<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.StileMessaggioDiPostaElettronica17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 2.0cm 2.0cm 2.0cm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=IT link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span lang=EN-US>*** Apologies for possible cross-postings. Please send it to interested colleagues and students. ***<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>***********************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>*** Paper Submission Extended: March 1, 2011 ***<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>***********************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>SAR/SSI-2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>International Conference on Network and Information Systems Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>La Rochelle, France - 18-21 May 2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>The SAR-SSI conference series provides a forum for presenting novel research results, practical experiences and <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>innovative ideas in network and information systems security. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>The goal of SAR-SSI-2011 is fostering exchanges among academic researchers, industry and a wider audience <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>interested in network and information system security. The conference will offer a broad area of events, ranging from <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>panels, tutorials, technical presentations and informal meetings. Prospective authors are encouraged to submit papers <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>describing novel research contributions as well as proposals for tutorials and panels. Submissions can address <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>theoretical issues in network and information system security or provide practical and operational experiences in <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>security management. Languages for papers and presentations can be French or English, both languages being used in <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>SAR-SSI. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>TOPICS <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Authors are invited to submit research papers, papers presenting a practical experience or new industrial applications, <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>panel and tutorial proposals on topics related to network and information systems security. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Topics of interest include, but are not limited to:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>+Network Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security of new network architectures (e.g. VoIP, MAN/WAN, Giga-Ethernet)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security in wireless and adhoc networks,<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security of communications (e.g. VPN, IPsec, SSL, MPLS)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security in backbone and IPv6 networks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Multicast security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security in peer-to-peer systems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security in embedded networks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>+Formal methods and models for computer security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Applied cryptography<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Authentication and access control<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Anonymity and privacy <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Metrology and security measurement <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Public Key Infrastructures (PKI)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security protocols<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security assessment and certification <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Trust representation and management<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>+Computer Forensics and Incident Response<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Intrusion detection systems, honeypots<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Worms, Viruses, Botnets, Malware and Spyware<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security assessment<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>+Software and Systems Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Reverse engineering and software protection<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Methodology, ethics, legislation and regulation <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Biometry and watermarking<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - E-commerce security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security in vehicular communications <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>+XML, Web Services and Cloud Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Web services and GRID computing security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Security on Untrusted Clouds<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Frameworks for managing inter-organizational trust relationships<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Web services exploitation of Trusted Computing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - Secure orchestration of Web services<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>PAPER SUBMISSIONS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Submissions should not exceed 15 pages must include on the cover page the paper title, author(s) name(s) and <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>affiliation, a full address (Phone, fax, e-mail), an abstract of the paper (150 words max) and no more than 5 keywords. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Authors must submit an electronic version of their paper (PDF / A4 format). Authors are requested to use the sarssi.cls <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>type and use the alpha style for the bibliography. For the final version the sources of the contribution in LaTeX will <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>also be required. All accepted papers will also be published in the conference proceeding by IEEE, and will be indexed <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>by IEEE Xplore Digital Library.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>The submission of papers must be done through the EasyChair Conference system using the following page: <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>http://www.easychair.org/conferences/?conf=sarssi2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>PANEL PROPOSALS <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>The conference may include panel sessions addressing topics of interest to the computer security community. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Proposals for panels should list possible panellists, specifying those who have confirmed participation. Please submit <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>panel proposals by email to the TPC co-chairs. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>JOURNAL PUBLICATION <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Authors of the best papers selected by the technical program committee will be invited to publish an extended <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>version of their paper in a journal of international audience. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>TUTORIALS <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>The conference will include a tutorial and prominent invited speakers session. The tutorials will address hot research <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>and/or industry topics relating to network and information systems security. Please submit tutorial proposals by email <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>to the TPC co-chairs.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>IMPORTANT DATES<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Submission: March 1st, 2011 -- EXTENDED DEADLINE <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Notification: March 29th, 2011 <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Registration: April 18th, 2011 (reduced fare)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Camera Ready Version: April 25th, 2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Conference: May 18th - 21st, 2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>COMMITTEES<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>General Chairs<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Ahmed Serhrouchni, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Steering Committee<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Abdelmajid Bouabdallah, UTC, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Danielle Boulanger, Univ. Lyon-Jean Moulin, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Isabelle Chrisment, Université Nancy I, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Alban Gabillon, Université de la Polynésie Française<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Ludovic Mé, Supélec, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Ahmed Serhrouchni, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Technical Program Committee Chair<o:p></o:p></span></p><p class=MsoNormal>- Ernesto Damiani, Università degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><span lang=EN-US>Organizing Committee<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Ibrahim Hajjeh, Ineovation, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Jean Leneutre, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Radwan Saâd, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Ahmed Serhrouchni, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Youcef Begriche, IEEE, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Rim Moalla, Télécom ParisTech, France <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Technical Program Committee<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mhamed Abdallah, Telecom Sud Paris, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mohammed Achemlal, France Telecom / Orange, France<o:p></o:p></span></p><p class=MsoNormal>- Hossam Afifi, Telecom Sud Paris, France<o:p></o:p></p><p class=MsoNormal>- Claudio Agostino Ardagna, Univ. degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoNormal><span lang=FR>- Gildas Avoine, Université catholique de Louvain, Belgique<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mohammed Badra, Limos CNRS, Clermont Ferrand, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Youcef Begriche, IEEE, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Patrick Bellot, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Nadia Bennani, INSA-Lyon, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Abdelmalek Benzekri, IRIT, Toulouse, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Christophe Bidan, Supélec, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Karima Boudaoud, Université de Nice, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Adel Bouhoula, SUPCOM of Tunis, Tunisie<o:p></o:p></span></p><p class=MsoNormal>- Lionel Brunie, INSA-Lyon, France<o:p></o:p></p><p class=MsoNormal>- Laurent Bussard, Microsoft Innovation Center, Germany<o:p></o:p></p><p class=MsoNormal>- Laurent Butti, Orange R&D, France<o:p></o:p></p><p class=MsoNormal>- Marco Casassa-Mont, HPLabs, HK<o:p></o:p></p><p class=MsoNormal><span lang=FR>- Yacine Challal, UTC, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Claude Chaudet, Télécom ParisTech, France <o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Ken Chen, Université de Paris 13, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Yves Correc, DGA/CELAR, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Bernard Cousin, IRISA, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Mathieu Couture, Carleton University, Canada<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Frederic Cuppens, Telecom Bretagne, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Nora Cuppens-Boulahia, Telecom Bretagne, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Hervé Debar, Telecom Sud Paris, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Rachida Dssouli, Concordia University, Canada<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Anas Abou El Kalam, ENSEEIHT, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Robert Erra, ESIEA, Paris, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Mounir Frikha, SUPCOM of Tunis, Tunisie <o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Laurent Gallon, Université de Pau, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Sihem Guemara, SUPCOM of Tunis, Tunisie<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Gilles Guette, University of Rennes 1, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Vincent Guyot, ESIEA, Paris, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Gaétan Hains, Université Paris-Est, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Ibrahim Hajjeh, Ineovation, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Artur Hecker, Télécom ParisTech, France <o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Guillaume Hiet, Supélec, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Mathieu Jaume, Lab. d'Informatique de Paris 6, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Rida Khatoun, UTT, Troyes, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Abou Khaled Omar, HES.SO, Fribourg, Switzerland <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Djamel Khadraoui, CRP Henri Tudor, Luxembourg<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Houda Labiod, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mohamed Lambarki, ESIEA, Paris, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Jean-Louis Lanet, University of Limoges, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Maryline Laurent, Telecom Sud Paris, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Daniel Le Métayer, INRIA Grenoble - Rhône-Alpes, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Jean Leneutre, Télécom ParisTech, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Bruno Martin, Université de Nice Sophia Antipolis, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Fabio Martinelli, IIT-CNR, Italy<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Ludovic Mé, Supélec, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Mohamed Mosbah, Labri, Bordeaux, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Elena Mugellini, HES.SO, Fribourg, Swizertland<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Farid Naït-Abdesselam, Univ. of Paris Descartes, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Philippe Owezarski, LAAS, CNRS, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Guillaume Piolle, Supélec, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Fabien Pouget, CERTA, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Nicolas Prigent, Supélec, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Guy Pujolle, Laboratoire d'Informatique de Paris 6, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Jean-Luc Richier, Lab. d'Informatique de Grenoble, France<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Etienne Riviere, Université de Neuchâtel, Switzerland<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Jean-Marc Robert, École de Tech. Supérieure, Canada<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>- Yves Roudier, Institut Eurécom, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Jörg Schwenk, University of Bochum, Germany<o:p></o:p></span></p><p class=MsoNormal>- Eric Totel, Supélec, France<o:p></o:p></p><p class=MsoNormal>- Frederic Tronel, Supélec, France<o:p></o:p></p><p class=MsoNormal>- Pascal Urien, Télécom ParisTech, France<o:p></o:p></p><p class=MsoNormal>- Valerie Viet Triem Tong, Supélec, France<o:p></o:p></p></div></body></html>