SePTIS'08 Second Edition
___

SITIS'08 Workshop on

Security and Privacy in Telecommunications & Information Systems
___________

in conjunction with The 4th International IEEE Conference on
SIGNAL-IMAGE TECHNOLOGY & INTERNET- BASED SYSTEMS (SITIS'08)
Sponsored by the IEEE and in Cooperation with ACM SIGAPP
November 30th - December 3rd, 2008
Bali Dynasty Resort
Bali, Indonesia



The security of digital exchanges and its counterpart, the management
of digital identities, is the main issue concerning the concept of
global security applied to the world of information systems. Moreover,
the advent of web technologies modify every day our vision of
information systems security.

The SePTIS workshop main topics encompass research advances around
digital identities and secure exchanges between information systems,
and focuses on web technologies.


*** The main topics of SePTIS include, but are not limited to, the
following

- Security with Web Technologies & Web Services Security
- Security Models, Architectures and Protocols
- Formal Methods for Web Applications
- E-Commerce and E-Government Security

- Identity Management and New Ideas & Paradigms for the Security of
Digital Identities
- Authentication
- Authorization and Access Control
- Security, Anonymity & User Privacy
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g.,
RFIDs

- Information System Paradigms
- Trust Negotiation, Establishment and Management
- Intrusion Avoidance, Detection, Response and Prevention
- Security Management and Strategy
- Digital Rights Management and Intellectual Property Protection

*** Submission and publication

SePTIS seeks high-quality research contributions in the form of
original and well-developed full papers on the topics described below.
All submitted papers will be peer-reviewed by at least two reviewers
for technical merit, originality, significance and relevance to track
topics. Papers must be up to 8 pages and follow IEEE double columns
publication format according to the genreal guidelines of the SITIS
conference.

Accepted papers will be included in the conference proceedings and
published by the IEEE Computer Society and referenced in IEEE Xplore
and major indexes. The proceedings will be mailed by the IEEE CS press
directly to registered authors after the conference. CD copies of the
proceeding will be available during the conference. Selected accepted
papers will be considered for publication in major journal.

Paper proposals should be submitted to jacques.fayolle@univ-st-
etienne.fr and mikael.ates@univ-st-etienne.fr.
Acceptable file formats are: Postscript and PDF. Hard copy submissions
are not permitted.

More information on http://septis.istase.com.

*** Important Dates

Paper Submission: August 22nd, 2008
Notification of Acceptance: September 12th, 2008
Camera Ready: October 3rd, 2008
Author Registration Due Date: October 10th, 2008
Conference Dates: November 30th - December 3rd, 2008

*** Program Committee

Christophe Gravier, ISTASE - University of Saint-Etienne, France
Djamal Benslimane, Claude Bernard Lyon 1 University, France
Gongliang Chen, Shanghai Jiaotong University, China
Jacques Fayolle, ISTASE - University of Saint-Etienne, France
Jeremy Lardon, ISTASE - University of Saint-Etienne, France
Lee Byung-Gil, ETRI - Information Security Research Division, Korea
Li Xiang, Shanghai Jiaotong University, China
Lionel Brunie, INSA - University of Lyon 1, France
Philippe Jaillon, ENSM - Ecole Nationale Superieure des Mines de
Saint-Etienne, France
Richard Chbeir, University of Bourgogne, France
Yinghua Ma, Shanghai Jiaotong University, China

*** SePTIS Worhshop Organizer

Jacques Fayolle, ISTASE - University of Saint-Etienne, France
(jacques.fayolle@univ-st-etienne.fr)
Mikael Ates, ISTASE - University of Saint-Etienne, France
(mikael.ates@univ-st-etienne.fr)