If you can't see this email correctly please visit www.wcc2010.org
WCC 2010 logo

Call for papers

1st IFIP International Conference on Critical Information Infrastructure Protection

IT Trust logo

Conference Topics

PDF icon  Printable version

At the 50th anniversary of the formation of the International Federation for Information Processing the simple fact that national economies and international commerce alike have become totally dependent upon the reliable and secure operation of national and global information infrastructures has been accepted. From the early days of 1960, with a perceived competitive advantage through computer usage, to today’s acknowledgement of total dependence upon computer systems and integrated data networks on a global scale, the realization that the emerging digital economy in nation states as well as national security and societal well-being depend upon necessary critical information infrastructures has been accepted by governments and all enterprises worldwide. In particular the theme of CIP acknowledges that all basic or national critical infrastructures themselves, from electrical power systems to telecommunications structures to water/sewerage systems and so on, whether owned and operated by the public or private sector, depend fundamentally upon a national and critical information infrastructure. On a global scale the evidence is clear that nations as well as international enterprises of all natures in a global economy have moved to address this reality through relevant draft legislation, regulations, industry codes and the like. At the same time there is recognition at the United Nations level that the rapid and almost unchecked rise of cybercrime is a reality. At the same time there is also recognition that imperatives for national defence have moved into cyberspace as well. Even topics related to the position of information assurance at national levels; the political, ethical and legal position related to the use of “information operations” and appropriate responses to detected “cyber-attack”; the problems of “hardening” national information infrastructures through public sector leadership and like themes are now topics discussed in the open media globally. The topic of CIIP, NIIP, NCI, or whatever term is used to describe this change, of necessity brings together the skills of computers scientists and mathematicians, engineers, information technologists and others to combine with the vital efforts of legal professionals, public and defence policy researchers, social scientists and psychologists, political scientists and related disciplines to address a common goal to provide effective and acceptable solutions to the growing threats.

CIIP 2010 is an opportunity to address current thinking and research in these vital global concerns from an international perspective. The conference presents a unique opportunity, at a time when nationally, regionally and internationally associated policies and legal regimes are under development, to both ponder those activities as well as to provide research leadership at both technical and policy levels.

Topics include but are not limited to the following areas of interest:

Policy and legal frameworks for CIP/CIIP
National, regional and international responses
Private sector response
Role of trusted and evaluated systems
Economics/funding of CIP
CIP in a Web 2/”Cloud” computing scheme
Organisational structures to address CIP
Roles/obligations of the ICT industry
Protection of SCADA systems
Identification of critical subsystems
Computer/network architecture for CIP
“Hardening” national information systems
National defence and CIP
Education and training needs
ICT structures for CIP needs
Needs for CIP related applications

Programme Committee Chairs

Professor Emeritus William J (Bill) Caelli, AO
Senior Research Scientist
Information Security Institute Queensland University of Technology

Programme Committee Members


Programme image
Important Dates
Submission of papers: January 31, 2010
Notification to authors: April 23, 2010
Camera-ready copies: May 15, 2010

Instructions for paper submission

  • Papers must not substantially overlap with papers that have been published or are simultaneously submitted to a journal or another conference with proceedings.
  • Papers must be written in English; they should be at most 12 pages in total, including bibliography and well-marked appendices. Papers should be intelligible without appendices, if any.
  • Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer.
  • Submitted and accepted papers must follow the publisher’s guidelines for the IFIP AICT Series (www.springer.com/series/6102, Author templates, Manuscript preparation in Word).
  • At least one author of each accepted paper must register for the conference and present the paper. Inclusion of the paper will be dependent upon one registration for the paper.
  • All papers must be submitted in electronic form through the web via www.wcc2010.org by January 31, 2010.

The Congress

The World Computer Congress (WCC2010) will bring together IT research and industry sectors in one event. The congress will combine 17 IFIP conferences with partner conferences from other international and regional, specialist IT organisations.

The conference content will be presented in eight program streams. Delegates may attend any of the participating conference, industry or partner events as well as networking, social, technical tours and certification courses offered at the congress.

Trust IT
  • Wireless Communications and Information Technology in Developing Countries (WCITD 2010)
  • Biologically-Inspired Collaborative Computing (BICC 2010)
  • Distributed and Parallel Embedded Systems (DIPES 2010)
  • Artificial Intelligence in Theory and Practice (IFIP AI 2010)
  • Network of the Future (NF)
  • Enterprise Architecture, Integration, Interoperability and Networking (EAI2N)
  • Human Choice and Computers International Conference (HCC9 2010)
    Track 2: Virtual Technologies and Social Shaping
Trust IT
  • International Information Security Conference 2010 (SEC 2010)
  • Critical Information Infrastructure Protection (CIP)
  • Human Choice and Computers International Conference (HCC9 2010)
    Track 3: Surveillance and Privacy
Value IT
  • Theoretical Computer Science (TCS 2010)
  • Human Computer Interaction (HCI 2010)
Learn IT
  • Key Competencies in the Knowledge Society (KCKS 2010)
  • History of Computing (HC)
Govern IT
  • Global Information Systems Processes (GISP)
  • E-Government and E-Services (EGES)
  • Human Choice and Computers conference (HCC9 2010)
    Track 1: Ethics and ICT Governance
Vitalise IT
  • E-Health (EHEALTH)
Sustain IT
  • Human Choice and Computers International Conference (HCC9 2010)
    Track 4: ICT and Sustainable Development
Play IT
  • Entertainment Computing Symposium (ECS 2010)