CRiSIS 2012: Call for Papers

7th International Conference on Risks and Security of Internet and Systems

Cork, Ireland, October 10-12, 2012

Call for Papers

The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies. Prospective authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications and case studies, such as telemedicine, banking, e-government and critical infrastructure, are also welcome. The list of topics includes but is not limited to:

•    Analysis and management of risk
•    Attacks and defences
•    Attack data acquisition and network monitoring
•    Cryptography, Biometrics, Watermarking
•    Dependability and fault tolerance of Internet applications
•    Distributed systems security
•    Embedded system security
•    Empirical methods for security and risk evaluation
•    Hardware-based security and Physical security
•    Intrusion detection and  Prevention systems
•    Organizational, ethical and legal issues
•    Privacy protection and anonymization
•    Risk-aware access and usage control
•    Security and risk assessment
•    Security and risks metrics
•    Security and dependability of operating systems
•    Security and safety of critical infrastructures
•    Security and privacy of peer-to-peer system
•    Security and privacy of wireless networks
•    Security models and security policies
•    Security of new generation networks, security of VoIP and multimedia
•    Security of e-commerce, electronic voting and database systems
•    Security of social networks
•    Traceability, metrology and forensics
•    Trust management
•    Use of smartcards and personal devices for Internet applications
•    Web and cloud security

Paper Submissions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must be submitted electronically in PDF format. Maximum paper length will be 8 printed pages for full papers or 4 pages for short papers, in IEEE 2-column style. Authors of accepted papers must guarantee that their papers will be presented at the conference. All papers selected for presentation at the conference will be published on-line by IEEE Xplore The authors of the best conference papers will be invited to submit an extended version to a special issue of the International Journal of Secure Software Engineering (IJSSE).

All paper submissions will be handled through the Easy Chair conference management system.  Follow the instructions given here:

Call for Tutorials

We solicit tutorials on state-of-the-art technologies relevant to the conference themes. We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference. The intended length of each tutorial is 2 to 3 hours.

A tutorial proposal should include a brief summary and outline, specific goals and objectives, the intended audience and the expected background of the audience as well as a biographical sketch of the presenter(s). The length of tutorial proposals should not exceed 5 pages.

Tutorial proposals should be submitted to the tutorial program chair: Nora Cuppens-Boulahia by email :  Nora(dot)Cuppens(at)telecom-bretagne(dot)eu  before June 18, 2012.