21-23th November 2016 | Cyprus
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

 

The Security Track will address all the security aspects of design, implementation, deployment, architectures and modeling of heterogeneous wired and wireless computer networks, of  virtualization technology, as well as of  pervasive computer applications. It will also provide dynamic forums for researchers, students and professionals to present their research results and development in these areas and will offer the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to information and system security.

 Topic areas of interest of this track include, but are not limited to the following:

Thematic areas:

  • Security engineering. Methodologies, formalisms, modeling, tools, code instrumentation ....
  • Cryptography. Algorithms, protocols, attacks...
  • Security in distributed systems.
  • Cryptographic Hardware and Embedded Systems.
  • Light-weight cryptography.
  • Information Hiding. Steganography ...
  • Privacy and Anonymity.
  • Security assurance. Evaluation, testing, formal proofs, certification.
  • Quantum Cryptography and QKD.
  • Trusted computing. Analyses and attacks, practical applications...
  • Surveillance and monitoring. Intrusion detection, monitoring techniques, architectures,...
  • Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
  • Social and psychological aspects of security. User-centered security evaluation, perception of security and threats...
  • Security and usability.

 

Application areas:

  • Service Oriented Computing. Platform security, access control, Security of the SOC processes (Negotiation, Orchestration), Identification of services...
  • Cloud computing. Platform security, data protection, software protection, surveillance and dynamic reaction.
  • Ubiquitous computing, pervasive computing and ambient intelligence. Secure system models, development support, dynamic reaction, self-* systems
  • Embedded systems. Dynamic replaceability, system security assessment, secure system composition, tampering-resistance...
  • Security in system evolution. Design for secure evolution, evolution-oriented surveillance, security patches...
  • Critical infrastructures. Protection architectures, redundancy and replication, scalability issues...

 

Security Track chairs

  • Hadi Otrok, Khalifa university, Abu Dhabi, UAE
  • Azzam Mourad, Lebanese American University, Lebanon

Security TPC committee (TBC)

Givenname Surname Affiliation Country
Omar Abdel Wahab Concordia University Canada
Giulio Aliberti University of Roma Tre Italy
Malik AlTakrori McGill University Canada
Claudio Ardagna Università degli Studi di Milano Italy
Gerard Chalhoub Clermont University France
Tassos Dimitriou Computer Technology Institute in Greece and Kuwait University Greece
Rebeca Estrada Concordia University Canada
Claude Fachkha New York University, Georgia Tech USA
Eduardo Fernandez Florida Atlantic University USA
Sigrid Guergens Fraunhofer Institute for Secure Information Technology Germany
Farkhund Iqbal Zayed University UAE
Stamatis Karnouskos SAP Research Germany
Sokratis Katsikas Norwegian University of Science and Technology Norway
Hristo Koshutanski University of Malaga Spain
Lukasz Krzywiecki Wroclaw University of Technology Poland
Bogdan Ksiezopolski Maria Curie-Sklodowska University Poland
Pascal Lafourcade LIMOS, Clermont University France
Costas Lambrinoudakis University of Piraeus Greece
Maryline Laurent Institut Mines-Télécom, Télécom SudParis France
Volkmar Lotz SAP AG France
Antonio Maña University of Malaga Spain
Fabio Martinelli CNR-IIT Italy
Rabeb Mizouni Khalifa University UAE
Djedjiga Mouheb Concordia University Canada
David Naccache ENS France
Joachim Posegga Institute of IT-Security and Security Law Germany
Kasper Rasmussen University of Oxford United Kingdom
Jean-Marc Robert Ecole de Technologie Supérieure Canada
Shakti Singh Khalifa University of Science Technology and Research UAE
Nicolas Sklavos University of Patras Greece
Hanine Tout Ecole de Technologie Supérieure Canada
Artemios Voyiatzis SBA Research Austria
Andreas Wespi IBM Zurich Research Laboratory Switzerland
Badis Hammi Telecom ParisTech France

Become a Sponsor

If you are interested in sponsoring the 8th IFIP NTMS edition, please contact us at your earliest convenience.

Important dates

  • Papers Submission Deadline : July 7th 2016 September 16th, 2016
  • WORKSHOPS Papers Submission Deadline : July 7th 2016 August 31th, 2016
  • Papers Acceptance Notification: September 30th, 2016
  • Papers camera-ready: October 17th, 2016
  • Workshop/Keynote submission deadline: Mai 31th, 2016
  • Workshop/Keynote Acceptance Notification: June 30th, 2016 
top