SIN 2010

From Openresearch
Jump to: navigation, search
SIN 2010
3rd International Conference on Security of Information and Networks
Dates 2010/09/07 (iCal) - 2010/09/11
Location: Taganrog, Rostov-on-Don, Russia
Loading map...

Important dates
Tutorials: 2010/06/01
Papers: 2010/05/11
Submissions: 2010/05/11
Notification: 2010/06/04
Camera ready due: 2010/06/22
Attendance fee: € 200 / 100 (reduced)
Table of Contents

The following coordinate was not recognized: Geocoding failed.
The following coordinate was not recognized: Geocoding failed.

3rd International Conference on Security of Information and Networks (SIN 2010) 7-11 September 2010 Taganrog, Rostov-on-Don, Russia

In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC)

Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.

In succession to the successful SIN 2007 and SIN 2009, the 3rd International Conference on Security of Information and Networks (SIN 2010) provides an international forum for presentation of research and applications of security in information and networks. SIN 2010 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice.

SIN 2010 will feature the following keynote papers and talks:

Elisa Bertino -- Professor of Computer Science and Research Director of the Center for Education and Research in Information Assurance and Security at Purdue University, USA;
Erdal Cayirci -- Professor, NATO JWC & University of Stavanger, Norway;
Sorin Alexander Huss -- Professor & Vice-President of CASED Research Center for IT Security, Darmstadt, Germany;
Josef Pieprzyk -- Professor, Macquarie U, Australia;
Lyudmila Babenko -- Professor & Director of SFedU Educational and Research Center for Contemporary Security Technologies, Taganrog, Russia;
Alexander Tereshkin -- Principal Researcher, Invisible Things Lab., Rostov-on-Don, Russia.

Future SIN Conferences are scheduled to take place in Australia (2011) and Germany (2012).


Papers addressing all aspects of security in information and networks are being sought. Researchers working on the following and related subjects are especially encouraged: realization of security schemes, new algorithms, experimenting with existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose papers on ongoing research.

Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development.

Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.

Half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome.

Proposals of special session(s) to be held in the main conference are welcome.

Proposals are invited for workshops to be held in conjunction with SIN 2010 Conference. The workshop proposal theme should be closely related to the conference topics.


Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:

  • Access control and intrusion detection
  • Autonomous and adaptive security
  • Cryptographic techniques and key management
  • Information assurance
  • Network security and protocols
  • Security in information systems
  • Security tools and development platforms
  • Security ontology, models, protocols & policies
  • Secure ontology-based systems
  • Standards, guidelines and certification
  • Security-aware software engineering
  • Trust and privacy

Following is a non-exhaustive list of subtopics of interest:

  • Agent & MAS security
  • Authentication & authorization
  • Cryptographic hardware design
  • Cryptography and cryptanalysis (symmetrical and asymmetrical)
  • Digital signature
  • Executables security
  • Information security development processes
  • Intrusion & fraud detection
  • Malicious codes
  • Mobile code and agent security
  • Privacy
  • Scripts and languages
  • Side-channel attacks
  • Signals & security
  • Securing storage: SAN/NAS security
  • Security ontology, models, protocols & policies
  • Semantics of security
  • Software security and testing
  • Spam counter measures
  • Steganography
  • Vulnerability analysis
  • Web security
  • Wireless security


Papers must be submitted electronically via the SIN 2010 Submission Site at Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 10 pages for full paper, 6 pages for short paper, 4 pages for fast abstract and position statement, and 4 pages for demo and tutorial proposals. Extra page charges apply. All papers should be written according to double-column ACM conference format (

All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail

All accepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an archival journal (TBA). Each accepted paper must be registered to be included in the proceedings.


Please consult site for the most up-to-date info on the following:

Workshop / Special Session Proposals: closed. Paper Submission by: 11 May 2010 Tutorial Proposal by: 1 June 2010 Tutorial Notification: 10 June 2010 All Author Notification: 4 June 2010 All Papers Camera Ready by: 22 June 2010 Author Registration due date: 22 June 2010 Tutorial Dates: 7-8 September 2010 Conference Dates: 9–10 September 2010 Workshops Date: 11 September 2010


Organized by

  • Dept. of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov, Russia
  • Internet Technologies Research Center, Eastern Mediterranean University, North Cyprus
  • The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Dept. of Computing, Macquarie University, Australia
  • CASED Research Center for IT Security, Technische Universität Darmstadt, Germany

Supported by (some pending) Russian Foundation for Basic Research Taganrog Institute of Technology - Southern Federal University, Russia National Research Institute of Electronics and Cryptology (UEKAE), Turkey European University of Lefke, North Cyprus TBD further

Sponsored by (some pending) Microsoft Russia Sun Russia Oracle Russia EC-Council, USA Dymera Strategies, USA TBD further

Hosted by -Dept. of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov-on-Don, Russia.


Honorary Chair: Vladislav Zakharevich (Rector of Southern Federal U, Russia)

Conference Chair: Oleg Makarevich (Southern Federal U, Russia) Conference Co-Chair: Atilla Elci (Middle East Technical U, Northern Cyprus Campus, North Cyprus) Conference Co-Chair: Mehmet Orgun (Macquarie U, Australia) Conference Co-Chair: Sorin Alexander Huss (Technische Universität Darmstadt, Germany)

Steering Committee Members: Alexander Sukhinov (Southern Federal U, Russia) Bülent Örencik (TUBITAK Marmara Research Center, Turkey) Bart Preneel (Katholieke U Leuven, Belgium) Elisa Bertino (Purdue U, USA) Dervis Deniz (Eastern Mediterranean U, North Cyprus) others tba

Program Chair: Ludmila Babenko (Southern Federal U, Russia) Program Co-Chair: Vijay Varadharajan (Macquarie U, Australia) Program Co-Chair: Alexander Chefranov (EMU, North Cyprus)

Tutorials Chair: Olga Peskova (Southern Federal U, Russia) Tutorials Co-Chair: Behnam Rahnama (European University of Lefke, North Cyprus) Tutorials Co-chair: Christophe Doche (Macquarie U, Australia)

Workshops Chair: Evgeny Tumoian (Southern Federal U, Russia) Workshops Co-chair: Rajan Shankaran (Macquarie U, Australia)

Publication Chair: Atilla Elci (Middle East Technical U, Northern Cyprus Campus, North Cyprus) Publication Co-Chair: Ekaterina Maro (Southern Federal U, Russia)

Treasurer: Vladimir Strukov (Southern Federal U, Russia) Finance co-chair: Michael Hitchens (Macquarie U, Australia)

Registration Chair: Ekaterina Pakulova (Southern Federal U, Russia) Registration Co-Chair: Duygu Çelik (EMU, North Cyprus)

Local Arrangements Chair: Maxim Anikeev (Southern Federal U, Russia)

e-Presence Chair: Igor Sidorov (Southern Federal U, Russia)

Promotion Chair: Georgy Evstafiev (Southern Federal U, Russia) Promotion Co-Chair: Yi Mu (University of Wollongong, Australia) Promotion Co-Chair: Zeki Bayram (EMU, North Cyprus)

Liaison for Americas: Carlos Becker Westphall (Federal University of Santa Catarina, Brazil)

Volunteers Team: Students of IT-Security Department (Southern Federal U, Russia)


Full list of the IPC is available at


For updated information, please refer to or the Conference e-mail sin2010 (at)