[AISWorld] CFP 1st International Conference on Information Systems Security and Privacy - ICISSP 2015

Calendar Sites calendarsites at insticc.org
Wed Jun 25 05:07:43 EDT 2014


CALL FOR PAPERS

1st International Conference on Information Systems Security and Privacy –
ICISSP 2015

Website: www.icissp.org

February 9 – 11, 2015

ESEO, Angers, Loire Valley, France

 

Regular Papers

Paper Submission: September 9, 2014

Authors Notification: November 25, 2014

Camera Ready and Registration: December 10, 2014

 

Position Papers

Paper Submission: October 28, 2014

Authors Notification: November 28, 2014

Camera Ready and Registration: December 10, 2014

 

Workshops

Workshop Proposal: September 9, 2014

 

Doctoral Consortium

Paper Submission: November 27, 2014

Authors Notification: December 11, 2014

Camera Ready and Registration: December 23, 2014

 

Special Sessions

Special Session Proposal: September 19, 2014

 

Tutorials, Demos and Panel Proposals

November 27, 2014

 

Sponsored by:

INSTICC – Institute for Systems and Technologies of Information, Control and
Communication

Co-organized by:

Groupe ESEO – Graduate School of Engineering

 

INSTICC is Member of:

WfMC – Workflow Management Coalition

OMG – Object Management Group

 

Logistics Partner:

SCITEVENTS – Science and Technology Events

 

The International Conference on Information Systems Security and Privacy
aims at creating a meeting point of researchers and practitioners that
address security and privacy challenges that concern information systems,
especially in organizations, including not only technological issues but
also social issues. The conference welcomes papers of either practical or
theoretical nature, presenting research or applications addressing all
aspects of security and privacy, such as methods to improve the accuracy of
data, encryption techniques to conceal information in transit and avoid data
breaches, identity protection, biometrics, access control policies, location
information and mobile systems privacy, transactional security, social media
privacy control, web and email vulnerabilities, trust management, compliance
violations in organizations, security auditing, and so on. Cloud computing,
big data, and other IT advances raise added security and privacy concerns to
organizations and individuals, thus creating new research opportunities. 

KEYNOTE SPEAKERS

ICISSP 2015 will have several invited keynote speakers, who are
internationally recognized experts in their areas. Their names are not yet
confirmed.

 

PUBLICATIONS

All accepted papers will be published in the conference proceedings, under
an ISBN reference, on paper and on CD-ROM support.

SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every
paper is given a DOI (Digital Object Identifier).

All papers presented at the conference venue will be available at the
SCITEPRESS Digital Library.

The proceedings will be submitted for indexation by Thomson Reuters
Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier
Index) and Scopus. 

 

AWARDS

The awards will be announced and bestowed at the conference closing session.

Please check the website for further information:
www.icissp.org/BestPaperAward.aspx

 

ICISSP CONFERENCE CHAIR

Olivier Camp, ESEO, MODESTE, France

 

PROGRAM CO-CHAIRS 

Edgar Weippl, Secure Business Austria - Vienn University of Technology,
Austria

Christophe Bidan, SUPELEC, France

Esma Aïmeur, Université De Montréal, Canada

CONFERENCE AREAS:

Each of these topic areas is expanded below but the sub-topics list is not
exhaustive. Papers may address one or more of the listed sub-topics,
although authors should not feel limited by them. Unlisted but related
sub-topics are also acceptable, provided they fit in one of the following
main topic areas:

 

1. DATA AND SOFTWARE SECURITY

2. TRUST

3. PRIVACY AND CONFIDENTIALITY

4. MOBILE SYSTEMS SECURITY

5. BIOMETRIC AUTHENTICATION

 

 

AREA 1: DATA AND SOFTWARE SECURITY

 

·         Security Frameworks, Architectures and Protocols

·         Cryptographic Algorithms

·         Artificial Intelligence and Security

·         Information Hiding and Anonymity

·         Vulnerability Analysis and Countermeasures

·         Data Integrity

·         Database Security

·         Content Protection and Digital Rights Management

·         Data Mining

·         Software Security Assurance

·         Security Architecture and Design Analysis

·         Security Testing

·         Middleware Security

·         Data Fraud and Data Fabrication

 

AREA 2: TRUST

 

·         Computational Models of Trust

·         Risk and Reputation Management

·         Phishing

·         Security and Trust in Pervasive Information Systems

·         E-Commerce and Contract Management Tools

·         Trusted Platforms

·         P2P Transactions and Scenarios

·         Common Practice, Legal and Regulatory Issues

·         Trust in Social Networks

·         Identity and Trust Management

·         Intrusion Detection

·         Smartcard Technology

·         Trustworthy Embedded Devices

·         Electronic Payment Fraud

 

AREA 3: PRIVACY AND CONFIDENTIALITY

 

·         Privacy-Enhancing Models and Technologies

·         Network Deployment and Management

·         Web Applications and Services

·         Privacy In Cloud and Pervasive Computing

·         Authentication, Privacy and Security Models

·         Privacy Compliance in Organizations

·         Social Media Privacy

·         User Profiling in E-Commerce Systems

·         E-Voting and Privacy

·         Privacy Metrics and Control

·         Malware Detection

·         Electronic Abuse Protection

·         Ethics

 

AREA 4: MOBILE SYSTEMS SECURITY

 

·         Location-based Services

·         GPS-based security

·         Mobile Sensing and Sensor Networks

·         Bluetooth and RFID Security

·         Privacy in Wireless Communications

·         Mobile Applications Control

·         Privacy-Preserving Protocols

·         Vehicular Systems and Networks

·         Secure Routing

·         Software Vulnerabilities

·         Access Control

·         Threat Awareness

 

AREA 5: BIOMETRIC AUTHENTICATION

 

·         Identification and Access Control

·         Feature Detection, Selection and Extraction

·         Biosignals in Biometrics

·         Physiological Signal Processing

·         Fingerprint, Face or Iris Recognition

·         Hand Geometry

·         Gait Analysis

·         Speaker Recognition and Voice Analysis

·         Behavioral Patterns

·         Keystroke Dynamics

·         Surveillance

·         Privacy Concerns with Biometrics

·         Multimodal Biometrics Systems

·         Knowledge Discovery in Biometric Databases

 

PROGRAM COMMITTEE

http://www.icissp.org/ProgramCommittee.aspx

 

Please check further details at the conference website http://www.icissp.org

 

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20140625/7e2141dd/attachment.html>


More information about the AISWorld mailing list