[Om-announce] Call for Participation - 5th International Conference on Network and System Security (NSS 2011)

Giovanni Livraga giovanni.livraga at unimi.it
Wed Jul 13 20:03:33 CEST 2011


[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION

5th INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY (NSS 2011)
Universita` degli Studi di Milano, via Festa del Perdono, Milan, Italy
September 6-8, 2011
http://anss.org.au/nss2011

**Registration now open (early bird registration: August 3, 2011)**


ABOUT THE CONFERENCE

NSS is an annual international conference covering research in network  
and
system security. The 5th International Conference on Network and System
Security (NSS 2011) will be held in Milan, Italy. Previous editions were
held in: Melbourne, Australia, (2010); Gold Coast, Australia, (2009);
Shanghai, China (2008); and Dalian, China (2007).

The NSS 2011 conference is organized as a 3-day event featuring:
- two keynote speakers
- NSS technical program (28 full papers, 29 short papers)
- co-located events:
	* International Conference on Data and Knowledge Engineering (ICDKE)
	* 3rd International Workshop on Cyberspace Safety and Security (CSS  
2011)
	* 1st International Workshop on Securing Services on the Cloud (IWSSC  
2011)
	* 1st Workshop on Mobile and Online Social Networks (MOSN 2011)
	* 1st Workshop on Socio-Technical Aspects in Security and Trust  
(STAST 2011)


REGISTRATION

Registration information is available at:
http://anss.org.au/nss2011/registration.htm

Early registration fees apply until August 3, 2011.


KEYNOTE SPEAKERS

- Prof. Javier Lopez
   University of Malaga, Spain

- Prof. Ernesto Damiani
   Università degli Studi di Milano, Italy


LIST OF ACCEPTED PAPERS
(in alphabetical order of title)

* FULL PAPERS

- A Distributed Client-Puzzle Mechanism to Mitigate Bandwidth Attacks
(Mazdak Alimadadi and Mehran S. Fallah)

- A Grid-Based Clustering for Low-Overhead Anomaly Intrusion Detection
(Zhong Yang, Yamaki Hirohumi, and Takakura Hiroki)

- A Holistic Methodology for Evaluating Wireless Intrusion Detection  
Systems
(Khalid Nasr, Anas Abou El Kalam, and Christian Fraboul)

- A Misuse-Based Network Intrusion Detection System Using Temporal  
Logic and Stream Processing
(Abdulbasit Ahmed, Alexei Lisitsa, and Clare Dixon)

- A Novel Semi-Supervised Approach for Network Traffic Clustering
(Yu Wang, Yang Xiang, Jun Zhang, and Shun-Zheng Yu)

- A Secure, Constraint-Aware Role-Based Access Control Interoperation  
Framework
(Nathalie Baracaldo, Amirreza Masoumzadeh, and James Joshi)

- Attack-resilient Compliance Monitoring for Large Distributed  
Infrastructure Systems
(Mirko Montanari and Roy Campbell)

- Automated Signatures Extraction of Polymorphic Viruses using  
Abstract Interpretation
(Renaud Tabary, Serge Chaumette, and Olivier Ly)

- CloudSec: A Security Monitoring Appliance for Virtual Machines in  
the IaaS Cloud Model
(Amani Ibrahim, James Hamlyn-Harris, John Grundy, and Mohamed Almorsy)

- DANAK: Finding the Odd!
(Cynthia Wagner, Jérôme François, Radu State, and Thomas Engel)

- Defeating Pharming Attacks at the Client-Side
(Sophie Gastellier-Prevost and Maryline Laurent)

- Designing Secure RFID Authentication Protocols is (Still) a Non- 
Trivial Task
(Panagiotis Rizomiliotis, Evangelos Rekleitis, and Stefanos Gritzalis)

- Detecting Infection Onset With Behavior-Based Policies
(Kui Xu, Danfeng Yao, Qiang Ma, and Alexander Crowell)

- Exploring Twisted Paths: Analyzing Authorization Processes in  
Organizations
(Steffen Bartsch)

- FORTUNA - A Probabilistic Framework for Early Design Stages of  
Hardware-Based Secure Systems
(Roberto Gallo, Ricardo Dahab, and Henrique Kawakami)

- Improving P2P IPTV Random Peers Search Through User Similarity
(Alessio Bonti and Wen Shi)

- KL-F: Karhunen-Loève Based fragile watermarking
(Marco Botta, Davide Cavagnino, and Victor Pomponiu)

- Make Mine a Quadruple: Strengthening the Security of Graphical One- 
Time PIN authentication
(Ravi Jhawar, Philip Inglesant, Martina Angela Sasse, and Nicolas  
Courtois)

- Model-based Safety Analysis of SELinux Security Policies
(Peter Amthor and Winfried Kühnhauser)

- Modeling Worms Propagation on Probability
(Yini Wang, Sheng Wen, and Yang Xiang)

- Privacy-enhanced Identity via Browser Extensions and Linking Services
(Renato Accornero, Daniele Rispoli, and Francesco Bergadano)

- Reactive Non-Interference for a Browser Model
(Nataliia Bielova, Dominique Devriese, Fabio Massacci, and Frank  
Piessens)

- Removing the Blinders: Using Information to Mitigate Adversaries in  
Adaptive Overlays
(David Zage, Charles Killian, and Cristina Nita-Rotaru)

- Scalable Consistency-based Hardware Trojan Detection and Diagnosis
(Sheng Wei and Miodrag Potkonjak)

- Towards Ground Truthing Observations in Gray-Box Anomaly Detection
(Jiang Ming, Haibin Zhang, and Debin Gao)

- Towards Safe and Optimal Filtering Rule Reordering for Complex  
Packet Filters
(Nizar Ben Neji and Adel Bouhoula)

- Tracking End-Users in Web Databases
(Boris Rozenberg, Ehud Gudes, Yaron Gonen, Erez Shmueli, and Nurit Gal- 
Oz)

- Truly–protect: A VM–based Software Protection
(Amir Averbuch, Michael Kiperberg, and Nezer Jacob Zaidenberg)


* SHORT PAPERS
	
- A Microcontroller SRAM-PUF
(Christoph Boehm, Maximilian Hofer, and Wolfgang Pribyl)

- A Privacy-Preserving eID based Single Sign-On Solution
(Arne Tauber, Thomas Zefferer, and Bernd Zwattendorfer)

- A Propagation Model of A Vulnerability Mitigation Computer Worm -  
Seawave
(Ziyad Al-Salloum and Stephen Wolthusen)

- A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc  
Networks
(Tony Cheneau, Andrei Sambra, and Maryline Laurent)

- Analysis of Prefix Hijacking Based on AS Hierarchical Model
(Bo-Feng Zhang, Yuan Li, Yu-Jing Liu, and Jin-Shu Su)

- Automatic Security Verification for 3-Party Authentication and Key  
Exchange Protocols
(Haruki Ota, Shinsaku Kiyomoto, and Yutaka Miyake)

- Avoiding DDoS with Active Management of Backlog Queues
(Martine Bellaiche, and Jean-Charles Grégoire)

- Channel State Information based Key Generation vs. Side-Channel  
Analysis Key Information Leakage
(Huiyun Li, Qi Zhang, and Hai Yuan)

- Data Control in Social Networks
(Robert Koch, Dominik Holzapfel, and Gabi Dreo Rodosek)

- Enhancement of ZigBee and Wi-Fi security by a robust and fast  
chaotic algorithm
(Bassem Bakhache, Joseph Ghazal, and Safwan El-Assad)

- Evaluating Usability and Security in Authentication Mechanisms – A  
Conceptual Framework
(Martin Mihajlov, Borka Jerman-Blazic, and Saso Josimovski)

- Flooding Attacks Against Network Coding and Countermeasures
(Yuan Yuan Zhang, Wassim Znaidi, Cédric Lauradoux, and Marine Minier)

- Measuring the Revised Guessability of Graphical Passwords
(Rosanne English and Ron Poet)

- Modelling Self-protected Networks and Dynamic Systems
(Marta Fernández-Diego and Julián Marcelo-Cocho)

- On the Security of the ECKE-1N and EECKE-1N Elliptic-Curve Key  
Agreement Protocols
(Maurizio Adriano Strangio)

- R5N : Randomized Recursive Routing for Restricted-Route Networks
(Nathan Evans and Christian Grothoff)

- RCHB: A Light-weight, Provably-secure Variant of the HB Protocol  
Using Rotation and Complementation
(Samia Ali)

- Reconstructing Security Types for Automated Policy Enforcement in  
FABLE
(Arash Afshar, and Mehran S. Fallah)

- Secure Conjunctive Keyword Searches For Unstructured Text
(Florian Kerschbaum)

- Semi-supervised Learning for Packed Executable Detection
(Xabier Ugarte-Pedrero, Igor Santos, Pablo Bringas, Mikel Gastesi, and  
José Miguel Esparza)

- SMS Linguistic Profiling Authentication on Mobile Devices
(Hataichanok Saevanee, Nathan Clarke, and Steven Furnell)

- STORK e-Privacy and Security
(Vasilis Koulolias, Athanasios Kountzeris, Alberto Crespo, Herbert  
Leitold, and Marc Stern)

- Taxonomic Analysis of Classification Schemes in Vulnerability  
Databases
(Anshu Tripathi and Umesh Kumar Singh)

- The Power of Credit Card Numbers and Long CVVs
(Valentim Oliveira and Tito Silva)

- Towards a Metric for Recognition-Based Graphical Password Security
(Rosanne English and Ron Poet)

- Towards Improving Security Testability of AADL Architecture Models
(Ayda Saidane and Nicolas Guelfi)

- Trustable Outsourcing of Business Processes to Cloud Computing  
Environments
(Sami Alsouri, Stefan Katzenbeisser, and Sebastian Biedermann)

- Usability of Internet Security Software: Have They Got it Right?
(Patryk Szewczyk)

- User-Representative Feature Selection for Keystroke Dynamics
(Eesa Al Soalmi, Colin Boyd, and Irfan Ahmed)



MORE INFORMATION

Additional information about the conference can be found at:
http://anss.org.au/nss2011


More information about the Om-announce mailing list