[Message Prev][Message Next][Thread Prev][Thread Next][Message Index][Thread Index]
13th European Symposium on Research in Computer Security (ESORICS'08)
F i r s t C a l l F o r P a p e r s
13th European Symposium on Research in Computer Security (ESORICS'08)
6-8 October, 2008
Malaga, Spain
http://www.isac.uma.es/esorics08/
Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Thirteenth European
Symposium
on Research in Computer Security (ESORICS 2008). Organized in a series
of European countries, ESORICS is confirmed as the European
research event in computer security. The symposium started in 1990 and
has been held on alternate years in different European countries and
attracts an international audience from both the academic and
industrial communities. From 2002 it has been held yearly. The
Symposium has
established itself as one of the premiere, international gatherings on
Information Assurance. Papers may present theory, technique,
applications,
or practical experience on topics including:
- Access control
- Anonymity
- Authentication
- Authorization and delegation
- Cryptographic protocols
- Data integrity
- Dependability
- Information flow control
- Smartcards
- System security
- Digital right management
- Accountability
- Applied cryptography
- Covert channels
- Cybercrime
- Denial of service attacks
- Formal methods in security
- Inference control
- Information warfare
- Steganography
- Transaction management
- Data and application security
- Intellectual property protection
- Intrusion tolerance
- Peer-to-peer security
- Language-based security
- Network security
- Non-interference
- Privacy-enhancing technology
- Pseudonymity
- Subliminal channels
- Trustworthy user devices
- Identity management
- Security as quality of service
- Secure electronic commerce
- Security administration
- Security evaluation
- Security management
- Security models
- Security requirements engineering
- Security verification
- Survivability
- Information dissemination control
- Trust models and trust management policies
The primary focus is on high-quality original unpublished research,
case studies and implementation experiences. We encourage submissions
of papers discussing industrial research and development. Proceedings
will be published by Springer-Verlag in the Lecture Notes in Computer
Science series.
* Instructions for paper submission
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference
with proceedings. Papers should be at most 15 pages excluding the
bibliography and well-marked appendices (using 11-point font), and at
most
20 pages total. Committee members are not required to read the
appendices, and so the paper should be intelligible without them.
Authors must submit their paper using the conference web site
following the requirements stated there.
Submissions must be received by March 31, 2008 in order to be
considered. Notification will be sent to authors by June 16, 2008.
Authors of
accepted papers must be prepared to sign a copyright statement and
must guarantee that their paper will be presented at the conference.
Authors
of accepted papers must follow the Springer Information for Authors'
guidelines for the preparation of the manuscript and use the templates
provided there.
* Program Chairs
Sushil Jajodia, George Mason University, USA
Javier Lopez, University of Malaga, Spain
* Important dates
Paper Submission due: March 31, 2008
Acceptance notification: June 16, 2008
Final papers due: July 7, 2008
alt.security.alarms Main Index |
alt.security.alarms Thread Index |
alt.security.alarms Home |
Archives Home