FW: Call for Papers SEC 2010, 20-23 Sept 2010, Brisbane - Security & Privacy − Silver Linings in the Cloud
FYI This is the Silver Jubilee SEC at 20-23 Sept 2010 in Brisbane www.sec2010.org<http://www.sec2010.org> . Matching the Silver Jubilee this year's theme is “Security & Privacy − Silver Linings in the Cloud”. Please find below (and attached) the Call for Papers. The deadline for Submission of papers is January 31, 2010, and don’t expect it to be extended, as the whole IFIP WCC 2010 has a quite strict timeline. Cheers Colin [cid:image001.jpg@01CA506F.7EF41DC0]<http://www.wcc2010.com/> Call for papers 25th IFIP International Information Security Conference Security & Privacy − Silver Linings in the Cloud www.sec2010.org<http://www.sec2010.org> [cid:image002.gif@01CA506F.7EF41DC0] Conference Topics [cid:image003.gif@01CA506F.7EF41DC0] Printable version<http://www.wcc2010.com/SEC2010/cfp_SEC2010.pdf> SEC-2010 is the 25th in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP World Computer Congress celebrating both the Golden Jubilee of IFIP and the Silver Jubilee of SEC. Papers offering novel and mature research contributions, in any aspect of information security and privacy, are solicited for submission to the conference. Papers may present theory, applications, or practical experiences on topics including but not limited to: (Authors of the best submissions will be invited to submit updated and significantly extended versions of their papers into Computers & Security.) Access Control Anonymity Applications of Cryptography Attacks and Malicious Software Authentication and Authorization Biometrics and Applications Critical ICT Resources Protection Data and Systems Integrity Data Protection ECommerce Privacy & Security Enterprise Security Identity Management Information Hiding Information Warfare Internet and Web Security Intrusion Detection Mobile Computing Security Mobile Networks Security Network Security Protocols Multilateral Security Peer-to-Peer Security Privacy Enhancing Technologies RFID Privacy & Security Risk Analysis and Management Secure Electronic Voting Secure Sensor Networks Secure Systems Development Security Architectures Security Economics Security Education Security Management Security Metrics Semantic Web Privacy & Security Smart Cards Software Security Spam, SPIT, SPIM Trust Management and Models Trusted Computing Ubiquitous Privacy & Security Programme Committee Chairs Kai Rannenberg, Goethe University Frankfurt, Germany Vijay Varadharajan, Macquarie University, Australia Publication Chair Christian Weber, Goethe University Frankfurt, Germany Programme Committee Members A. Aldini, University of Urbino, Italy C. J. Armstrong, Curtin University, Australia V. Atluri, Rutgers University, USA T. Aura, Microsoft Research, UK M. Bañón, Epoche & Espri, Spain R. L. Baskerville, Georgia State University, USA J. Benaloh, Microsoft Research, USA C. Benzmüller, International University, Germany J. Biskup, T.U. Dortmund, Germany R. Botha, NMMU, South Africa L. Bussard, Microsoft EMIC, Germany J. Camenisch, IBM Research, Switzerland K. Cameron, Microsoft, USA L. Chen, Hewlett-Packard Labs, UK M. Christodorescu, IBM TJ Watson Research Center, USA R. Clarke, Xamax Consultancy Pty Ltd, ANU and UNSW, Australia R. Clayton, University of Cambridge, UK C.J.F. Cremers, ETH Zurich, Switzerland M. Crompton, Information Integrity Solutions and NICTA N. Cuppens-Boulahia, TELECOM Bretagne, France E. Dawson, QUT, Australia S. De Capitani di Vimercati, Universita` degli Studi di Milano, Italy B. de Decker, K.U. Leuven, Belgium M. de Soete, Security4Biz, Belgium Y. Deswarte, LAAS-CNRS, France G. Dhillon, Virginia Commonwealth University, USA T. Dimitrakos, BT Innovate & Design, UK R. Dodge, U.S. Military Academy, USA J. Eloff, University of Pretoria, South Africa A. Escudero-Pascual, it46.se, Sweden H. Federrath, University of Regensburg, Germany S. Fischer, University of Lübeck, Germany S. Fischer-Huebner, Karlstad University, Sweden U. Flegel, SAP, Germany S. N. Foley, University College Cork, Ireland F. Freiling, Mannheim University, Germany A. Fuchsberger, Microsoft Corp, USA W. Fumy, Bundesdruckerei, Germany S. Furnell, University of Plymouth, UK M. Gasson, University of Reading, UK V. D. Gligor, Carnegie Mellon University, USA D. Gollmann, TU Hamburg-Harburg, Germany R. Grimm, University of Koblenz, Germany D. Gritzalis, Athens University of Economics & Business, Greece M. Hansen, Independent Centre for Privacy Protection, Germany H. Hedbom, Karlstad Universitet, Sweden M. Heisel, University Duisburg-Essen, Germany U. Helmbrecht, ENISA, EU P. Herrmann, NTNU, Norway A. Hevia, Universidad de Chile, Chile M. Hoelbl, Maribor University, Slovenia J.-H. Hoepman, TNO & Radboud University Nijmegen, the Netherlands E. Humphreys, XISEC, UK C. Irvine, Naval Postgraduate School, Monterey, USA S. Jajodia, George Mason University, USA L. Janczewski, Univ. of Auckland, New Zealand D.-O. Jaquet-Chiffelle, Bern Univ. of Applied Sciences, Switzerland A. Jøsang, University of Oslo, Norway & QUT, Australia W. Jonker, Philips Research & Twente University, The Netherlands M.C. Kang, ISO/IEC JTC 1/SC 27/WG 4 S. Katsikas, University of Piraeus, Greece D. Kesdogan, University of Siegen, Germany H. Kikuchi, Tokai University, Japan V. Kisimov, University of World and National Economy, Sofia, Bulgaria S. Knapskog, NTNU/Q2S, Norway K.-P. Kossakowski, PRESECURE Consulting GmbH, Germany U. Kühn, DZ BANK AG, Germany K. Kursawe, Philips Research, The Netherlands B. LaMacchia, Microsoft, USA C. E. Landwehr, University of Maryland, USA P. J. Lee, POSTECH, Korea H. Leitold, Graz University, Austria A. Levi, Sabanci University, Istanbul, Turkey T. Levin, Naval Postgraduate School, Monterey, USA J. Lopez, University of Malaga, Spain V. Lotz, SAP Research, France N. Luttenberger, Kiel University, Germany M. Marhöfer, Nokia Siemens Networks, Germany S. Marsh, Communications Research Centre, Canada F. Martinelli, National Research Council, Italy V. Matyas, Masaryk University Brno, Czech Republic S. Mauw, Uni Luxembourg, Luxembourg C. Maziero, PUCPR, Brazil C. A. Meadows, Naval Research Laboratory, USA M. Meints, Dataport, Germany N. Miloslavskaya, The National Research Nuclear Institute MEPhI, Russia C. Mitchell, Royal Holloway, University of London, UK R. Molva, EURECOM, France G. Mueller, Freiburg University, Germany Y. Murayama, Iwate Prefectural University, Japan M. Ohlin, FMV, Sweden (†) E. Okamoto, University of Tsukuba, Japan R. Oppliger, eSECURITY Technologies, Switzerland J. I. Pagter, Alexandra Instituttet, Denmark C. Palmer, IBM Research; Dartmouth College, USA A. Pasic, ATOS Origin, Spain P. Peleties, USB BANK PLC, Cyprus G. Pernul, University of Regensburg, Germany G. L. Peterson, Air Force Institute of Technology, USA M. Petkovic, Philips Research / Eindhoven University of Technology, Netherlands A. Pfitzmann, Dresden University of Technology, Germany U. Pinsdorf, Microsoft EMIC, Germany H. Pohl, Univ. of Applied Sciences Bonn-Rhein-Sieg, Germany M. Pollitt, University of Central Florida, USA R. Posch, TU Graz, Austrian Federal Government J. Posegga, University of Passau, Germany B. Preneel, K.U. Leuven, Belgium G. Price, Royal Holloway, University of London, UK C. W Probst, Technical University of Denmark S. Qing, Chinese Academy of Sciences, China M. Reichenbach, Commerzbank, Germany C. Rieder, Lucerne Univ. of Applied Sciences & Arts, Switzerland M. Riguidel, ENST, France Y. Roudier, EURECOM, France P. Samarati, University of Milan, Italy A. Sarma, NEC Laboratories Europe, Germany R Sasaki, Dendai University, Japan D. Sauveron, University of Limoges, France I. Schaumüller-Bichl, Univ. of Applied Sciences Hagenberg, Austria A. B. Seip, Kredittilsynet, Norway S. Shenoi, University of Tulsa, USA E. Snekkenes, Gjøvik University College, Norway R. von Solms, NMMU, South Africa H. von Sommerfeld, Rohde & Schwarz SIT, Germany F. Stajano, University of Cambridge, UK S. Steinbrecher, Dresden University of Technology, Germany R. K Subramaniam, Valiant Technologies, India M. Swimmer, Trend Micro, USA P. Syverson, Naval Research Laboratory, USA K. Takaragi, Hitachi, Japan S. Teufel, University of Fribourg, Switzerland M. Ullmann, BSI & Univ. of AS Bonn-Rhein-Sieg, Germany P. M. B. Veiga, Universidade de Lisboa, Portugal T. Virtanen, Finland C. Vishik, Intel, USA J. Vyskoc, VaF, Slovakia M. Waidner, IBM, USA C. Wallis, Dept. of Internal Affairs, New Zealand Government G. Weck, INFODAS GmbH, Germany N. Weiler, Sensaco, Switzerland S. Weiss, KPMG AG Wirtschaftspruefungsgesellschaft, Germany T. Welzer, University of Maribor, Slovenia S. Wohlgemuth, National Institute of Informatics, Japan S. Wolthusen, Royal Holloway, University of London, UK J. Zhou, I2R, Singapore A. Zugenmaier, DoCoMo Research, Germany [cid:image004.jpg@01CA506F.7EF41DC0] [cid:image005.gif@01CA506F.7EF41DC0] Submission of papers: January 31, 2010 Notification to authors: April 23, 2010 Camera-ready copies: May 15, 2010 Instructions for paper submission * Papers must not substantially overlap with papers that have been published or are simultaneously submitted to a journal or another conference with proceedings. * Papers must be written in English; they should be at most 12 pages in total, including bibliography and well-marked appendices. Papers should be intelligible without appendices, if any. * Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer. * Submitted and accepted papers must follow the publisher’s guidelines for the IFIP AICT Series (www.springer.com/series/6102<http://www.springer.com/series/6102>, Author templates). * At least one author of each accepted paper must register for the conference and present the paper. Inclusion of the paper will be dependent upon one registration for the paper. * All papers must be submitted in electronic form through the web via www.sec2010.org<http://www.sec2010.org> by January 31, 2010. The Congress The World Computer Congress (WCC2010) will bring together IT research and industry sectors in one event. The congress will combine 17 IFIP conferences with partner conferences from other international and regional, specialist IT organisations. The congress content will be presented in eight program streams. Delegates may attend any of the participating conference, industry or partner events as well as networking, social, technical tours and certification courses offered at the congress. [cid:image007.jpg@01CA5075.88664580] * Wireless Communications and Information Technology in Developing Countries (WCITD 2010) * Biologically-Inspired Collaborative Computing (BICC 2010) * Distributed and Parallel Embedded Systems (DIPES 2010) * Artificial Intelligence in Theory and Practice (IFIP AI 2010) * Network of the Future (NF) * Enterprise Architecture, Integration, Interoperability and Networking (EAI2N) * Human Choice and Computers International Conference (HCC9 2010) Track 2: Virtual Technologies and Social Shaping [cid:image009.jpg@01CA5075.88664580] * International Information Security Conference 2010 (SEC 2010) * Critical Information Infrastructure Protection (CIP) * Human Choice and Computers International Conference (HCC9 2010) Track 3: Surveillance and Privacy [cid:image011.jpg@01CA5075.88664580] * Theoretical Computer Science (TCS 2010) * Human Computer Interaction (HCI 2010) [cid:image013.jpg@01CA5075.88664580] * Key Competencies in the Knowledge Society (KCKS 2010) * History of Computing (HC) [cid:image015.jpg@01CA5075.88664580] * Global Information Systems Processes (GISP) * E-Government and E-Services (EGES) * Human Choice and Computers conference (HCC9 2010) Track 1: Ethics and ICT Governance [cid:image017.jpg@01CA5075.88664580] * E-Health (EHEALTH) [cid:image019.jpg@01CA5075.88664580] * Human Choice and Computers International Conference (HCC9 2010) Track 4: ICT and Sustainable Development [cid:image021.jpg@01CA5075.88664580] * Entertainment Computing Symposium (ECS 2010) ==== CAUTION: This email message and any attachments contain information that may be confidential and may be LEGALLY PRIVILEGED. If you are not the intended recipient, any use, disclosure or copying of this message or attachments is strictly prohibited. If you have received this email message in error please notify us immediately and erase all copies of the message and attachments. Thank you. ====
participants (1)
-
Colin Wallis