13th European Symposium on Research in Computer Security (ESORICS’08)

Venue: Malaga

Location: Malaga, Spain

Event Date/Time: Oct 06, 2008 End Date/Time: Oct 08, 2008
Early Registration Date: Mar 31, 2008
Paper Submission Date: Mar 31, 2008
Report as Spam

Description

F i r s t C a l l F o r P a p e r s

13th European Symposium on Research in Computer Security (ESORICS’08)
6-8 October, 2008
Malaga, Spain

http://www.isac.uma.es/esorics08/


Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Thirteenth European Symposium on Research in Computer Security (ESORICS 2008). Organized in a series of European countries, ESORICS is confirmed as the European research event in computer security. The symposium started in 1990 and has been held on alternate years in different European countries and attracts an international audience from both the academic and industrial communities. From 2002 it has been held yearly. The Symposium has established itself as one of the premiere, international gatherings on Information Assurance. Papers may present theory, technique, applications,
or practical experience on topics including:

- Access control
- Anonymity
- Authentication
- Authorization and delegation
- Cryptographic protocols
- Data integrity
- Dependability
- Information flow control
- Smartcards
- System security
- Digital right management
- Accountability
- Applied cryptography
- Covert channels
- Cybercrime
- Denial of service attacks
- Formal methods in security
- Inference control
- Information warfare
- Steganography
- Transaction management
- Data and application security
- Intellectual property protection
- Intrusion tolerance
- Peer-to-peer security
- Language-based security
- Network security
- Non-interference
- Privacy-enhancing technology
- Pseudonymity
- Subliminal channels
- Trustworthy user devices
- Identity management
- Security as quality of service
- Secure electronic commerce
- Security administration
- Security evaluation
- Security management
- Security models
- Security requirements engineering
- Security verification
- Survivability
- Information dissemination control
- Trust models and trust management policies

The primary focus is on high-quality original unpublished research, case studies and implementation experiences. We encourage submissions of papers discussing industrial research and development. Proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series.

* Instructions for paper submission

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using 11-point font), and at most 20 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Authors must submit their paper using the conference web site following the requirements

stated there.
Submissions must be received by March 31, 2008 in order to be considered. Notification will be sent to authors by June 16, 2008. Authors of
accepted papers must be prepared to sign a copyright statement and must guarantee that their paper will be presented at the conference. Authors of accepted papers must follow the Springer Information for Authors’ guidelines for the preparation of the manuscript and use the templates provided there.


* Program Chairs

Sushil Jajodia, George Mason University, USA
Javier Lopez, University of Malaga, Spain


* Important dates

Paper Submission due: March 31, 2008
Acceptance notification: June 16, 2008
Final papers due: July 7, 2008

Venue

Malaga
Malaga
Spain
MORE INFO ON THIS VENUE