JNS 2014 - 4th National Security Days
Topics/Call fo Papers
The 4th edition JNS 4 includes four tracks :
Track 1 : Security Policies Formalization & Security and Trust Management
Security Policies, Formal methods & Verification,
Digital Identity,
Access Control Models,
Trust management systems, Public-Key Infrastructures (PKI), Reputation systems
Risk Analysis, Threats and Vulnerabilities
Metrology, Measurement of security
Privacy Protection
Organizational, Juridical and Ethical Aspects of Security
Information Systems Security and Governance, ...
Track 2 : Network and Application Security
Security of e-commerce, e-government, e-health, .
Web Applications Security
Intrusion Detection, Honeypots, Malware prevention
Embedded Systems Security , Smart cards security,, ...
Authentication and Biometric Access Control
Wired, Mobile and Next Generation Networks Security
Track 3 : Cloud Computing and Collaborative Systems Security
Cloud Computing Security
Virtualization and Security
Web Services, Midellewares and Security
Peer to Peer and Distributed Systems Security
Social Networks Security and Privacy
Workflow and Collaborative Systems Security
Track 4 : Cryptology, Watermarking & Steganography
Steganography, Watermarking
Secret-key & public-key Cryptography (Encryption, Hash functions, Electronic signatures, ...)
Elliptic Curve Cryptography
Quantum Cryptography
Cryptanalysis, Security proofs
Cryptographic Protocols
etc.
This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged.
Submissions from both industry and institutional circles will be considered with particular interest.
All accepted papers will be included in the conference proceedings. English versions of accepted and presented papers will be submitted to IEEE for potential publication in the IEEE Xplore. IEEE reserves the right to not publish any proceedings not meeting its quality standards.
Track 1 : Security Policies Formalization & Security and Trust Management
Security Policies, Formal methods & Verification,
Digital Identity,
Access Control Models,
Trust management systems, Public-Key Infrastructures (PKI), Reputation systems
Risk Analysis, Threats and Vulnerabilities
Metrology, Measurement of security
Privacy Protection
Organizational, Juridical and Ethical Aspects of Security
Information Systems Security and Governance, ...
Track 2 : Network and Application Security
Security of e-commerce, e-government, e-health, .
Web Applications Security
Intrusion Detection, Honeypots, Malware prevention
Embedded Systems Security , Smart cards security,, ...
Authentication and Biometric Access Control
Wired, Mobile and Next Generation Networks Security
Track 3 : Cloud Computing and Collaborative Systems Security
Cloud Computing Security
Virtualization and Security
Web Services, Midellewares and Security
Peer to Peer and Distributed Systems Security
Social Networks Security and Privacy
Workflow and Collaborative Systems Security
Track 4 : Cryptology, Watermarking & Steganography
Steganography, Watermarking
Secret-key & public-key Cryptography (Encryption, Hash functions, Electronic signatures, ...)
Elliptic Curve Cryptography
Quantum Cryptography
Cryptanalysis, Security proofs
Cryptographic Protocols
etc.
This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged.
Submissions from both industry and institutional circles will be considered with particular interest.
All accepted papers will be included in the conference proceedings. English versions of accepted and presented papers will be submitted to IEEE for potential publication in the IEEE Xplore. IEEE reserves the right to not publish any proceedings not meeting its quality standards.
Other CFPs
- International Conference on Social Media Marketing in Emerging Markets
- 2014 5th International Conference on Environmental Engineering and Applications
- 2014 4th International Conference on Environmental, Biomedical and Biotechnology
- 2014 3rd International Conference on Biotechnology and Food Engineering
- 2015 International Business and Management Winter Conference
Last modified: 2014-01-13 23:31:57