Security 2009
Security 2009 | |
---|---|
CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
| |
Dates | N/A "N/A" contains an extrinsic dash or other characters that are invalid for a date interpretation. -
|
Homepage: | www.ijcsi.org |
Location | |
Location: | N/A, N/A |
Loading map... | |
Important dates | |
Submissions: | Jul 31, 2009 |
Table of Contents | |
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results. ========================================================================== CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2) ISSN: 1694-0784 Submission Deadline: 31st July 2009 Acceptance Notification:19th August 2009 Online Publication: 31st August 2009 The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./ Fundamentals for SHS; Privacy and protection for SHS; Identify and location management in SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces for SHS; SHS for accessibility and elderly/disabled people; Real-time challenges for SHS in eHealth environments; Architectures and systems for SHS; Network technologies and protocols for SHS; Ubiquitous/pervasive platform and middleware for SHS; Services and applications for SHS; SHS on campuses and hotels; SHS for mission critical laboratories; Content protection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and Homeland security; Personal data privacy and protection in SHS; Emerging standards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience Fundamentals on highly dynamic environments; Privacy and predefined access control dilemma; Privacy police, provisions and obligations; Dependability in dynamic environments; Protection of digital documents in dynamic environments; On-line activities in high dynamic systems; Law enforcement in high dynamic systems; Personalization; Privacy and transparency; Distributed usage control; Privacy compliance Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems All submitted papers will be judged based on their quality by the reviewers committee. All paper submissions will be handled electronically and detailed instructions on submission procedure are available on IJCSI website (see http://www.ijcsi.org/authors.php). For other information, please contact IJCSI Managing Editor, (editor@ijcsi.org) Website: http://www.ijcsi.org
This CfP was obtained from WikiCFP
Facts about "Security 2009"
Acronym | Security 2009 + |
Event type | Conference + |
Has coordinates | 18° 43' 41", 99° 0' 39"Latitude: 18.728008333333 Longitude: 99.010819444444 + |
Has location city | N/A + |
Has location country | Category:N/A + |
Homepage | http://www.ijcsi.org + |
IsA | Event + |
Submission deadline | July 31, 2009 + |
Title | CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2) + |