jueves, 17 de enero de 2008

[Mycolleagues] IEEE Globecom2008 Computer and Communications Network Security Symposium -- CFP--

-------------------------------------------------------------------
Apologies if you received multiple copies of this posting.
Please feel free to distribute it to those who might be interested.
-------------------------------------------------------------------
************************************************************************
IEEE Globecom 2008
Computer and Communications Network Security Symposium

CALL FOR PAPERS

Brief description
-----------------
The IEEE GLOBECOM 2008 Computer and Communications Network Security
Symposium (CCNS) will be held in New Orleans, USA, November 2008.
With the advent of pervasive computer applications and due to the
proliferation of heterogeneous wired and wireless computer networks,
computer and network security has become paramount. The Computer and
Communications Network Security Symposium will address all aspects of
the modeling, design, implementation, deployment, and management of
computer/network security algorithms, protocols, architectures, and
systems. Furthermore, contributions devoted to the evaluation,
optimization, or enhancement of security mechanisms for current
technologies as well as devising efficient security and privacy
solutions for emerging technologies are solicited.
Original papers are invited in the area of computer and network
security. Papers must represent high-quality and previously unpublished
work.
Contributions in CCNS symposium target wired networks as well as
wireless networks.:
3G/ 4G, Satellite, IEEE 802.11, Bluetooth, Ad hoc, vehicular, Sensor and
RFID networks, WiMAX/ 802.16, 802.16e and Peer-to-peer systems.

Topics of interest
------------------
Topics of interest include, but are not limited to, the following:
- Secure PHY, MAC, Routing and upper layer protocols
- Secure Cross layer design
- Authentication protocols and services authorization
- Confidentiality
- Data and system integrity
- Availability of secure services
- Key Distribution and management
- PKI and security management
- Trust models and Trust establishment
- Identity management and access control
- Deployment and management of computer/network security policies
- Monitoring Design for security
- Distributed Intrusion Detection Systems & Countermeasures
- Traffic filtering and Firewalling
- IPv6 security, IPSec
- Virtual Private Networks (VPNs)
- Prevention, Detection and Reaction Design
- Revocation of malicious parties
- Light-weight cryptography
- Quantum Cryptography and QKD
- Applications of Cryptography and Cryptanalysis in communications security
- Security and mobility
- Mobile code security
- Network traffic analysis techniques
- Secure naming and addressing (Privacy and anonymity)
- Application/network penetration testing
- Advanced Cryptographic Testbeds
- Network security metrics and performance evaluation
- Operating System(OS) security and log analysis tools
- Security modelling and protocol design
- Security specification techniques
- Self-healing networks
- Smart cards and secure hardware
- Biometric security: technologies, risks and vulnerabilities
- Information hiding and watermarking
- Vulnerability, exploitation tools, and virus/worm analysis
- Distributed Denial-Of-Service (DDOS) attacks and countermeasures
- DNS spoofing and security
- Critical infrastructure security
- Single- and multi-source intrusion detection and response (automation)
- Web, e-commerce, m-commerce, and e-mail security
- New design for unknown attacks detection

Sponsoring Technical Committees
-------------------------------
IEEE ComSoc Communications and Information Security (CISTC)
IEEE ComSoc Radio Communications (RCC)

Important Dates
---------------
Papers submission deadline: March 15, 2008
Notification of decision: June 28, 2008
Camera-ready deadline: August 15, 2008

Instructions for Authors
------------------------
Papers must represent high-quality and previously unpublished work.
Original research papers are solicited in all areas of computer and
communications network security. All submissions will be handled
electronically through the EDAS conference management system at

www.edas.info and must be in pdf format, with a maximum length of five
pages. A formatting template may be found at
http://www.ieee.org/web/publications/authors/transjnl/index.html.

IEEE Gobecom 2008 Security Symposium co-Chairs
----------------------------------------------
Abderrahim Benslimane, LIA/CERI, France
Jiankun Hu, RMIT University, Australia
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
************************************************************************

--
______________________________________________________________

Professor Abderrahim BENSLIMANE
LIA/Univ. Avignon, 339 Chemin des Meinajaries
BP 1228 - 84911 AVIGNON CEDEX 9
Tél : (+33/0) 4 90 84 35 61
-------------------------------------------------------------
TWO coming conferences to meet you:
http://www.lia.univ-avignon.fr/wimob2008
http://www.ieee-globecom.org/2008/symposium/compcom.html
_____________________________________________________________

_______________________________________________
Mycolleagues mailing list
Mycolleagues@grid.lrg.ufsc.br
http://grid.lrg.ufsc.br/mailman/listinfo/mycolleagues

No hay comentarios: