SIN 2012 - 5th International Conference on Security of Information and Networks (SIN 2012)
Topics/Call fo Papers
5th International Conference on Security of Information and Networks (SIN 2012), Jaipur India
October 22-26, 2012
Papers addressing all aspects of security in Information and Networks are being sought. Researchers and Industrial practitioners working on the following and related subjects are especially encouraged: Next Generation Network architectures, Protocols, Systems and Applications; the development and the realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cyber crimes such as fraud and phishing; industrial experiences and challenges of the above.
Topics of Interest: Possible topics for the special issue include:
? Access control and intrusion detection
? Security in information systems
? Autonomous and adaptive security
? Security tools and development platforms
? Computational intelligence techniques in security
? Security ontology, models, protocols & policies
? Computer network defense
? Standards, guidelines and certification
? Cryptographic techniques and key management
? Security-aware software engineering
? Industrial applications of security
? Trust and privacy
? Information assurance
? Cyber Warfare (attacks and defenses)
? Next generation network architectures
? Malware analysis
? Network security and protocols
? Security challenges in Mobile/Embedded Systems
Proposal submission: Papers should include the title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author. All papers will be reviewed by at least three members of the reviewers judging their originality, significance, correctness, presentation and relevance. Acceptance and final category depend on reviewer feedback. All accepted papers will be published by ACM Press in the conference proceedings and placed into the ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an international journal (TBA). The submitted papers should be written according to double-column ACM conference format (http://www.acm.org/sigs/publications/proceedings-t...). All papers must be submitted electronically via the SIN 2012 Submission Site (https://cmt.research.microsoft.com/SIN2012/).
Submission categories:
? Research contributions - Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted simultaneously to any other conference or workshop that has published proceedings. Maximum length for the proceedings is 8 pages for full papers, 6 pages for short papers.
? Student contributions - Doctoral / Masters Students are encouraged to propose papers on ongoing research. Please add "(Student contribution)" to the title. Maximum length for the proceedings is 6 pages for student papers.
? Industrial contributions - Authors from industry and government enterprises are welcome to submit original papers that describe their experiences, challenges, and applications in security. Maximum length for the proceedings is 8 pages.
? Position papers / fast abstracts - Authors are also encouraged to propose position papers / fast abstracts on practical studies and experiments, critiques of existing work, emerging issues, and novel ideas under development. Maximum length for the proceedings is 4 pages for fast abstracts and position statements.
? Tool demos - Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demos. Maximum length for the proceedings is 4 pages for tool demos.
Important Dates:
Paper Submission: June 15, 2012
Tutorial Proposal: June 15, 2012
Notification: July 15, 2012
Camera Ready & Author Registration: August 10, 2012
Organized by:
? Malaviya National Institute of Technology, Jaipur, India
? Indian Institute of Technology, Guwahati, India
? Indian Institute of Technology, Bombay, India
? The Centre for Advanced Computing - Algorithms and Cryptography (ACAC) & The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Dept. of Computing, Macquarie University, Sydney, Australia
? Department of Computer and Educational Technology, Faculty of Education, Süleyman Demirel University, Isparta, Turkey
? Department of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov, Russia
M.S.Gaur
MNIT Jaipur India
General Chair
SIN 2012
October 22-26, 2012
Papers addressing all aspects of security in Information and Networks are being sought. Researchers and Industrial practitioners working on the following and related subjects are especially encouraged: Next Generation Network architectures, Protocols, Systems and Applications; the development and the realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cyber crimes such as fraud and phishing; industrial experiences and challenges of the above.
Topics of Interest: Possible topics for the special issue include:
? Access control and intrusion detection
? Security in information systems
? Autonomous and adaptive security
? Security tools and development platforms
? Computational intelligence techniques in security
? Security ontology, models, protocols & policies
? Computer network defense
? Standards, guidelines and certification
? Cryptographic techniques and key management
? Security-aware software engineering
? Industrial applications of security
? Trust and privacy
? Information assurance
? Cyber Warfare (attacks and defenses)
? Next generation network architectures
? Malware analysis
? Network security and protocols
? Security challenges in Mobile/Embedded Systems
Proposal submission: Papers should include the title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author. All papers will be reviewed by at least three members of the reviewers judging their originality, significance, correctness, presentation and relevance. Acceptance and final category depend on reviewer feedback. All accepted papers will be published by ACM Press in the conference proceedings and placed into the ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an international journal (TBA). The submitted papers should be written according to double-column ACM conference format (http://www.acm.org/sigs/publications/proceedings-t...). All papers must be submitted electronically via the SIN 2012 Submission Site (https://cmt.research.microsoft.com/SIN2012/).
Submission categories:
? Research contributions - Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted simultaneously to any other conference or workshop that has published proceedings. Maximum length for the proceedings is 8 pages for full papers, 6 pages for short papers.
? Student contributions - Doctoral / Masters Students are encouraged to propose papers on ongoing research. Please add "(Student contribution)" to the title. Maximum length for the proceedings is 6 pages for student papers.
? Industrial contributions - Authors from industry and government enterprises are welcome to submit original papers that describe their experiences, challenges, and applications in security. Maximum length for the proceedings is 8 pages.
? Position papers / fast abstracts - Authors are also encouraged to propose position papers / fast abstracts on practical studies and experiments, critiques of existing work, emerging issues, and novel ideas under development. Maximum length for the proceedings is 4 pages for fast abstracts and position statements.
? Tool demos - Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demos. Maximum length for the proceedings is 4 pages for tool demos.
Important Dates:
Paper Submission: June 15, 2012
Tutorial Proposal: June 15, 2012
Notification: July 15, 2012
Camera Ready & Author Registration: August 10, 2012
Organized by:
? Malaviya National Institute of Technology, Jaipur, India
? Indian Institute of Technology, Guwahati, India
? Indian Institute of Technology, Bombay, India
? The Centre for Advanced Computing - Algorithms and Cryptography (ACAC) & The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Dept. of Computing, Macquarie University, Sydney, Australia
? Department of Computer and Educational Technology, Faculty of Education, Süleyman Demirel University, Isparta, Turkey
? Department of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov, Russia
M.S.Gaur
MNIT Jaipur India
General Chair
SIN 2012
Other CFPs
- Intercollegiate Sustainable Energy Network Scientific Seminar RIED 2012
- International Workshop on Where Learning Analytics Meets Learning Design
- International Workshop on Learning analytics and higher education: ethical perspectives
- International Workshop on Connecting Levels and Methods of Analysis in Networked Learning Communities
- 1st International Workshop on Learning Analytics and Linked Data (LALD2012)
Last modified: 2012-03-21 07:32:02