posted by user: jgalfaro || 8686 views || tracked by 9 users: [display]

FPS 2011 : Foundations & Practice of Security

FacebookTwitterLinkedInGoogle


Conference Series : Foundations and Practice of Security
 
Link: http://fps2011.dyndns.org
 
When May 12, 2011 - May 13, 2011
Where Paris (France)
Submission Deadline Mar 5, 2011
Notification Due Mar 19, 2011
Final Version Due Apr 4, 2011
Categories    security   privacy   trust   networking
 

Call For Papers

CALL FOR PAPERS -- FPS 2011

4th MITACS workshop on Foundations & Practice of Security
(http://fps2011.dyndns.org)

12 - 13 May, 2011, Paris, France
Springer LNCS Proceedings

We invite researchers and practitioners working in security, privacy,
trustworthy data systems and related areas to participate in the
event.

This fourth edition of the workshop will be hosted by the
Institut TELECOM at Telecom ParisTech, the 12th and 13th of May.

The meeting is held in co-operation with MITACS (Mathematics of
Information Technology and Complex Systems), a Canadian research
network which connects university-based researchers with industry
and the public sector.

Important dates:

* Submission Deadline: March 5, 2011
* Acceptance Notification: March 19, 2011
* Camera Ready: April 4, 2011

Scope:

The objective of the workshop is to present and discuss international
research in different areas of theoretical and practical security
solutions. We invite researchers and practitioners from all countries
working in security, privacy, trustworthy data systems and related
areas to participate in the event. The main topics, but not limited
to, include:

* Cryptography & Cryptanalysis
* Security in Service Oriented Architectures
* Security in Web Services
* Security Administration
* Policy-based Security Architectures
* Security of Distributed Embedded Middleware
* Access Control Languages
* Trust Management
* Risk Assessment and Assurance
* Threat Analysis
* Distributed Security Protocols
* Security of Grid Computing
* Malware & Botnet Detection
* Protocol Verification
* Privacy & Sensitive Data Management
* Data Mining
* Security of Cloud Computing
* Watermarking
* Side Channel Attacks
* Monitoring and Auditing
* Privacy in Social Networks
* Information Theoretic Security
* Information Flow
* Security in Ambient Intelligence (AmI) Applications
* Security in Sensor Networks and RFIDs

For more information, please see http://fps2011.dyndns.org/.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
NLPA 2025   6th International Conference on Natural Language Processing and Applications
NLAIM 2025   2nd International Conference on NLP, Artificial Intelligence, Machine Learning and Applications
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ISCMI 2025   2025 12th International Conference on Soft Computing & Machine Intelligence (ISCMI 2025)
TPDL 2025   29th International Conference on Theory and Practice of Digital Libraries
CRBL 2025   5th International Conference on Cryptography and Blockchain