DBSEC 2012 - 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy
Topics/Call fo Papers
26th Annual WG 11.3 Conference on
Data and Applications Security and Privacy
DBSEC 2012
Paris, France, July 11-13, 2012
http://conferences.telecom-bretagne.eu/dbsec2012/
The 26th Annual WG 11.3 Conference on Data and Applications Security
and Privacy provides a forum for presenting original unpublished
research re-sults, practical experiences, and innovative ideas in data
and applications security and privacy. Both research papers and panel
proposals are solicited. Proceedings will be published by Springer as
the next volume in the Research Advances in Database and Information
Systems Security series (http://www.springeronline.com/lncs).
Papers may present theory, techniques, applications, or practical
experience on topics of relevance to IFIP WG 11.3:
- Access control
- Applied cryptography in data security and privacy
- Identity theft and countermeasures
- Integrity maintenance
- Intrusion detection
- Knowledge discovery and privacy
- Logics for security and privacy
- Organizational security
- Privacy-preserving data management
- Secure transaction processing
- Secure information integration
- Secure semantic web
- Secure sensor monitoring
- Secure web services
- Risk management
- Traceability and accountability
- Trust management
Additional topics of interest include (but are not limited to):
Critical Infrastructure Protection, Cyber Terrorism, Information
Warfare, Database Forensics, Electronic Commerce Security, and
Security in Digital Health Care.
* Submissions Guidelines:
Authors are invited to submit their contributions electronically to
the conference submission web site at
http://www.easychair.org/conferences/?conf=dbsec20.... Submission must
be in the form of a PDF file. Manuscripts must be in English, typed in
11-point font (minimum), and must not be more than 16 pages long.
Manuscripts must have a cover page with title, names and addresses
(including e-mail address) of authors, an abstract, and a set of
keywords. At least one author of each accepted paper is required to
register with the conference and present the paper. Accepted papers
will be published in the conference proceedings. The final copy of a
paper for the proceedings must use LaTeX, and must be laid out
according to the Camera Ready Copy format required by Springer. A
submitted paper must not be under review for inclusion in any other
conference or journal, and must be substantially different from
previously published work. Duplicate submissions will be automatically
rejected and without review.
* Award for the best student paper:
This award will be chosen by the program committee. The student must
be the first author to be eligible.
* Panel Proposals:
Proposals for panels should be e-mailed to the PC chair
(dbsec2012-AT-easychair.org). Proposals should include a one-page
description of the subject matter, the name and address (including
e-mail address) of the organizer, and a list of proposed panelists.
* Important Dates:
- Paper submission due: February 26, 2012
- Notification to authors: April 8, 2012
- Camera ready due: May 2, 2012
* Committees:
General Chair
- David Sadek, Institut TELECOM, France
PC Chairs
- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France
IFIP WG 11.3 Chair
- Vijay Atluri, Rutgers University, USA
Publication and Publicity Chair
- Joaquin Garcia-Alfaro, TELECOM Bretagne, France
Local Arrangement
- Ghislaine Le Gall, TELECOM Bretagne, France
Web Chair
- Said Oulmakhzoune, TELECOM Bretagne, France
Program Committee
- Kamel Adi, Universite du Quebec en Outaouais, Canada
- Gail-Joon Ahn, Arizona State University, USA
- Claudio A. Ardagna, Universita degli Studi di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- Steve Barker, King's College London, UK
- Joachim Biskup, Technische Universitat Dortmund, Germany
- Marina Blanton, University of Notre Dame, USA
- David Chadwick, University of Kent, UK
- Jason Crampton, Royal Holloway, UK
- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France
- Mourad Debbabi, Concordia University, Canada
- Sabrina De Capitani, Universita degli Studi di Milano, Italy
- Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
- Eduardo B. Fernandez, Florida Atlantic University, USA
- Simone Fischer-Hubner, Karlstad University, Sweden
- Simon Foley, University College Cork, Ireland
- Sara Foresti, Universit‡ degli Studi di Milano, Italy
- Alban Gabillon, University of French Polynesia, France
- Ehud Gudes, Ben-Gurion University, Israel
- Ragib Hasan, University of Alabama at Birmingham, USA
- Sushil Jajodia, George Mason University, USA
- Sokratis Katsikas, University of Piraeus, Greece
- Adam J. Lee, University of Pittsburgh, USA
- Yingjiu Li, Singapore Management University
- Peng Liu, Pennsylvania State University, USA
- Jorge Lobo, IBM Research T.J. Watson, USA
- Javier Lopez, University of Malaga, Spain
- Emil Lupu, Imperial College London, UK
- Martin Olivier, University of Pretoria, South Africa
- Stefano Paraboschi, Universita di Bergamo, Italy
- Wolter Pieters, University of Twente, Netherlands
- Indrajit Ray, Colorado State University, USA
- Indrakshi Ray, Colorado State University, USA
- Kui Ren, Illinois Institute of Technology, USA
- Mark Ryan, University of Birmingham, UK
- Kouchi Sakurai, Kyushu University, Japan
- Pierangela Samarati, Universita degli Studi di Milano, Italy
- Anoop Singhal, NIST, USA
- Traian Marius Truta, Northern Kentucky University, USA
- Leon van der Torre, University of Luxemburg, Luxemburg
- Vijay Varadharajan, Macquarie University, Australia
- Jaideep Vaidya, Rutgers University, USA
- Lingyu Wang, Concordia University, Canada
- Meng Yu, Virginia Commonwealth University, USA
- Xinwen Zhang, Samsung Information Systems, USA
- Jianying Zhou, Institute for Infocomm Research, Singapore
- Zutao Zhu, Google Inc., USA
Data and Applications Security and Privacy
DBSEC 2012
Paris, France, July 11-13, 2012
http://conferences.telecom-bretagne.eu/dbsec2012/
The 26th Annual WG 11.3 Conference on Data and Applications Security
and Privacy provides a forum for presenting original unpublished
research re-sults, practical experiences, and innovative ideas in data
and applications security and privacy. Both research papers and panel
proposals are solicited. Proceedings will be published by Springer as
the next volume in the Research Advances in Database and Information
Systems Security series (http://www.springeronline.com/lncs).
Papers may present theory, techniques, applications, or practical
experience on topics of relevance to IFIP WG 11.3:
- Access control
- Applied cryptography in data security and privacy
- Identity theft and countermeasures
- Integrity maintenance
- Intrusion detection
- Knowledge discovery and privacy
- Logics for security and privacy
- Organizational security
- Privacy-preserving data management
- Secure transaction processing
- Secure information integration
- Secure semantic web
- Secure sensor monitoring
- Secure web services
- Risk management
- Traceability and accountability
- Trust management
Additional topics of interest include (but are not limited to):
Critical Infrastructure Protection, Cyber Terrorism, Information
Warfare, Database Forensics, Electronic Commerce Security, and
Security in Digital Health Care.
* Submissions Guidelines:
Authors are invited to submit their contributions electronically to
the conference submission web site at
http://www.easychair.org/conferences/?conf=dbsec20.... Submission must
be in the form of a PDF file. Manuscripts must be in English, typed in
11-point font (minimum), and must not be more than 16 pages long.
Manuscripts must have a cover page with title, names and addresses
(including e-mail address) of authors, an abstract, and a set of
keywords. At least one author of each accepted paper is required to
register with the conference and present the paper. Accepted papers
will be published in the conference proceedings. The final copy of a
paper for the proceedings must use LaTeX, and must be laid out
according to the Camera Ready Copy format required by Springer. A
submitted paper must not be under review for inclusion in any other
conference or journal, and must be substantially different from
previously published work. Duplicate submissions will be automatically
rejected and without review.
* Award for the best student paper:
This award will be chosen by the program committee. The student must
be the first author to be eligible.
* Panel Proposals:
Proposals for panels should be e-mailed to the PC chair
(dbsec2012-AT-easychair.org). Proposals should include a one-page
description of the subject matter, the name and address (including
e-mail address) of the organizer, and a list of proposed panelists.
* Important Dates:
- Paper submission due: February 26, 2012
- Notification to authors: April 8, 2012
- Camera ready due: May 2, 2012
* Committees:
General Chair
- David Sadek, Institut TELECOM, France
PC Chairs
- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France
IFIP WG 11.3 Chair
- Vijay Atluri, Rutgers University, USA
Publication and Publicity Chair
- Joaquin Garcia-Alfaro, TELECOM Bretagne, France
Local Arrangement
- Ghislaine Le Gall, TELECOM Bretagne, France
Web Chair
- Said Oulmakhzoune, TELECOM Bretagne, France
Program Committee
- Kamel Adi, Universite du Quebec en Outaouais, Canada
- Gail-Joon Ahn, Arizona State University, USA
- Claudio A. Ardagna, Universita degli Studi di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- Steve Barker, King's College London, UK
- Joachim Biskup, Technische Universitat Dortmund, Germany
- Marina Blanton, University of Notre Dame, USA
- David Chadwick, University of Kent, UK
- Jason Crampton, Royal Holloway, UK
- Frederic Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France
- Mourad Debbabi, Concordia University, Canada
- Sabrina De Capitani, Universita degli Studi di Milano, Italy
- Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
- Eduardo B. Fernandez, Florida Atlantic University, USA
- Simone Fischer-Hubner, Karlstad University, Sweden
- Simon Foley, University College Cork, Ireland
- Sara Foresti, Universit‡ degli Studi di Milano, Italy
- Alban Gabillon, University of French Polynesia, France
- Ehud Gudes, Ben-Gurion University, Israel
- Ragib Hasan, University of Alabama at Birmingham, USA
- Sushil Jajodia, George Mason University, USA
- Sokratis Katsikas, University of Piraeus, Greece
- Adam J. Lee, University of Pittsburgh, USA
- Yingjiu Li, Singapore Management University
- Peng Liu, Pennsylvania State University, USA
- Jorge Lobo, IBM Research T.J. Watson, USA
- Javier Lopez, University of Malaga, Spain
- Emil Lupu, Imperial College London, UK
- Martin Olivier, University of Pretoria, South Africa
- Stefano Paraboschi, Universita di Bergamo, Italy
- Wolter Pieters, University of Twente, Netherlands
- Indrajit Ray, Colorado State University, USA
- Indrakshi Ray, Colorado State University, USA
- Kui Ren, Illinois Institute of Technology, USA
- Mark Ryan, University of Birmingham, UK
- Kouchi Sakurai, Kyushu University, Japan
- Pierangela Samarati, Universita degli Studi di Milano, Italy
- Anoop Singhal, NIST, USA
- Traian Marius Truta, Northern Kentucky University, USA
- Leon van der Torre, University of Luxemburg, Luxemburg
- Vijay Varadharajan, Macquarie University, Australia
- Jaideep Vaidya, Rutgers University, USA
- Lingyu Wang, Concordia University, Canada
- Meng Yu, Virginia Commonwealth University, USA
- Xinwen Zhang, Samsung Information Systems, USA
- Jianying Zhou, Institute for Infocomm Research, Singapore
- Zutao Zhu, Google Inc., USA
Other CFPs
- 10th Annual Conference on Privacy, Security and Trust
- International Workshop on Acoustic Signal Enhancement
- 13th International ACM SIGACCESS Conference on Computers and Accessibility
- 17th International Doctoral Symposium on Components and Architecture
- 2012 4th International Conference on Knowledge and Smart Technologies (KST)
Last modified: 2012-02-10 22:55:39