SECURWARE 2009 - SECURWARE 2009 The Third (International Conference on Emerging Security Information Systems and Technologies)
View: 2020
Website http://www.iaria.org/conferences2009/CfPSECURWARE09.html |
Edit Freely
Category SECURWARE 2009
Deadline: January 20, 2009 | Date: June 18, 2009
Venue/Country: Athens, Greece
Updated: 2010-06-04 19:32:22 (GMT+9)
Call For Papers - CFP
The SECURWARE 2009 The Third (International Conference on Emerging Security Information Systems and Technologies) is an event covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related to low enforcement, security data mining, malware models, etc.Security, defined for ensuring protected communication among terminals and user applications across public and private networks, is the core for guaranteeing confidentiality, privacy, and data protection. Security affects business and individuals, raises the business risk, and requires a corporate and individual culture. In the open business space offered by Internet, it is a need to improve defences against hackers, disgruntled employees, and commercial rivals. There is a required balance between the effort and resources spent on security versus security achievements. Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs. Other technical aspects are related to the communication speed versus complex and time consuming cryptography/security mechanisms and protocols. Digital Ecosystem is defined as an open decentralized information infrastructure where different networked agents, such as enterprises (especially SMEs), intermediate actors, public bodies and end users, cooperate and compete enabling the creation of new complex structures. In digital ecosystems, the actors, their products and services can be seen as different organisms and species that are able to evolve and adapt dynamically to changing market conditions.Digital Ecosystems lie at the intersection between different disciplines and fields: industry, business, social sciences, biology, and cutting edge ICT and its application driven research. They are supported by several underlying technologies such as semantic web and ontology-based knowledge sharing, self-organizing intelligent agents, peer-to-peer overlay networks, web services-based information platforms, and recommender systems.To enable safe digital ecosystem functioning, security and trust mechanisms become essential components across all the technological layers. The aim is to bring together multidisciplinary research that ranges from technical aspects to socio-economic models. As a multi-track event, SECURWARE 2009 will serve as a forum for researchers from the academia and the industry, professionals, standard developers, policy makers and practitioners to exchange ideas. The topics could be on techniques and applications, best practices, awareness and experiences as well as future trends and needs (both in research and practices) related to all aspects of information security, security systems and technologies. SECURWARE 2009 has the following tracks: ARCH: Security frameworks, architectures and protocols SECMAN: Security management SECTECH: Security technologies SYSSEC: System security INFOSEC: Information security MALWA: Malware and Anti-malwareANTIFO: Anti-forensicsPRODAM: Profiling data miningSECHOME: Smart home securitySECDYN: Security and privacy in dynamic environments ECOSEC: Ecosystem security and trustCRYPTO: CryptographyCYBER-Threat: We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals. The topics suggested by the conference can be discussed in term of concepts, state of the art, standards, implementations, running experiments and applications. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Industrial presentations are not subject to these constraints. Tutorials on specific related topics and panels on challenging areas are encouraged. Topics of interest include, but are not limited to, the following tracks: ARCH: Security frameworks, architectures and protocols Formal aspects of security Security analysis methodologies Security verification Security protocols Security architectures and formalisms Security and design vulnerability Security and privacy protection Performance and security Secure group communication/multicast Software design security Middleware security Security for nomadic code Intrusion detection systemsStatic analysis for software securitySecurity modeling SECMAN: Security managementIdentity management Security law enforcement PKI PKI Key management Incident response planning Intrusion detection and event correlation Firewalls Trust managementSoftware security assuranceSECTECH: Security technologiesSecure protocols Applied cryptography Smart cards Biometrics Digital rights management Electronic surveillance Database security SYSSEC: System securityInternet security Security in wireless Sensor/cellular network security Ad hoc network security Security in peer-to-peer networks Security in wireless multimedia systems Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.) Security of emergency services INFOSEC: Information securityInformation hiding Anonymity Authentication Data Integrity Security data mining Data confidentiality and integrity Information flow protection Trustworthy networks: authentication, privacy and security models Secure service discovery Secure location-based service Information survivabilityMALWA: Malware and Anti-malwareThreat taxonomies and modelingSecurity threatsThreats propagationAnti-malware technologiesEngineering anti-malware Anti-virus, anti-spyware, anti-phishingMalware propagation modelsProfiling security informationVulnerability analysis and countermeasuresDenial of service attacksMeasurements and metricsTesting samples and techniquesQuarantine/reuse decisionsAnti-malware tool performanceAnti-malware tool suitesOpen-source anti-malwareHost-based anti-malwareOn-line anti-malware scanning Messaging, viruses, spywareAdvanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./ Message filtering, blocking, authenticationDigital signaturesGeneralized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /Spam compression and recognitionLearning misuse patternsPayment schemesEconomics of generalized spamTracking abuse tactics and patternsProtecting legitimate use patternsMethods for testing protection robustnessCosts and benefits of messaging use and misuseStandards for messaging and misuse reportingLegal aspects /identity theft, privacy, freedom of speech, etc./ANTIFO: Anti-forensicsAdvanced anti-forensics mechanismsSmart anti-forensicse-discovery industry and anti-forensicsOverwriting data and metadataData hiding approachesDetecting forensics analysisAnti-forensics toolsUnix-, Windows-, and Linux anti-forensics techniquesOpen source anti-forensics toolsNetwork anti-forensics tools PRODAM: Profiling data miningUser and traffic profilingData mining and visualizationProfile mining and knowledge discoveryMining lifecycle for profile collectionsProfile warehouse constructionProfile portfolio and profile discoveryProfiling game users and game trafficProfiling transactionsSimpson'd paradoxReal-time profiling mechanismsPatterns for information profilingProfiling enginesProfiling metricsForensicsProfiling applications (banks, on-line shopping, etc.)Data mining-based user profile prediction SECHOME: Smart home securityFundamentals for SHSPrivacy and protection for SHSIdentify and location management in SHSAuthentication and authorization in SHSAccess control and security policies in SHSTrust and reputation managementSecurity context-based interfaces for SHSSHS for accessibility and elderly/disabled peopleReal-time challenges for SHS in eHealth environmentsArchitectures and systems for SHSNetwork technologies and protocols for SHSUbiquitous/pervasive platform and middleware for SHSServices and applications for SHSSHS on campuses and hotelsSHS for mission critical laboratoriesContent protection and digital rights management for SHSIntelligent devices, sensor network/RFID for SHSIntrusion detection and computer forensics for SHSSHS and Homeland securityPersonal data privacy and protection in SHSEmerging standards and technologies for SHSCommercial and industrial for SHSCase studies, prototypes and experienceSECDYN: Security and privacy in dynamic environments Fundamentals on highly dynamic environmentsPrivacy and predefined access control dilemmaPrivacy police, provisions and obligationsDependability in dynamic environmentsProtection of digital documents in dynamic environments,On-line activities in high dynamic systemsLaw enforcement in high dynamic systemsPersonalizationPrivacy and transparencyDistributed usage controlPrivacy complianceECOSEC: Ecosystem security and trustSecure and trusted service compositions in peer-to-peer networksSecure data management in collaborative peer-to-peer networksSecurity and reputation models for self-adaptive overlay networksIdentity and trust management in dynamic, self-organizing environmentsSocial institutional-based trust models for self-evolving communitiesCRYPTO: CryptographyFoundations of cryptography Applied cryptographyCryptanalysisSignatures schemes and trust modelsCryptographic algorithmsElectronic payment systemsHigh-performance encryption methodsGroup-oriented cryptographyIdentity-based cryptographyAnonymous authenticationCryptography for multi-user environmentsCryptography and secure localization systemsAttacks on cryptosystemsCYBER-Threate-CrimeEpidemiological models for warware and cyber-crime propagationRecord and retrieval of cyber-crimesCyber-crime preventionCyber-crime vulnerabilitiesCyber-counterattack at sourceDistributed cyber-attacksOrchestrated cyber-attacksRecursion attacksCyber-storm attacksCyber-pranks, hoaxesPhishing/Pharming and anti-phishingCyber-terrorismOnline cyber-crime reportingAccuracy and security of cyber-reportsFighting cyber-crimesCyber-crime laws INSTRUCTION FOR THE AUTHORSThe SECURWARE 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes. Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.Important deadlines:Submission (full paper) January 20, 2009 Authors notification February 25, 2009 Registration March 15, 2009 Camera ready March 20, 2009 Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system. Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here. Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.Poster ForumPosters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the track/workshop preference as "POSTER : Poster Forum". Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner.Work in ProgressWork-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the track/workshop preference as "WIP: Work in Progress". Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.Technical marketing/business/positioning presentationsThe conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference¡¯s CD collection. Please send your presentations to petreiaria.org.TutorialsTutorials provide overviews of current high interest topics. They should be about three hours long. One page with the title, tutorial summary, and a short bio are expected. Please send your proposals to petreiaria.orgPanel proposals:The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies.For more information, petreiaria.orgWorkshop proposalsWe welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petreiaria.org.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.