[Tccc] Call for Papers - ESTEL Security and Privacy Special Track

Simone Fischer-Hubner Simone.Fischer-Huebner
Mon Jun 11 16:06:00 EDT 2012


Hi Marit,
Yes.
Best wishes, Simone.
-----Original Message-----
From: Ravi Jhawar <ravi.jhawar at unimi.it>
To: tccc at lists.cs.columbia.edu
Date: Mon, 11 Jun 2012 21:34:53 +0200
Subject: [Tccc] Call for Papers - ESTEL Security and Privacy Special Track

> [Apologies if you receive multiple copies of this message]
> 
> 
> =================================
> CALL FOR PAPERS
> 
> 
> Security and Privacy Special Track?
> IEEE-AESS Conference in Europe about Space and Satellite Communications
> (ESTEL)
> Rome, Italy, October 2-5, 2012
> http://estel-sec.dti.unimi.it/
> =================================
> 
> 
> The special track on Security and Privacy of the ESTEL Conference aims
> at providing a
> forum for discussing security and privacy issues that need to be
> investigated for
> providing advanced services, architectures, and technologies for space
> and satellite
> applications. ?In this context, it is of utmost importance to ensure
> proper protection to
> such complex systems, or systems-of-systems, to ensure security,
> privacy, and availability
> of the infrastructure as well as of resources and information it
> provides and
> manages. These aspects concern both the specific satellite application
> and infrastructure
> as well as the base stations and land data servers and communications
> that serve them,
> touching then the different areas with ICT. ?The problem is far from
> trivial, due to the
> criticality and the social impact of the applications and services
> relying on this global
> infrastructure, as well as the complexity given by the co-existence and
> co-operation of,
> possibly heterogeneous, component systems. Topics of interest include,
> but are not limited
> to:
> 
> 
> - Access Control
> - Applied Cryptography for Space Applications
> - Authentication
> - Biometrics Security and Privacy
> - Critical Infrastructure Protection
> - Data Integrity
> - Data Protection?
> - Database Security and Privacy
> - Digital Forensics
> - Digital Rights Management
> - Ethical and Legal Implications of Security and Privacy
> - Formal Methods for Security
> - Homeland Security
> - Human Factors and Human Behaviour Recognition Techniques
> - Identification, Authentication and Non-repudiation
> - Identity Management
> - Information Hiding
> - Information Systems Auditing
> - Insider Threats and Countermeasures
> - Intellectual Property Protection
> - Intrusion Detection & Prevention
> - Management of Computing Security
> - Organizational Security Policies
> - Peer-to-Peer Security
> - Privacy
> - Privacy Enhancing Technologies
> - Reliability and Dependability
> - Risk Assessment
> - Satellite-based Disaster Recovery
> - Satellite Network Security
> - Secure Cloud Computing
> - Secure Software Development Methodologies
> - Security Protocols
> - Security and Privacy in Mobile Systems
> - Security and Privacy in Complex Systems
> - Security and Privacy in IT Outsourcing
> - Security and Privacy in Location-based Services
> - Security and Privacy in Pervasive/Ubiquitous Computing
> - Security and Privacy in Satellite Surveillance
> - Security and Privacy in Web Services
> - Security and Privacy Policies
> - Security Area Control
> - Security Deployment
> - Security Engineering
> - Security for Grid Computing
> - Security in Distributed Systems
> - Security Information Systems Architecture and Design and Security
> Patterns
> - Security in e-Healthcare
> - Security Issues of Satellite Communications
> - Security Management
> - Security Metrics and Measurement
> - Security Requirements (Threats, Vulnerabilities, Risk, Formal
> Methods, etc.)
> - Security Verification and Validation
> - Sensor and Mobile Ad Hoc Network Security
> - Service and Systems Design and QoS Network Security
> - Software Security
> - Trust Management and Reputation Systems
> - Ubiquitous Computing Security
> - Wireless Network Security?
> 
> 
> 
> 
> SUBMISSION INSTRUCTIONS
> Submitted papers must not substantially overlap papers that have been
> published or that are
> simultaneously submitted to a journal or a conference with proceedings.
> Submitted papers
> must be formatted according to the IEEE Conference proceedings format,
> available at
> http://www.ieee.org/publications_standards/publications/authors/authors
> _journals.html.?
> Submissions should be at most 6 pages. Submissions are to be made to
> the submission?
> web site at https://www.easychair.org/conferences/?conf=estelsec2012.
> Only pdf files will be?
> accepted. Submissions not meeting these guidelines risk rejection
> without consideration of their?
> merits. Papers must be received by the deadline of July 20, 2012 (11:59
> p.m. American Samoa time).?
> All accepted papers will be published in the conference proceedings.
> Authors of accepted papers?
> must guarantee that their papers will be presented at the conference. A
> one-day registration?
> option will be made available to special session attendees.
> 
> 
> 
> 
> IMPORTANT DATES
> Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
> Notification to authors: August 25, 2012
> Camera ready due: September 5, 2012
> 
> 
> 
> 
> SPECIAL TRACK PROGRAM CHAIR
> Pierangela Samarati
> Universita' degli Studi di Milano, Italy
> 
> 
> 
> 
> PROGRAM COMMITTEE
> tba
> 
> 
> 
> 
> This call for papers and additional information about the conference
> can be found at http://estel-sec.dti.unimi.it/
> _______________________________________________
> IEEE Communications Society Tech. Committee on Computer Communications
> (TCCC) - for discussions on computer networking and communication.
> Tccc at lists.cs.columbia.edu
> https://lists.cs.columbia.edu/cucslists/listinfo/tccc





More information about the TCCC mailing list