Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

               SePTIS'08 Second Edition

                 SITIS'08 Workshop on

    Security and Privacy in Telecommunications & Information Systems

      in conjunction with The 4th International IEEE Conference on
        Sponsored by the IEEE and in Cooperation with ACM SIGAPP
            November 30th - December 3rd, 2008
                 Bali Dynasty Resort
                   Bali, Indonesia

    The security of digital exchanges and its counterpart, the management
of digital identities, is the main issue concerning the concept of
global security applied to the world of information systems. Moreover,
the advent of web technologies modify every day our vision of
information systems security.

    The SePTIS workshop main topics encompass research advances around
digital identities and secure exchanges between information systems,
and focuses on web technologies.

***    The main topics of SePTIS include, but are not limited to, the

- Security with Web Technologies & Web Services Security
    - Security Models, Architectures and Protocols
    - Formal Methods for Web Applications
    - E-Commerce and E-Government Security

- Identity Management and New Ideas & Paradigms for the Security of
Digital Identities
    - Authentication
    - Authorization and Access Control
    - Security, Anonymity & User Privacy
    - Security & Privacy in Pervasive and Ubiquitous Computing, e.g.,

- Information System Paradigms
    - Trust Negotiation, Establishment and Management
    - Intrusion Avoidance, Detection, Response and Prevention
    - Security Management and Strategy
    - Digital Rights Management and Intellectual Property Protection

***    Submission and publication

    SePTIS seeks high-quality research contributions in the form of
original and well-developed full papers on the topics described below.
All submitted papers will be peer-reviewed by at least two reviewers
for technical merit, originality, significance and relevance to track
topics. Papers must be up to 8 pages and follow IEEE double columns
publication format according to the genreal guidelines of the SITIS

    Accepted papers will be included in the conference proceedings and
published by the IEEE Computer Society and referenced in IEEE Xplore
and major indexes. The proceedings will be mailed by the IEEE CS press
directly to registered authors after the conference. CD copies of the
proceeding will be available during the conference. Selected accepted
papers will be considered for publication in major journal.

    Paper proposals should be submitted to jacques.fayolle@univ-st- and
Acceptable file formats are: Postscript and PDF. Hard copy submissions
are not permitted.

    More information on .

***    Important Dates

    Paper Submission: August 22nd, 2008
    Notification of Acceptance: September 12th, 2008
    Camera Ready: October 3rd, 2008
    Author Registration Due Date: October 10th, 2008
    Conference Dates: November 30th - December 3rd, 2008

***    Program Committee

    Christophe Gravier, ISTASE - University of Saint-Etienne, France
    Djamal Benslimane, Claude Bernard Lyon 1 University, France
    Gongliang Chen, Shanghai Jiaotong University, China
    Jacques Fayolle, ISTASE - University of Saint-Etienne, France
    Jeremy Lardon, ISTASE - University of Saint-Etienne, France
    Lee Byung-Gil, ETRI - Information Security Research Division, Korea
    Li Xiang, Shanghai Jiaotong University, China
    Lionel Brunie, INSA - University of Lyon 1, France
    Philippe Jaillon, ENSM - Ecole Nationale Superieure des Mines de
Saint-Etienne, France
    Richard Chbeir, University of Bourgogne, France
    Yinghua Ma, Shanghai Jiaotong University, China

***    SePTIS Worhshop Organizer

    Jacques Fayolle, ISTASE - University of Saint-Etienne, France
    Mikael Ates, ISTASE - University of Saint-Etienne, France

Site Timeline