Conferences In Information Security

Conference Name NSS 2010 - 3rd International Conference on Network & System Security
Venue Gold Coast Australia
URL NSS 2010
Submission Deadline 30-Apr-10
Conference Date October 19th-21st, 2010
Sponsership/Publisher IFIP/IEEE
Aim/Scope/Research Area While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. We will focus our program on issues related to Network and System Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of this conference is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry and governments.
NSS 2010 will be in technical co-sponsorship with the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing (pending). The publication will be the IEEE Computer Society Proceedings (pending, EI, ISTP, and INSPEC indexed) *. Selected best papers will be published in high quality international journals (SCI and EI indexed). Previous journal special issues can be found at the past event websites.
Topics of interest include, but not limited to:
Active Defense Systems
Adaptive Defense Systems
Benchmark, Analysis and Evaluation of Security Systems
Distributed Access Control and Trust Management
Distributed Attack Systems and Mechanisms
Distributed Intrusion Detection/Prevention Systems
Denial-of-Service Attacks and Countermeasures
High Performance Security Systems
Identity Management and Authentication
Implementation, Deployment and Management of Security Systems
Intelligent Defense Systems
Internet and Network Forensics
Key Distribution and Management
Large-scale Attacks and Defense
RFID Security and Privacy
Security Architectures in Distributed Network Systems
Security for Critical Infrastructures
Security in P2P systems
Security in Cloud and Grid Systems
Security in E-Commerce
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing
Viruses, Worms, and Other Malicious Code
World Wide Web Security

Back To Conferences List

Database Sections