are available at:
http://worldcomp.phanfare.com/5408606
3. This announcement contains updated and current information (correct
as of the date of this message). The information that appears in this
announcement supersedes earlier ones.

CONTACT:
Inquiries should be sent to: sc@world-comp.org

Mar 06

17th European Symposium on Research in Computer Security (ESORICS 2012)

CALL FOR PAPERS

******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy — September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

– access control
– accountability
– ad hoc networks
– anonymity
– applied cryptography
– authentication
– biometrics
– database security
– data protection
– digital content protection
– digital forensic
– distributed systems security
– electronic payments
– embedded systems security
– inference control
– information hiding
– identity management
– information flow control
– integrity
– intrusion detection
– formal security methods
– language-based security
– network security
– phishing and spam prevention
– privacy
– risk analysis and management
– secure electronic voting
– security architectures
– security economics
– security metrics
– security models
– security and privacy in cloud scenarios
– security and privacy in complex systems
– security and privacy in location services
– security and privacy for mobile code
– security and privacy in pervasive/ubiquitous computing
– security and privacy policies
– security and privacy in social networks
– security and privacy in web services
– security verification
– software security
– steganography
– systems security
– trust models and management
– trustworthy user devices
– web security
– wireless security

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of March 31, 2012 (11:59 p.m.
American Samoa time). Authors of accepted papers must guarantee that
their papers will be presented at the conference.

IMPORTANT DATES
Paper submission due: March 31, 2012 (11:59 p.m. American Samoa time)
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012

GENERAL CHAIR
Fabio Martinelli
National Research Council – CNR, Italy

PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy

Moti Yung
Google Inc.,  USA

PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs – Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/

Mar 06

The 2012 International Conference on Security and Management (SAM’12)

CALL  FOR  PAPERS

SAM’12
The 2012 International Conference on
Security and Management

July 16-19, 2012, Las Vegas, USA

http://sam.udmercy.edu/sam12

IMPORTANT DATES:

March 12, 2012:    Submission of full papers (about 7 pages)
April 12, 2012:    Notification of acceptance (+/- two days)
April 26, 2012:    Final papers + Copyright/Consent + Registration
July 16-19, 2012:  The 2012 International Conference on Security
and Management (SAM’12)

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. The proceedings of the congress that SAM is part of, enjoys
a high number of citations; over 25,000 citations so far.

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
Security algorithms, mobile network security, security in CDN
(Contents Distribution Networks), Virtual Private Network (VPN),
tracing techniques in internet, active networks, security in Grid,
web monitoring, network security engineering, transport-level
security, wireless network security, IP security, electronic mail
security.
O  Cryptographic Technologies:
Security protocols, key management techniques, cryptographic
technologies, applications of block and stream ciphers, applications
of public key cryptology, message authentication and hash functions,
anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
Surveillance technologies, security policies, security for protocol
management, location management, QoS management, resource management,
channel management, mobility management, digital contents copyright
protection, system security management, network security management,
management in network equipment, Storage Area Networks (SAN)
management, information security management, government security
policy, web penetration testing, security operations,
vulnerabilities management.
O  Security Applications:
Security in e-Commerce and M-Commerce, secure OS, watermarking,
high-tech systems at airports, emerging technologies and
applications, Cloud computing security, database security, data
mining security, cyber security automation.
O  Biometrics and Forensics:
Novel biometric methods, forensics, biological security technologies,
face recognition systems, signature recognition systems, cyber
forensics, forensic analysis, biometric technologies for security,
feature extraction and matching algorithms.
O  Hardware Security:
Embedded systems security, cryptographic processors and co-processors,
security architectures, true and pseudorandom number generators,
side channel attacks, fault attacks, hardware tamper resistance,
smart card processors, secure storage devices.
O  Information Assurance:
Mission assurance, risk assessment and risk management, continuity
of operations and business impact analysis, cyber security compliance,
security auditing, security-savvy software development, disaster
recovery, business continuity analysis, access control, secure use
of software, secure performance.
O  Computer Security:
Firewall systems, hacking techniques and related issues, intrusion
detection system (IDS), honeypot, virus issues (detection,
prevention …), trusted computing, alert correlation, attack graphs,
incident responding, malware analysis, incident responding, malware
analysis, intrusion detection.
O  Security Education:
Computer security education, network security education, cyber
security education, cyber security body of knowledge, information
assurance education.

SUBMISSION OF PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam12
Submissions must be uploaded by March 12, 2012 and they must be in
either MS doc or pdf formats (about 7 pages including all figures,
tables, and references – single space, font size of 10 to 12). All
reasonable typesetting formats are acceptable (later, the authors of
accepted papers will be asked to follow a particular typesetting format
to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication
elsewhere. The first page of the paper should include: title of the
paper, name, affiliation, postal address, and email address for each
author. The first page should also identify the name of the Contact Author
and a maximum of 5 topical keywords that would best represent the content
of the paper. The name of the conference (ie, SAM) that the paper is
being submitted for consideration must be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final
Camera-Ready papers (if accepted) will be limited to 7 (two-column IEEE
style) pages.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee will be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees by using a double-blinded review
process. In addition, all papers whose authors include a member of the
conference program committee will be evaluated using the double-blinded
review process. (Essay/philosophical papers will not be refereed but may be
considered for discussion/panels).

Authors whose papers are accepted will be instructed to upload their papers
to a particular web site for publication – the uploaded papers to the
publication web site will only be checked for correct typesetting. At this
point, authors will be required to attest to the originality of their work
(ie, declaring that no part of the work is plagiarized and the paper does not
suffer from any acts of plagiarism.)

Proceedings of SAM will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper (science citation databases such as: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (covers the core
scientific literature in Science; about 90% of inclusions are journals;
only about 9% are proceedings; worldcomp tracks are selected to be among
the 9% – accessable from INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit,
Qwam, and STN International); and others. Though, there is no guarantee that
the proceedings will also be included in EI Compendex/Elsevier indexings,
in the past, the proceedings in which SAM was part of were included in
these databases. Therefore, we will also be sending the proceedings for
indexing procedures to EI Compendex/Elsevier. The printed proceedings/books
will be available for distribution on site at the conference.

In addition to the publication of the proceedings, selected authors will be
invited to submit extended versions of their papers for publication in a
number of research books contracted with various publishers – these books
will be composed after the conference. Also, many chairs of tracks will be
forming journal special issues to be published after the conference.

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except for the submission
is limited to 2 pages. On the first page, the author should state that “This
paper is being submitted as a poster”. Poster papers (if accepted) will be
published if and only the author of the accepted paper wishes to do so.
See: http://sam.udmercy.edu/sam12/call-for-posters.html

GENERAL INFORMATION:

The SAM conference is being held jointly (same location and dates) with a
number of other research conferences (WORLDCOMP). WORLDCOMP is the
largest annual gathering of researchers in computer science, computer
engineering and applied computing. We anticipate to have 2,100 or more
attendees from over 80 countries. WORLDCOMP 2012 will be composed of
research presentations, keynote lectures, invited presentations, tutorials,
panel discussions, and poster presentations. In recent past, keynote/
tutorial/panel speakers have included: Prof. David A. Patterson (pioneer,
architecture, U. of California, Berkeley), Dr. K. Eric Drexler (known as
Father of Nanotechnology), Prof. John H. Holland (known as Father of
Genetic Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of
Grid Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), and many other distinguished speakers. To get a feeling
about the conferences’ atmosphere, see the 2011 delegates photos
available at: http://worldcomp.phanfare.com/5408606

An important mission of WORLDCOMP is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.  70148

CO-SPONSORS:

Currently being prepared – The ACADEMIC co-sponsors of the last offering of
the congress (2011) included research labs and centers affiliated with (a
partial list): University of California, Berkeley; Harvard University;
Massachusetts Institute of Technology (MIT); University of Texas at
Austin; University of Southern California; Minnesota Supercomputing
Institute, University of Minnesota; Germany’s University of Siegen; UMIT,
Institute of Bioinformatics and Translational Research, Austria; University
of Iowa; Russian Academy of Sciences, Russia; University of Naples
Federico II, Italy; University of Naples Parthenope, Italy; Second
University of Naples, Italy; ICEL, Texas A&M University Com.; University
of North Dakota; and others. CORPORATE Co-Sponsors and Sponsors at-large
included (a partial list): Intel Corporation; Microsoft Research; Altera
Corporation; Pico Computing; SuperMicro Computer, Inc., USA; High
Performance Computing for Nanotechnology (HPCNano); International Society
of Intelligent Biological Medicine; World Academy of Biomedical Sciences
and Technologies; Int’l Council on Medical and Care Compunetics; UK
Department for Business, Enterprise and Regulatory Reform; Scientific
Technologies Corporation; and HoIP – Health without Boundaries; and others.

MEASURABLE SCIENTIFIC IMPACT OF WORLDCOMP:

The proceedings of WORLDCOMP enjoys a high number of citations (ICAI
is an important part of WORLDCOMP). As of February 28, 2012, papers published
in each track of the proceedings have received the following number of
citations: 252 citations to BIOCOMP papers; 116 to CDES papers; 65 to CGVR
papers; 55 to CSC papers; 271 to DMIN papers; 69 to EEE papers; 1289 to
ERSA papers; 504 to ESA papers; 176 to FCS papers; 9416 to FECS papers; 157
to GCA papers; 75 to GEM papers; 2277 to ICAI papers; 1539 to ICOMP papers;
1247 to ICWN papers; 571 to IKE papers; 255 to IPCV papers; 137 to MSV
papers; 5239 to PDPTA papers; 496 to SAM papers; 1390 to SERP papers; and
177 to SWWS papers. In total, over 25,000 citations have been made (so far)
to papers published in the proceedings of WORLDCOMP conferences.

USEFUL WEB LINKS:

1. Web site of SAM’12:
http://sam.udmercy.edu/sam12
2. The 2011 congress delegates photos are available at:
http://worldcomp.phanfare.com/5408606
3. This announcement contains updated and current information (correct
as of the date of this message). The information that appears in this
announcement supersedes earlier ones.

CONTACT:
Inquiries should be sent to: editor@world-comp.org

Mar 05

CFP 9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others)

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

– Full Paper: A full paper presents a work where the research is
completed or almost finished.  Authors of regular submitted papers
will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position
paper.
– Position Paper: A position paper presents results that are
preliminary or that simply require few pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures, or results of scientific research
(bibliographic, experimental, theoretical, or other) focused on one
of the conference topics. The acceptance of a position paper is
restricted to the categories of “short paper” or “poster”.

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission),
which is described at http://secrypt.icete.org/paper_formats.asp.
Submission page limit is 10 pages for full paper and 6 pages for position papers.
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.

IMPORTANT DATES
Full Paper submission: March 19, 2012
Authors Notification (full papers): May 4, 2012
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita’ degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore

PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita’ di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita’ degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int’l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int’l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int’l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int’l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int’l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
– Geoffrey Charles Fox, Indiana University, United States
http://www.icete.org/KeynoteSpeakers.aspx