CFP 1st International Conference on Information Systems Security
Dear Sir/Madam,
I would like to know if it is possible to post in your website the following event:
Conference name:
1st International Conference on Information Systems Security and Privacy - ICISSP 2015
Venue:
ESEO, Angers, Loire Valley, France
Event date:
9 阠11 February, 2015
Regular Papers
Paper Submission: September 9, 2014
Authors Notification: November 25, 2014
Camera Ready and Registration: December 10, 2014
Position Papers
Paper Submission: October 28, 2014
Authors Notification: November 28, 2014
Camera Ready and Registration: December 10, 2014
Workshops
Workshop Proposal: September 9, 2014
Doctoral Consortium
Paper Submission: November 27, 2014
Authors Notification: December 11, 2014
Camera Ready and Registration: December 23, 2014
Special Sessions
Special Session Proposal: September 19, 2014
Tutorials, Demos and Panel Proposals
November 27, 2014
Scope:
The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and
individuals, thus creating new research opportunities.
Conference Areas:
Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:
1. DATA AND SOFTWARE SECURITY
2. TRUST
3. PRIVACY AND CONFIDENTIALITY
4. MOBILE SYSTEMS SECURITY
5. BIOMETRIC AUTHENTICATION
AREA 1: DATA AND SOFTWARE SECURITY
锉Security Frameworks, Architectures and Protocols
锉Cryptographic Algorithms
锉Artificial Intelligence and Security
锉Information Hiding and Anonymity
锉Vulnerability Analysis and Countermeasures
锉Data Integrity
锉Database Security
锉Content Protection and Digital Rights Management
锉Data Mining
锉Software Security Assurance
锉Security Architecture and Design Analysis
锉Security Testing
锉Middleware Security
锉Data Fraud and Data Fabrication
AREA 2: TRUST
锉Computational Models of Trust
锉Risk and Reputation Management
锉Phishing
锉Security and Trust in Pervasive Information Systems
锉E-Commerce and Contract Management Tools
锉Trusted Platforms
锉P2P Transactions and Scenarios
锉Common Practice, Legal and Regulatory Issues
锉Trust in Social Networks
锉Identity and Trust Management
锉Intrusion Detection
锉Smartcard Technology
锉Trustworthy Embedded Devices
锉Electronic Payment Fraud
AREA 3: PRIVACY AND CONFIDENTIALITY
锉Privacy-Enhancing Models and Technologies
锉Network Deployment and Management
锉Web Applications and Services
锉Privacy In Cloud and Pervasive Computing
锉Authentication, Privacy and Security Models
锉Privacy Compliance in Organizations
锉Social Media Privacy
锉User Profiling in E-Commerce Systems
锉E-Voting and Privacy
锉Privacy Metrics and Control
锉Malware Detection
锉Electronic Abuse Protection
锉Ethics
AREA 4: MOBILE SYSTEMS SECURITY
锉Location-based Services
锉GPS-based security
锉Mobile Sensing and Sensor Networks
锉Bluetooth and RFID Security
锉Privacy in Wireless Communications
锉Mobile Applications Control
锉Privacy-Preserving Protocols
锉Vehicular Systems and Networks
锉Secure Routing
锉Software Vulnerabilities
锉Access Control
锉Threat Awareness
AREA 5: BIOMETRIC AUTHENTICATION
锉Identification and Access Control
锉Feature Detection, Selection and Extraction
锉Biosignals in Biometrics
锉Physiological Signal Processing
锉Fingerprint, Face or Iris Recognition
锉Hand Geometry
锉Gait Analysis
锉Speaker Recognition and Voice Analysis
锉Behavioral Patterns
锉Keystroke Dynamics
锉Surveillance
锉Privacy Concerns with Biometrics
锉Multimodal Biometrics Systems
锉Knowledge Discovery in Biometric Databases
Keynote Lecture
Rafael Accorsi, University of Freiburg, Germany
ICISSP Conference Chair
Olivier Camp, ESEO, MODESTE, France
Program Co-Chairs
Edgar Weippl, Secure Business Austria - Vienn University of Technology, Austria
Christophe Bidan, SUPELEC, France
Esma A鮛eur, UniversitDe Montr嶧l, Canada
PROGRAM COMMITTEE
http://www.icissp.org/ProgramCommittee.aspx
ICISSP Secretariat
Address: Av. D. Manuel I, 27A, 2먠esq.
2910-595 Setal - Portugal
Tel.: +351 265 100 033
Fax: +44 203 014 8813
e-mail: icissp.secretariat@insticc.org
Web: http://www.icissp.org
Thanking you in advance for your collaboration,
On behalf of ICISSP Secretariat
Margarida Sorribas