Conference Information
FPS 2015 : International Symposium on Foundations & Practice of Security
Submission Date:
2015-06-28 Extended
Notification Date:
Conference Date:
Clermont-Ferrand, France
Viewed: 2262   Tracked: 0   Attend: 0

Conference Location
Call For Papers
Protecting the communication and data infrastructure of an increasingly inter-connected world has become vital to the normal functioning of all aspects of our world. Security has emerged as an important scientific discipline whose many multifaceted complexities deserve the attention and synergy of the mathematical, computer science and engineering communities.

After the previous meetings held in La Rochelle, Montréal, Grenoble, Toronto and Paris, this 8th edition of the FPS symposium will be held in Clermont-Ferrand, France.

The aim of FPS is to discuss and exchange theoretical and practical ideas that address security issues in inter-connected systems. It aims to provide scientific presentations as well as to establish links, promote scientific collaboration, joint research programs, and student exchanges between institutions involved in this important and fast moving research field.

We also invite papers from researchers and practitioners working in security, privacy, trustworthy data systems and related areas to submit their original papers. The main topics, but not limited to, include:

    Computer and Network Security
    Formal foundations in Information or Operational Security
    Security of Service Oriented Architectures
    Information Theoretic Security
    Security of Cloud Computing
    Security Management and Security Policies
    Policy-based Security Architectures
    Security of P2P systems
    Security & Privacy on Social Networks
    Access Control Languages
    Data Mining & Watermarking
    Cryptography & Cryptanalysis
    Threat Analysis and Trust Management
    Privacy & Sensitive Data Management
    Policy-based Distributed Information Systems
    Security in Sensor Networks and RFIDs
    Security of Cloud Computing, Grid Computing
    Security of Distributed Embedded Middleware
    Distributed Security Protocols & Policies
    Security and Privacy in Digital Currencies
    Malware, Botnet and Advanced Persistent Threats
    Code Reverse Engineering and Vulnerability Exploitation
    Side Channel & Physical Attacks
    Social Engineering

Submission Guidelines

Full Technical Papers should be at most 16 pages, including the bibliography and well-marked appendices. Short papers should be up to 8 pages, including the bibliography and well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. All papers will be refereed. Accepted papers should be presented at the symposium. At least one author of each accepted paper must register to the symposium, by the early date indicated by the organizers, and present the paper.

As in previous editions, proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. The submitted paper (in PDF format) should follow the template indicated by Springer (see It must start with a title, a short abstract, and a list of keywords.

Authors must submit their papers before the deadline, using the EasyChair web site and following the requirements stated there.

Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged.
Last updated by Dou Sun in 2015-06-19
Related Publications
Related Conferences