SAR-SSI 2012

7th Conference on Network and Information Systems Security

.

Cabourg2

Call for papers

This conference on network and information systems security represents a challenging continuation of the previous conferences SAR (on Security and Network Architecture) and SSI (on Information System Security) which decided to join since 2006. SAR/SSI’2010 is the new annual research conference of the SAR/SSI series. It aims at fostering the presentation of high quality research work in network and system security. The goal of this event is to provide a framework for exchanges among academic researchers, industry, graduate students and a broader audience interested in network and system security. The conference will offer a broad area of events, ranging from panels, tutorials, technical presentations and informal meetings. SAR/SSI will take place in the very nice area of cap-martin, located between Menton and Nice.

Prospective authors are encouraged to submit papers offering novel research contributions in network and system security as well as proposals for tutorials and panels. Submissions can address both theoretical issues in network and system security or provide practical and operational experiences in security management. Languages for papers and presentations can be French or English, both languages being used in SAR/SSI.

Topics

Authors are invited to submit research papers, papers presenting an experience or industrial applications or tutorials in the following (but not only) topics of interest:

  • Security of new network architectures (e.g. VoIP, MAN/WAN, Gigaethernet),
  • Security in wireless networks,
  • Security in adhoc networks,
  • Security of communications (VPN IPsec, SSL, MPLS, etc.),
  • Security in backbone networks,
  • Security of GIS (Geographic Information Systems)
  • IPv6 security,
  • Intrusion detection, honeypots,
  • Reverse engineering and software protection,
  • Security in peer-to-peer systems,
  • Security in embedded networks,
  • E-commerce security,
  • Formal methods for computer security,
  • Applied cryptography,
  • Authentication, access control,
  • Security protocols,
  • Metrology and security measurement,
  • Worms, Viruses, Botnets, Malware and Spyware,
  • Computer Forensics and Incident Response,
  • Security assessment,
  • Multicast security,
  • Public Key Infrastructures (PKI), trust management,
  • Methodology, ethics, legislation, regulation,
  • Security assessment for information technologies and certification,
  • XML, Web Services and Security,
  • Biometry, watermarking,
  • Anonymity and privacy
  • Security in vehicular communication

Panel proposals

The conference may include panel sessions addressing topics of interest to the computer security community. Proposals for panels should include possible panelists and an indication of which of those panelists have confirmed participation. Please submit panel proposals by email to the TPC chairs.

Paper submissions

Submissions should not exceed 8 pages must include on the cover page the paper title, author(s) name(s) and affiliation, a full address (Phone, fax, e-mail), an abstract of the paper (150 words max) and no more than 5 keywords. Authors must submit an electronic version of their paper (PDF / A4 format).

For the final version the sources of the contribution in LaTeX will also be required.

Style sheet can be downloaded from the following links:

Authors of the best papers selected by the technical program committee will be invited to publish an extended version of their paper in a journal of international audience.

Camera Ready Style Sheet

For the final version the sources of the contribution in LaTeX is required.

Contact

sarssi2012@easychair.org