Hi Marit, Yes. Best wishes, Simone. -----Original Message----- From: Ravi Jhawar <[email protected]> To: [email protected] Date: Mon, 11 Jun 2012 21:34:53 +0200 Subject: [Tccc] Call for Papers - ESTEL Security and Privacy Special Track
> [Apologies if you receive multiple copies of this message] > > > ================================= > CALL FOR PAPERS > > > Security and Privacy Special Track > IEEE-AESS Conference in Europe about Space and Satellite Communications > (ESTEL) > Rome, Italy, October 2-5, 2012 > http://estel-sec.dti.unimi.it/ > ================================= > > > The special track on Security and Privacy of the ESTEL Conference aims > at providing a > forum for discussing security and privacy issues that need to be > investigated for > providing advanced services, architectures, and technologies for space > and satellite > applications. In this context, it is of utmost importance to ensure > proper protection to > such complex systems, or systems-of-systems, to ensure security, > privacy, and availability > of the infrastructure as well as of resources and information it > provides and > manages. These aspects concern both the specific satellite application > and infrastructure > as well as the base stations and land data servers and communications > that serve them, > touching then the different areas with ICT. The problem is far from > trivial, due to the > criticality and the social impact of the applications and services > relying on this global > infrastructure, as well as the complexity given by the co-existence and > co-operation of, > possibly heterogeneous, component systems. Topics of interest include, > but are not limited > to: > > > - Access Control > - Applied Cryptography for Space Applications > - Authentication > - Biometrics Security and Privacy > - Critical Infrastructure Protection > - Data Integrity > - Data Protection > - Database Security and Privacy > - Digital Forensics > - Digital Rights Management > - Ethical and Legal Implications of Security and Privacy > - Formal Methods for Security > - Homeland Security > - Human Factors and Human Behaviour Recognition Techniques > - Identification, Authentication and Non-repudiation > - Identity Management > - Information Hiding > - Information Systems Auditing > - Insider Threats and Countermeasures > - Intellectual Property Protection > - Intrusion Detection & Prevention > - Management of Computing Security > - Organizational Security Policies > - Peer-to-Peer Security > - Privacy > - Privacy Enhancing Technologies > - Reliability and Dependability > - Risk Assessment > - Satellite-based Disaster Recovery > - Satellite Network Security > - Secure Cloud Computing > - Secure Software Development Methodologies > - Security Protocols > - Security and Privacy in Mobile Systems > - Security and Privacy in Complex Systems > - Security and Privacy in IT Outsourcing > - Security and Privacy in Location-based Services > - Security and Privacy in Pervasive/Ubiquitous Computing > - Security and Privacy in Satellite Surveillance > - Security and Privacy in Web Services > - Security and Privacy Policies > - Security Area Control > - Security Deployment > - Security Engineering > - Security for Grid Computing > - Security in Distributed Systems > - Security Information Systems Architecture and Design and Security > Patterns > - Security in e-Healthcare > - Security Issues of Satellite Communications > - Security Management > - Security Metrics and Measurement > - Security Requirements (Threats, Vulnerabilities, Risk, Formal > Methods, etc.) > - Security Verification and Validation > - Sensor and Mobile Ad Hoc Network Security > - Service and Systems Design and QoS Network Security > - Software Security > - Trust Management and Reputation Systems > - Ubiquitous Computing Security > - Wireless Network Security > > > > > SUBMISSION INSTRUCTIONS > Submitted papers must not substantially overlap papers that have been > published or that are > simultaneously submitted to a journal or a conference with proceedings. > Submitted papers > must be formatted according to the IEEE Conference proceedings format, > available at > http://www.ieee.org/publications_standards/publications/authors/authors > _journals.html. > Submissions should be at most 6 pages. Submissions are to be made to > the submission > web site at https://www.easychair.org/conferences/?conf=estelsec2012. > Only pdf files will be > accepted. Submissions not meeting these guidelines risk rejection > without consideration of their > merits. Papers must be received by the deadline of July 20, 2012 (11:59 > p.m. American Samoa time). > All accepted papers will be published in the conference proceedings. > Authors of accepted papers > must guarantee that their papers will be presented at the conference. A > one-day registration > option will be made available to special session attendees. > > > > > IMPORTANT DATES > Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time) > Notification to authors: August 25, 2012 > Camera ready due: September 5, 2012 > > > > > SPECIAL TRACK PROGRAM CHAIR > Pierangela Samarati > Universita' degli Studi di Milano, Italy > > > > > PROGRAM COMMITTEE > tba > > > > > This call for papers and additional information about the conference > can be found at http://estel-sec.dti.unimi.it/ > _______________________________________________ > IEEE Communications Society Tech. Committee on Computer Communications > (TCCC) - for discussions on computer networking and communication. > [email protected] > https://lists.cs.columbia.edu/cucslists/listinfo/tccc _______________________________________________ IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/tccc
