Wednesday, May 30, 2012

Call for Post-Conference Proceedings Papers with Extended Deadline of June 1, 2012: The 2012 International Conference on Security and Management (SAM'12) at WORLDCOMP'12, USA, July 16-19, 2012


**************************************************************************
          CALL FOR PAPERS - Extended Deadline: June 1, 2012

                 The 2012 International Conference on
                       Security and Management
                               SAM'12

                  July 16-19, 2012, Las Vegas, USA
**************************************************************************

INVITATION:
You are invited to submit a full paper (max of 7 pages) for consideration.
All accepted papers will be published in printed conference books/proceedings
(ISBN) and will also be made available online. Abstract submissions (1 to 2
pages) will be considered for poster presentations. The conference proceedings will be made available in printed book as well as online. The proceedings will be indexed in science citation databases that track citation frequency/ data for each paper. The proceedings of the congress that SAM is part of enjoys a high number of citations; about 26,000 citations have been made (so
far) to papers published in the proceedings. The conference is co-sponsored by various associations and groups as well as centers, large labs, and institutes affiliated with University of Iowa, George Mason University, Texas A&M University, Harvard University and MIT, University of Minnesota, US national labs, and many others. Corporate sponsors include, Intel Corporation, Super Micro Computer, Inc., and others.

IMPORTANT NOTE:
This announcement is ONLY for those who MISSED the opportunity to submit their papers in response to earlier "Call For Papers". Therefore, authors who have already submitted papers in response to earlier "Call For Papers"
should IGNORE this announcement. (Those who have been notified that their papers have been accepted, MUST still follow the instructions that were emailed to them; including meeting the deadlines mentioned in the notifications that were sent to them).

IMPORTANT DATES/DEADLINES:
Please note that the conference web site refers to different deadlines; those who receive this announcement should ignore the deadlines mentioned on the web (we are not updating the deadlines on the conference web site because we would like to control the number of submissions - we can only manage a limited number of additional submissions at this late date). What appears below are the current deadlines.

June 1, 2012:       Submission of papers for evaluation
                    Prospective authors are invited to submit their papers by
                    uploading them to the following general evaluation web site:
                    http://world-comp.org
June 14, 2012:      Notification of acceptance/not-acceptance
June 22, 2012:      Registration
July 16-19, 2012:   The 2012 International Conference on Security and Management
                    (SAM'12)

July 30, 2012:      Camera-Ready Papers Due for publication
                    (papers submitted and accepted in response to this announcement
                    will be published in the Final Edition of the proceedings which
                    will go to press soon after the conference.)

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
   Security algorithms, mobile network security, security in CDN
   (Contents Distribution Networks), Virtual Private Network (VPN),
   tracing techniques in internet, active networks, security in Grid,
   web monitoring, network security engineering, transport-level
   security, wireless network security, IP security, electronic mail
   security.
O  Cryptographic Technologies:
   Security protocols, key management techniques, cryptographic
   technologies, applications of block and stream ciphers, applications
   of public key cryptology, message authentication and hash functions,
   anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
   Surveillance technologies, security policies, security for protocol
   management, location management, QoS management, resource management,
   channel management, mobility management, digital contents copyright
   protection, system security management, network security management,
   management in network equipment, Storage Area Networks (SAN)
   management, information security management, government security
   policy, web penetration testing, security operations,
   vulnerabilities management.
O  Security Applications:
   Security in e-Commerce and M-Commerce, secure OS, watermarking,
   high-tech systems at airports, emerging technologies and
   applications, Cloud computing security, database security, data
   mining security, cyber security automation.
O  Biometrics and Forensics:
   Novel biometric methods, forensics, biological security technologies,
   face recognition systems, signature recognition systems, cyber
   forensics, forensic analysis, biometric technologies for security,
   feature extraction and matching algorithms.
O  Hardware Security:
   Embedded systems security, cryptographic processors and co-processors,
   security architectures, true and pseudorandom number generators,
   side channel attacks, fault attacks, hardware tamper resistance,
   smart card processors, secure storage devices.
O  Information Assurance:
   Mission assurance, risk assessment and risk management, continuity
   of operations and business impact analysis, cyber security compliance,
   security auditing, security-savvy software development, disaster
   recovery, business continuity analysis, access control, secure use
   of software, secure performance.
O  Computer Security:
   Firewall systems, hacking techniques and related issues, intrusion
   detection system (IDS), honeypot, virus issues (detection,
   prevention ...), trusted computing, alert correlation, attack graphs,
   incident responding, malware analysis, incident responding, malware
   analysis, intrusion detection.
O  Security Education:
   Computer security education, network security education, cyber
   security education, cyber security body of knowledge, information
   assurance education.

SUBMISSION OF FULL PAPERS AND INDEXING INFORMATION:

Prospective authors are invited to submit their papers by uploading them to the evaluation web site at:  http://world-comp.org Submissions must be uploaded by June 1, 2012 and must be in either MS doc or pdf formats (about 7 pages including all figures, tables, and references - single space, font size of 10 to 12). All reasonable typesetting formats are acceptable (later, the authors of accepted papers will be asked to follow a particular typesetting format to prepare their final papers for publication.) Papers must not have been previously published or currently submitted for publication elsewhere. The first page of the paper should include: title of the paper, name, affiliation, postal address, and email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5 topical keywords that would best represent the content of the paper. The name of the conference that the paper is being submitted for consideration must be stated on the first page of the paper (ie, SAM) as well as a 100 to 150-word abstract. The length of the final/Camera-Ready papers (if
accepted) will be limited to 7 (two-column IEEE style) pages.
Authors whose papers are ACCEPTED will be instructed to upload their papers to a particular web site for publication - the uploaded papers to the publication web site will only be checked for correct typesetting.

The proceedings will be published in printed conference books (ISBN) and will also be made available online. The proceedings will be indexed in science citation databases that track citation frequency/data for each published paper (science citation databases such as: Inspec / IET / The Institute for Engineering & Technology; The French National Center for Scientific Research, CNRS, INIST databases, PASCAL (covers the core scientific literature in Science; about 90% of inclusions are journals; only about 9% are proceedings; the set of proceedings that SAM is part of has been selected to be among the 9% - accessable from INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN International); and others.
Though, there is no guarantee that the proceedings will also be included in EI Compendex/Elsevier indexings, in the past, the proceedings that SAM was part of were included in these databases. Therefore, we will also be sending the proceedings for indexing procedures to EI Compendex/Elsevier.

In addition to the publication of the proceedings, selected authors will be invited to submit extended versions of their papers for publication in a number of research books contracted with various publishers. These books will be composed after the conference. Also, many chairs of tracks will be forming journal special issues to be published after the conference.

Note that authors who submit papers in response to this announcement, will have their papers evaluated for publication consideration in the Final Edition of the conference proceedings which will go to press soon after the conference (the conference would then make the necessary arrangements to ship the printed proceedings/books to such authors). The Final Edition of the conference proceedings will be identical to earlier edition except for a number of sections/chapters appended to the proceedings/book. 4043

Submission of Poster Papers:

Poster papers can be 2 pages long. Authors are to follow the same instructions that appear above. On the first page, the author should state that "This paper is being submitted as a poster for SAM". Poster papers (if accepted) will be published if and only if the author of the accepted poster wishes to have his/her poster published as a 2-page extended abstract.)

GENERAL INFORMATION:

SAM conference is being held jointly (same location and dates) with a number of other federated research conferences (World Congress in Computer Science, Computer Engineering, and Applied Computing). This federated congress is the largest annual gathering of researchers in computer science, computer engineering and applied computing. The congress will be composed of research presentations, keynote lectures, invited presentations, tutorials, panel discussions, and poster presentations. In recent past, keynote/tutorial/panel speakers have included: Prof. David A. Patterson (pioneer, architecture, U. of California, Berkeley), Dr. K. Eric Drexler (known as Father of Nanotechnology), Prof. John H. Holland (known as Father of Genetic Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.  of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window System, xhost; OLPC), Prof. John Koza (known as Father of Genetic Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director, U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern California), Dr. Jose L. Munoz (NSF Program Director and Consultant), Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.), Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head, NASA Mars Exploration Program/2000-2005 and Associate Director, Project Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director, NASA's JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus, McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive Director, CERIAS and Professor, Purdue University), Dr. Sandeep Chatterjee (Vice President & Chief Technology Officer, SourceTrace Systems, Inc.), and many other distinguished speakers. To get a feeling about the conferences'
atmosphere, see the 2011 delegates photos available at: http://worldcomp.phanfare.com/5408606

An important mission of the congress is "Providing a unique platform for a diverse community of constituents composed of scholars, researchers, developers, educators, and practitioners. The Congress makes concerted effort to reach out to participants affiliated with diverse entities (such as: universities, institutions, corporations, government agencies, and research centers/labs) from all over the world. The congress also attempts to connect participants from institutions that have teaching as their main mission with those who are affiliated with institutions that have research as their main mission. The congress uses a quota system to achieve its institution and geography diversity objectives."

One main goal of the congress is to assemble a spectrum of affiliated research conferences, workshops, and symposiums into a coordinated research meeting held in a common place at a common time. This model facilitates communication among researchers in different fields of computer science, computer engineering, and applied computing. The Congress also encourages multi-disciplinary and inter-disciplinary research initiatives; ie, facilitating increased opportunities for cross-fertilization across sub-disciplines.
The list of co-sponsors of 2012 meeting is Currently being prepared; for the 2011 list of sponsors, refer to:

MEASURABLE SCIENTIFIC IMPACT OF PROCEEDINGS:

The congress proceedings enjoy a high number of citations. In total, about
26,000 citations have been made (so far) to papers published in the proceedings of the federated congress. The link below contains the url's to the citation data for each track (each link is a live search and so it may take a few seconds for the data to pull up):


USEFUL WEB LINKS AND OTHER MISC INFORMATION:
1. SAM 2012 web site:
2. To see the caliber of the past offering of worldcomp, see the 2011 congress web site:
3. The 2011 delegates photos are available at:

CONTACT:

Any inquiries should be sent to: sc@world-comp.org