International Conference on Emerging Security Information, Systems and Technologies

SECURWARE 2007

October 14-20, 2007 - Valencia, Spain


Call for Papers

The SECURWARE 2007 (International Conference on Emerging Security Information Systems and Technologies) is an event covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related to low enforcement, security data mining, malware models, etc.

Security, defined for ensuring protected communication among terminals and user applications across public and private networks, is the core for guaranteeing confidentiality, privacy, and data protection. Security affects business and individuals, raises the business risk, and requires a corporate and individual culture. In the open business space offered by Internet, it is a need to improve defences against hackers, disgruntled employees, and commercial rivals. There is a required balance between the effort and resources spent on security versus security achievements. Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs. Other technical aspects are related to the communication speed versus complex and time consuming cryptography/security mechanisms and protocols.

As a multi-track event, SECURWARE 2007 will serve as a forum for researchers from the academia and the industry, professionals, standard developers, policy makers and practitioners to exchange ideas. The topics could be on techniques and applications, best practices, awareness and experiences as well as future trends and needs (both in research and practices) related to all aspects of information security, security systems and technologies.

SECURWARE 2007 has the following tracks:

ARCH: Security frameworks, architectures and protocols
SECMAN: Security management
SECTECH: Security technologies
SYSSEC: System security
INFOSEC: Information security
THREATS: Security threats
ANTIFO: Anti-forensics
PRODAM: Profiling data mining
SECHOME: Smart home security
SECDYN: Security and privacy in dynamic environments

We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

The topics suggested by the conference can be discussed in term of concepts, state of the art, standards, implementations, running experiments and applications. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited topic areas. Industrial presentations are not subject to these constraints. Tutorials on specific related topics and panels on challenging areas are encouraged. 

Topics of interest include, but are not limited to, the following tracks:

ARCH: Security frameworks, architectures and protocols

Formal aspects of security
Security analysis methodologies
Security verification
Security protocols
Security architectures and formalisms
Security and design vulnerability
Security and privacy protection
Performance and security
Secure group communication/multicast
Software design security
Middleware security
Security for nomadic code
Intrusion detection systems

SECMAN: Security management

Identity management
Security law enforcement 
PKI
PKI Key management
Incident response planning
Intrusion detection and event correlation
Firewalls
Trust management

SECTECH: Security technologies

Secure protocols
Applied cryptography
Smart cards
Biometrics
Digital rights management
Electronic surveillance
Database security

SYSSEC: System security

Internet security
Security in wireless 
Sensor/cellular network security
Ad hoc network security
Security in peer-to-peer networks
Security in wireless multimedia systems
Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.)
Security of emergency services

INFOSEC: Information security

Information hiding
Anonymity
Authentication
Data Integrity
Security data mining
Data confidentiality and integrity
Information flow protection
Trustworthy networks: authentication, privacy and security models
Secure service discovery
Secure location-based service 
Information survivability

THREATS: Security threats

Malware propagation models
Profiling security information
Vulnerability analysis and countermeasures
Denial of service attacks
Antivirus techniques

ANTIFO: Anti-forensics

Advanced anti-forensics mechanisms
Smart anti-forensics
e-discovery industry and anti-forensics
Overwriting data and metadata
Data hiding approaches
Detecting forensics analysis
Anti-forensics tools
Unix-, Windows-, and Linux anti-forensics techniques
Open source anti-forensics tools
Network anti-forensics tools

PRODAM: Profiling data mining

User and traffic profiling
Data mining and visualization
Profile mining and knowledge discovery
Mining lifecycle for profile collections
Profile warehouse construction
Profile portfolio and profile discovery
Profiling game users and game traffic
Profiling transactions
Simpson'd paradox
Real-time profiling mechanisms
Patterns for information profiling
Profiling engines
Profiling metrics
Forensics
Profiling applications (banks, on-line shopping, etc.)
Data mining-based user profile prediction

SECHOME: Smart home security

Fundamentals for SHS
Privacy and protection for SHS
Identify and location management in SHS
Authentication and authorization in SHS
Access control and security policies in SHS
Trust and reputation management
Security context-based interfaces for SHS
SHS for accessibility and elderly/disabled people
Real-time challenges for SHS in eHealth environments
Architectures and systems for SHS
Network technologies and protocols for SHS
Ubiquitous/pervasive platform and middleware for SHS
Services and applications for SHS
SHS on campuses and hotels
SHS for mission critical laboratories
Content protection and digital rights management for SHS
Intelligent devices, sensor network/RFID for SHS
Intrusion detection and computer forensics for SHS
SHS and Homeland security
Personal data privacy and protection in SHS
Emerging standards and technologies for SHS
Commercial and industrial for SHS
Case studies, prototypes and experience

SECDYN: Security and privacy in dynamic environments

Fundamentals on highly dynamic environments
Privacy and predefined access control dilemma
Privacy police, provisions and obligations
Dependability in dynamic environments
Protection of digital documents in dynamic environments,
On-line activities in high dynamic systems
Law enforcement in high dynamic systems
Personalization
Privacy and transparency
Distributed usage control
Privacy compliance

INSTRUCTION FOR THE AUTHORS

The SECURWARE 2007 Proceedings will be published by IEEE Computer Society Conference Publishing Services and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes.

Important deadlines:

Submission deadline May 10, 2007
Notification June 10, 2007 June 12, 2007
Registration and camera ready June 25, 2007 June 29, 2007

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the EDAS system.

Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page.

Paper formatting samles are available for as word document and pdf document.

Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference’s CD collection, together with the regular papers. Please send your presentations to petre@iaria.org and lourdes@disca.upv.es.

Tutorials

Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to petre@iaria.org and lourdes@disca.upv.es.

Panel proposals

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. Contact petre@iaria.org and lourdes@disca.upv.es.

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org and lourdes@disca.upv.es.

For more information, petre@iaria.org

 
 

Copyright (c) 2006, IARIA