Friday, June 27, 2014

[DMANET] Deadline Approaching (July 20), 7th International Symposium on Foundations & Practice of Security, Montréal, Canada, Springer LNCS proceedings

Apologies for cross-posting

Call for Papers

**The 7th International Symposium on Foundations & Practice of Security
(FPS'2014), Montreal, Canada, November 3-5, 2014.**

Conference Website



Protecting the communication and data infrastructure of an
increasingly inter-connected world has become vital to the normal
functioning of all aspects of our world. Security has emerged as an
important scientific discipline whose many multifaceted complexities
deserve the attention and synergy of the mathematical, computer
science and engineering communities.

After the previous meetings held in La Rochelle, Montreal, Grenoble,
Toronto and Paris, this 7th edition of the FPS symposium will be held
at Montreal.

The aim of this event is to discuss and exchange theoretical and
practical ideas that address security issues in inter-connected
systems. It aims to provide scientific presentations as well as to
establish links, promote scientific collaboration, joint research
programs, and student exchanges between institutions involved in this
important and fast moving research field.

We also invite papers from researchers and practitioners working in
security, privacy, trustworthy data systems and related areas to
submit their original papers. The main topics, but not limited to,

* Security in Service Oriented Architecture & Web Services
* Security Administration & Policy-based Security Architectures
* Access Control Languages
* Cryptography & Cryptanalysis
* Threat Analysis
* Privacy & Sensitive Data Management
* Security on P2P Systems and their Applications
* Policy-based Distributed Information Systems and Security Policies
* Security in Sensor Networks and RFID
* Security of Cloud Computing, Grid Computing and their Applications
* Trust Management
* Security of Distributed Embedded Middleware
* Distributed Security Protocols
* Privacy in Social Networks
* Formal foundations in Information Security
* Side-channel analysis and Fault injection attacks
* Countermeasures against physical attacks
* Protected implementations, security by design
* Formal Verification of security properties
* Methods and Platforms for evaluation of attacks and countermeasures
* Malware, botnets, binary analysis

Submissions Guidelines

Full papers should be at most 16 pages (using 11-point font),
excluding the bibliography and well-marked appendices. Position
papers, as well as extended abstract and contributed talks, should be
up to 8 pages (using 11-point font). Committee members are not
required to read the appendices, so the paper should be intelligible
without them. All submissions must be written in English. Authors must
submit their papers by the deadline indicated below, using the
EasyChair web site (using the link
<>) and following
the requirements stated there. All papers will be refereed. The
submitted contribution should be formatted according to Springer's
LNCS style. Submissions by PhD students as well as surveys and
controversial ideas are encouraged. Case studies (successful or not)
are also encouraged.

Authors should indicate whether their paper is a "position paper" to
differentiate them from regular ones (you mention "Position paper" in
the title).


Proceedings will be published by Springer-Verlag in the Lecture Notes
in Computer Science (LNCS) series. At least one author of each
accepted paper must register to the symposium, by the date indicated
by the organizers, and present the paper.


General Chair

Mourad Debbabi (University of Conccordia)

Program Committee Chairs

Philip W. L. Fong (University of Calgary)
Frédéric Cuppens (Telecom Bretagne)

Organization Chairs

Lingyu Wang (University of Concrdia)

Publicity and Publication Chairs

Joaquin Garcia-Alfaro (Telecom SudParis)
Nur Zincir Heywood (Dalhousie University)

Program Committee

Diala Abi Haidar (Dar Al Hekma College)
Carlisle Adams (Ottawa University)
Gildas Avoine (UCL, Belgium)
Guillaume Bonfante (Université de Lorraine, LORIA)
Jordi Castellà-Roca (Rovira i Virgili Univ.)
Ana Cavalli (Télécom SudParis)
Frédéric Cuppens (TELECOM Bretagne)
Nora Cuppens-Boulahia (TELECOM Bretagne)
Mila Dalla Preda (Bologna University)
Jean-Luc Danger (Telecom ParisTech)
Mourad Debbabi (Concordia University)
Nicola Dragoni (Technical University of Denmark)
Philip W. L. Fong (University of Calgary)
Sara Foresti (Univ. degli Studi di Milano)
Eric Freyssinet (Université Paris 6)
Sebastien Gambs (Université de Rennes 1)
Joaquin Garcia-Alfaro (Telecom SudParis)
Ali Ghorbani (UNB)
Roberto Giacobazzi (University of Verona)
Sylvain Guilley (Télécom ParisTech)
Abdelwahab Hamou-Lhadj (Concordia University)
Jordi Herrera (Universitat Autònoma de Barcelona)
Bruce Kapron (University of Victoria)
Hyoungshick Kim (SungKyunKwan University )
Evangelos Kranakis (Carleton University)
Pascal Lafourcade (University Joseph Fourier)
Yassine Lakhnech (University Joseph Fourier)
Georgios Lioudakis (National Technical University of Athens)
Luigi Logrippo (Université du Québec en Outaouais)
Stefan Mangard (Infineon Technologies)
Jean-Yves Marion (Mines de Nancy)
Joan Melia-Segui (Universitat Pomepu Fabra)
Ali Miri (Ryerson University)
Guillermo Navarro-Arribas (UAB)
Jordi Nin (UPC)
Andreas Pashalidis (K.U.Leuven)
Emmanuel Prouff (ANSSI)
Silvio Ranise (FBK-Irst)
Jean-Marc Robert (Ecole de technologie superieure)
Alessandro Sorniotti (SAP Research)
Anna Squicciarini (The Pennsylvania State University)
Chamseddine Talhi (ETS, Montreal)
Nadia Tawbi (Université LAVAL)
Alexandre Viejo (Universitat Rovira i Virgili)
Lena Wiese (Georg-August-Universität Göttingen)
Nicola Zannone (Eindhoven University of Technology)
Mohammad Zulkernine (Queen's University, Canada)


Said Oulmakhzoune (TELECOM Bretagne)

Submission Website


Important Dates

| Event | Date |
| Submission Deadline: | July 20, 2014 |
| Acceptance Notification: | August 20, 2014 |
| Camera Ready: | September 10, 2014 |
| Conference: | November 3-5, 2014, Montreal, Canada |

* Contributions to be spread via DMANET are submitted to
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.