World Computer Congress 2010 International Federation for Information Processing Brisbane Convention & Exhibition Centre, Australia 20-23 September 2010 www.wcc2010.com

Call for papers 25th IFIP International Information Security Conference Trust IT Security & Privacy − Silver Linings in the Cloud www.sec2010.org

Conference topics SEC-2010 is the 25th in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP World Congress celebrating both the Golden Jubilee of IFIP and the Silver Jubilee of SEC. Papers offering novel and mature research contributions, in any aspect of information security and privacy, are solicited for submission to the conference. Papers may present theory, applications, or practical experiences on topics including but not limited to: (Authors of the best submissions will be invited to submit updated and significantly extended versions of their papers into Computers & Security.)

Access Control Information Warfare Secure Systems Development Anonymity Internet and Web Security Security Architectures Applications of Cryptography Intrusion Detection Security Economics Attacks and Malicious Software Mobile Computing Security Security Education Authentication and Authorization Mobile Networks Security Security Management Biometrics and Applications Network Security Protocols Security Metrics Critical ICT Resources Protection Multilateral Security Semantic Web Privacy & Security Data and Systems Integrity Peer-to-Peer Security Smart Cards Data Protection Privacy Enhancing Technologies Software Security ECommerce Privacy & Security RFID Privacy & Security Spam, SPIT, SPIM Enterprise Security Risk Analysis and Management Trust Management and Models Identity Management Secure Electronic Voting Trusted Computing Information Hiding Secure Sensor Networks Ubiquitous Privacy & Security

Programme Committee Chairs E. Dawson, QUT, Australia Kai Rannenberg, Goethe University Frankfurt, S. De Capitani di Vimercati, Universita` degli Studi di Milano, Italy Vijay Varadharajan, Macquarie University, Australia B. de Decker, K.U. Leuven, Belgium M. de Soete, Security4Biz, Belgium Publication Chair Y. Deswarte, LAAS-CNRS, France Christian Weber, Goethe University Frankfurt, Germany G. Dhillon, Virginia Commonwealth University, USA T. Dimitrakos, BT Innovate & Design, UK Programme Committee Members R. Dodge, U.S. Military Academy, USA A. Aldini, University of Urbino, Italy J. Eloff, University of Pretoria, South Africa C. J. Armstrong, Curtin University, Australia A. Escudero-Pascual, it46.se, Sweden V. Atluri, Rutgers University, USA H. Federrath, University of , Germany T. Aura, Microsoft Research, UK S. Fischer, University of Lübeck, Germany M. Bañón, Epoche & Espri, Spain S. Fischer-Huebner, , Sweden R. L. Baskerville, Georgia State University, USA U. Flegel, SAP, Germany J. Benaloh, Microsoft Research, USA S. N. Foley, University College Cork, Ireland C. Benzmüller, International University, Germany F. Freiling, Mannheim University, Germany J. Biskup, T.U. Dortmund, Germany A. Fuchsberger, Microsoft Corp, USA R. Botha, NMMU, South Africa W. Fumy, Bundesdruckerei, Germany L. Bussard, Microsoft EMIC, Germany S. Furnell, University of Plymouth, UK J. Camenisch, IBM Research, Switzerland M. Gasson, University of Reading, UK K. Cameron, Microsoft, USA V. D. Gligor, Carnegie Mellon University, USA L. Chen, Hewlett-Packard Labs, UK D. Gollmann, TU Hamburg-Harburg, Germany M. Christodorescu, IBM TJ Watson Research Center, USA R. Grimm, University of Koblenz, Germany R. Clarke, Xamax Consultancy Pty Ltd, ANU and UNSW, Australia D. Gritzalis, Athens University of Economics & Business, Greece R. Clayton, University of Cambridge, UK M. Hansen, Independent Centre for Privacy Protection, Germany C.J.F. Cremers, ETH Zurich, Switzerland H. Hedbom, Karlstad Universitet, Sweden M. Crompton, Information Integrity Solutions and NICTA M. Heisel, University Duisburg-Essen, Germany N. Cuppens-Boulahia, TELECOM Bretagne, France U. Helmbrecht, ENISA, EU J. Posegga, , Germany P. Herrmann, NTNU, Norway B. Preneel, K.U. Leuven, Belgium A. Hevia, Universidad de Chile, Chile G. Price, Royal Holloway, University of London, UK M. Hoelbl, Maribor University, Slovenia C. W Probst, Technical University of Denmark J.-H. Hoepman, TNO & Radboud University Nijmegen, the S. Qing, Chinese Academy of Sciences, China Netherlands M. Reichenbach, Commerzbank, Germany E. Humphreys, XISEC, UK C. Rieder, Lucerne Univ. of Applied Sciences & Arts, Switzerland C. Irvine, Naval Postgraduate School, Monterey, USA M. Riguidel, ENST, France S. Jajodia, George Mason University, USA Y. Roudier, EURECOM, France L. Janczewski, Univ. of Auckland, New Zealand P. Samarati, University of Milan, Italy D.-O. Jaquet-Chiffelle, Bern Univ. of Applied Sciences, Switzerland A. Sarma, NEC Laboratories Europe, Germany A. Jøsang, University of Oslo, Norway & QUT, Australia R Sasaki, Dendai University, Japan W. Jonker, Philips Research & Twente University, The Netherlands D. Sauveron, , France M.C. Kang, ISO/IEC JTC 1/SC 27/WG 4 I. Schaumüller-Bichl, Univ. of Applied Sciences Hagenberg, Austria S. Katsikas, University of Piraeus, Greece A. B. Seip, Kredittilsynet, Norway D. Kesdogan, , Germany S. Shenoi, University of Tulsa, USA H. Kikuchi, Tokai University, Japan E. Snekkenes, Gjøvik University College, Norway V. Kisimov, University of World and National Economy, Sofia, Bulgaria R. von Solms, NMMU, South Africa S. Knapskog, NTNU/Q2S, Norway H. von Sommerfeld, Rohde & Schwarz SIT, Germany K.-P. Kossakowski, PRESECURE Consulting GmbH, Germany F. Stajano, University of Cambridge, UK U. Kühn, DZ BANK AG, Germany S. Steinbrecher, Dresden University of Technology, Germany K. Kursawe, Philips Research, The Netherlands R. K Subramaniam, Valiant Technologies, India B. LaMacchia, Microsoft, USA M. Swimmer, Trend Micro, USA C. E. Landwehr, University of Maryland, USA P. Syverson, Naval Research Laboratory, USA P. J. Lee, POSTECH, Korea K. Takaragi, Hitachi, Japan H. Leitold, Graz University, Austria S. Teufel, , Switzerland A. Levi, Sabanci University, Istanbul, Turkey M. Ullmann, BSI & Univ. of AS Bonn-Rhein-Sieg, Germany T. Levin, Naval Postgraduate School, Monterey, USA P. M. B. Veiga, Universidade de Lisboa, Portugal J. Lopez, University of Malaga, Spain T. Virtanen, Finland V. Lotz, SAP Research, France C. Vishik, Intel, USA N. Luttenberger, Kiel University, Germany J. Vyskoc, VaF, Slovakia M. Marhöfer, Nokia Siemens Networks, Germany M. Waidner, IBM, USA S. Marsh, Communications Research Centre, Canada C. Wallis, Dept. of Internal Affairs, New Zealand Government F. Martinelli, National Research Council, Italy G. Weck, INFODAS GmbH, Germany V. Matyas, Brno, Czech Republic N. Weiler, Sensaco, Switzerland S. Mauw, Uni Luxembourg, Luxembourg S. Weiss, KPMG AG Wirtschaftspruefungsgesellschaft, Germany C. Maziero, PUCPR, Brazil T. Welzer, , Slovenia C. A. Meadows, Naval Research Laboratory, USA S. Wohlgemuth, National Institute of Informatics, Japan M. Meints, Dataport, Germany S. Wolthusen, Royal Holloway, University of London, UK N. Miloslavskaya, The National Research Nuclear Institute MEPhI, J. Zhou, I2R, Singapore Russia A. Zugenmaier, DoCoMo Research, Germany C. Mitchell, Royal Holloway, University of London, UK R. Molva, EURECOM, France G. Mueller, Freiburg University, Germany Y. Murayama, Iwate Prefectural University, Japan M. Ohlin, FMV, Sweden (†) E. Okamoto, University of Tsukuba, Japan R. Oppliger, eSECURITY Technologies, Switzerland J. I. Pagter, Alexandra Instituttet, Denmark C. Palmer, IBM Research; Dartmouth College, USA A. Pasic, ATOS Origin, Spain P. Peleties, USB BANK PLC, G. Pernul, , Germany G. L. Peterson, Air Force Institute of Technology, USA M. Petkovic, Philips Research / Eindhoven University of Technology, Netherlands A. Pfitzmann, Dresden University of Technology, Germany U. Pinsdorf, Microsoft EMIC, Germany H. Pohl, Univ. of Applied Sciences Bonn-Rhein-Sieg, Germany M. Pollitt, University of Central Florida, USA R. Posch, TU Graz, Austrian Federal Government Important dates

Submission of papers: January 31, 2010 Notification to authors: April 23, 2010 Camera-ready copies: May 15, 2010

Instructions for paper submission

• Papers must not substantially overlap with papers that have been published or are simultaneously submitted to a journal or another conference with proceedings.

• Papers must be written in English; they should be at most 12 pages in total, including bibliography and well-marked appendices. Papers should be intelligible without appendices, if any.

• Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer.

• Submitted and accepted papers must follow the publisher’s guidelines for the IFIP AICT Series (www.springer.com/ series/6102, Author templates, Manuscript preparation in Word).

• At least one author of each accepted paper must register for the conference and present the paper. Inclusion of the paper will be dependent upon one registration for the paper.

• All papers must be submitted in electronic form through the web via www.sec2010.org by January 31, 2010.

The Congress

The World Computer Congress (WCC2010) will bring together IT research and industry sectors in one event. The congress will combine 18 IFIP conferences with partner conferences from other international and regional, specialist IT organisations.

The conference content will be presented in eight program streams. Delegates may attend any of the participating conference, industry or partner events as well as networking, social, technical tours and certification courses offered at the congress.

• Wireless Communications and Information Technology in Developing Countries (WCITD 2010) • Biologically-Inspired Collaborative Computing (BICC 2010) • Distributed and Parallel Embedded Systems (DIPES 2010) • Artificial Intelligence in Theory and Practice (IFIP AI 2010) • Network of the Future (NF) • Enterprise Architecture, Integration, Interoperability and Networking (EAI2N) • Human Choice and Computers International Conference (HCC9 2010) Track 2: Virtual Technologies and Social Shaping

• International Information Security Conference (SEC 2010) • Critical Information Infrastructure Protection (CIP) • Human Choice and Computers International Conference (HCC9 2010) Track 3: Surveillance and Privacy

• Theoretical Computer Science (TCS 2010) • Human Computer Interaction (HCI 2010)

• Key Competencies in the Knowledge Society (KCKS 2010) • History of Computing (HC)

• Global Information Systems Processes (GISP) • E-Government and E-Services (EGES) • Human Choice and Computers conference (HCC9 2010) Track 1: Ethics and ICT Governance

• E-Health (EHEALTH)

• Human Choice and Computers International Conference (HCC9 2010) Track 4: ICT and Sustainable Development

• Entertainment Computing Symposium (ECS 2010)