Security 2009

From Openresearch
Jump to: navigation, search
Security 2009
CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
Dates N/A
"N/A" contains an extrinsic dash or other characters that are invalid for a date interpretation.
-
Homepage: www.ijcsi.org
Location
Location: N/A, N/A
Loading map...

Important dates
Submissions: Jul 31, 2009
Table of Contents


Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.


==========================================================================
CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
ISSN: 1694-0784

Submission Deadline:     31st July 2009
Acceptance Notification:19th August 2009
Online Publication:    31st August 2009

The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.


Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling

Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance

Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security

Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services

Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability

Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning

Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./

Fundamentals for SHS; Privacy and protection for SHS; Identify and location management in SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces for SHS; SHS for accessibility and elderly/disabled people; Real-time challenges for SHS in eHealth environments; Architectures and systems for SHS; Network technologies and protocols for SHS; Ubiquitous/pervasive platform and middleware for SHS; Services and applications for SHS; SHS on campuses and hotels; SHS for mission critical laboratories; Content protection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and Homeland security; Personal data privacy and protection in SHS; Emerging standards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience

Fundamentals on highly dynamic environments; Privacy and predefined access control dilemma; Privacy police, provisions and obligations; Dependability in dynamic environments; Protection of digital documents in dynamic environments; On-line activities in high dynamic systems; Law enforcement in high dynamic systems; Personalization; Privacy and transparency; Distributed usage control; Privacy compliance

Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems

All submitted papers will be judged based on their quality by the reviewers committee. All paper submissions will be handled electronically and detailed instructions on submission procedure are available on IJCSI website (see http://www.ijcsi.org/authors.php).

For other information, please contact IJCSI Managing Editor, (editor@ijcsi.org)
Website: http://www.ijcsi.org
	

This CfP was obtained from WikiCFP

Facts about "Security 2009"
AcronymSecurity 2009 +
Event typeConference +
Has coordinates41° 37' 27", -74° 8' 31"Latitude: 41.624061111111
Longitude: -74.141863888889
+
Has location cityN/A +
Has location countryCategory:N/A +
Homepagehttp://www.ijcsi.org +
IsAEvent +
Submission deadlineJuly 31, 2009 +
TitleCALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2) +