CFP 1st International Conference on Information Systems Security

看板Bugtraq作者時間11年前 (2014/06/27 18:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Dear Sir/Madam, I would like to know if it is possible to post in your website the following event: Conference name: 1st International Conference on Information Systems Security and Privacy - ICISSP 2015 Venue: ESEO, Angers, Loire Valley, France Event date: 9 阠11 February, 2015 Regular Papers Paper Submission: September 9, 2014 Authors Notification: November 25, 2014 Camera Ready and Registration: December 10, 2014 Position Papers Paper Submission: October 28, 2014 Authors Notification: November 28, 2014 Camera Ready and Registration: December 10, 2014 Workshops Workshop Proposal: September 9, 2014 Doctoral Consortium Paper Submission: November 27, 2014 Authors Notification: December 11, 2014 Camera Ready and Registration: December 23, 2014 Special Sessions Special Session Proposal: September 19, 2014 Tutorials, Demos and Panel Proposals November 27, 2014 Scope: The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and individuals, thus creating new research opportunities. Conference Areas: Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas: 1. DATA AND SOFTWARE SECURITY 2. TRUST 3. PRIVACY AND CONFIDENTIALITY 4. MOBILE SYSTEMS SECURITY 5. BIOMETRIC AUTHENTICATION AREA 1: DATA AND SOFTWARE SECURITY 锉Security Frameworks, Architectures and Protocols 锉Cryptographic Algorithms 锉Artificial Intelligence and Security 锉Information Hiding and Anonymity 锉Vulnerability Analysis and Countermeasures 锉Data Integrity 锉Database Security 锉Content Protection and Digital Rights Management 锉Data Mining 锉Software Security Assurance 锉Security Architecture and Design Analysis 锉Security Testing 锉Middleware Security 锉Data Fraud and Data Fabrication AREA 2: TRUST 锉Computational Models of Trust 锉Risk and Reputation Management 锉Phishing 锉Security and Trust in Pervasive Information Systems 锉E-Commerce and Contract Management Tools 锉Trusted Platforms 锉P2P Transactions and Scenarios 锉Common Practice, Legal and Regulatory Issues 锉Trust in Social Networks 锉Identity and Trust Management 锉Intrusion Detection 锉Smartcard Technology 锉Trustworthy Embedded Devices 锉Electronic Payment Fraud AREA 3: PRIVACY AND CONFIDENTIALITY 锉Privacy-Enhancing Models and Technologies 锉Network Deployment and Management 锉Web Applications and Services 锉Privacy In Cloud and Pervasive Computing 锉Authentication, Privacy and Security Models 锉Privacy Compliance in Organizations 锉Social Media Privacy 锉User Profiling in E-Commerce Systems 锉E-Voting and Privacy 锉Privacy Metrics and Control 锉Malware Detection 锉Electronic Abuse Protection 锉Ethics AREA 4: MOBILE SYSTEMS SECURITY 锉Location-based Services 锉GPS-based security 锉Mobile Sensing and Sensor Networks 锉Bluetooth and RFID Security 锉Privacy in Wireless Communications 锉Mobile Applications Control 锉Privacy-Preserving Protocols 锉Vehicular Systems and Networks 锉Secure Routing 锉Software Vulnerabilities 锉Access Control 锉Threat Awareness AREA 5: BIOMETRIC AUTHENTICATION 锉Identification and Access Control 锉Feature Detection, Selection and Extraction 锉Biosignals in Biometrics 锉Physiological Signal Processing 锉Fingerprint, Face or Iris Recognition 锉Hand Geometry 锉Gait Analysis 锉Speaker Recognition and Voice Analysis 锉Behavioral Patterns 锉Keystroke Dynamics 锉Surveillance 锉Privacy Concerns with Biometrics 锉Multimodal Biometrics Systems 锉Knowledge Discovery in Biometric Databases Keynote Lecture Rafael Accorsi, University of Freiburg, Germany ICISSP Conference Chair Olivier Camp, ESEO, MODESTE, France Program Co-Chairs Edgar Weippl, Secure Business Austria - Vienn University of Technology, Austria Christophe Bidan, SUPELEC, France Esma A鮛eur, UniversitDe Montr嶧l, Canada PROGRAM COMMITTEE http://www.icissp.org/ProgramCommittee.aspx ICISSP Secretariat Address: Av. D. Manuel I, 27A, 2먠esq. 2910-595 Setal - Portugal Tel.: +351 265 100 033 Fax: +44 203 014 8813 e-mail: icissp.secretariat@insticc.org Web: http://www.icissp.org Thanking you in advance for your collaboration, On behalf of ICISSP Secretariat Margarida Sorribas
文章代碼(AID): #1JhK3UKs (Bugtraq)