| |||||||||||||||||
NordSec 2011 : 16th Nordic Conference in Secure IT SystemsConference Series : Nordic Conference on Secure IT Systems | |||||||||||||||||
Link: http://nordsec2011.cyber.ee | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
The 16th Nordic Conference in Secure IT Systems will take place in Tallinn Science Park Tehnopol, Tallinn, Estonia, 26-28 October 2011. The conference will be organized by Cybernetica AS, in cooperation with University of Tartu and Tallinn University of Technology.
The conference welcomes contributions in the form of papers, short papers, and posters. Since 1996, the NordSec conferences have brought together computer security researchers and practitioners from around the world, and particularly from the Nordic countries and Northern Europe. The conference focuses on applied IT security and is intended to encourage interaction between academic and industrial research. Student papers and posters are particularly encouraged. Submissions reporting industrial or governmental experiences are also encouraged and will be given special consideration. The post-proceedings of the conference, containing revised versions of full papers, will appear in the Springer Lecture Notes in Computer Science (LNCS) series. Contributions should reflect original research, developments, studies and practical experience within all areas of IT security. With the theme “IT Security in Governance”, this year's conference will emphasize policies, strategies and technologies related to the security and sustainability of processes executed by heterogeneous organizations, departments or organizational clusters of all sizes. NordSec 2011 also welcomes contributions over a broad range of topics in IT security, including, but not limited to, the following areas: * Applied cryptography * Commercial security policies and their enforcement * Communication and network security * Computer crime and information warfare * Hardware and smart card applications * Internet and web security * Intrusion detection * Language-based techniques for security * New ideas and paradigms in security * Operating system security * Privacy and anonymity * Security education and training * Security evaluation and measurement * Security management and audit * Security modeling and metrics * Access control and security models * Security protocols * Social engineering and phishing * Security usability * Economics, law and social aspects of security * Software security and malware * Trust and identity management |
|