CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0 (Apple Message framework v1081)
Content-Type:
text/plain; charset=windows-1252
Date:
Fri, 5 Nov 2010 11:57:13 +0900
Reply-To:
Sven Wohlgemuth <[log in to unmask]>
Subject:
Content-Transfer-Encoding:
quoted-printable
Message-ID:
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From:
Sven Wohlgemuth <[log in to unmask]>
Parts/Attachments:
text/plain (76 lines)
[Apologies if you receive multiple copies]

--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- 

Welcome to IWSEC2010
Following the success of past workshops in this series, ISEC and CSEC are delighted to host the Fifth International Workshop on Security, IWSEC2010, on November 22-24, 2010, in Kobe, Japan. The aim of IWSEC2010 is to contribute to security research and development addressing the topics from traditional theory and tools on security to up-to-date issues.
	 Track I: Foundations of Security 
(Track Chair: Noboru Kunihiro, The University of Tokyo, Japan)
		 Authentication
		 Biometrics
		 Block/Stream Ciphers
		 Cryptographic Protocols
		 Cryptanalysis
		 Digital Signatures
		 Hash Functions
		 Information Hiding
		 Public Key Cryptosystems
		 Quantum Security
	 Track II: Security in Networks and Ubiquitous Computing Systems 
(Track Chair: Isao Echizen, National Institute of Informatics, Japan)
		 Network Security
			 Intrusion Detection
			 Malware Detection
			 Security in Sensor Networks
		 Security of Ubiquitous and Cloud Computing
			 Security of Multi-party Computing
			 Authorization and Access Control
			 Mobile Security
		 Privacy Enhancing Technology
			 Anonymity-related Technology
			 Privacy Preserving System
			 Privacy on WEB and DB
		 Software Security
			 Security Architectures
			 Data and System Integrity
			 Reliable Secure Interactions of Services
	 Track III: Security in Real Life Applications 
(Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan)
		 Secure Living and Working Environments
			 Secure Consumer Electronics
			 RFID Security
		 Security in Commerce and Government
			 DRM
			 Copyright Protection
			 Content Security E-business/e-commerce/e-government Security
		 Security Management
			 Access Control Policies and ISMS
			 Business Processes Security
		 Protection of Critical Infrastructures
			 Critical Infrastructure Protection
			 Risk Analysis and Risk Management
		 Testing, Verification and Certification
			 Security Verification
			 Assurance
		 Law, Policy, Ethics and Related Technologies
			 Digital Forensics
			 Information Law and Ethics

We accepted 22 regular papers and 10 short papers through a rigorous review process.

And, we have 2 invited talk: "Security metrics and investment models" by Dr.-Ing. Rainer Boehme, and "Automating Security Configuration and Administration: An Access Control Perspective" by Prof. Jaideep S. Vaidya .

We now invite you to attend IWSEC2010. Join the fruitful discussions in Kobe!

Registration
On-line registration is available through the main website of the workshop. Please visit the website to find the detailed information and register.
On-line registration : http://www.iwsec.org/2010/registration.html

Contact
Send e-mail to:  [log in to unmask]
    ---------------------------------------------------------------
                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2