[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201406261723.s5QHNgfx023664@sf01web1.securityfocus.com>
Date: Thu, 26 Jun 2014 17:23:42 GMT
From: calendarsites@...ticc.org
To: bugtraq@...urityfocus.com
Subject: CFP 1st International Conference on Information Systems Security
and Privacy - ICISSP 2015
Dear Sir/Madam,
I would like to know if it is possible to post in your website the following event:
Conference name:
1st International Conference on Information Systems Security and Privacy - ICISSP 2015
Venue:
ESEO, Angers, Loire Valley, France
Event date:
9 11 February, 2015
Regular Papers
Paper Submission: September 9, 2014
Authors Notification: November 25, 2014
Camera Ready and Registration: December 10, 2014
Position Papers
Paper Submission: October 28, 2014
Authors Notification: November 28, 2014
Camera Ready and Registration: December 10, 2014
Workshops
Workshop Proposal: September 9, 2014
Doctoral Consortium
Paper Submission: November 27, 2014
Authors Notification: December 11, 2014
Camera Ready and Registration: December 23, 2014
Special Sessions
Special Session Proposal: September 19, 2014
Tutorials, Demos and Panel Proposals
November 27, 2014
Scope:
The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and
individuals, thus creating new research opportunities.
Conference Areas:
Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:
1. DATA AND SOFTWARE SECURITY
2. TRUST
3. PRIVACY AND CONFIDENTIALITY
4. MOBILE SYSTEMS SECURITY
5. BIOMETRIC AUTHENTICATION
AREA 1: DATA AND SOFTWARE SECURITY
Security Frameworks, Architectures and Protocols
Cryptographic Algorithms
Artificial Intelligence and Security
Information Hiding and Anonymity
Vulnerability Analysis and Countermeasures
Data Integrity
Database Security
Content Protection and Digital Rights Management
Data Mining
Software Security Assurance
Security Architecture and Design Analysis
Security Testing
Middleware Security
Data Fraud and Data Fabrication
AREA 2: TRUST
Computational Models of Trust
Risk and Reputation Management
Phishing
Security and Trust in Pervasive Information Systems
E-Commerce and Contract Management Tools
Trusted Platforms
P2P Transactions and Scenarios
Common Practice, Legal and Regulatory Issues
Trust in Social Networks
Identity and Trust Management
Intrusion Detection
Smartcard Technology
Trustworthy Embedded Devices
Electronic Payment Fraud
AREA 3: PRIVACY AND CONFIDENTIALITY
Privacy-Enhancing Models and Technologies
Network Deployment and Management
Web Applications and Services
Privacy In Cloud and Pervasive Computing
Authentication, Privacy and Security Models
Privacy Compliance in Organizations
Social Media Privacy
User Profiling in E-Commerce Systems
E-Voting and Privacy
Privacy Metrics and Control
Malware Detection
Electronic Abuse Protection
Ethics
AREA 4: MOBILE SYSTEMS SECURITY
Location-based Services
GPS-based security
Mobile Sensing and Sensor Networks
Bluetooth and RFID Security
Privacy in Wireless Communications
Mobile Applications Control
Privacy-Preserving Protocols
Vehicular Systems and Networks
Secure Routing
Software Vulnerabilities
Access Control
Threat Awareness
AREA 5: BIOMETRIC AUTHENTICATION
Identification and Access Control
Feature Detection, Selection and Extraction
Biosignals in Biometrics
Physiological Signal Processing
Fingerprint, Face or Iris Recognition
Hand Geometry
Gait Analysis
Speaker Recognition and Voice Analysis
Behavioral Patterns
Keystroke Dynamics
Surveillance
Privacy Concerns with Biometrics
Multimodal Biometrics Systems
Knowledge Discovery in Biometric Databases
Keynote Lecture
Rafael Accorsi, University of Freiburg, Germany
ICISSP Conference Chair
Olivier Camp, ESEO, MODESTE, France
Program Co-Chairs
Edgar Weippl, Secure Business Austria - Vienn University of Technology, Austria
Christophe Bidan, SUPELEC, France
Esma Aοmeur, Universitι De Montrιal, Canada
PROGRAM COMMITTEE
http://www.icissp.org/ProgramCommittee.aspx
ICISSP Secretariat
Address: Av. D. Manuel I, 27A, 2Ί esq.
2910-595 Setϊbal - Portugal
Tel.: +351 265 100 033
Fax: +44 203 014 8813
e-mail: icissp.secretariat@...ticc.org
Web: http://www.icissp.org
Thanking you in advance for your collaboration,
On behalf of ICISSP Secretariat
Margarida Sorribas
Powered by blists - more mailing lists