ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CRiSIS' 2009 - CRiSIS'2009 International Conference on Risks and Security of Internet and Systems



VenueToulouse, France France



Topics/Call fo Papers

CRiSIS'2009 International Conference on Risks and Security of Internet and Systems

IEEE technical co-sponsorship
in cooperation with "ACM SIGSAC"
Supported by SEE

19-22 October 2009
Toulouse - France

*** ***

The International Confernece on Risks and Security of Internet and
Systems (CRiSIS'09) will be held on 19-22 October 2009, Toulouse - France.

CRiSIS'09 is dedicated to security issues in Internet-related applications,
networks and systems.

The topics addressed by CRiSIS range from the analysis of risks, attacks
to networks and system survivability, passing through security models,
security mechanisms and privacy enhancing technologies.

The authors are invited to submit research results as well as practical
experiment or deployment reports.

Industrial papers about applications or case studies are also welcomed
in different domains (e.g., telemedicine, e-government, e-learning,
e-commerce, critical infrastructures, mobile networks, embedded
applications, etc.).

The list of topics includes but is not limited to:
* Access controls and security mechanisms
* Analysis and management of risk, attacks and vulnerabilities
* Attacks and defenses
* Attack data acquisition (honeypots) and network monitoring
* Authentication, authorization and audit
* Cryptography, Biometrics, watermarking
* Dependability and fault tolerance of Internet applications
* Distributed systems security
* Embedded system security
* Firewalls and intrusion detection / prevention systems (IDS/IPS)
* Formal methods, verification and certification
* Hardware-based security
* Key management Infrastructure (PKI) and trust management
* Metrology, security evaluation, and security management
* network security, security protocols, Security architectures
* Organizational, ethical and legal issues
* Physical security
* Privacy protection, anonymization, PETs
* Recovery
* System security
* Security and dependability of operating systems and network components
* Security and safety of critical infrastructures
* Security and privacy of peer-to-peer system
* Security and privacy of embedded systems
* Security and privacy of wireless networks
* Security models and security policies
* Security of new generation networks, security of VoIP and multimedia
* Security of e-commerce, electronic voting and database systems
* Traceability and forensics
* Use of smartcards and personal devices for Internet applications
* Viruses, worms and malicious codes
* Web security, Web services and enterprise security.

* Paper Submissions *
Papers must be written in English and must be submitted electronically
in PDF format.
Maximum paper length will be 8 printed pages for full papers or 4 pages
for short papers, in IEEE 2-column style .
The authors of the best conference papers will be invited to submit an
extended version to a special issue of the International Journal of
Information and Computer Security (IJICS).

* Call for Tutorials *
We solicit tutorials on state-of-the-art technologies relevant to the
conference themes.
We are particularly interested in tutorials that foster knowledge
exchange among the different research communities present at the
Each tutorial will be 4 hours long. The tutorial proposal should include
a brief summary and outline, specific goals and objectives,
the intended audience and the expected background of the audience as
well as a biographical sketch of the presenter(s).
The length of tutorial proposals should not exceed 5 pages. They should
be submitted to the tutorial program chair: Nora Cuppens by email:
nora(dot)cuppens(at)enst-bretagne(dot)fr before May 15, 2009.

* Important Dates *
* Submissions due : May 15, 2009
* Notification : July 1, 2009
* Camera-Ready due : September 1, 2009

* General chair
Yves Deswarte (LAAS)

* PC co-chairs
Anas Abou El Kalam Jos? M. Fernandez

* Program Committee
Jocelyn Aubert, Centre de Recherche Henri Tudor, Luxembourg
Rahma Ben Ayad, ENIT, Tunisia
Elisa Bertino, Purdue University, USA
Joachim Biskup, T.U. Dortmund, Germany
Gilles Brassard, Universit? de Montr?al, Canada
Fr?d?ric Cuppens, Telecom Bretagne, France
Michel Cukier, University of Maryland, USA
Merouane Debbah, Alcatel-Lucent ?SupElec, France
Geert Deconinck, Katholieke Universiteit Leuven, Belgium
Theo Dimitrakos, Centre for Information and Security Systems Research,
BT Innovate, UK
Khalil Drira, LAAS?CNRS, France
James P. Early, State University of New York at Oswego, USA
Mahmoud El-Hadidi, Cairo University, Egypt
Simone Fischer-Huebner, Karlstad University, Sweden
Dimitris Gritzalis, Athens University of Economics & Business, Greece
Noureddine Idboufker, ENSA, Morocco
Lech J. Janczewski, University of Auckland, New Zealand
Mohamed Jmaiel, Universit? de Sfax, Tunisia
Zbigniew Kalbarczyk, University of Illinois, USA
Corrado Leita, Symantec, France
Javier Lopez, University of M?laga, Spain
Fabio Massacci, Universit? di Trento, Italy
Catherine Meadows, Naval Research Laboratory, USA
Ludovic M?, SupElec Rennes, France
Fatma Mili, Oakland University, USA
Mohamed Mosbah, LaBRI, France
Raja Natarajan, Tata Institute of Fundamental Research, India
Claudio Pastrone, ISMB, Italy
Kai Rannenberg, Goethe Universit?t Frankfurt, Germany
Peter Ryan, University of Newcastle, UK
Mickael Rusinowitch, INRIA, France
Pierangela Samarati, Universit? Degli Studi di Milano, Italy
Damien Sauveron, Universit? de Limoges ? CNRS, France
Virendra Singh, Supercomputer Education and Research Centre, India
Ethan Singleton, University of Tulsa, USA
Paulo V?rissimo, Universitade de Lisboa, Portugal
Vijay Varadharajan, Macquarie University, Australia
Amit Vasudevan, CyLab/CMU, USA
Jinpeng Wei, Georgia Institute of Technology, USA
Belhassen Zouari, National Agency of Security, Tunisia
Youssef Zaz, Universit? Ibn Zohr, Morocco

More information is available on the CRiSIS'09 web site

Last modified: 2010-06-04 19:32:22