SECURWARE 2009

Tracks

 * ARCH: Security frameworks, architectures and protocols

Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling


 * SECMAN: Security management

Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance


 * SECTECH: Security technologies

Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security


 * SYSSEC: System security

Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services


 * INFOSEC: Information security

Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability


 * MALWA: Malware and Anti-malware

Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning


 * MISUSE: Electronic abuse protection

Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./


 * ANTIFO: Anti-forensics

Advanced anti-forensics mechanisms; Smart anti-forensics; e-discovery industry and anti-forensics; Overwriting data and metadata; Data hiding approaches; Detecting forensics analysis; Anti-forensics tools; Unix-, Windows-, and Linux anti-forensics techniques; Open source anti-forensics tools; Network anti-forensics tools


 * PRODAM: Profiling data mining

User and traffic profiling; Data mining and visualization; Profile mining and knowledge discovery; Mining lifecycle for profile collections; Profile warehouse construction; Profile portfolio and profile discovery; Profiling game users and game traffic; Profiling transactions; Simpson'd paradox; Real-time profiling mechanisms; Patterns for information profiling; Profiling engines; Profiling metrics; Forensics; Profiling applications (banks, on-line shopping, etc.); Data mining-based user profile prediction


 * SECHOME: Smart home security

Fundamentals for SHS; Privacy and protection for SHS; Identify and location management in SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces for SHS; SHS for accessibility and elderly/disabled people; Real-time challenges for SHS in eHealth environments; Architectures and systems for SHS; Network technologies and protocols for SHS; Ubiquitous/pervasive platform and middleware for SHS; Services and applications for SHS; SHS on campuses and hotels; SHS for mission critical laboratories; Content protection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and Homeland security; Personal data privacy and protection in SHS; Emerging standards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience


 * SECDYN: Security and privacy in dynamic environments

Fundamentals on highly dynamic environments; Privacy and predefined access control dilemma; Privacy police, provisions and obligations; Dependability in dynamic environments; Protection of digital documents in dynamic environments; On-line activities in high dynamic systems; Law enforcement in high dynamic systems; Personalization; Privacy and transparency; Distributed usage control; Privacy compliance


 * ECOSEC: Ecosystem security and trust

Secure and trusted service compositions in peer-to-peer networks; Secure data management in collaborative peer-to-peer networks; Security and reputation models for self-adaptive overlay networks; Identity and trust management in dynamic, self-organizing environments; Social institutional-based trust models for self-evolving communities


 * CRYPTO: Cryptography

Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems


 * CYBER-Threat

e-Crime; Epidemiological models for warware and cyber-crime propagation; Record and retrieval of cyber-crimes; Cyber-crime prevention; Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm attacks; Cyber-pranks, hoaxes; Phishing/Pharming and anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and security of cyber-reports; Fighting cyber-crimes; Cyber-crime laws

SECURWARE Advisory Chairs

 * has advisory chair::Petre Dini, Cisco Systems, Inc. / Concordia University, Canada
 * has advisory chair::Catherine Meadows, Naval Research Laboratory-Washington DC, USA
 * has advisory chair::Juha Roing, University of Oulu, Finland

SECURWARE 2009 Industry Research Chairs

 * has industry research chair::Rainer Falk, Siemens AG / Corporate Technology Security - Munich, Germany
 * has industry research chair::Wilson Goudalo, France, ATOS Origin // University Paris VI, France
 * has industry research chair::Dan Harkins, Aruba Networks, USA
 * has industry research chair::Dan Jiang, Philips Research Asia – Shanghai, China

SECURWARE 2009 Technical Program Committee

 * Chairs
 * has program chair::Eric Y. Chen, NTT / Information Sharing Platform Laboratories, Japan
 * has program chair::Bogdan Ghita, University of Plymouth, UK
 * has program chair::Stefanos Gritzalis, University of the Aegean, Greece
 * has program chair::Reijo Savola, VTT Technical Research Centre of Finland, Finland


 * Members
 * has PC member::Imad Abbadi, Associated Newspapers, UK
 * has PC member::Sheikh Iqbal Ahamed, Marquette University-Milwaukee, USA
 * has PC member::Nuno Amalio, University of Luxembourg, Luxembourg
 * has PC member::Stamatios G. Arkoulis, National Technical University of Athens (NTUA), Greece
 * has PC member::Ioannis Askoxylakis, FORTH-ICS, Greece
 * has PC member::Joonsang Baek, Institute for Infocomm Research-Singapore, Singapore
 * has PC member::Wolfgang Boehmer, Technical University of Darmstadt, Germany
 * has PC member::Alberto Bonastre, Universidad Politécnica de Valencia, Spain
 * has PC member::Rafael Bosse Brinhosa, Federal University of Santa Catarina, Brazil
 * has PC member::Jeremy Briffaut, ENSI Bourges, France
 * has PC member::Sonja Buchegger, Deutsche Telekom Laboratories - Berlin, Germany
 * has PC member::Dariusz Caban, Wroclaw University of Technology, Poland
 * has PC member::Juan Vicente Capella Hernández, Universidad Politécnica de Valencia, Spain
 * has PC member::Yannick Carlinet, Orange - CORE/M2I, France
 * has PC member::Nikolaos Chatzis, Fraunhofer Gesellschaft e.V. - Institute FOKUS, Germany
 * has PC member::Eric Y. Chen, NTT Information Sharing Platform Laboratories, Japan
 * has PC member::Mohammad Mushfiqur Rahman Chowdhury, UniK-University Graduate Center/University of Oslo, Norway
 * has PC member::Jim Clarke, Waterford Institute of Technology, Ireland
 * has PC member::Marcin Dabrowski, AGH University of Science and Technology – Krakow, Poland
 * has PC member::Rainer Falk, Siemens AG / Corporate Technology Security - Munich, Germany
 * has PC member::Somchart Fugkeaw, Mahidol University - Bangkok, Thailand
 * has PC member::Liu Fuwen, Brandenburg University of Technology - Cottbus, Germany
 * has PC member::Solange Ghernaouti –Hélie, Université de Lausanne, Switzerland
 * has PC member::Bogdan Ghita, University of Plymouth, UK
 * has PC member::Laurent Gomez, SAP Research, France
 * has PC member::Luis Gomes, Universidade Nova de Lisboa, Portugal
 * has PC member::Wilson Goudalo, France, ATOS Origin // University Paris VI, France
 * has PC member::Stefanos Gritzalis, University of the Aegean, Greece
 * has PC member::Hédi Hamdi, University of Bordeaux1, France
 * has PC member::Petr Hanácek, Brno University of Technology, Czech Republic
 * has PC member::Dan Harkins, Aruba Networks, USA
 * has PC member::Pedro Ricardo Morais Inácio, University of Beira Interior / Nokia Siemens Networks Portugal S.A., Portugal
 * has PC member::Mihaela Ion, CREATE-NET, Italy
 * has PC member::Lari Iso-Anttila, Tampere University of Technology - Pori, Finland
 * has PC member::Tetsu Iwata, Nagoya University, Japan
 * has PC member::Dan Jiang, Philips Research Asia – Shanghai, P.R.C.
 * has PC member::Nevin Vunka Jungum, University of Mauritius, Mauritius
 * has PC member::Hristo Koshutanski, University of Malaga, Spain
 * has PC member::Lam-for Kwok, City University of Hong Kong, Hong Kong
 * has PC member::Jean-Francois Lalande, University of Orléans, France
 * has PC member::Christoph Mayer, University of Karlsruhe (TH), Germany
 * has PC member::Catherine Meadows, Naval Research Laboratory-Washington DC, USA
 * has PC member::Anders Moen Hagalisletto, Norwegian Computing Center / University of Oslo, Norway
 * has PC member::Amir Moulavi, Kungliga Tekniska Högskolan (KTH) - Stockholm, Sweden
 * has PC member::Jose M. Moya, Universidad Politecnica de Madrid, Spain
 * has PC member::Amiya Nayak, University of Ottawa, Canada
 * has PC member::Carlos Enrique Palau Salvador, Universidad Politecnica de Valencia, Spain
 * has PC member::Pierre Parrend, INSA-Lyon – Villeurbanne, France
 * has PC member::Sergio Pozo Hidalgo, Universiy of Seville, Spain
 * has PC member::Sameerchand Pudaruth, University of Mauritius, Mauritius
 * has PC member::Juha Röning, University of Oulu, Finland
 * has PC member::Jean-Michel Sahut, Ecole supérieure de commerce Amiens Picardie, France
 * has PC member::Reijo Savola, VTT Technical Research Centre of Finland, Finland
 * has PC member::Roland Schmitz, Hochschule der Medien Stuttgart, Germany
 * has PC member::Dae-Hee Seo, Ewha Womans University, Korea
 * has PC member::Lars Strand, Norwegian Computing Center / University of Oslo, Norway
 * has PC member::Frederic Stumpf, Technische Universität Darmstadt, Germany
 * has PC member::Masaru Takesue, Hosei University, Japan
 * has PC member::Carlos Miguel Tavares Calafate, Universidad Politécnica de Valenci, Spain
 * has PC member::Panagiotis Trimintzios, ENISA, EU
 * has PC member::Shambhu Upadhyaya, University at Buffalo, USA
 * has PC member::Athanasios Vasilakos, University of Western Macedonia, Greece
 * has PC member::Miroslav Velev, Consultant USA
 * has PC member::Luca Viganò, Università di Verona, Italy
 * has PC member::Adam Wierzbicki, Polish-Japanese Institute of Information Technology - Warsaw, Poland
 * has PC member::Amr M. Youssef, Concordia University, Canada
 * has PC member::Albert Zomaya, The University of Sydney, Australia