posted by user: ffulvio || 6885 views || tracked by 10 users: [display]

SAR-SSI 2011 : The 6th International Conference on Network and Information Systems Security

FacebookTwitterLinkedInGoogle

Link: http://sarssi-conf.org/
 
When May 18, 2011 - May 21, 2011
Where La Rochelle, France
Submission Deadline Mar 1, 2011
Notification Due Mar 29, 2011
Final Version Due Apr 25, 2011
Categories    network security   information security
 

Call For Papers

SAR/SSI-2011 CALL FOR PAPERS
International Conference on Network and Information Systems Security
La Rochelle, France - 18-21 May 2011

The SAR-SSI conference series provides a forum for presenting novel research results, practical experiences and innovative ideas in network and information systems security.
The goal of SAR-SSI-2011 is fostering exchanges among academic researchers, industry and a wider audience interested in network and information system security. The conference will offer a broad area of events, ranging from panels, tutorials, technical presentations and informal meetings. Prospective authors are encouraged to submit papers
describing novel research contributions as well as proposals for tutorials and panels. Submissions can address theoretical issues in network and information system security or provide practical and operational experiences in security management. Languages for papers and presentations can be French or English, both languages being used in
SAR-SSI.

TOPICS
Authors are invited to submit research papers, papers presenting a practical experience or new industrial applications, panel and tutorial proposals on topics related to network and information systems security.
Topics of interest include, but are not limited to:

+Network Security
- Security of new network architectures (e.g. VoIP, MAN/WAN, Giga-Ethernet)
- Security in wireless and adhoc networks,
- Security of communications (e.g. VPN, IPsec, SSL, MPLS)
- Security in backbone and IPv6 networks
- Multicast security
- Security in peer-to-peer systems
- Security in embedded networks
+Formal methods and models for computer security
- Applied cryptography
- Authentication and access control
- Anonymity and privacy
- Metrology and security measurement
- Public Key Infrastructures (PKI)
- Security protocols
- Security assessment and certification
- Trust representation and management
+Computer Forensics and Incident Response
- Intrusion detection systems, honeypots
- Worms, Viruses, Botnets, Malware and Spyware
- Security assessment
+Software and Systems Security
- Reverse engineering and software protection
- Methodology, ethics, legislation and regulation
- Biometry and watermarking
- E-commerce security
- Security in vehicular communications
+XML, Web Services and Cloud Security
- Web services and GRID computing security
- Security on Untrusted Clouds
- Frameworks for managing inter-organizational trust relationships
- Web services exploitation of Trusted Computing
- Secure orchestration of Web services

PAPER SUBMISSIONS
Submissions should not exceed 15 pages must include on the cover page the paper title, author(s) name(s) and affiliation, a full address (Phone, fax, e-mail), an abstract of the paper (150 words max) and no more than 5 keywords.
Authors must submit an electronic version of their paper (PDF / A4 format). Authors are requested to use the sarssi.cls type and use the alpha style for the bibliography. For the final version the sources of the contribution in LaTeX will also be required. All accepted papers will also be published in the conference proceeding by IEEE, and will be indexed by IEEE Xplore Digital Library.

The submission of papers must be done through the EasyChair Conference system using the following page: http://www.easychair.org/conferences/?conf=sarssi2011

PANEL PROPOSALS
The conference may include panel sessions addressing topics of interest to the computer security community.
Proposals for panels should list possible panellists, specifying those who have confirmed participation. Please submit panel proposals by email to the TPC co-chairs.

JOURNAL PUBLICATION
Authors of the best papers selected by the technical program committee will be invited to publish an extended version of their paper in a journal of international audience.

TUTORIALS
The conference will include a tutorial and prominent invited speakers session. The tutorials will address hot research and/or industry topics relating to network and information systems security. Please submit tutorial proposals by email to the TPC co-chairs.

IMPORTANT DATES
Submission: February 14th, 2011
Notification: March 29th, 2011
Registration: April 18th, 2011 (reduced fare)
Camera Ready Version: April 25th, 2011
Conference: May 18th - 21st, 2011

COMMITTEES

General Chairs
- Ahmed Serhrouchni, Télécom ParisTech, France

Steering Committee
- Abdelmajid Bouabdallah, UTC, France
- Danielle Boulanger, Univ. Lyon-Jean Moulin, France
- Isabelle Chrisment, Université Nancy I, France
- Alban Gabillon, Université de la Polynésie Française
- Ludovic Mé, Supélec, France
- Ahmed Serhrouchni, Télécom ParisTech, France

Technical Program Committee Chair
- Ernesto Damiani, Università degli Studi di Milano, Italy

Organizing Committee
- Ibrahim Hajjeh, Ineovation, France
- Jean Leneutre, Télécom ParisTech, France
- Radwan Saâd, Télécom ParisTech, France
- Ahmed Serhrouchni, Télécom ParisTech, France
- Youcef Begriche, IEEE, France
- Rim Moalla, Télécom ParisTech, France

Technical Program Committee

- Mhamed Abdallah, Telecom Sud Paris, France
- Mohammed Achemlal, France Telecom / Orange, France
- Hossam Afifi, Telecom Sud Paris, France
- Claudio Agostino Ardagna, Univ. degli Studi di Milano, Italy
- Gildas Avoine, Université catholique de Louvain, Belgique
- Mohammed Badra, Limos CNRS, Clermont Ferrand, France
- Youcef Begriche, IEEE, France
- Patrick Bellot, Télécom ParisTech, France
- Nadia Bennani, INSA-Lyon, France
- Abdelmalek Benzekri, IRIT, Toulouse, France
- Christophe Bidan, Supélec, France
- Karima Boudaoud, Université de Nice, France
- Adel Bouhoula, SUPCOM of Tunis, Tunisie
- Lionel Brunie, INSA-Lyon, France
- Laurent Bussard, Microsoft Innovation Center, Germany
- Laurent Butti, Orange R&D, France
- Marco Casassa-Mont, HPLabs, HK
- Yacine Challal, UTC, France
- Claude Chaudet, Télécom ParisTech, France
- Ken Chen, Université de Paris 13, France
- Yves Correc, DGA/CELAR, France
- Bernard Cousin, IRISA, France
- Mathieu Couture, Carleton University, Canada
- Frederic Cuppens, Telecom Bretagne, France
- Nora Cuppens-Boulahia, Telecom Bretagne, France
- Hervé Debar, Telecom Sud Paris, France
- Rachida Dssouli, Concordia University, Canada
- Anas Abou El Kalam, ENSEEIHT, France
- Robert Erra, ESIEA, Paris, France
- Mounir Frikha, SUPCOM of Tunis, Tunisie
- Laurent Gallon, Université de Pau, France
- Sihem Guemara, SUPCOM of Tunis, Tunisie
- Gilles Guette, University of Rennes 1, France
- Vincent Guyot, ESIEA, Paris, France
- Gaétan Hains, Université Paris-Est, France
- Ibrahim Hajjeh, Ineovation, France
- Artur Hecker, Télécom ParisTech, France
- Guillaume Hiet, Supélec, France
- Mathieu Jaume, Lab. d'Informatique de Paris 6, France
- Rida Khatoun, UTT, Troyes, France
- Abou Khaled Omar, HES.SO, Fribourg, Switzerland
- Djamel Khadraoui, CRP Henri Tudor, Luxembourg
- Houda Labiod, Télécom ParisTech, France
- Mohamed Lambarki, ESIEA, Paris, France
- Jean-Louis Lanet, University of Limoges, France
- Maryline Laurent, Telecom Sud Paris, France
- Daniel Le Métayer, INRIA Grenoble - Rhône-Alpes, France
- Jean Leneutre, Télécom ParisTech, France
- Bruno Martin, Université de Nice Sophia Antipolis, France
- Fabio Martinelli, IIT-CNR, Italy
- Ludovic Mé, Supélec, France
- Mohamed Mosbah, Labri, Bordeaux, France
- Elena Mugellini, HES.SO, Fribourg, Swizertland
- Farid Naït-Abdesselam, Univ. of Paris Descartes, France
- Philippe Owezarski, LAAS, CNRS, France
- Guillaume Piolle, Supélec, France
- Fabien Pouget, CERTA, France
- Nicolas Prigent, Supélec, France
- Guy Pujolle, Laboratoire d'Informatique de Paris 6, France
- Jean-Luc Richier, Lab. d'Informatique de Grenoble, France
- Etienne Riviere, Université de Neuchâtel, Switzerland
- Jean-Marc Robert, École de Tech. Supérieure, Canada
- Yves Roudier, Institut Eurécom, France
- Jörg Schwenk, University of Bochum, Germany
- Eric Totel, Supélec, France
- Frederic Tronel, Supélec, France
- Pascal Urien, Télécom ParisTech, France
- Valerie Viet Triem Tong, Supélec, France

Related Resources

ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
IJCIS 2024   International Journal on Cryptography and Information Security
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SEAS 2025   14th International Conference on Software Engineering and Applications
NTIJ 2024   Nanoscience and Technology: An International Journal
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy