Call for papers
25th IFIP International Information Security Conference
Brisbane, Australia
20-23 September, 2010

Security & Privacy  Silver Linings in the Cloud 

Conference Topics

SEC-2010 is the 25th in a series of well-established international
conferences on Security and Privacy organized annually by the
Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP
World Computer Congress celebrating both the Golden Jubilee of IFIP
and the Silver Jubilee of SEC. Papers offering novel and mature
research contributions, in any aspect of information security and
privacy, are solicited for submission to the conference. Papers may
present theory, applications, or practical experiences on topics
including but not limited to: (Authors of the best submissions will be
invited to submit updated and significantly extended versions of their
papers into Computers & Security.)

Access Control
Applications of Cryptography
Attacks and Malicious Software
Authentication and Authorization
Biometrics and Applications
Critical ICT Resources Protection
Data and Systems Integrity
Data Protection
ECommerce Privacy & Security
Enterprise Security
Identity Management
Information Hiding
Information Warfare
Internet and Web Security
Intrusion Detection
Mobile Computing Security
Mobile Networks Security
Network Security Protocols
Multilateral Security
Peer-to-Peer Security
Privacy Enhancing Technologies
RFID Privacy & Security
Risk Analysis and Management
Secure Electronic Voting
Secure Sensor Networks
Secure Systems Development
Security Architectures
Security Economics
Security Education
Security Management
Security Metrics
Semantic Web Privacy & Security
Smart Cards
Software Security
Trust Management and Models
Trusted Computing
Ubiquitous Privacy & Security
Programme Committee Chairs

Kai Rannenberg, Goethe University Frankfurt, Germany
Vijay Varadharajan, Macquarie University, Australia
Publication Chair

Christian Weber, Goethe University Frankfurt, Germany
Programme Committee Members

A. Aldini, University of Urbino, Italy
C. J. Armstrong, Curtin University, Australia
V. Atluri, Rutgers University, USA
T. Aura, Microsoft Research, UK
M. Bañón, Epoche & Espri, Spain
R. L. Baskerville, Georgia State University, USA
J. Benaloh, Microsoft Research, USA
C. Benzmüller, International University, Germany
J. Biskup, T.U. Dortmund, Germany
R. Botha, NMMU, South Africa
L. Bussard, Microsoft EMIC, Germany
J. Camenisch, IBM Research, Switzerland
K. Cameron, Microsoft, USA
L. Chen, Hewlett-Packard Labs, UK
M. Christodorescu, IBM TJ Watson Research Center, USA
R. Clarke, Xamax Consultancy Pty Ltd, ANU and UNSW, Australia
R. Clayton, University of Cambridge, UK
C.J.F. Cremers, ETH Zurich, Switzerland
M. Crompton, Information Integrity Solutions and NICTA
N. Cuppens-Boulahia, TELECOM Bretagne, France
E. Dawson, QUT, Australia
S. De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
B. de Decker, K.U. Leuven, Belgium
M. de Soete, Security4Biz, Belgium
Y. Deswarte, LAAS-CNRS, France
G. Dhillon, Virginia Commonwealth University, USA
T. Dimitrakos, BT Innovate & Design, UK
R. Dodge, U.S. Military Academy, USA
J. Eloff, University of Pretoria, South Africa
A. Escudero-Pascual,, Sweden
H. Federrath, University of Regensburg, Germany
S. Fischer, University of Lübeck, Germany
S. Fischer-Huebner, Karlstad University, Sweden
U. Flegel, SAP, Germany
S. N. Foley, University College Cork, Ireland
F. Freiling, Mannheim University, Germany
A. Fuchsberger, Microsoft Corp, USA
W. Fumy, Bundesdruckerei, Germany
S. Furnell, University of Plymouth, UK
M. Gasson, University of Reading, UK
V. D. Gligor, Carnegie Mellon University, USA
D. Gollmann, TU Hamburg-Harburg, Germany
R. Grimm, University of Koblenz, Germany
D. Gritzalis, Athens University of Economics & Business, Greece
M. Hansen, Independent Centre for Privacy Protection, Germany
H. Hedbom, Karlstad Universitet, Sweden
M. Heisel, University Duisburg-Essen, Germany
U. Helmbrecht, ENISA, EU
P. Herrmann, NTNU, Norway
A. Hevia, Universidad de Chile, Chile
M. Hoelbl, Maribor University, Slovenia
J.-H. Hoepman, TNO & Radboud University Nijmegen, the Netherlands
E. Humphreys, XISEC, UK
C. Irvine, Naval Postgraduate School, Monterey, USA
S. Jajodia, George Mason University, USA
L. Janczewski, Univ. of Auckland, New Zealand
D.-O. Jaquet-Chiffelle, Bern Univ. of Applied Sciences, Switzerland
A. Jsang, University of Oslo, Norway & QUT, Australia
W. Jonker, Philips Research & Twente University, The Netherlands
M.C. Kang, ISO/IEC JTC 1/SC 27/WG 4
S. Katsikas, University of Piraeus, Greece
D. Kesdogan, University of Siegen, Germany
H. Kikuchi, Tokai University, Japan
V. Kisimov, University of World and National Economy, Sofia, Bulgaria
S. Knapskog, NTNU/Q2S, Norway
K.-P. Kossakowski, PRESECURE Consulting GmbH, Germany
U. Kühn, DZ BANK AG, Germany
K. Kursawe, Philips Research, The Netherlands
B. LaMacchia, Microsoft, USA
C. E. Landwehr, University of Maryland, USA
P. J. Lee, POSTECH, Korea
H. Leitold, Graz University, Austria
A. Levi, Sabanci University, Istanbul, Turkey
T. Levin, Naval Postgraduate School, Monterey, USA
J. Lopez, University of Malaga, Spain
V. Lotz, SAP Research, France
N. Luttenberger, Kiel University, Germany
M. Marhöfer, Nokia Siemens Networks, Germany
S. Marsh, Communications Research Centre, Canada
F. Martinelli, National Research Council, Italy
V. Matyas, Masaryk University Brno, Czech Republic
S. Mauw, Uni Luxembourg, Luxembourg
C. Maziero, PUCPR, Brazil
C. A. Meadows, Naval Research Laboratory, USA
M. Meints, Dataport, Germany
N. Miloslavskaya, The National Research Nuclear Institute MEPhI, Russia
C. Mitchell, Royal Holloway, University of London, UK
R. Molva, EURECOM, France
G. Mueller, Freiburg University, Germany
Y. Murayama, Iwate Prefectural University, Japan
M. Ohlin, FMV, Sweden (+)
E. Okamoto, University of Tsukuba, Japan
R. Oppliger, eSECURITY Technologies, Switzerland
J. I. Pagter, Alexandra Instituttet, Denmark
C. Palmer, IBM Research; Dartmouth College, USA
A. Pasic, ATOS Origin, Spain
P. Peleties, USB BANK PLC, Cyprus
G. Pernul, University of Regensburg, Germany
G. L. Peterson, Air Force Institute of Technology, USA
M. Petkovic, Philips Research / Eindhoven University of Technology, Netherlands
A. Pfitzmann, Dresden University of Technology, Germany
U. Pinsdorf, Microsoft EMIC, Germany
H. Pohl, Univ. of Applied Sciences Bonn-Rhein-Sieg, Germany
M. Pollitt, University of Central Florida, USA
R. Posch, TU Graz, Austrian Federal Government
J. Posegga, University of Passau, Germany
B. Preneel, K.U. Leuven, Belgium
G. Price, Royal Holloway, University of London, UK
C. W Probst, Technical University of Denmark
S. Qing, Chinese Academy of Sciences, China
M. Reichenbach, Commerzbank, Germany
C. Rieder, Lucerne Univ. of Applied Sciences & Arts, Switzerland
M. Riguidel, ENST, France
Y. Roudier, EURECOM, France
P. Samarati, University of Milan, Italy
A. Sarma, NEC Laboratories Europe, Germany
R Sasaki, Dendai University, Japan
D. Sauveron, University of Limoges, France
I. Schaumüller-Bichl, Univ. of Applied Sciences Hagenberg, Austria
A. B. Seip, Kredittilsynet, Norway
S. Shenoi, University of Tulsa, USA
E. Snekkenes, Gjøvik University College, Norway
R. von Solms, NMMU, South Africa
H. von Sommerfeld, Rohde & Schwarz SIT, Germany
F. Stajano, University of Cambridge, UK
S. Steinbrecher, Dresden University of Technology, Germany
R. K Subramaniam, Valiant Technologies, India
M. Swimmer, Trend Micro, USA
P. Syverson, Naval Research Laboratory, USA
K. Takaragi, Hitachi, Japan
S. Teufel, University of Fribourg, Switzerland
M. Ullmann, BSI & Univ. of AS Bonn-Rhein-Sieg, Germany
P. M. B. Veiga, Universidade de Lisboa, Portugal
T. Virtanen, Finland
C. Vishik, Intel, USA
J. Vyskoc, VaF, Slovakia
M. Waidner, IBM, USA
C. Wallis, Dept. of Internal Affairs, New Zealand Government
G. Weck, INFODAS GmbH, Germany
N. Weiler, Sensaco, Switzerland
S. Weiss, KPMG AG Wirtschaftspruefungsgesellschaft, Germany
T. Welzer, University of Maribor, Slovenia
S. Wohlgemuth, National Institute of Informatics, Japan
S. Wolthusen, Royal Holloway, University of London, UK
J. Zhou, I2R, Singapore
A. Zugenmaier, DoCoMo Research, Germany

Important Dates
Submission of papers: 	January 31, 2010
Notification to authors: 	April 23, 2010
Camera-ready copies: 	May 15, 2010

Instructions for paper submission

    * Papers must not substantially overlap with papers that have been
      published or are simultaneously submitted to a journal or another
      conference with proceedings.

    * Papers must be written in English; they should be at most 12
      pages in total, including bibliography and well-marked
      appendices. Papers should be intelligible without appendices, if any.

    * Accepted papers will be presented at the conference and
      published in the IFIP AICT (Advances in Information and Communication
      Technology) Series by Springer.

    * Submitted and accepted papers must follow the publisher's
      guidelines for the IFIP AICT Series (,
      Author templates).

    * At least one author of each accepted paper must register for the
      conference and present the paper. Inclusion of the paper will be
      dependent upon one registration for the paper.

    * All papers must be submitted in electronic form through the web
      via by January 31, 2010.

The Congress

The World Computer Congress (WCC2010) will bring together IT research
and industry sectors in one event. The congress will combine 18 IFIP
conferences with partner conferences from other international and
regional, specialist IT organisations.

The conference content will be presented in eight program
streams. Delegates may attend any of the participating conference,
industry or partner events as well as networking, social, technical
tours and certification courses offered at the congress.

Trust IT 	

    * Wireless Communications and Information Technology in Developing Countries (WCITD 2010)
    * Biologically-Inspired Collaborative Computing (BICC 2010)
    * Distributed and Parallel Embedded Systems (DIPES 2010)
    * Artificial Intelligence in Theory and Practice (IFIP AI 2010)
    * Network of the Future (NF)
    * Enterprise Architecture, Integration, Interoperability and Networking (EAI2N)
    * Human Choice and Computers International Conference (HCC9 2010)
      Track 2: Virtual Technologies and Social Shaping

Trust IT 	

    * International Information Security Conference 2010 (SEC 2010)
    * Critical Information Infrastructure Protection (CIP)
    * Human Choice and Computers International Conference (HCC9 2010)
      Track 3: Surveillance and Privacy

Value IT 	

    * Theoretical Computer Science (TCS 2010)
    * Human Computer Interaction (HCI 2010)

Learn IT 	

    * Key Competencies in the Knowledge Society (KCKS 2010)
    * History of Computing (HC)

Govern IT 	

    * Global Information Systems Processes (GISP)
    * E-Government and E-Services (EGES)
    * Human Choice and Computers conference (HCC9 2010)
      Track 1: Ethics and ICT Governance

Vitalise IT 	

    * E-Health (EHEALTH)

Sustain IT 	

    * Human Choice and Computers International Conference (HCC9 2010)
      Track 4: ICT and Sustainable Development

Play IT 	

    * Entertainment Computing Symposium (ECS 2010)