SIN 2011 - 4th International Conference on Security of Information and Networks (SIN 2011)
Topics/Call fo Papers
CALL FOR PAPERS
4th International Conference on Security of Information and Networks (SIN 2011)
14-19 November 2011, Sydney, Australia
www.sinconf.org
*** Paper submission deadline extended to July 25, 2011
*** Special issues of Concurrency and Computation: Practice and Experience (by Wiley) and Networking Science (by Springer-Verlag)
The 4th International Conference on Security of Information and Networks (SIN 2011) provides an international forum for presentation of research and applications of security in information and networks.
SIN 2011 will feature contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice. Its drive is to convene a high quality, well-attended, and up-to-date conference on scientific and technical issues of security in information, networks, and systems.
Papers addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: next generation network architectures, protocols, theory, systems and applications; the development and the realization of cryptographic solutions, security schemes, new algorithms; critical analysis of, and/or experimenting with, existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cyber crimes such as fraud and phishing; industrial experiences and challenges of the above.
Proposals of special session(s) of the conference, workshops, and tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. The themes of such proposals should be closely related to the conference topics.
All proposals for workshops, tutorials, and special sessions are expected at the conference e-mail : sin2011 (at) sinconf (dot) org.
The authors of selected papers will be invited to submit an extended version of their papers for possible publication in the following special issues:
* Concurrency and Computation: Practice and Experience (by Wiley).
The theme of the special issue is Trust and Security in Wireless Sensor Networks.
* Networking Science (by Springer-Verlag). The theme of the special issue is Next Generation Network Architectures, Protocols, Theory, Systems and Applications.
AREAS OF INTEREST
Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
* Access control and intrusion detection
* Autonomous and adaptive security
* Computational intelligence techniques in security
* Computer network defense
* Cryptographic techniques and key management
* Industrial applications of security
* Information assurance
* Next generation network architectures
* Network security and protocols
* Security in information systems
* Security tools and development platforms
* Security ontology, models, protocols & policies
* Standards, guidelines and certification
* Security-aware software engineering
* Trust and privacy
Following is a non-exhaustive list of subtopics of interest:
# Agent & MAS security
# Authentication & authorization
# Availability and reliability
# Biometric security
# Cognitive radio networks
# Cryptographic hardware design
# Cryptography and cryptanalysis (symmetrical and asymmetrical)
# Cyber crime
# Digital signature
# Executables security
# Formal verification for security
# Human factors in security
# Information security development processes
# Intrusion & fraud detection
# Malicious codes
# Mobile code and agent security
# Mobile VoIP
# Network management
# Privacy in service computing
# Privacy policies and security
# Quality of Service
# Scripts and languages
# Secure ontology-based systems
# Securing storage: SAN/NAS security
# Security and privacy in online social networks
# Semantics of security
# Side-channel attacks
# Signals & security
# Software security and testing
# Spam counter measures
# Steganography
# Vulnerability analysis
# Web security
# Wireless security
SUBMISSION OF PROPOSALS
Papers should include the title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author. All papers will be reviewed by at least three members of the program committee judging their originality, significance, correctness, presentation and relevance. Acceptance and final category depend on reviewer feedback.
All acccepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an international journal (TBA).
The submitted papers should be written according to double-column ACM conference format (http://www.acm.org/sigs/publications/proceedings-t...).
The papers should not exceed the maximum length stipulated below under submission categories (extra page charges apply for overlength papers).
All papers must be submitted electronically via the SIN 2011 Submission Site (https://cmt.research.microsoft.com/SIN2011/) by the due date.
At least one of the authors of each accepted paper must register as a participant of the conference for the paper to be included in the proceedings.
SUBMISSION CATEGORIES
Research contributions - Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted simultaneously to any other conference or workshop that has published proceedings. If in doubt, the authors are encouraged to consult ACM Policy on Prior Publication and Simultaneous Submissions.
Maximum length for the proceedings is 8 pages for full papers, 6 pages for short papers and workshop papers.
Student contributions - Doctoral / Masters students are encouraged to propose papers on ongoing research. Please add "(Student contribution)" to the title. Maximum length for the proceedings is 6 pages for student papers.
Industrial contributions - Authors from industry and government enterprises are welcome to submit original papers that describe their experiences, challenges, and applications in security. Maximum length for the proceedings is 8 pages for industrial papers. Please add "(Industrial contribution)" to the title.
Position papers / fast abstracts - Authors are also encouraged to propose position papers / fast abstracts on practical studies and experiments, critiques of existing work, emerging issues, and novel ideas under development. Maximum length for the proceedings is 4 pages for fast abstracts and position statements. Please add "(Position paper)" / "(Fast abstract)" to the title.
Tool demos - Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demos. Maximum length for the proceedings is 4 pages for tool demos. Please add "(Tool demo)" to the title.
IMPORTANT DATES
Tutorial Proposal by: July 25, 2011
Tutorial Notification: August 15, 2011
Paper Submission by: July 25, 2011 (additional 3 days grace period can be availed if requested in writing)
All Author Notification: August 15, 2011 All Papers Camera Ready by: September 9, 2011 Author Registration due date: September 9, 2011 Tutorial Dates: 14-19 November, 2011 Conference Dates: 14-19 November, 2011
ORGANIZED BY
* The Centre for Advanced Computing - Algorithms and Cryptography (ACAC)& The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Dept. of Computing, Macquarie University, Sydney, Australia
* Faculty of Education, Süleyman Demirel University, ?sparta, Turkey
* Department of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov, Russia
* CASED Research Center for IT Security, Technische Universität Darmstadt, Germany
SPONSORED BY
* US Army Air Force Office of Scientific Research (AFOSR) / Asian Office of Aerospace Research & Development (AOARD)
* Office of Naval Research Global (ONRG)
HOSTED BY
The Centre for Advanced Computing - Algorithms and Cryptography (ACAC)& The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Department of Computing, Macquarie University, Sydney, Australia
ORGANIZATION COMMITTEE
Conference Chairs:
Mehmet Orgun, Macquarie University, Australia
Atilla Elçi, Süleyman Demirel University, Turkey
Oleg Makarevich, Southern Federal University, Russia
Sorin Huss, Techniche Universitat Darmstadt, Germany
Program Chairs:
Josef Pieprzyk, Macquarie University, Australia
L. Babenko, Southern Federal University, Russia
Alexander Chefranov, Eastern Mediterranean University, North Cyprus
Rajan Shankaran, Macquarie University, Australia
Tutorials Chairs:
Christophe Doche, Macquarie University, Australia
Olga Peskova, Southern Federal University, Russia
Duygu Çelik, Istanbul Aydin University, Turkey
Workshops Chairs:
Ron Steinfeld, Macquarie University, Australia
Evgeny Tumoian, Southern Federal University, Russia
Luc Rolland, Toros University, Turkey
Publication Chairs:
Behnam Rahnama, European University of Lefke, North Cyprus
Ekaterina Maro, Southern Federal University, Russia
Kaile Su, Griffith University, Australia & Peking University, PRC
Finance Chair:
Michael Hitchens, Macquarie University, Australia
Registration Chairs:
Yan Wang, Macquarie University, Australia
Ekaterina Pakulova (Southern Federal U, Russia)
D. Tayyar Sen, Toros University, Turkey
Local Arrangements Chairs:
Rajan Shankaran, Macquarie University, Australia
Dat Tran, University of Canberra, Australia
Kalyan Janakiraman, Macquarie University, Australia
e-Presence Chair:
Wanli Ma, University of Canberra, Australia
Promotion Chairs:
Yi Mu, University of Wollongong, Australia
Maxim Anikeev, Southern Federal University, Russia
Deniz Özdemir, Toros University, Turkey
Liaison for Americas: Carlos Becker Westphall, Federal U of Santa Catarina, Brazil
Liaison for Asia-Pacific: Huaxiong Wang, Nanyang Technological University, Singapore
Volunteers Team: TBA, Macquarie University, Australia
GENERAL INQUIRIES
For updated information, please refer to www.sinconf.org.
INTERNATIONAL PROGRAM COMMITTEE
For updated information, please refer to www.sinconf.org.
v4.1.20110724
4th International Conference on Security of Information and Networks (SIN 2011)
14-19 November 2011, Sydney, Australia
www.sinconf.org
*** Paper submission deadline extended to July 25, 2011
*** Special issues of Concurrency and Computation: Practice and Experience (by Wiley) and Networking Science (by Springer-Verlag)
The 4th International Conference on Security of Information and Networks (SIN 2011) provides an international forum for presentation of research and applications of security in information and networks.
SIN 2011 will feature contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice. Its drive is to convene a high quality, well-attended, and up-to-date conference on scientific and technical issues of security in information, networks, and systems.
Papers addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: next generation network architectures, protocols, theory, systems and applications; the development and the realization of cryptographic solutions, security schemes, new algorithms; critical analysis of, and/or experimenting with, existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cyber crimes such as fraud and phishing; industrial experiences and challenges of the above.
Proposals of special session(s) of the conference, workshops, and tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. The themes of such proposals should be closely related to the conference topics.
All proposals for workshops, tutorials, and special sessions are expected at the conference e-mail : sin2011 (at) sinconf (dot) org.
The authors of selected papers will be invited to submit an extended version of their papers for possible publication in the following special issues:
* Concurrency and Computation: Practice and Experience (by Wiley).
The theme of the special issue is Trust and Security in Wireless Sensor Networks.
* Networking Science (by Springer-Verlag). The theme of the special issue is Next Generation Network Architectures, Protocols, Theory, Systems and Applications.
AREAS OF INTEREST
Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
* Access control and intrusion detection
* Autonomous and adaptive security
* Computational intelligence techniques in security
* Computer network defense
* Cryptographic techniques and key management
* Industrial applications of security
* Information assurance
* Next generation network architectures
* Network security and protocols
* Security in information systems
* Security tools and development platforms
* Security ontology, models, protocols & policies
* Standards, guidelines and certification
* Security-aware software engineering
* Trust and privacy
Following is a non-exhaustive list of subtopics of interest:
# Agent & MAS security
# Authentication & authorization
# Availability and reliability
# Biometric security
# Cognitive radio networks
# Cryptographic hardware design
# Cryptography and cryptanalysis (symmetrical and asymmetrical)
# Cyber crime
# Digital signature
# Executables security
# Formal verification for security
# Human factors in security
# Information security development processes
# Intrusion & fraud detection
# Malicious codes
# Mobile code and agent security
# Mobile VoIP
# Network management
# Privacy in service computing
# Privacy policies and security
# Quality of Service
# Scripts and languages
# Secure ontology-based systems
# Securing storage: SAN/NAS security
# Security and privacy in online social networks
# Semantics of security
# Side-channel attacks
# Signals & security
# Software security and testing
# Spam counter measures
# Steganography
# Vulnerability analysis
# Web security
# Wireless security
SUBMISSION OF PROPOSALS
Papers should include the title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author. All papers will be reviewed by at least three members of the program committee judging their originality, significance, correctness, presentation and relevance. Acceptance and final category depend on reviewer feedback.
All acccepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an international journal (TBA).
The submitted papers should be written according to double-column ACM conference format (http://www.acm.org/sigs/publications/proceedings-t...).
The papers should not exceed the maximum length stipulated below under submission categories (extra page charges apply for overlength papers).
All papers must be submitted electronically via the SIN 2011 Submission Site (https://cmt.research.microsoft.com/SIN2011/) by the due date.
At least one of the authors of each accepted paper must register as a participant of the conference for the paper to be included in the proceedings.
SUBMISSION CATEGORIES
Research contributions - Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted simultaneously to any other conference or workshop that has published proceedings. If in doubt, the authors are encouraged to consult ACM Policy on Prior Publication and Simultaneous Submissions.
Maximum length for the proceedings is 8 pages for full papers, 6 pages for short papers and workshop papers.
Student contributions - Doctoral / Masters students are encouraged to propose papers on ongoing research. Please add "(Student contribution)" to the title. Maximum length for the proceedings is 6 pages for student papers.
Industrial contributions - Authors from industry and government enterprises are welcome to submit original papers that describe their experiences, challenges, and applications in security. Maximum length for the proceedings is 8 pages for industrial papers. Please add "(Industrial contribution)" to the title.
Position papers / fast abstracts - Authors are also encouraged to propose position papers / fast abstracts on practical studies and experiments, critiques of existing work, emerging issues, and novel ideas under development. Maximum length for the proceedings is 4 pages for fast abstracts and position statements. Please add "(Position paper)" / "(Fast abstract)" to the title.
Tool demos - Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demos. Maximum length for the proceedings is 4 pages for tool demos. Please add "(Tool demo)" to the title.
IMPORTANT DATES
Tutorial Proposal by: July 25, 2011
Tutorial Notification: August 15, 2011
Paper Submission by: July 25, 2011 (additional 3 days grace period can be availed if requested in writing)
All Author Notification: August 15, 2011 All Papers Camera Ready by: September 9, 2011 Author Registration due date: September 9, 2011 Tutorial Dates: 14-19 November, 2011 Conference Dates: 14-19 November, 2011
ORGANIZED BY
* The Centre for Advanced Computing - Algorithms and Cryptography (ACAC)& The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Dept. of Computing, Macquarie University, Sydney, Australia
* Faculty of Education, Süleyman Demirel University, ?sparta, Turkey
* Department of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov, Russia
* CASED Research Center for IT Security, Technische Universität Darmstadt, Germany
SPONSORED BY
* US Army Air Force Office of Scientific Research (AFOSR) / Asian Office of Aerospace Research & Development (AOARD)
* Office of Naval Research Global (ONRG)
HOSTED BY
The Centre for Advanced Computing - Algorithms and Cryptography (ACAC)& The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Department of Computing, Macquarie University, Sydney, Australia
ORGANIZATION COMMITTEE
Conference Chairs:
Mehmet Orgun, Macquarie University, Australia
Atilla Elçi, Süleyman Demirel University, Turkey
Oleg Makarevich, Southern Federal University, Russia
Sorin Huss, Techniche Universitat Darmstadt, Germany
Program Chairs:
Josef Pieprzyk, Macquarie University, Australia
L. Babenko, Southern Federal University, Russia
Alexander Chefranov, Eastern Mediterranean University, North Cyprus
Rajan Shankaran, Macquarie University, Australia
Tutorials Chairs:
Christophe Doche, Macquarie University, Australia
Olga Peskova, Southern Federal University, Russia
Duygu Çelik, Istanbul Aydin University, Turkey
Workshops Chairs:
Ron Steinfeld, Macquarie University, Australia
Evgeny Tumoian, Southern Federal University, Russia
Luc Rolland, Toros University, Turkey
Publication Chairs:
Behnam Rahnama, European University of Lefke, North Cyprus
Ekaterina Maro, Southern Federal University, Russia
Kaile Su, Griffith University, Australia & Peking University, PRC
Finance Chair:
Michael Hitchens, Macquarie University, Australia
Registration Chairs:
Yan Wang, Macquarie University, Australia
Ekaterina Pakulova (Southern Federal U, Russia)
D. Tayyar Sen, Toros University, Turkey
Local Arrangements Chairs:
Rajan Shankaran, Macquarie University, Australia
Dat Tran, University of Canberra, Australia
Kalyan Janakiraman, Macquarie University, Australia
e-Presence Chair:
Wanli Ma, University of Canberra, Australia
Promotion Chairs:
Yi Mu, University of Wollongong, Australia
Maxim Anikeev, Southern Federal University, Russia
Deniz Özdemir, Toros University, Turkey
Liaison for Americas: Carlos Becker Westphall, Federal U of Santa Catarina, Brazil
Liaison for Asia-Pacific: Huaxiong Wang, Nanyang Technological University, Singapore
Volunteers Team: TBA, Macquarie University, Australia
GENERAL INQUIRIES
For updated information, please refer to www.sinconf.org.
INTERNATIONAL PROGRAM COMMITTEE
For updated information, please refer to www.sinconf.org.
v4.1.20110724
Other CFPs
- Workshop on Visual Mobile Interfaces (VMI 2011)
- 11th International Conference on Artificial Intelligence and Soft Computing ICAISC 2012
- China International Oil & Gas Pipeline Technical Conference
- 18th International Conference on MultiMedia Modeling
- 25th IEEE Conference on Computer Vision and Pattern Recognition
Last modified: 2011-07-25 06:46:14