Call for Papers (PDF)
The Sixth International Conference on
Risks and Security of Internet and Systems
CRiSIS 2011
Timişoara, Romania, 26-28 September 2011
endorsed by the IEEE CS TC on Security and Privacy

The International Conference on Risks and Security of Internet and Systems 2011 will be the 6th in a series dedicated to security issues in Internet-related applications, networks and systems. In recent years, the Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing security and privacy risks, due to the development increasingly sophisticated online attacks, the growth of Cybercrime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, attacking tool are readily available. Moreover, the increasing complexity and the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raises new security challenges.

In this context, new security mechanisms and techniques are needed to achieve an acceptable level of assurance for critical domains such as transportation, health, defence, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers an effective forum for computer and network security researchers from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them.

Marius Minea, Politehnica University of Timişoara, Romania

Frédéric Cuppens, TELECOM Bretagne, France

Simon Foley, University College Cork, Ireland

Anas Abou ElKalam, Université de Toulouse, IRIT-INP, France

Yannick Chevalier, Université de Toulouse, IRIT, France

Bogdan Groza, Politehnica University of Timişoara

Anas Abou ElKalam, Université de Toulouse, IRIT-INP, France
Christophe Bidan, SupElec, France
Joachim Biskup, T.U. Dortmund, Germany
Yannick Chevalier, Université de Toulouse, IRIT, France
Gouenou Coatrieux, TELECOM Bretagne, France
Cas Cremers, ETH Zürich, Switzerland
Nora Cuppens-Boulahia, TELECOM Bretagne, Rennes, France
Geert Deconinck, Katholieke Universiteit Leuven, Belgium
Catalin Dima, Université Paris 12, France
Khalil Drira, LAAS-CNRS, France
Samuel Dubus, Alcatel-Lucent, France
Jose M. Fernandez, École Polytechnique de Montréal, Canada
Alban Gabillon, Université de la Polynésie Française, Tahiti
Joaquin Garcia-Alfaro, TELECOM Bretagne, Rennes, France
Bogdan Groza, Politehnica University of Timişoara, Romania
Olivier Heen, Technicolor, France
Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, USA
Corrado Leita, Symantec, France
Javier Lopez, Universidad de Málaga, Spain
Fatma Mili, Oakland University, USA
Ludovic Mé, SupElec, France
Mohamed Mosbah, LaBRI, France
Raja Natarajan, Tata Institute of Fundamental Research, India
Stephen Neville, University of Victoria, Victoria, Canada
Claudio Pastrone, ISMB, Italy
Kai Rannenberg, Goethe Universität Frankfurt, Germany
Michael Rusinowitch, LORIA, France
Thierry Sans, Carnegie Mellon, Doha, Qatar
Ethan Singleton, University of Tulsa, USA
Syrine Tlili, Ministry of Communication Technologies, Tunisia
Amit Vasudevan, CyLab, Carnegie Mellon University, USA
Bogdan Warinschi, University of Bristol, United Kingdom

The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies. Prospective authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications and case studies, such as telemedicine, banking, e-government and critical infrastructure, are also welcome. The list of topics includes but is not limited to:

  • Analysis and management of risk
  • Attacks and defences
  • Attack data acquisition and network monitoring
  • Cryptography, Biometrics, Watermarking
  • Dependability and fault tolerance of Internet applications
  • Distributed systems security
  • Embedded system security
  • Intrusion detection and Prevention systems
  • Hardware-based security and Physical security
  • Trust management
  • Organizational, ethical and legal issues
  • Privacy protection and anonymization
  • Security and dependability of operating systems
  • Security and safety of critical infrastructures
  • Security and privacy of peer-to-peer system
  • Security and privacy of wireless networks
  • Security models and security policies
  • Security of new generation networks, security of VoIP and multimedia
  • Security of e-commerce, electronic voting and database systems
  • Traceability, metrology and forensics
  • Use of smartcards and personal devices for Internet applications
  • Web security

Paper Submissions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Papers must be written in English and must be submitted electronically in PDF format. Maximum paper length will be 8 printed pages for full papers or 4 pages for short papers, in IEEE 2-column style.

Authors of accepted papers must guarantee that their papers will be presented at the conference. All papers selected for presentation at the conference will be published in the hard-copy proceedings distributed to all conference participants and will also be available on-line by IEEE Xplore.

The authors of the best conference papers will be invited to submit an extended version to a special issue of the International Journal of Information and Computer Security (IJICS).

All paper submissions will be handled through the Easy Chair conference management system. Follow the instructions given here.

Call for Tutorials

We solicit tutorials on state-of-the-art technologies relevant to the conference themes. We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference. The intended length of each tutorial is 2 to 3 hours.

A tutorial proposal should include a brief summary and outline, specific goals and objectives, the intended audience and the expected background of the audience as well as a biographical sketch of the presenter(s). The length of tutorial proposals should not exceed 5 pages.

Tutorial proposals should be submitted to the tutorial program chair: Anas Abou el Kalam by email: anas(dot)abouelkalam(at)enseeiht(dot)fr before May 10, 2011.

Important Dates
Submission deadline:
6 June 2011
Notification to Authors:
20 July 2011
Camera Ready Due:
19 August 2011
IEEE Xplore
Technical Co-Sponsorship