[AISWorld] WOSIS 2013- LAST EXTENSION 23 April. Special issue in The Computer Journal: 0, 785

DAVID GARCIA ROSADO David.GRosado at uclm.es
Fri Apr 19 07:27:19 EDT 2013


[Apologies if you receive multiple copies of this announcement. Please
pass it on to your colleagues and students who might be interested in
contributing]

 

================================================================

CALL FOR PAPERS

                               

The Tenth International Workshop on Security in Information Systems
WOSIS-2013

3-7 July, 2013 - Angers, France

http://www.iceis.org/wosis.aspx <http://www.iceis.org/wosis.aspx>
<http://www.iceis.org/wosis.aspx <http://www.iceis.org/wosis.aspx> > 

 

To be held in conjunction with the 15th International Conference on
Enterprise Information Systems (ICEIS 2013) http://www.iceis.org/
<http://www.iceis.org/>  <http://www.iceis.org/ <http://www.iceis.org/>
> 

 

The best papers will have the chance to publish extended and revised
versions in a special issue of The Computer Journal in the ISI Journal
Citation Reports with Impact factor of 0.785.

 

================================================================

 

 

IMPORTANT DATES

----------------------------

Regular Paper Submission:  April 23, 2013 (extended) 

Authors Notification: April 30, 2013 

Camera Ready Submission May 13, 2013

 

 

TOPICS

-----------

Topics of interest include, but are not limited to:

 

**Security in Software Engineering

-Security in agile software development

-Secure architecture, design and deployment 

-Aspect-oriented, Model-driven development of secure software and
systems 

-Domain-specific modeling languages (DSML) for secure software 

-Modeling privacy for software systems 

-Analysis and management of risks 

-Security requirements and Specification of security and privacy
requirements and policies 

-Threats, vulnerability, and trust modeling 

-Testing for security 

-Security Metrics and Measurement 

-Static and dynamic analysis for security 

-Verification and assurance techniques for security properties 

-Model-based verification techniques for security properties 

-Case studies and experiences of secure software engineering

 

**Security in Cloud Computing

-Security Engineering for Cloud-Based Systems 

-Security Requirements Engineering for Cloud-Based Systems 

-Risks and threats in Cloud 

-Privacy and Data protection in Cloud 

-Cloud Legal Issues 

-Trust and policy management in Clouds 

-Issues and recent approaches in portability, interoperability and
secure migration processes to cloud computing 

-Storage security and Cloud Infrastructure Security 

-Security Governance in the Cloud and Risk management and assessment and
third-party risk management 

-Identity & Access Management in the Cloud 

-Security and Virtualization 

-Security in SaaS, PaaS and IaaS 

-Security in Cloud applications 

-MDA and MDS applied to cloud computing 

-Case studies

 

**Security in BBDD and Mobile Computing

-Security for Databases and Data Warehouses 

-Metadata and Security 

-Secure Data Management 

-Data Anonymization/Pseudonymization 

-Data Hiding 

-Data Integrity 

-Secure Auditing 

-Security for Mobile Computing, sensors networks, multimedia systems 

-Mobile security/privacy policies 

-Secure mobile software architecture 

-Secure mobile application design 

-Security and privacy issues related to user behavior

 

**Rest of topics

-Security Management and Assessment

-Security culture, IT Governance and IT Service Continuity 

-Open Security Standards and Security Certification 

-Common practice, legal and regulatory issues 

-Security for SOA, Web Services, Grid computing and Social Network 

-Workflow and Business Process Security 

-Security ontology/taxonomy design 

-Semantic Web Technologies applied to Security 

-Security in Software Product Lines 

-Distributed and Network Security 

-Security & Trust Models 

-Authentication, Authorization and Access Control, Anonymity and Privacy


-Security for Electronic Commerce, Electronic Business and e-Services
(e-voting, e-banking, e-governement, e-health) 

-Security for embedded systems, smart cards and RFID 

-Security Issues in Ubiquitous/Pervasive Computing 

-Intellectual Property Protection, Personal Data Protection for
Information Systems and Digital Identity management 

-Disaster Recovery and Failure Prevention, Incident Response and
Prevention, Intrusion Detection and Fraud Detection 

-Biometric Security, Cryptology: Cryptography and Cryptanalysis,
Information hiding: Steganography & Steganalysis and Digital Forensics

-Cyber terrorism

 

 

CO-CHAIRS

-----------------

Dr. David G. Rosado

University of Castilla-La Mancha, Spain

David.GRosado at uclm.es <mailto:David.GRosado at uclm.es> 

 

Dr. Carlos Blanco

University of Cantabria, Spain

blancobc at unican.es <mailto:blancobc at unican.es>  

 

Dr. Daniel Mellado

Spanish Tax Agency, Spain

damefe at esdebian.org <mailto:damefe at esdebian.org> 

 

Dr. Jan Jurjens

Technical University of Dortmund, Germany 

jan.jurjens at cs.tu-dortmund.de <mailto:jan.jurjens at cs.tu-dortmund.de> 

 

 

PAPER SUBMISSION

------------------------------

Prospective authors are invited to submit papers for oral presentation
in any of the topics listed above. Submitted papers must present
original, non-published work of high quality. Only papers in English
will be accepted.

 

The paper submission types are as follow:

 

- Regular Paper Submission.

A regular paper presents a work where the research is completed or
almost finished. It does not necessary means that the acceptance is as a
full paper. It may be accepted as a "full paper" (30 min. oral
presentation), or a "short paper" (20 min. oral presentation). The
length of the paper should not exceed 10 pages for full papers and 8
pages for short papers (figures and appendices included).

 

- Tool Demostrations. 

The paper must not exceed 4 pages including all text, references and
figures. It must contain the problem context, a typical usage scenario,
existing tools and their shortcomings, the concepts behind the proposed
tool, a graphical overview of the tool's architecture, a short
discussion of the technologies used for implementation, a summary of
experiments or other experiences with the tool, an outline of missing
features and other future work, and the URL of the tool's website (if
one exists).

 

Instructions for preparing the manuscript (in Word and Latex formats)
are available at the conference Paper Templates web page
(http://www.iceis.org/GuidelinesTemplates.aspx
<http://www.iceis.org/GuidelinesTemplates.aspx> . Please also check the
web page with the Submission Guidelines. Papers should be submitted
electronically via the web-based submission system at:
http://www.insticc.org/Primoris <http://www.insticc.org/Primoris>  

 

 

PUBLICATIONS

----------------------

All accepted papers (full and short) will be published in the conference
proceedings, under an ISBN reference, on paper and on CD-ROM support.

The proceedings are submitted for indexation by Thomson Reuters
Conference Proceedings Citation Index (ISI), INSPECC, DBLP and EI
(Elsevier Index). 

 

Additionally, the best papers will have the chance to publish extended
and revised versions in The Computer Journal in the ISI Journal Citation
Reports.

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130419/805e351e/attachment.html>


More information about the AISWorld mailing list