International Conference on Security of Information and Networks (SIN 2007)



Similar documents
Standard Big Data Architecture and Infrastructure

THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

Emerging Trends and The Role of Standards in Future Health Systems. Nation-wide Healthcare Standards Adoption: Working Groups and Localization

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

18th IEEE Conference on Business Informatics Call for Papers

DR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK

Dept. of Financial Information Security

Title ISSN SJR H index Country Foundations and Trends in Information Retrieval

PhD Perspectives, Trends and Challenges

U.S. News Best Global Universities Rankings: An inside look at the latest results and methodology

1. ELECTRONIC COMPONENT, POWER SUPPLIES AND EMBEDDED SYSTEMS FAIR

IJRCW May 2009 Suleyman Demirel University, Isparta, Turkey. In Technical Cooperation with IEEE Robotics and Automation Society (pending).

Curriculum Vitae. 1 Person Dr. Horst O. Bunke, Prof. Em. Date of birth July 30, 1949 Place of birth Langenzenn, Germany Citizenship Swiss and German

SMART InTeRneT OF ThIngS

09:15-09:35 İsmail TOHUMCU, Deputy Undersecretary (Industrial Services), SSM, Turkey

Basheer Al-Duwairi Jordan University of Science & Technology

CIS 253. Network Security

Huseyin Polat s Curriculum Vitae

Full professor and 6 assistant professors of IT A new school in IT Cameroon

The Second Research Methods Summer School for Research Students co-organized by the School of Hotel and Tourism Management (SHTM), The Hong Kong

Teaching in School of Electronic, Information and Electrical Engineering

CISCO PIX SECURITY APPLIANCE LICENSING

e-code Academy Information Security Diploma Training Discerption

CURRICULUM VITAE. 1. Name: İbrahim ERŞAN. 2. Date of Birth : Academic Rank : Asst.Prof.Dr. 4. Academic Degrees: Eastern Mediterranean

FACT SHEET ON THE ASSOCIATION OF PACIFIC RIM UNIVERSITIES

Resume. Dr. Vedat COSKUN. Organisational Personal Personal Web Site Research Lab Web Site

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

ASSESSMENT PLAN: M.S. in Computer Science

FINANCIAL AID.

University and Entrepreneurship (TURKEY)

Chapter 1: Introduction

Hospitality Management

Final report November 2014 West hall Atrium Tokyo Big Sight, Japan

Mobile Network Security Technology Research Center Kyungpook National University

Guide. Axis Webinar. User guide

CURRICULUM VITAE SERDAR SAYMAN September 2014

The Internationalization of Higher Education: Foreign Doctorate Holders in a Russian Academic Market as Agents of Transformation

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

KOBA Exhibition Result Post Show Report. A. at a Glance

The VAT & Invoicing Requirements Update March 2012

Content of smart wireless sensor network security and its network security policy

A National Ranking for Turkish Universities: URAP-TR. Fatih Ömrüuzun Oğuzhan ALAŞEHİR

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

Network security and privacy

Faculty of Letters / Graduate School of Humanities

Information Security and Cryptography

5 TH INTERNATİONAL CONFERENCE OF EXPERTS ON THE RETURN OF CULTURAL PROPERTY. List Of Participants

Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2015

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

HL7 AROUND THE WORLD

FELLOWSHIPS, GRANTS, ACADEMIC AWARDS

IDEF YOUR NEXT BIG IDEA. MAKE ONTARIO, CANADA MEET THE ONTARIO, CANADA DELEGATION. Ontario Stand 224, Hall 2

Security of Web Applications and Browsers: Challenges and Solutions

Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2013

CURRICULUM VITA BYUNGCHAE JIN

October 15, 2015 Moscow, Hotel Baltschug Kempinski, 1 Balchug street

NETCONF-based Integrated Management for Internet of Things using RESTful Web Services

International Organization for Standardization TC 215 Health Informatics. Audrey Dickerson, RN MS ISO/TC 215 Secretary

ISAF 2012 WAS AGAIN OUTSTANDING WITH 5 TOPICS AND 5 TITLES

CURRICULUM VITAE. Research Interests. Education. Fatih ÖZAYDIN, PhD

Mobility-Enhanced File Integrity Analyzer For Networked Environments

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Evaluating The Performance of Symmetric Encryption Algorithms

Chicago Business Overview

CURRICULUM VITAE. Degree Field University Year BA Economics Middle East Technical 1988 University MBA Business Administration Bilkent University 1990

7 INTERNATIONAL INVESTMENT ATTRACTION AND EXPORT DEVELOPMENT PROGRAMS UPDATE

Imam Mohammad Ibn Saud Islamic University College of Computer and Information Sciences Department of Computer Sciences

Hosted Security Quick Start Guide

Network Security Using Job Oriented Architecture (SUJOA)

Summary Report to UNESCO for UNESCO Chair program in higher education at Peking University, PR China

Doctor of Philosophy in Computer Science

EUROPEAN STUDIES IN TURKEY: PRESENT STATE AND PROPOSALS FOR THE FUTURE

Asia Pacific the Future of Cloud Computing

Quantum View Manage Administration Guide


AES Data Encryption in a ZigBee network: Software or Hardware?

CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK)

Introduction of Information Security Research Division

G20 EMPLOYMENT WORKING GROUP SUB-GROUP ON LABOUR INCOME SHARE AND INEQUALITIES

United Kingdom Internet Security Threat Profile

Computer Science. College of Engineering

Transcription:

LAST CALL International Conference on Security of Information and Networks (SIN 2007) May 8-10, 2007 Venue Salamis Bay Conti Resort Hotel, Gazimagusa (TRNC), North Organized by Faculty of Engineering, Eastern Mediterranean University, Gazimagusa (TRNC), North Faculty of Electrical and Electronic Engineering, Istanbul Technical University, Istanbul, Turkey Supported by Scientific & Technological Research Council of Turkey (TUBITAK) (pending) National Research Institute of Electronics and Cryptology (UEKAE) IEEE Turkey Section IEEE Computer Society Turkey Branch Chamber of Computer Engineers, TRNC, North Internet Technologies Association (INETD), Turkey Linux Users Association (LKD), Turkey Sponsored by KKTCell, North Technopark, GMTGB, North Microsoft Research and Microsoft Turkey ARGELA, Turkey & North EC-Council, USA Hosted by Department of Computer Engineering, and Internet Technologies Research Center (ITRC) Eastern Mediterranean University Gazimagusa (TRNC), North

The International Conference on Security of Information and Networks (SIN 2007) provides an international forum for presentation of research and applications of security in information and networks. The SIN 2007 conference features contributed as well as invited papers, workshops and tutorials on theory and practice. Its drive is to convene a high quality, well-attended, and up-to-date conference on scientific and technical issues of security in information, networks, and systems. The Conference s main theme is Information Assurance, Security, and Public Policy, by which is meant Effecting Security in the Age of e-x, where X could stand for any keyword such as commerce, tourism, banking, wallet, learning, Other themes vying for the top spot are Security Development Lifecycle: Promises, Practices, Findings, High-Assurance Design, Service-Oriented Architecture (SOA) and Identity Management, and VoIP & Wireless Access: Boon or Bust for Enterprise Security. The Conference main theme will be supported by invited papers and talks. The following have gracefully accepted to talk: Prof. Bart PRENEEL, Head of Computer Security and Industrial Cryptography (COSIC) at Katholieke Universiteit Leuven, Leuven, Prof. Marc Joye, Thomson R&D, France Prof. Elisabeth OSWALD, Cryptography and Information Security Group, University of Bristol, Bristol, UK Prof. Cetin Kaya KOC, Istanbul Commerce U., Turkey, & Oregon State U., USA Prof. Mehmet Ufuk CAGLAYAN, Bogazici U., Turkey Prof. Muslim BOZYIGIT, Middle East Technical U., North Dr. Karthik BHARGAWAN, Microsoft Research Cambridge, UK. CALL FOR PROPOSALS Researchers and practitioners of security are invited to propose papers. Position papers addressing all aspects of security in information and networks are being sought. Researchers working on the following and related subjects are especially encouraged: realization of security schemes, new algorithms, experimenting with existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose short papers. Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. Half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals are invited for workshops to be held in conjunction with SIN 2007 Conference. The workshop proposal theme should be closely related to the conference topics. Conference medium will be English; papers in Turkish will be accepted as well. Paper proposals must be submitted electronically via the SIN 2007 Submission Site. The SIN 2007 Submission Site at URL https://msrcmt.research.microsoft.com/sin2007 will become available by November 2006. Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is ten pages for full paper, 5 pages for short paper, and two pages for demo and tutorial proposals. All papers should be written by using LNCS/LNAI format. Please download LNCS Paper format by Clicking here (MS Word and LaTex formats are available). Workshop proposals are submitted to the Workshops Chair, Justin Zhan (justinzh [at] andrew.cmu.edu) by e-mail.

Tutorial proposals are submitted to the Tutorials Chair, Saban Eren (sabaneren [at] maltepe.edu.tr) by e-mail. All accepted papers will be published in the conference proceedings book with ISBN number. At least one of the authors of each accepted paper must register as a full participant of the conference for the paper to be included in the proceedings. Papers will be accepted for chaired presentation sessions. Broad areas of interest in security will include, but are not limited to, the following: Access control and intrusion detection Cryptographic techniques and key management Information assurance Network security and protocols Security in information systems Security tools and development platforms Security ontology, models, protocols & policies Standards, guidelines and certification Following is a non-exhaustive list of subtopics of interest: Agent security Authentication & authorization Cryptographic hardware design Cryptography and cryptanalysis (symmetrical and asymmetrical) Digital signature Executables security Information security development processes Intrusion & fraud detection Malicious codes Mobile code and agent security Privacy Scripts and languages Side-channel attacks Signals & security Securing storage: SAN/NAS security Security ontology, models, protocols & policies Semantics of security Software security and testing Spam counter measures Steganography Vulnerability analysis Web security Wireless security Applications of security in the following areas are especially sought for: Ad hoc networks Agent-based systems Autonomous systems Computer modeling / simulation Computer security / forensics Computer networks Control systems Data mining Digital rights management Distributed systems E-government, -commerce, - learning, Electronic payments Embedded systems Emergent intelligence Information systems / databases Information security management Internet and Web-based systems Knowledge-based systems Mobile computing Multimedia applications Network processors RFID systems Robotics Safety critical systems Semantic Web and semantic Web services Smart card applications SOA applications Software engineering for dependable systems Web services

IMPORTANT DATES Workshop Proposals Due Date: March 1, 2007 (extended) Workshop Proposal Acceptance Notification Due Date: March 3, 2007 Conference Paper Submission Due Date: March 1, 2007 (extended) Workshop Paper Submission Due Date: March 23, 2007 (soft date) Tutorial Proposal Submission Due Date: Feb. 21, 2007 (soft date) Tutorial Notification Due Date: Mar. 1, 2007 (revised) All Author Notification Due Date: Mar. 19, 2007 All Papers Camera Ready Due Date: Apr. 5, 2007 Conference Dates: May 8-10, 2007 CONFERENCE ORGANIZERS Steering Committee Chair: Bulent ORENCIK, TUBITAK MAM (TR) Conference Chair: Atilla ELCI, EMU (TRNC) Conference Co-Chair: Siddika Berna Ors YALCIN, ITU (TR) Program Chair: Ahmet Hasan KOLTUKSUZ, IYTE (TR) Program Co-Chair: Attila OZGIT, METU (TR) Program Co-Chair: Alexander CHEFRANOV, EMU (TRNC) Tutorials Chair: Saban EREN, Maltepe U. (TR) Tutorials Co-Chair: Sefer KURNAZ, Air Force Academy (TR) Workshops Chair: Justin ZHAN, CMU (USA) Treasurer: Muhammed SALAMAH, EMU (TRNC) Finance Co-Chair: Suha BAYINDIR, EMU (TRNC) Finance Co-Chair: Ender YUKSEL, ITU (TR) Registration Chair: Alev ELCI, EMU (TRNC) Operations / Local Arrangements Chair: Yiltan BITIRIM, EMU (TRNC) Site Facilities Chair: Ahmet UNVEREN, EMU (TRNC) Volunteers, Internet Presence, and Exhibits Chair: Behnam RAHNAMA, EMU (TRNC) Volunteers Team: ACM & IEEE CS EMU Student Chapters, Computer Club, EMU (TRNC) Promotion Chair: Nurten KARA, EMU (TRNC) Local Publicity / Press Relations Chair: Suleyman IRVAN, EMU (TRNC)

INTERNATIONAL PROGRAM COMMITTEE (to be updated) Khalil A. ABUOSBA, Philadelphia University, Jordan Sheikh Iqbal AHAMED, Marquette U., USA Ersan AKYILDIZ, METU, Turkey Taner ALTINOK, Defense Sciences Institute, Military Academy, Turkey Serap ATAY, Izmir Institute of Technology, Turkey Lyudmila Klimentyevna BABENKO, Federal U. of South Russia, Russia Arkadiy B. BARSKIY, Moscow State U. of Transport Ways, Russia Suha BAYINDIR, Eastern Mediterranean U., North Zeki BAYRAM, Eastern Mediterranean U., North Ayse BENER, Bogazici U., Turkey Jun BI, Tsinghua U., China Müslim BOZYIGIT, Middle East Technical U., North Mehmet Ufuk CAGLAYAN, Bogazici U., Turkey Jan CAPPAERT, Katholieke Universiteit Leuven, Alexander CHEFRANOV, Eastern Mediterranean U. & ITRC, North Anton CHUVAKIN, LogLogic, USA Danny De COCK, Katholieke U. Leuven, Mina DENG, Katholieke Universiteit Leuven, Claudia DIAZ, Katholieke Universiteit Leuven, Tharam S. DILLON, U. of Technology, Sydney (UTS), Australia Atilla ELCI, Eastern Mediterranean U., North Saban EREN, Maltepe U., Turkey Ruyal ERGUL, METU, Turkey Ana Isabel Gonzlez-Tablas FERRERES, Universidad Carlos III de Madrid, Spain Dieter GOLLMANN, Techniche U. Hamburg- Harburg, Germany Johann GROSCHDL, Graz University of Technology, Austria Song HAN, Curtin U. of Technology, Australia Selim HENDRICKSON, Izmir Institute of Technology, Turkey Edward HUMPHREYS, XiSEC and ISO/IEC SC27, UK David HWANG, University of California, Los Angeles, USA Fuat INCE, Marmara U., Turkey Hai JIN, Huazhong U. of Science and Technology, China Tai-hoon KIM, Security Engineering Research Group (SERC), Korea Il Seok KO, Dongguk U., Korea Cetin Kaya KOC, Istanbul Commerce U., Turkey, & Oregon State U., USA Ahmet Hasan KOLTUKSUZ, Izmir Institute of Technology, Turkey Ozgul KUCUK, Katholieke U. Leuven, Sefer KURNAZ, ASTIN- Air Force Academy, Turkey Klaus KURSAWE, Phillips, The Nederlands Geuk LEE, Hannam U. & SERC, Korea Tiberiu S. LETIA, Technical U. of Cluj-Napoca, Romania Albert LEVI, Sabanci U., Turkey Chuchang LIU, DSTO, Australia Robert MAIER, Katholieke Universiteit Leuven, Oleg Borisovich MAKAREVICH, Federal U. of South Russia, Russia Nele MENTENS, Katholieke Universiteit Leuven, Jorge NAKAHARA, Universidade Catolica de Santos, Brazil Gregory NEVEN, Katholieke Universiteit Leuven, Svetla NIKOVA, Katholieke Universiteit Leuven, Jose Antonio ONIEVA, U. de Málaga, Spain Bülent ORENCIK, TUBITAK MAM, Turkey Mehmet A. ORGUN, Macquarie U., Australia Valeriy O. OSIPYAN, Kuban State U., Russia Elisabeth OSWALD, Graz University of Technology, Austria Attila OZGIT, Middle East Tech U., Turkey Pascal PAILLIER, Gemalto, France Josef PIEPRZYK, Macquarie U., Australia Norbert PRAMSTALLER, Graz University of Technology, Austria Vasant H. RAVAL, Creighton U., USA Mesut RAZBONYALI, Maltepe U., Turkey Seref SAGIROGLU, Gazi U., Turkey Muhammed SALAMAH, Eastern Mediterranean U., North Erkay SAVAS, Sabanci University, Turkey Ashutosh SAXENA, Infosys Technologies, India Bruce SCHNEIER, BT Counterpane, USA Ali Aydin SELCUK, Bilkent U., Turkey Stefaan SEYS, Katholieke Universiteit Leuven, Siraj SHAIKH, United Nations U., Macau SAR China Dave SINGELEE, Katholieke U. Leuven, Gennadiy Viasilyevich SLYUSAREV, North Caucasus State Technical U., Russia Boris V. SOBOL, Don State Technical U., Russia Eugene H. SPAFFORD, Purdue U., USA Kaile SU, Sun Yat-Sen University, China Cengiz TAVUKCUOGLU, Defense Sciences Institute, Military Academy, Turkey

Dongvu TONIEN, CIS, TITRI, U. of Wollongong, Australia Tugkan TUGLULAR, Izmir Institute of Technology, Turkey Ion TUTANESCU, U. of Pitesti, Romania Ahmet UNVEREN, Eastern Mediterranean U., North Vladimir I. VASILYEV, Ural State Aviation Technology U., Russia Huaxiong WANG, Nanyang Technological U., Singapore Dai WATANABE, Hitachi, Japan Thomas WOLLINGER, escrypt GmbH - Embedded Security, Germany Karel WOUTERS, Katholieke Universiteit Leuven, Brecht WYSEUR, Katholieke Universiteit Leuven, Siddika Berna Ors YALCIN, Istanbul Technical U., Turkey Justin ZHAN, Carnegie-Mellon U., USA Mohammad ZULKERNINE, Queens U., Canada Sushil K. SHARMA, Ball State University, USA [The International Program Committee is still being formed] GENERAL INQUIRIES For updated information, please refer to www.sinconf.org or the Promotion Chair. Released on 2007-02-15