Conferences In Information Security
Conference Name | NSS 2010 - 3rd International Conference on Network & System Security |
---|---|
Venue | Gold Coast Australia |
URL | NSS 2010 |
Submission Deadline | 30-Apr-10 |
Conference Date | October 19th-21st, 2010 |
Sponsership/Publisher | IFIP/IEEE |
Aim/Scope/Research Area |
While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. We will focus our program on issues related to Network and System Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of this conference is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry and governments.
NSS 2010 will be in technical co-sponsorship with the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing (pending). The publication will be the IEEE Computer Society Proceedings (pending, EI, ISTP, and INSPEC indexed) *. Selected best papers will be published in high quality international journals (SCI and EI indexed). Previous journal special issues can be found at the past event websites. Topics of interest include, but not limited to: Active Defense Systems Adaptive Defense Systems Benchmark, Analysis and Evaluation of Security Systems Distributed Access Control and Trust Management Distributed Attack Systems and Mechanisms Distributed Intrusion Detection/Prevention Systems Denial-of-Service Attacks and Countermeasures High Performance Security Systems Identity Management and Authentication Implementation, Deployment and Management of Security Systems Intelligent Defense Systems Internet and Network Forensics Key Distribution and Management Large-scale Attacks and Defense RFID Security and Privacy Security Architectures in Distributed Network Systems Security for Critical Infrastructures Security in P2P systems Security in Cloud and Grid Systems Security in E-Commerce Security and Privacy in Wireless Networks Secure Mobile Agents and Mobile Code Security Protocols Security Simulation and Tools Security Theory and Tools Standards and Assurance Methods Trusted Computing Viruses, Worms, and Other Malicious Code World Wide Web Security |