<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
{font-family:Arial-BoldMT;}
@font-face
{font-family:TimesNewRomanPSMT;
panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin-top:0cm;
margin-right:0cm;
margin-bottom:10.0pt;
margin-left:0cm;
line-height:115%;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
{mso-style-priority:99;
mso-style-link:"Texto sin formato Car";
margin:0cm;
margin-bottom:.0001pt;
font-size:10.5pt;
font-family:Consolas;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0cm;
margin-right:0cm;
margin-bottom:10.0pt;
margin-left:36.0pt;
line-height:115%;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
{mso-style-priority:34;
mso-style-type:export-only;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
margin-bottom:.0001pt;
line-height:115%;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
{mso-style-priority:34;
mso-style-type:export-only;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
margin-bottom:.0001pt;
line-height:115%;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
{mso-style-priority:34;
mso-style-type:export-only;
margin-top:0cm;
margin-right:0cm;
margin-bottom:10.0pt;
margin-left:36.0pt;
line-height:115%;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
span.EstiloCorreo17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
span.TextosinformatoCar
{mso-style-name:"Texto sin formato Car";
mso-style-priority:99;
mso-style-link:"Texto sin formato";
font-family:Consolas;}
span.apple-style-span
{mso-style-name:apple-style-span;}
span.apple-converted-space
{mso-style-name:apple-converted-space;}
.MsoChpDefault
{mso-style-type:export-only;}
@page WordSection1
{size:595.3pt 841.9pt;
margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
{page:WordSection1;}
@page WordSection2
{size:612.0pt 792.0pt;
margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection2
{page:WordSection2;}
/* List Definitions */
@list l0
{mso-list-id:49574963;
mso-list-type:hybrid;
mso-list-template-ids:1218324136 309523040 201981955 201981957 201981953 201981955 201981957 201981953 201981955 201981957;}
@list l0:level1
{mso-level-start-at:8;
mso-level-number-format:bullet;
mso-level-text:-;
mso-level-tab-stop:36.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Calibri","sans-serif";
mso-fareast-font-family:Calibri;
mso-bidi-font-family:Calibri;}
@list l0:level2
{mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level3
{mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level4
{mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level5
{mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level6
{mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level7
{mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level8
{mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level9
{mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=ES link=blue vlink=purple><div class=WordSection1><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>**** CALL FOR PAPERS ****<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>The First International Workshop on Information Systems Security Engineering - WISSE’11<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><a name="OLE_LINK1"></a><a name="OLE_LINK2"><span lang=EN-US>London, United Kingdom – 21 June 2011<o:p></o:p></span></a></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><a href="http://gsya.esi.uclm.es/WISSE2011/"><span lang=EN-US>http://gsya.esi.uclm.es/WISSE2011/</span></a><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>To be held in conjunction with the 23rd International Conference on Advanced Information Systems Engineering (</span><a href="http://www.caise2011.com/index.php" title="CAiSE 2011 Homepage"><span lang=EN-US style='color:windowtext;text-decoration:none'>CAiSE'11</span></a><span lang=EN-US>) </span><a href="http://www.caise2011.com/index.php"><span lang=EN-US>http://www.caise2011.com/index.php</span></a><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><u><span lang=EN-GB><o:p><span style='text-decoration:none'> </span></o:p></span></u></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><u><span lang=EN-GB>Workshop co-chairs:<o:p></o:p></span></u></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Nadira Lammari<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>CEDRIC-CNAM. 292 Rue Saint Martin. <o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>75141 Paris Cedex 03, France<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>lammari@cnam.fr <o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><o:p> </o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>David G. Rosado<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>University of Castilla-La Mancha. Paseo de la Universidad, 4.<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>13071 Ciudad Real, Spain<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>David.GRosado@uclm.es<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><u><span lang=EN-GB><o:p><span style='text-decoration:none'> </span></o:p></span></u></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><u><span lang=EN-GB>Steering committee:<o:p></o:p></span></u></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Jan Jürjens<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Technical University of Dortmund. <o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>44221 Dortmund, Germany<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>jan.jurjens@cs.tu-dortmund.de<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><o:p> </o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>Nora Cuppens<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>LUSSI/SERES Telecom-Bretagne. 2 Rue de La Châtaigneraie. <o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>35576 Cesson-Sévigné, France<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>nora.cuppens@telecom-bretagne.eu<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>Luis Enrique Sánchez<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>University of Castilla-La Mancha. Paseo de la Universidad, 4.<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'>13071 Ciudad Real, Spain<o:p></o:p></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>LuisE.Sanchez@uclm.es<o:p></o:p></span></p><p class=MsoPlainText><u><span lang=EN-US><o:p><span style='text-decoration:none'> </span></o:p></span></u></p><p class=MsoPlainText><u><span lang=EN-US>Purpose<o:p></o:p></span></u></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Information systems security problems are currently a widespread and growing concern that covers most of the areas of society, such as business, domestic, financial, government, healthcare, and so on. The scientific community is beginning to realize the importance of aligning information systems engineering and security engineering in order to develop more secure information systems. <o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>This Workshop expands the vision of the Information System (IS) engineering from a perspective of security. It aims to identify current research on methods, models, and tools for IS security and to bring together researchers and practitioners who want to discuss key issues in IS security engineering. <o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:justify'><b><span lang=EN-GB style='font-family:Arial-BoldMT'><o:p> </o:p></span></b></p><p class=MsoPlainText><u><span lang=EN-US>Topics of interest: <o:p></o:p></span></u></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Topics of interest include, but are not limited to:<o:p></o:p></span></p><p class=MsoListParagraphCxSpFirst style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security requirements models and engineering<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security analysis methods and models<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security design methods and models<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security testing methods and models<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security Modelling Support Tools<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Integrating functional and security requirements<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Model-based approaches for IS security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>IS security models<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Access and Usage control models<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Secure IS interoperability modelling<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security and process modelling<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Secure Information Systems development methodologies<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Methodologies and models for evaluating IS security aspects<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Formal methods for modelling security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Models and approaches for the verification of security properties<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Approaches for managing security changes in IS<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Methods for security reengineering<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Component-based, Aspect-oriented, Agent-based, Pattern-based Information system Security methods<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Methods, models and tools for workflow and Business Process Security <o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Case studies in modelling secure IS<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security Architectures and Patterns for Information Systems <o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Semantic Web Technologies applied to Security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Ontologies for IS security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security Engineering for specific Information Systems (e-Services, databases, mobile, internet, social networks, ...)<o:p></o:p></span></p><p class=MsoListParagraphCxSpLast style='margin-bottom:0cm;margin-bottom:.0001pt;text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if !supportLists]><span lang=EN-US><span style='mso-list:Ignore'>-<span style='font:7.0pt "Times New Roman"'> </span></span></span><![endif]><span lang=EN-US>Security Engineering for SOA Systems<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-GB style='font-family:Arial-BoldMT'><o:p> </o:p></span></b></p><p class=MsoPlainText><u><span lang=EN-US>Important Dates<o:p></o:p></span></u></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Regular Paper Submission: February 1, 2011<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Authors Notification: March 11, 2011<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US>Camera Ready Submission Deadline: March 25, 2011<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:justify;line-height:normal;text-autospace:none'><span lang=EN-GB style='font-size:12.0pt;font-family:TimesNewRomanPSMT'><o:p> </o:p></span></p><p class=MsoPlainText><u><span lang=EN-US>Paper Submission<o:p></o:p></span></u></p></div><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:TimesNewRomanPSMT'><br clear=all style='page-break-before:always'></span><div class=WordSection2><p class=MsoNormal style='margin-top:6.0pt;text-align:justify;text-autospace:none'><span lang=EN-GB>Prospective authors are invited to submit papers in any of the topics of the workshop. The results described must be unpublished and must not be under review elsewhere. Only papers in English will be accepted, and the length of the paper should not exceed 15 pages (including all text, figures, references and appendices.). Three to five keywords characterising the paper should be indicated at the end of the abstract<o:p></o:p></span></p><p class=MsoNormal style='margin-top:6.0pt;text-align:justify;text-autospace:none'><span lang=EN-GB>Manuscripts must comply with the </span><span lang=EN-GB><a href="http://www.springer.com/computer/lncs?SGWID=0-164-6-791344-0">Springer NLBIP formatting rules</a></span><span lang=EN-GB>.</span><span lang=EN-GB> <span style='color:black'>Prepare your manuscript as a PDF file and submit it to the workshop organizers </span></span><span lang=EN-GB>via EasyChair system</span><span lang=EN-US> (</span><span lang=EN-US><a href="http://www.easychair.org/conferences/?conf=wisse11">http://www.easychair.org/conferences/?conf=wisse11</a></span><span lang=EN-US>)</span><span lang=EN-GB style='color:black'>.<o:p></o:p></span></p><p class=MsoNormal style='margin-top:6.0pt;text-align:justify;text-autospace:none'><span lang=EN-GB>Submissions not conforming to the LNCS format, exceeding 15 pages, or being obviously out of the scope of the workshop, will be rejected without review.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;text-autospace:none'><span lang=EN-GB>Of every accepted submission, at least one author is expected to register for the workshop.<o:p></o:p></span></p><p class=MsoPlainText><u><span lang=EN-US>Publications<o:p></o:p></span></u></p><p class=MsoNormal style='text-align:justify;text-autospace:none'><span lang=EN-GB>All accepted papers will be published in the CAiSE 2011 workshop proceedings book </span><span class=apple-style-span><span lang=EN-US style='color:#333333'>with</span></span><span class=apple-converted-space><span lang=EN-US style='color:#333333'> </span></span><span class=MsoHyperlink><span lang=EN-GB><a href="http://www.springer.com/computer?SGWID=0-146-6-450209-0" target="_blank">Springer's Lecture Notes in Business Information Processing (LNBIP)</a>.</span></span><span class=apple-style-span><span lang=EN-GB style='color:#333333'> </span></span><span class=apple-style-span><span lang=EN-US style='color:#333333'><o:p></o:p></span></span></p><p class=MsoNormal style='text-align:justify;text-autospace:none'><span lang=EN-GB>Additionally, best workshop papers will be published at the International Journal of Information System Modeling and Design. </span><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p></div></body></html>