CNSM 2010 (Former MANWEEK)

6th IEEE/IFIP International Conference on Network and Service Management Niagara Falls, Canada
October 25 – 29, 2010

The 6th IEEE/IFIP International Conference on Network and Service Management (CNSM 2010) is a premier annual conference in the general area of network, systems, and services management. Built upon the success starting in 2005 to collocate six management workshops within the same week (MANWEEK), this year we debut the single main conference with a single track. The integrated conference provides a unique opportunity to showcase both premier research results and innovative cross-disciplinary explorations. As an open forum, we encourage authors to explore new ideas and to boost the synergy among distinctive but strongly correlated areas.

Topics of interest include:

Service and Business Management
Distributed systems operations and management
Application management (context-aware, enterprise, healthcare) Management of multimedia and data services
SOA and web services management
Data centers& hosting service management
IT service management and Business process management
Cloud computing and grid management
Virtualization& resource provisioning
Trust and privacy as a service
Decision support for business-driven management

Network Management
Ad-hoc networks
Wireless& mobile networks
IP/MPLS networks
Optical networks
Sensor networks
Overlay networks
P2P networks
Broadband access networks
Home networking
IP Operations and management
Smart Grids (Energy)
Future Internet and Next-Generation networks
Managing network and service changes

Management Methods and Technologies
Fault management
Configuration management
Performance management
Security management
Event management
Energy management
Policy-based management
Autonomic and self-management
Protocols, middleware, and mobile agents
Control theory, optimization theory, and machine learning Probability and stochastic processes

Paper registration and submission May 7, 2010
Author notification June 30, 2010
Camera ready papers due July 23, 2010
Conference date October 25-29, 2010

Paper submissions must present original, unpublished research or experiences. Late-breaking advances and work-in-progress reports are also encouraged. Papers under review elsewhere MUST NOT be submitted to CNSM 2010. Authors are requested to submit either long papers or short papers (work-in-progress reports) formatted according to the standard IEEE two-column Transactions guidelines

* Long papers (up to 8 two-column pages)
* Short papers (up to 4 two-column pages)

Please visit JEMS conference management system at for paper registration and submission (only PDF files are accepted).

General Chair
Raouf Boutaba, University of Waterloo, Canada

Program Chairs
Hanan Lutfiyya, University of Western Ontario, Canada
Yixin Diao, IBM T.J. Watson Research Center, USA

Program Vice Chairs
Service and Business Management
* Lisandro Granville, Federal University of Rio Grande do Sul, Brazil * John Strassner, POSTECH, Korea
Network Management
* Alexander Clemm, Cisco Systems, USA
* Rolf Stadler, KTH Royal Institute of Technology, Sweden Management Methods and Technologies
* Alexander Keller, IBM Global Technology Services, USA * Joan Serrat, University Politecnica de Catalunya, Spain

Publications Chair
Deep Medhi, University of Missouri, USA

Publicity Chair
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Workshops Chair
Noura Limam, POSTECH, Korea

Karthick Ramachandran, University of Western Ontario, Canada

Steering Committee
Raouf Boutaba, University of Waterloo, Canada
James Hong, POSTECH, Korea
Aiko Pras, University of Twente, Nethereland
Doug Zuckerman, Telcordia Technologies, USA



The Premier Telecommunications Event for Industry Professionals and Academics from Companies, Governmental Agencies, and Universities around the World

Themed “MIAMI: Moving Into the Age of Mobile Interactivity,” IEEE GLOBECOM 2010 covers the entire range of communications technologies, offering in-depth information on the latest developments in voice, data, image, and multimedia.


  • Technical Symposia focus on technological trends in recent communication research and development from academia to the industrial laboratories throughout the world.
    • Ad Hoc, Sensor and Mesh Networking
    • Communication Theory
    • Communications Quality of Service, Reliability, and Performance  Modeling
    • Communications Software, Services, and Mulitmedia Applications
    • Computer and Communications Network Security
    • Next Generation Networks, Protocols, and Services
    • Optical Networks and Systems
    • Signal Processing for Communications
    • Wireless Communications
    • Wireless Networking
    • Selected Areas in Communications
  • IEEE GLOBECOM 2010 features exciting Tutorials program, which is OPEN to ALL conference attendees FREE of Charge. Many Workshops are featured to address emerging technical and business issues in communications technologies.


  • Business Forum includes panel sessions on Design & Development, Enterprise Networking and Access.
  • CEO Forum features high-level executives addressing challenges, opportunities, and the future of the industry.
  • Exhibition showcases the latest technologies, applications, and services

IEEE GLOBECOM 2010 is the flagship conference of IEEE Communications Society, which is to be held in Miami during 6 – 10 December 2010. We invite you to submit your original technical papers and tutorial and workshop proposals to this event.

The following 11 symposia (with emails of contact points) are featured:

All general questions regarding to IEEE GLOBECOM 2010 symposia can be addressed to Dr. Qian Zhang ( directly. All questions regarding to panels can be addressed to Dr. Jin Li (

The organizers of IEEE GLOBECOM 2010 as well as our attendees expect accepted papers to be presented at the conference. IEEE reserves the right to exclude a paper from distribution after the conference (e.g., removal from IEEE Xplore) if the paper is not presented at the conference.

IEEE GLOBECOM 2010 opens all tutorial sessions to conference attendees FREE of charge. The Tutorial/lecture proposals should be submitted via EDAS, and all questions can be addressed to Khaled El-Maleh (, and the workshop proposals should be submitted to Xiaobo Zhou ( directly.


  • Workshop Proposal:    15  December 2009
  • Tutorial Proposal:        15  December 2009
  • Proposal Acceptance: 15  January  2010
  • Paper Submission:      15 March 2010
  • Paper Acceptance:       1   July  2010
  • Camera-ready Paper:    1   August 2010

3rd International Conference on Security of Information and Networks (SIN 2010)

3rd International Conference on Security of Information and Networks (SIN 2010) 7-11 September 2010
Taganrog, Rostov-on-Don, Russia

In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC)

Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.

In succession to the successful SIN 2007 and SIN 2009, the 3rd International Conference on Security of Information and Networks (SIN 2010) provides an international forum for presentation of research and applications of security in information and networks. SIN 2010 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice.

SIN 2010 will feature the following keynote papers and talks: – Elisa Bertino — Professor of Computer Science and Research Director of the Center for Education and Research in Information Assurance and Security at Purdue University, USA;
– Erdal Cayirci — Professor, NATO JWC & University of Stavanger, Norway; – Sorin Alexander Huss — Professor & Director CASED Research Center for IT Security, Darmstadt, Germany;
– Josef Pieprzyk, Macquarie U, Australia;
– Alexander Tereshkin, Invisible Things Lab., Rostov-on-Don, Russia.

Future SIN Conferences are scheduled to take place in Australia (2011) and Germany (2012).

Papers addressing all aspects of security in information and networks are being sought. Researchers working on the following and related subjects are especially encouraged: realization of security schemes, new algorithms, experimenting with existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose papers on ongoing research.

Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development.

Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.

Half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome.

Proposals of special session(s) to be held in the main conference are welcome.

Proposals are invited for workshops to be held in conjunction with SIN 2010 Conference. The workshop proposal theme should be closely related to the conference topics.

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:

* Access control and intrusion detection
* Autonomous and adaptive security
* Cryptographic techniques and key management
* Information assurance
* Network security and protocols
* Security in information systems
* Security tools and development platforms
* Security ontology, models, protocols & policies
* Secure ontology-based systems
* Standards, guidelines and certification
* Security-aware software engineering
* Trust and privacy

Following is a non-exhaustive list of subtopics of interest:

* Agent & MAS security
* Authentication & authorization
* Cryptographic hardware design
* Cryptography and cryptanalysis (symmetrical and asymmetrical) * Digital signature
* Executables security
* Information security development processes
* Intrusion & fraud detection
* Malicious codes
* Mobile code and agent security
* Privacy
* Scripts and languages
* Side-channel attacks
* Signals & security
* Securing storage: SAN/NAS security
* Security ontology, models, protocols & policies
* Semantics of security
* Software security and testing
* Spam counter measures
* Steganography
* Vulnerability analysis
* Web security
* Wireless security

Papers must be submitted electronically via the SIN 2010 Submission Site at Title, author’s name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 10 pages for full paper, 6 pages for short paper, 4 pages for fast abstract and position statement, and 4 pages for demo and tutorial proposals. Extra page charges apply. All papers should be written according to double-column ACM conference format

All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail

All accepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an archival journal (TBA). Each accepted paper must be registered to be included in the proceedings.

Please consult site for the most up-to-date info on the following:

Workshop / Special Session Proposals: open.
Paper Submission by: 20 April 2010
Tutorial Proposal by: 10 May 2010
Tutorial Notification: 20 May 2010
All Author Notification: 17 May 2010
All Papers Camera Ready by: 1 June 2010
Author Registration due date: 1 June 2010
Tutorial Dates: 7-8 September 2010
Conference Dates: 910 September 2010
Workshops Date: 11 September 2010

Organized by
-Dept. of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov, Russia
-Internet Technologies Research Center, Eastern Mediterranean University, North Cyprus
-The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG), Dept. of Computing, Macquarie University, Australia -CASED Research Center for IT Security, Technische Universität Darmstadt, Germany

Supported by
some pending)
Unitary State Enterprise “Sistemprom”, Moscow, Russia
National Research Nuclear University “MEPhI”, Moscow, Russia Russian Foundation for Basic Research
National Research Institute of Electronics and Cryptology (UEKAE), Turkey IEEE Turkey Section
IEEE Computer Society Turkey Branch
Chamber of Computer Engineers, TRNC, North Cyprus
Internet Technologies Association (INETD), Turkey
Linux Users Association (LKD), Turkey
TBD further

Sponsored by
(some pending)
Taganrog Institute of Technology of Southern Federal University, Taganrog, Russia
Technopark (GMTGB), TRNC, North Cyprus
Microsoft Turkey
EC-Council, USA
World Scientific Publishing (UK) Ltd., London, England
Falcovis Technology Services Ltd., TRNC
Nethouse Networks, TRNC
Dymera Strategies, USA
TBD further

Hosted by
-Dept. of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov-on-Don, Russia.

(to be updated)

Conference Chair: Oleg Makarevich (Southern Federal U, Russia) Conference Co-Chair: Atilla Elci (ITRC, EMU, North Cyprus)
Conference Co-Chair: Mehmet Orgun (Macquarie U, Australia)
Conference Co-Chair: Sorin Alexander Huss (Technische Universität Darmstadt, Germany)

Honorary Chair: Vladislav Zakharevich (Rector of Southern Federal U, Russia)

Steering Committee Members:
Alexander Sukhinov (Southern Federal U, Russia)
Bülent Örencik (TUBITAK Marmara Research Center, Turkey)
Bart Preneel (Katholieke U Leuven, Belgium)
Elisa Bertino (Purdue U, USA)
Dervis Deniz (Eastern Mediterranean U, North Cyprus)
others tba

Program Chair: Ludmila Babenko (Southern Federal U, Russia)
Program Co-Chair: Vijay Varadharajan (Macquarie U, Australia) Program Co-Chair: Alexander Chefranov (EMU, North Cyprus)

Tutorials Chair: Olga Peskova (Southern Federal U, Russia)
Tutorials Co-Chair: Behnam Rahnama (EMU, North Cyprus)
Tutorials Co-chair: Christophe Doche (Macquarie U, Australia)

Workshops Chair: Evgeny Tumoian (Southern Federal U, Russia) Workshops Co-chair: Rajan Shankaran (Macquarie U, Australia)

Publication Chair: Atilla Elci (Internet Technologies Research Center, EMU, North Cyprus)
Publication Co-Chair: Alexey Nekrasov (Southern Federal U, Russia)

Treasurer: Vladimir Strukov (Southern Federal U, Russia)
Finance co-chair: Michael Hitchens (Macquarie U, Australia)

Registration Chair: Ekaterina Pakulova (Southern Federal U, Russia)

Local Arrangements Chair: Maxim Anikeev (Southern Federal U, Russia)

e-Presence Chair: Igor Sidorov (Southern Federal U, Russia)

Promotion Chair: Georgy Evstafiev (Southern Federal U, Russia) Promotion Co-Chair: Yi Mu (University of Wollongong, Australia) Promotion Co-Chair: Zeki Bayram (EMU, North Cyprus)

Liaison for Americas: Carlos Becker Westphall (Federal University of Santa Catarina, Brazil)

Volunteers Team: Students of IT-Security Department (Southern Federal U, Russia)

Full list of the IPC is available at

For updated information, please refer to or the Conference e-mail

BDIM 2010 International Workshop on Business-driven IT Management

5th IEEE/IFIP International Workshop on Business-driven IT Management (BDIM 2010) In conjunction with NOMS 2010
12th IEEE/IFIP Network Operations and Management Symposium
Osaka International Convention Center, Osaka, Japan, April 19th, 2010

The fifth edition of the BDIM workshop builds on the success of the first four editions, that were held in conjunction with NOMS 2006, IM 2007, NOMS 2008, and IM 2009. BDIM 2010 aims to continue building the community of researchers in business-driven IT management by inviting complete, original, unpublished contributions in the following, or related topic areas:

Topic Areas

Models for measuring/estimating business-IT alignment

-Models for IT faults and performance degradations
-Data mining techniques for impact model construction
-Modeling of business operations and their relationships to IT -Modeling of business strategies and their relationships to IT
-Modeling IT risk and IT-related business risk- Software tools for Business-driven IT management

-Semantic web models for business-IT alignment

Decision support for IT Management from a business perspective

-Business-driven IT optimization problems
-Business-driven IT planning and decision-making
-IT actions to enhance/optimize business performance

Automation for IT Management from a business perspective

-Adaptive/autonomic computing from a business perspective
-Automated IT management solutions from a business perspective

Business Objectives, Processes and SLM

-Business process modeling for IT management
-Business-driven Service Level Management
-Business-driven dynamic provisioning
-Business-driven inventory management
-Business continuity management and its impact on IT
-Accounting, Billing, Chargeback and linkages to business objectives -IT Governance, ITSM, COBIT
-Business objectives and their impact on new IT paradigms like utility/grid computing

Case studies in Business-driven IT management (in e-commerce, messaging, ?)

-E-commerce, e-business and relation to IT infrastrcutures
-Services infrastructures and QOS concerns (MTBF, MTTR, Response times, latency etc) that have customer impact


We are seeking submissions for full papers (8 pages on 2-columns IEEE style) and short papers presenting position statements or preliminary results on relevant work (4 pages on 2-columns IEEE style). All selected works will be included in the IEEE Xplore Digital Library.

Submissions are to be uploaded at

Important dates

-Submission deadline: January 11, 2010
-Notification of acceptance: February 8, 2010
-Final camera-ready papers due: February 19, 2010
-BDIM2010 Workshop: April 19, 2010

Organizing Committee

Workshop co-chairs

-Claudio Bartolini (HP Labs, USA)
-Kamal Bhattacharya (IBM Research – India)
-Jacques Sauvé (UFCG, Brazil)

Publicity chair

-Carlos Becker Westphall (USFC, Brazil)

Program committee

Alexander Keller, IBM Global Technology Services, USA
Issam Aib, University of Waterloo, Canada
Arosha Bandara, The Open University, UK
Michael Brenner, MNM Team, Technische Universität München, Germany Mark Burgess, Oslo University College, Norway
Sandro Etalle, University of Twente, The Netherlands
Sven Graupner, HP Labs, USA
Lundy Lewis, Southern New Hampshire University, USA
Heiko Ludwig, IBM T.J. Watson Research Center, USA
Hanan Lutfiyya, University of Western Ontario, Canada
Christian Mayerl, Materna GMBH, Germany
Antão Moura, Universidade Federal de Campina Grande, Brazil
José Augusto Oliveira Neto, Vivo, Brazil
Luciano Paschoal Gaspary, UFRGS, Brazil
Maher Rahmouni, HP Labs, USA
Rodrigo Rebouças de Almeida, UFCG, Brazil
Thomas Schaaf, MNM Team, Technische Universität München, Germany Thomas Setzer, Technische Universität München, Germany
Sharad Singhal, HP Labs, USA
John Strassner, Pohang University of Science and Technology (POSTECH), Korea Rep. Vladimir Tosic, NICTA, Australia
David Trastour SAP Research, France
Christopher Ward, IBM T.J. Watson Research Center, USA
Lisandro Zambenedetti Granville, UFRGS, Brazil