CALL FOR PAPERS 
 IFIP International Conference on 
 Network and Service Security 
 June 24 - 26, 2009 - Paris - France 
 http://www.n2s-conf.org/ 
------------------------------------------------------------------- 

N2S'2009 is the First International Conference on Network and Service
Security that will be held from 24 to 26 June, 2009 in Paris, France.

N2S'2009 conference is technically sponsored by IFIP TC6 WG and IEEE
Section France.  The proliferation of heterogeneous and distributed
computer networks and the advanced deployment of pervasive
applications have led to an urgent need for constructing reliable and
efficient approaches where both applications and networking security
issues are addressed jointly. The N2S International Conference will
address all the security aspects of design, implementation,
deployment, architectures and modelling of heterogeneous wired and
wireless computer networks, of the virtualization technology, as well
as of the pervasive computer applications. It will also provide
dynamic forums for researchers, students and professionals to present
their research results and development in these areas and will offer
the opportunity for a more focused exchange of ideas and presentation
of on-going research relevant to information and system security.
Original papers are invited in the area of computer and network
security. Papers must represent high-quality and previously
unpublished work. The research sessions will include presentations of

latest research projects, papers, posters, tutorials, panels, demos, 
industrial track and exhibitions around, but not limited to, the 
following topics: 

- Authentication protocols and services authorization 
- Data and system integrity and confidentiality 
- Availability of secure services 
- Key Distribution and management, PKI and security management 
- Trust models and Trust establishment 
- Identity management, authentication and access control 
- Deployment and management of computer/network security policies 
- Monitoring Design for security, Traffic filtering and firewalling 
- Distributed Intrusion Detection Systems & Countermeasures 
- Single and multi-source intrusion detection and response 
- IPv6 security, IPSec, Virtual Private Networks (VPNs) 
- Privacy, contract agreements, and payment systems 
- XML, Query Processing & Optimization, Storage Structures & Indexing
- Quantum Cryptography and QKD 
- Applications of Cryptography & Cryptanalysis in communications 
 security 
- Cryptographic Hardware and Embedded Systems. 
- Component based software engineering
- Software verification & analysis 
- Agents and Middleware, Agent Computing and Agent Applications 
- Distributed Denial-of-Service (DDoS) attacks and countermeasures 
- Web Commerce & Services, Data models, Web searching & querying 
- Prevention, Detection and Reaction Design 
- Revocation of malicious parties 
- Grid and cluster computing & Context aware computing 
- Adaptation software development 
- Next generation systems & Service-oriented techniques 
- Web Mining & Web Semantic, Network traffic analysis techniques 
- Pervasive, Ubiquitous and Mobile Computing 
- Mobile code security & Security management 
- Secure PHY, MAC, Routing and upper layer protocols 
- Secure Cross layer design 
- Secure naming and addressing, Privacy and anonymity 
- Application/network penetration testing 
- Network security metrics and performance evaluation 
- Security modelling and protocol design 
- Self-healing networks 
- Light-weight cryptography 
- Smart cards, secure hardware, and biometric security 
- Information hiding and watermarking 
- Vulnerability, exploitation tools, and virus/worm analysis 

IMPORTANT DATES 
--------------- 
Full paper submission due: February 15, 2009 
Notification of acceptance: March 30, 2009 
Camera ready due: April 10, 2009 
Tutorial & Workshop (Instructor) Submission due: February 25, 2009 
Notification of Tutorial & Workshop Acceptance: March 10, 2009 

SUBMISSION 
---------- 
Submission Formatting Full papers (not solely abstracts) must be 
submitted for review. Only original papers, neither unpublished nor 
submitted for publication elsewhere, can be submitted. 
Papers need to be uploaded to the EDAS system. Papers should be in 
English, not exceeding 6 double-column pages, and should follow IEEE 
paper templates available at 
http://www.ieee.org/web/publications/authors/transjnl/index.html

All paper submissions will be carefully reviewed by at least three
experts and returned to the author(s) with comments to ensure the high
quality of accepted papers. The authors of accepted papers must
guarantee that their paper will be presented at the conference. At
least one author of each accepted paper must be duly registered for
the conference in order for the paper to appear in the proceedings and
be scheduled in the conference program.  To access the full list of
topics, submission guidelines, as well as venue and travel information
please visit: http://www.n2s-conf.org

Steering Committee 
-------------------- 
Jacques Stern, ENS, France 
Raouf Boutaba, University of Waterloo, Canada 

General Co-Chairs 
----------------- 
Pascal Urien, TELECOM ParisTech, France 
Guy Pujolle, LIP6, France 

Tutorials chair 
----------------------------- 
Bertrand du Castel, Schlumberger, USA 
Pierre Paradinas, INRIA Rocquencourt, France 

Sponsorships Chair 
------------------ 
Vincent Guyot, ESIEA, France 

Program Co-Chairs 
----------------- 
Mohamad Badra, LIMOS-CNRS, France 
Nicolas Sklavos, Technological Educational Institute of Patras,
Greece 

Program Members 
--------------- 
Randall Atkinson - Exreme Networks, USA 
Feng Bao - Institute for Infocomm Research, Singapore 
Azzedine Boukerche - University of Ottawa, Canada 
Stefano Campadello - Nokia, Finland 
Zhenfu Cao - SJTU, China 
Georg Carle - University of Tübingen, Germany 
Serge Chaumette - University of Bordeaux, France 
Yu Chen - State University of New York, Binghamton 
Herve Debar - France Telecom R&D, France 
Eric Filiol - ESAT, France 
Mario Freire - University of Beira Interior, Portugal 
Steven Furnell - Univ. of Plymouth, United Kingdom 
Dominique Gaiti - University of Troyes, France 
Adam Grzech - Wroclaw Univ of Technology, Poland 
Mohsen Guizani - WMU, USA 
Peter Honeyman - Univ. of Michigan, USA 
Russell Housley - Vigil Security, LLC, USA 
Stamatis Karnouskos - SAP Research, Germany 
Stamatios Kartalopoulos - Univ. of Oklahoma, USA 
Marek Klonowski - TU Wroclaw, Poland 
Odysseas Koufopavlou - Univ. of Patras, Greece 
Xuejia Lai - Shanghai Jiao Tong University, China 
Dong Hoon Lee - Korea University, Korea 
Albert Levi - Sabanci University, Turkey 
Pascal Lorenz - Univ. of Haute Alsace, France 
Fabio Massacci - Univ. of Trento, Italy 
Madjid Merabti - Liverpool John Moores Univ., UK 
Refik Molva - Insitut Eurecom, France 
Peter Mueller - IBM Zurich Research Lab, Switzerland 
Jose Neuman - UFC, Brazil 
Ramon Puigjaner - Baleares Island University 
Jean-Jacques Quisquater - Univ. Catholique De Louvain 
Serugudi Raghavan - IIT Madras, India 
Haidar Safa - American Univ. of Beirut, Lebanon 
Ping Shum - Nanyang Technological Univ., Singapore 
Wanqing Tu - University College Cork, Ireland 
Otto Spaniol - RWTH Aachen Univ., Germany 
Theodore Stergiou - Intracom Telecom, Greece 
Thomas Walter - DoCoMo Euro-Lab, Germany 
Sherali Zeadally - Univ. of the District of Columbia, USA 
Bin Zhu - Microsoft Research Asia, China