posted by user: nilskals || 5492 views || tracked by 8 users: [display]

CRITIS 2010 : Fifth International Workshop on Critical Information Infrastructure Security

FacebookTwitterLinkedInGoogle


Conference Series : Critical Information Infrastructures Security
 
Link: http://www.critis.net/
 
When Sep 22, 2010 - Sep 24, 2010
Where Athens, Greece
Submission Deadline May 16, 2010
Notification Due Jun 27, 2010
Final Version Due Jul 18, 2010
Categories    critical infrastructure   dependable infrastructures   threat analysis   security risks
 

Call For Papers

Key sectors of modern economies depend highly on ICT. The information
flowing through the resulting technological super-infrastructure as
well as the information being processed by the complex computing
systems that underpin these are critical as their disruption,
disturbance or loss can lead to high economical, material and,
sometimes, human loss. As a consequence, the security and dependability
of this infrastructure becomes critical and its protection a major
objective for governments, companies and the research community.

Now in its fifth edition, CRITIS will again bring together researchers
and professionals from academia, industry, and government interested
or involved in all security-related heterogeneous aspects of Critical
Information Infrastructures. We invite research papers, work-in-progress
reports, R&D projects results, surveying works and industrial
experiences describing significant security advances including but not
limited to the following areas:

- Continuity of Services
- Dependable Infrastructure Communications
- Early Warning Systems
- Embedded Technologies Security
- Incident Response
- Infrastructure Interdependencies
- Information Assurance
- Internet-Based Remote Control
- Forensic Techniques
- National and Cross Border Activities
- Network Survivability
- Trust Models in Critical Scenarios
- Policy Management
- Resilient Software
- Secure Information Sharing
- Security Logistics
- Security Modeling and Simulation
- Security Risks
- Threat Analysis
- Vulnerability Assessment

INSTRUCTIONS FOR AUTHORS

All submissions will be subjected to a thorough blind review by at least
three reviewers. Submissions must not substantially duplicate work that
was published elsewhere, or work that any of the authors has submitted
in parallel to any other conference or workshop that has proceedings.
Papers should be up to 12 pages in English, including bibliography and
well-marked appendices. Post-proceedings will be published by Springer-
Verlag in the Lecture Notes in Computer Science series. Pre-proceedings
will appear at the time of the conference. At least one author of each
accepted paper is required to register with the Workshop and present
the paper.

The CRITIS 2010 proceedings will again be published in Springer's
Lecture Notes in Computer Science series. To submit a paper, please
follow the specific instructions posted on the workshop website
(http://www.critis.net/). The submitted paper (in PDF or PostScript
format), which should follow the template indicated by Springer
(http:www.springer.de/comp/lncs/authors.html), must start with a title,
a short abstract, and a list of keywords. However, it should be
anonymised with no author names, affiliations, acknowledgements, nor
obvious references.

Inclusion in the post-proceedings volume requires at least one author
for each paper to present in person so as to ensure the interactive
workshop character.

IMPORTANT DATES
Submissions due: May 16, 2010
Notification to authors: June 27, 2010
Camera-ready papers: July 18, 2010

GENERAL CHAIRS
- Javier Lopez (University of Malaga, Spain)
- Sokratis Katsikas (University of Piraeus, Greece)

PROGRAMME CHAIRS
- Stephen D. Wolthusen (Gjøvik University College, Norway and
Royal Holloway, University of London, UK)
-Christos Xenakis (University of Piraeus, Greece)

TECHNICAL PROGRAMME COMMITTEE (some invitations pending)
- Cristina Alcaraz (University of Malaga, Spain)
- Fabrizio Baiardi (Università di Pisa, Italy)
- Sandro Bologna (ENEA, Italy)
- Robin Bloomfield (City University London, UK)
- Fernando Carvajal (INDRA, Spain)
- Emiliano Casalicchio (Università di Tor Vergata, Italy)
- Daniel Chavarri (S21SEC, Spain)
- Roberto Clemente (Telecom Italia, Italy)
- Geert Deconinck (K. U. Leuven, Belgium)
- Stelios Dritsas (Athens University of Economics and Business, Greece)
- Claudia Eckert (Fraunhofer SIT, Germany)
- Richard Garber (DRDC Centre for Security Science, Canada)
- Erol Gelenbe (Imperial College London, UK)
- Dimitris Geneiatakis (University of Piraeus, Greece)
- Stefan Geretshuber (IABG, Germany)
- Adrian Gheorghe (Old Dominion University, USA)
- Dimitris Gritzalis (Athens University of Economics and Business,
Greece)
- Stefanos Gritzalis (University of the Aegean, Greece)
- Nouredine Hadjsaid (LEG Grenoble Institute of Technology, France)
- Bernhard M. Hämmerli (Acris GmbH, Switzerland)
- Dan Horschel (Sandia National Laboratories, USA)
- Chris Johnson (Glasgow University, UK)
- Rüdiger Klein (Fraunhofer IAIS, Germany)
- Pierre-Dominique Lansard (France Telecom, France)
- Kostas Lambrinoudakis (University of Piraeus, Greece)
- Paul Lewis (Technology Strategy Board, UK)
- Eric Luiijf (TNO Defence, Security and Safety, The Netherlands)
- Marcelo Masera (EU Joint Researh Centre, European Commission)
- Christoforos Ntantogian (University of Athens, Greece)
- Eiji Okamoto (University of Tsukuba, Japan)
- Stefano Panzieri (Università di Roma Tre, Italy)
- Kai Rannenberg (Goethe University Frankfurt, Germany)
- Erich Rome (Fraunhofer IAIS, Germany)
- William H. Sanders (University of Illinois, USA)
- Roberto Setola (Università CAMPUS Bio-Medico, Italy)
- Sujeet Shenoi (University of Tulsa, USA)
- Sebastian von Solms (University of Johannesburg, South Africa)
- Neeraj Suri (TU Darmstadt, Germany)
- Nils K. Svendsen (Gjøvik University College)
- Simin Nadjm-Tehrani (Linköping University, Sweden)
- Barend Taute (Council for Scientific and Industrial Research,
South Africa)
- Paul Trushell (Attorney General's Department, Australia)
- William Tsoumas (Ernst & Young, Greece)
- Salvatore Tucci (Università di Tor Vergata, Italy)
- Jianying Zhou (Institute for Infocom Research, Singapore)

Related Resources

CPS4CIP 2025   The 6th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2025)
Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
ACIE 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ICINT--EI 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ICCDE 2025   2026 12th International Conference on Computing and Data Engineering (ICCDE 2026)
ICDMIS 2025   International Conference on Data Mining and Information Security
ICCNS--EI 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
ICCNS 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)