Abstract

It is our great pleasure to welcome you at the 3rd International Conference on Security of Information and Networks -- SIN 2010, organized in technical cooperation with the ACM Special Interest Group on Security, Audit and Control (SIGSAC). The conference, similar to SIN 2009 and SIN 2007, covers practically all aspects of security of information and networks. The SIN 2009 Conference had such sections as "Security Assessment, Policies, Educational Programs", "Security and Integrity Management and Models", "Cryptography, Security and Networks", "Access Control and Security Assurance", and "Attacks, Intrusion Detection". Based on accepted submissions, the following sections are presented at SIN 2010: Security Assessment, Policies, Privacy, and Educational Programs (12 papers);Management and Models of Security and Integrity (9 papers);Cryptography, Security, and Networks (10 papers);Attacks and Intrusion Detection (7 papers). We received 73 submissions of which only a small portion was accepted based on at least two independent reviews. At times three, even four, reviews were secured before a decision could be made. Among all the submissions, 31 were accepted as full papers (42%), 6 as short (8%), and 1 as a position statement (1%). The authors of the submitted papers hail from China, France, Germany, India, Iran, Italy, Japan, North Cyprus, Philippines, Portugal, Russia, Turkey, Ukraine, and USA. The papers of "Security Assessment, Policies, Privacy, and Educational Programs" section consider such topics as security standards and regulations, privacy, anonymity, educational issues, and digital forensics. "Management and Models of Security and Integrity" section papers consider various security management policies, models and architectures. "Cryptography, Security, and Networks" section features papers on cryptographic algorithms and protocols, as well as networks security. And finally, "Attacks and Intrusion Detection" section combines the papers discussing the detection and prevention of intrusions. SIN 2010 Conference gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of security of information and networks. We hope that these proceedings will serve as a valuable reference for security researchers and developers.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call