-------- Original-Nachricht -------- Betreff: [computational.science] CFP: Fourth Workshop in Information Security Theory and Practice (WISTP 2010) - Security and Privacy of Pervasive Systems and Smart Devices Datum: Tue, 27 Oct 2009 18:47:00 +0100 Von: Damien Sauveron damien.sauveron@xlim.fr Organisation: "ICCSA" An: Computational Science Mailing List computational.science@lists.iccsa.org
[Apologies if you receive multiple copies of this message]
***************** CALL FOR PAPERS *****************
FOURTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2010): Security and Privacy of Pervasive Systems and Smart Devices April 13-14, Passau, Germany - http://www.wistp.org/
WISTP 2010 BACKGROUND AND GOALS The impact of pervasive and smart devices on our daily lives is ever increasing, and the rapid technological development of information technologies ensures that this impact is constantly changing. It is imperative that these complex and resource constrained technologies are not vulnerable to attack. This workshop will consider the full impact of the use of pervasive and smart technologies on individuals, and society at large, with regard to the security and privacy of the systems that make use of them.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy of pervasive systems and smart devices, as well as experimental studies of fielded systems. We encourage submissions that address the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to:
* Access control * Ad hoc networks security * Anonymity * Biometrics, national ID cards * Data and application security and privacy * Data protection * Delay-tolerant network security * Digital rights management (DRM) in pervasive environments * Domestic network security * Embedded systems security and TPMs * Human and psychological aspects of security * Human-computer interaction and human behavior impact for security * Identity management * Information assurance and trust management * Interplay of TPMs and smart cards * Intrusion detection and information filtering * Mobile codes security * Mobile commerce security * Mobile devices security * New applications for secure RFID systems * Peer-to-peer security * Privacy enhancing technologies * RFID and NFC systems security * Secure self-organization and self-configuration * Security in location services * Security issues in mobile and ubiquitous networks * Security metrics * Security models and architecture * Security of GSM/GPRS/UMTS systems * Security policies * Security protocols * Sensor networks security * Smart card security * Smart devices applications * Vehicular network security * Wireless communication security * Wireless sensor node security
IMPORTANT DATES Paper submission due: November 20, 2009 (midnight Samoa time) Notification to authors: January 17, 2010 Author registration: February 1, 2010 Camera-ready due: February 1, 2010
SUBMISSION INSTRUCTIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, a conference, or a workshop with proceedings. Papers should be at most 15 pages including the bibliography and well-marked appendices (using 11-point font and reasonable margins), and should be in single-column format. Committee members are not required to read the appendices, and so the paper should be intelligible without them. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions are to be made to the submission web site (http://www.wistp.org/submission-details/). Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of November 20, 2009. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series. The camera-ready version of the accepted papers must follow Springer guidelines (a Latex source file will be required).
If a submitted paper is mainly the result of the work of a student author, this paper could have the chance to be selected as "Best student paper" (even if the paper has been written with senior co-authors). To participate to this selection process, please add the word "STUDENT" in the affiliation field in the submission form.
Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper is required to register with the workshop and present the paper. For authors presenting multiple papers, one normal registration is valid for up to two papers.
WISTP 2010 COMMITTEES AND CHAIRS
General Chairs * Joachim Posegga, University of Passau, Germany * Konstantinos Markantonakis, Royal Holloway University of London, UK
Program Chairs * Pierangela Samarati , Universita' degli Studi di Milano, Italy * Michael Tunstall, University of Bristol, UK
Workshop/Panel/Tutorial Chair * Damien Sauveron, University of Limoges, France
Publicity Chairs * Claudio A. Ardagna, Universita' degli Studi di Milano, Italy * Ioannis G. Askoxylakis, FORTH-ICS, Greece * Gerhard Hancke, ISG, Royal Holloway University of London, UK
Local Organization * Joachim Posegga, University of Passau, Germany
Program Committee * Rafael Accorsi, IIG, University of Freiburg, Germany * Claudio A. Ardagna, Department of Information Technologies, Universita' degli Studi di Milano, Italy * Francois Arnault, XLIM, University of Limoges, France * Ioannis G. Askoxylakis, FORTH-ICS, Greece * Gildas Avoine, Catholic University of Louvain, Belgium * Angelos Bilas, FORTH-ICS & University of Crete, Greece * Carlo Blundo, University of Salerno, Italy * Marco Casassa Mont, HP Labs, UK * Sabrina De Capitani di Vimercati, Department of Information Technologies, Universita' degli Studi di Milano, Italy * Jan de Meer, Brandenburg Technical University (BTU), Germany * Estibaliz Delgado, European Software Institute (ESI), Spain * Tassos Dimitriou, Athens Information Technology, Greece * Sara Foresti , Department of Information Technologies, Universita' degli Studi di Milano, Italy * Flavio Garcia, Radboud University Nijmegen, Netherlands * Stefanos Gritzalis, Info-Sec-Lab, University of the Aegean, Greece * Yong Guan, Iowa State University, USA * Gerhard Hancke, ISG, Royal Holloway University of London, UK * Ragib Hasan, University of Illinois at Urbana Champaign, USA * Olivier Heen, INRIA, France * Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands * Michael Huth, Imperial College London, UK * Sotiris Ioannidis, FORTH-ICS & University of Crete, Greece * Sokratis Katsikas, Dept. of Technology Education & Digital Systems, University of Piraeus, Greece * Evangelos Kranakis, Carleton University, Canada * Michiharu Kudo, IBM Research, Japan * Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK * Olivier Markowitch, ULB, Belgium * Fabio Martinelli, Information Security Group, IIT-CNR, Italy * Sjouke Mauw, SATOSS of Compute Science and Communications, University of Luxembourg, Luxembourg * Keith Mayes, ISG-SCC, Royal Holloway University of London, UK * Carlos Maziero, Pontifical Catholic University of Parana State Curitiba PR, Brazil * Chris Mitchell, ISG, Royal Holloway University of London, UK * Stefaan Motte, NXP Semiconductors, Belgium * Jose Onieva. Computer Science Department, University of Malaga, Spain * Rolf Oppliger, eSECURITY Technologies, Switzerland * Dan Page, Department of Computer Science, University of Bristol, UK * Stefano Paraboschi , University of Bergamo, Italy * Pierre Paradinas, INRIA & CNAM, France * Gerardo Pelosi, University of Bergamo, Italy * Erik Poll, SOS (Security of Systems) group of the Radboud University Nijmegen, Netherlands * Konstantinos Rantos, GSPAEG at the Hellenic Ministry of Interior, Public Administration and Decentralisation, Greece * Kui Ren, Illinois Institute of Technology, USA * Vincent Rijmen, Katholieke Universiteit Leuven, Belgium * Rei Safavi-Naini, Center for Information Security and Cryptography, University of Calgary, Canada * Damien Sauveron, University of Limoges, France * Daniel Schreckling, Institute for IT Security and Security Law, University of Passau, Germany * Byron Thomas, SiVenture, UK * Erik Zenner, Technical University of Denmark, Danemark * Bo Zhu, Computer Security Laboratory, University of Concordia, Canada
WISTP Steering Committee * Angelos Bilas, FORTH-ICS & University of Crete, Greece * Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands * Konstantinos Markantonakis, Royal Holloway University of London, UK * Chris Mitchell, Royal Holloway University of London, UK * Jean-Jacques Quisquater, Catholic University of Louvain, Belgium * Damien Sauveron, University of Limoges, France
SPONSOR * IFIP WG 11.2 Pervasive Systems Security
For further inquiries, please contact Damien Sauveron at damien.sauveron@unilim.fr https://securemail.unimi.it/java_script:main.compose%28%27new%27,%27t=damien.sauveron@unilim.fr%27%29