[PET] Call for Papers SEC 2010, 20-23 Sept 2010, Brisbane - Security & Privacy − Silver Linings in the Cloud

Kai Rannenberg Kai.Rannenberg at m-chair.net
Thu Oct 29 10:23:10 GMT 2009

Dear PET friends,

Please find below (and attached) the Call for Papers of the Silver Jubilee SEC 2010 at 20-23 Sept 2010 in Brisbane (www.sec2010.org<http://www.sec2010.org>) together with IFIP World Computer Congress 2010.

Matching the Silver Jubilee the motto is “Security & Privacy − Silver Linings in the Cloud”.

The deadline for Submission of papers is January 31, 2010, and don’t expect it to be extended, as the whole IFIP WCC 2010 has a quite strict timeline.

Please feel encouraged to distribute this call widely e.g. by your preferred mailing lists.

Still well positioned CfP printouts are worth the paper, so we attached a PDF version (best printed 2 on 1, both sided).

Looking forward to great PET submissions for a great SEC 2010

Kai Rannenberg, Vijay Varadharajan

SEC 2010 PC Chairs

[cid:image001.jpg at 01CA506F.7EF41DC0]<http://www.wcc2010.com/>

Call for papers
25th IFIP International Information Security Conference

Security & Privacy − Silver Linings in the Cloud

[cid:image002.gif at 01CA506F.7EF41DC0]

Conference Topics

[cid:image003.gif at 01CA506F.7EF41DC0]  Printable version<http://www.wcc2010.com/SEC2010/cfp_SEC2010.pdf>

SEC-2010 is the 25th in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP World Computer Congress celebrating both the Golden Jubilee of IFIP and the Silver Jubilee of SEC. Papers offering novel and mature research contributions, in any aspect of information security and privacy, are solicited for submission to the conference. Papers may present theory, applications, or practical experiences on topics including but not limited to: (Authors of the best submissions will be invited to submit updated and significantly extended versions of their papers into Computers & Security.)

Access Control
Applications of Cryptography
Attacks and Malicious Software
Authentication and Authorization
Biometrics and Applications
Critical ICT Resources Protection
Data and Systems Integrity
Data Protection
ECommerce Privacy & Security
Enterprise Security
Identity Management
Information Hiding
Information Warfare
Internet and Web Security
Intrusion Detection
Mobile Computing Security
Mobile Networks Security
Network Security Protocols
Multilateral Security

Peer-to-Peer Security
Privacy Enhancing Technologies
RFID Privacy & Security
Risk Analysis and Management
Secure Electronic Voting
Secure Sensor Networks
Secure Systems Development
Security Architectures
Security Economics
Security Education
Security Management
Security Metrics
Semantic Web Privacy & Security
Smart Cards
Software Security
Trust Management and Models
Trusted Computing
Ubiquitous Privacy & Security

Programme Committee Chairs

Kai Rannenberg, Goethe University Frankfurt, Germany
Vijay Varadharajan, Macquarie University, Australia

Publication Chair

Christian Weber, Goethe University Frankfurt, Germany

Programme Committee Members

A. Aldini, University of Urbino, Italy
C. J. Armstrong, Curtin University, Australia
V. Atluri, Rutgers University, USA
T. Aura, Microsoft Research, UK
M. Bañón, Epoche & Espri, Spain
R. L. Baskerville, Georgia State University, USA
J. Benaloh, Microsoft Research, USA
C. Benzmüller, International University, Germany
J. Biskup, T.U. Dortmund, Germany
R. Botha, NMMU, South Africa
L. Bussard, Microsoft EMIC, Germany
J. Camenisch, IBM Research, Switzerland
K. Cameron, Microsoft, USA
L. Chen, Hewlett-Packard Labs, UK
M. Christodorescu, IBM TJ Watson Research Center, USA
R. Clarke, Xamax Consultancy Pty Ltd, ANU and UNSW, Australia
R. Clayton, University of Cambridge, UK
C.J.F. Cremers, ETH Zurich, Switzerland
M. Crompton, Information Integrity Solutions and NICTA
N. Cuppens-Boulahia, TELECOM Bretagne, France
E. Dawson, QUT, Australia
S. De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
B. de Decker, K.U. Leuven, Belgium
M. de Soete, Security4Biz, Belgium
Y. Deswarte, LAAS-CNRS, France
G. Dhillon, Virginia Commonwealth University, USA
T. Dimitrakos, BT Innovate & Design, UK
R. Dodge, U.S. Military Academy, USA
J. Eloff, University of Pretoria, South Africa
A. Escudero-Pascual, it46.se, Sweden
H. Federrath, University of Regensburg, Germany
S. Fischer, University of Lübeck, Germany
S. Fischer-Huebner, Karlstad University, Sweden
U. Flegel, SAP, Germany
S. N. Foley, University College Cork, Ireland
F. Freiling, Mannheim University, Germany
A. Fuchsberger, Microsoft Corp, USA
W. Fumy, Bundesdruckerei, Germany
S. Furnell, University of Plymouth, UK
M. Gasson, University of Reading, UK
V. D. Gligor, Carnegie Mellon University, USA
D. Gollmann, TU Hamburg-Harburg, Germany
R. Grimm, University of Koblenz, Germany
D. Gritzalis, Athens University of Economics & Business, Greece
M. Hansen, Independent Centre for Privacy Protection, Germany
H. Hedbom, Karlstad Universitet, Sweden
M. Heisel, University Duisburg-Essen, Germany
U. Helmbrecht, ENISA, EU
P. Herrmann, NTNU, Norway
A. Hevia, Universidad de Chile, Chile
M. Hoelbl, Maribor University, Slovenia
J.-H. Hoepman, TNO & Radboud University Nijmegen, the Netherlands
E. Humphreys, XISEC, UK
C. Irvine, Naval Postgraduate School, Monterey, USA
S. Jajodia, George Mason University, USA
L. Janczewski, Univ. of Auckland, New Zealand
D.-O. Jaquet-Chiffelle, Bern Univ. of Applied Sciences, Switzerland
A. Jøsang, University of Oslo, Norway & QUT, Australia
W. Jonker, Philips Research & Twente University, The Netherlands
M.C. Kang, ISO/IEC JTC 1/SC 27/WG 4
S. Katsikas, University of Piraeus, Greece
D. Kesdogan, University of Siegen, Germany
H. Kikuchi, Tokai University, Japan
V. Kisimov, University of World and National Economy, Sofia, Bulgaria
S. Knapskog, NTNU/Q2S, Norway
K.-P. Kossakowski, PRESECURE Consulting GmbH, Germany
U. Kühn, DZ BANK AG, Germany
K. Kursawe, Philips Research, The Netherlands
B. LaMacchia, Microsoft, USA
C. E. Landwehr, University of Maryland, USA
P. J. Lee, POSTECH, Korea
H. Leitold, Graz University, Austria
A. Levi, Sabanci University, Istanbul, Turkey
T. Levin, Naval Postgraduate School, Monterey, USA
J. Lopez, University of Malaga, Spain
V. Lotz, SAP Research, France
N. Luttenberger, Kiel University, Germany
M. Marhöfer, Nokia Siemens Networks, Germany
S. Marsh, Communications Research Centre, Canada
F. Martinelli, National Research Council, Italy
V. Matyas, Masaryk University Brno, Czech Republic
S. Mauw, Uni Luxembourg, Luxembourg
C. Maziero, PUCPR, Brazil
C. A. Meadows, Naval Research Laboratory, USA
M. Meints, Dataport, Germany
N. Miloslavskaya, The National Research Nuclear Institute MEPhI, Russia
C. Mitchell, Royal Holloway, University of London, UK
R. Molva, EURECOM, France
G. Mueller, Freiburg University, Germany
Y. Murayama, Iwate Prefectural University, Japan
M. Ohlin, FMV, Sweden (†)
E. Okamoto, University of Tsukuba, Japan
R. Oppliger, eSECURITY Technologies, Switzerland
J. I. Pagter, Alexandra Instituttet, Denmark
C. Palmer, IBM Research; Dartmouth College, USA
A. Pasic, ATOS Origin, Spain
P. Peleties, USB BANK PLC, Cyprus
G. Pernul, University of Regensburg, Germany
G. L. Peterson, Air Force Institute of Technology, USA
M. Petkovic, Philips Research / Eindhoven University of Technology, Netherlands
A. Pfitzmann, Dresden University of Technology, Germany
U. Pinsdorf, Microsoft EMIC, Germany
H. Pohl, Univ. of Applied Sciences Bonn-Rhein-Sieg, Germany
M. Pollitt, University of Central Florida, USA
R. Posch, TU Graz, Austrian Federal Government
J. Posegga, University of Passau, Germany
B. Preneel, K.U. Leuven, Belgium
G. Price, Royal Holloway, University of London, UK
C. W Probst, Technical University of Denmark
S. Qing, Chinese Academy of Sciences, China
M. Reichenbach, Commerzbank, Germany
C. Rieder, Lucerne Univ. of Applied Sciences & Arts, Switzerland
M. Riguidel, ENST, France
Y. Roudier, EURECOM, France
P. Samarati, University of Milan, Italy
A. Sarma, NEC Laboratories Europe, Germany
R Sasaki, Dendai University, Japan
D. Sauveron, University of Limoges, France
I. Schaumüller-Bichl, Univ. of Applied Sciences Hagenberg, Austria
A. B. Seip, Kredittilsynet, Norway
S. Shenoi, University of Tulsa, USA
E. Snekkenes, Gjøvik University College, Norway
R. von Solms, NMMU, South Africa
H. von Sommerfeld, Rohde & Schwarz SIT, Germany
F. Stajano, University of Cambridge, UK
S. Steinbrecher, Dresden University of Technology, Germany
R. K Subramaniam, Valiant Technologies, India
M. Swimmer, Trend Micro, USA
P. Syverson, Naval Research Laboratory, USA
K. Takaragi, Hitachi, Japan
S. Teufel, University of Fribourg, Switzerland
M. Ullmann, BSI & Univ. of AS Bonn-Rhein-Sieg, Germany
P. M. B. Veiga, Universidade de Lisboa, Portugal
T. Virtanen, Finland
C. Vishik, Intel, USA
J. Vyskoc, VaF, Slovakia
M. Waidner, IBM, USA
C. Wallis, Dept. of Internal Affairs, New Zealand Government
G. Weck, INFODAS GmbH, Germany
N. Weiler, Sensaco, Switzerland
S. Weiss, KPMG AG Wirtschaftspruefungsgesellschaft, Germany
T. Welzer, University of Maribor, Slovenia
S. Wohlgemuth, National Institute of Informatics, Japan
S. Wolthusen, Royal Holloway, University of London, UK
J. Zhou, I2R, Singapore
A. Zugenmaier, DoCoMo Research, Germany

[cid:image004.jpg at 01CA506F.7EF41DC0]

[cid:image005.gif at 01CA506F.7EF41DC0]
Submission of papers:

January 31, 2010

Notification to authors:

April 23, 2010

Camera-ready copies:

May 15, 2010

Instructions for paper submission

 *   Papers must not substantially overlap with papers that have been published or are simultaneously submitted to a journal or another conference with proceedings.
 *   Papers must be written in English; they should be at most 12 pages in total, including bibliography and well-marked appendices. Papers should be intelligible without appendices, if any.
 *   Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer.
 *   Submitted and accepted papers must follow the publisher’s guidelines for the IFIP AICT Series (www.springer.com/series/6102<http://www.springer.com/series/6102>, Author templates).
 *   At least one author of each accepted paper must register for the conference and present the paper. Inclusion of the paper will be dependent upon one registration for the paper.
 *   All papers must be submitted in electronic form through the web via www.sec2010.org<http://www.sec2010.org> by January 31, 2010.

The Congress

The World Computer Congress (WCC2010) will bring together IT research and industry sectors in one event. The congress will combine 17 IFIP conferences with partner conferences from other international and regional, specialist IT organisations.

The congress content will be presented in eight program streams. Delegates may attend any of the participating conference, industry or partner events as well as networking, social, technical tours and certification courses offered at the congress.

[cid:image007.jpg at 01CA5075.88664580]

 *   Wireless Communications and Information Technology in Developing Countries (WCITD 2010)
 *   Biologically-Inspired Collaborative Computing (BICC 2010)
 *   Distributed and Parallel Embedded Systems (DIPES 2010)
 *   Artificial Intelligence in Theory and Practice (IFIP AI 2010)
 *   Network of the Future (NF)
 *   Enterprise Architecture, Integration, Interoperability and Networking (EAI2N)
 *   Human Choice and Computers International Conference (HCC9 2010)
Track 2: Virtual Technologies and Social Shaping

[cid:image009.jpg at 01CA5075.88664580]

 *   International Information Security Conference 2010 (SEC 2010)
 *   Critical Information Infrastructure Protection (CIP)
 *   Human Choice and Computers International Conference (HCC9 2010)
Track 3: Surveillance and Privacy

[cid:image011.jpg at 01CA5075.88664580]

 *   Theoretical Computer Science (TCS 2010)
 *   Human Computer Interaction (HCI 2010)

[cid:image013.jpg at 01CA5075.88664580]

 *   Key Competencies in the Knowledge Society (KCKS 2010)
 *   History of Computing (HC)

[cid:image015.jpg at 01CA5075.88664580]

 *   Global Information Systems Processes (GISP)
 *   E-Government and E-Services (EGES)
 *   Human Choice and Computers conference (HCC9 2010)
Track 1: Ethics and ICT Governance

[cid:image017.jpg at 01CA5075.88664580]

 *   E-Health (EHEALTH)

[cid:image019.jpg at 01CA5075.88664580]

 *   Human Choice and Computers International Conference (HCC9 2010)
Track 4: ICT and Sustainable Development

[cid:image021.jpg at 01CA5075.88664580]

 *   Entertainment Computing Symposium (ECS 2010)

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 41384 bytes
Desc: image001.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0010.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.gif
Type: image/gif
Size: 882 bytes
Desc: image002.gif
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0003.gif>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image003.gif
Type: image/gif
Size: 169 bytes
Desc: image003.gif
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0004.gif>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image004.jpg
Type: image/jpeg
Size: 13432 bytes
Desc: image004.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0011.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image005.gif
Type: image/gif
Size: 836 bytes
Desc: image005.gif
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0005.gif>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image007.jpg
Type: image/jpeg
Size: 1632 bytes
Desc: image007.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0012.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image009.jpg
Type: image/jpeg
Size: 1545 bytes
Desc: image009.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0013.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image011.jpg
Type: image/jpeg
Size: 1748 bytes
Desc: image011.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0014.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image013.jpg
Type: image/jpeg
Size: 1638 bytes
Desc: image013.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0015.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image015.jpg
Type: image/jpeg
Size: 1654 bytes
Desc: image015.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0016.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image017.jpg
Type: image/jpeg
Size: 1464 bytes
Desc: image017.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0017.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image019.jpg
Type: image/jpeg
Size: 1709 bytes
Desc: image019.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0018.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image021.jpg
Type: image/jpeg
Size: 1728 bytes
Desc: image021.jpg
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0019.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: cfp_SEC2010.20091006.pdf
Type: application/pdf
Size: 170775 bytes
Desc: cfp_SEC2010.20091006.pdf
URL: <http://lists.links.org/pipermail/pet/attachments/20091029/67d84419/attachment-0001.pdf>

More information about the PET mailing list