JNS 2013 - 3rd Edition of National Days of Security
Date2013-04-26 - 2013-04-27
Deadline2013-02-15
VenueRabat, Morocco
Keywords
Websitehttps://www.ensias.ma/jns3
Topics/Call fo Papers
Track 1 : Security Policies Formalization & Security and Trust Management
Chair : Khalid EL YASSINI
- Security Policies, Formal methods & verification,
- Digital Identity,
- Access Control Models,
- Trust management systems, Public-Key Infrastructures (PKI), Reputation systems
- Risk Analysis, threats and vulnerabilities
- Métrologie, mesure de la sécurité
- Privacy Protection
- Organizational, juridical and ethical Aspects of Security
- Information Systems Security and Governance
- …
Track 2 : Network and Application Security
Chair : Ahmed BATTAS
- Security of e-commerce, e-government, e-healt, …
- Web Applications Security
- Intrusion Detection, Honeypots, Malware prevention
- Embedded Systems Security , smart cards, ...
- Authentication and biometric Access Control
- Wired , Mobile and Next Generation Networks Security
- …
Track 3 : Cloud Computing and Collaborative Systems Security
Chair : Bouabid EL OUAHIDI
- Cloud Computing Security
- Web Services, midellewares and Security
- Peer to Peer and distributed systems Security
- Social Networks Security and Privacy
- Workflow and Collaborative Systems Security
- …
Track 4 : Cryptology, Watermarking & Steganography
Chair : Said EL HAJJI
- Steganography, Watermarking
- Secret-key & à public-key Cryptography (Encryption, Hash functions, electronic signatures, ..)
- Elliptic Curve Cryptography
- Quantic Cryptography
- Cryptanalysis, security proofs
- Cryptographic Protocols
- …
This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged.
Submissions from both industry and institutional circles will be considered with particular interest.
Paper Submission and publication
Authors wishing to participate in JNS3 are requested to write an original and high quality paper in English or French according to IEEE double column template.
Papers must be submitted via Easychair (http://www.easychair.org/conferences/?conf=jns3). All submitted papers will be peer-reviewed by at least two reviewers for technical merit, originality and relevance to track topics. Papers must not exceed 6 pages total (including the references and appendices) and must be in Portable Document or Microsoft Word Format (.pdf, .doc).
Chair : Khalid EL YASSINI
- Security Policies, Formal methods & verification,
- Digital Identity,
- Access Control Models,
- Trust management systems, Public-Key Infrastructures (PKI), Reputation systems
- Risk Analysis, threats and vulnerabilities
- Métrologie, mesure de la sécurité
- Privacy Protection
- Organizational, juridical and ethical Aspects of Security
- Information Systems Security and Governance
- …
Track 2 : Network and Application Security
Chair : Ahmed BATTAS
- Security of e-commerce, e-government, e-healt, …
- Web Applications Security
- Intrusion Detection, Honeypots, Malware prevention
- Embedded Systems Security , smart cards, ...
- Authentication and biometric Access Control
- Wired , Mobile and Next Generation Networks Security
- …
Track 3 : Cloud Computing and Collaborative Systems Security
Chair : Bouabid EL OUAHIDI
- Cloud Computing Security
- Web Services, midellewares and Security
- Peer to Peer and distributed systems Security
- Social Networks Security and Privacy
- Workflow and Collaborative Systems Security
- …
Track 4 : Cryptology, Watermarking & Steganography
Chair : Said EL HAJJI
- Steganography, Watermarking
- Secret-key & à public-key Cryptography (Encryption, Hash functions, electronic signatures, ..)
- Elliptic Curve Cryptography
- Quantic Cryptography
- Cryptanalysis, security proofs
- Cryptographic Protocols
- …
This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged.
Submissions from both industry and institutional circles will be considered with particular interest.
Paper Submission and publication
Authors wishing to participate in JNS3 are requested to write an original and high quality paper in English or French according to IEEE double column template.
Papers must be submitted via Easychair (http://www.easychair.org/conferences/?conf=jns3). All submitted papers will be peer-reviewed by at least two reviewers for technical merit, originality and relevance to track topics. Papers must not exceed 6 pages total (including the references and appendices) and must be in Portable Document or Microsoft Word Format (.pdf, .doc).
Other CFPs
Last modified: 2013-02-11 21:24:38