-------- Original Message --------
Subject: [computational.science] CFP - 8th International
Conference of Inf. Systems Security (ICISS'12)
Date: Mon, 04 Jun 2012 18:26:58 +0200
From: Claudio Agostino Ardagna (claudio.ardagna)
<claudio.ardagna(a)unimi.it>
Organization: "ICCSA"
To: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
CALL FOR PAPERS
Eighth International Conference on Information Systems Security (ICISS 2012)
15-19 December 2012
IIT Guwahati, India
The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. The acceptance ratio of the past four conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. The conference encourages submissions addressing theoretical and practical problems in information and systems security and related areas. We especially like to encourage papers in domains that have not been represented much in the past at the conference, such as database security/privacy, usability aspects of security, and smartphone security. Papers that introduce and address unique security challenges or present thought-provoking ideas are also welcome. Topics of interest include but are not limited to:
Application Security
Authentication and Access Control
Biometric Security
Cryptographic Protocols
Data Security
Digital Forensics and Diagnostics
Digital Rights Management
Distributed System Security Formal Methods in Security
Intrusion Detection, Prevention and Response
Intrusion Tolerance and Recovery
Key Management and Cryptographic Protocols
Language-based Security
Malware Analysis and Mitigation
Network Security
Operating System Security
Privacy and Anonymity
Security in P2P, Sensor and Ad Hoc Networks
Smartphone Security
Software Security
Vulnerability Detection and Mitigation
Usable Security
Web Security
IMPORTANT DATES
Manuscript Submission (Full Paper) : 13 July 2012 (11.59 p.m., U.S. Central Time)
Notification of Acceptance : Sep 3rd, 2012
Submission of Camera-Ready Manuscript: 15 Sep 2012
Paper Submission
Submissions must be made to the submission website by the deadline of July 20, 2012, 11.59 US Central Time. Papers should be formatted as they would appear in the final LNCS proceedings. Papers should be at most 15 pages in length, including the bibliography. Detailed submission instructions can be found at the conference web site. One of the authors of an accepted paper must attend the conference to present the paper. ICISS accepts only electronic submissions in PDF format. Camera-ready manuscripts must be submitted in LaTex.
Dual Submission Policy: Submitted papers must not substantially overlap with papers published or currently submitted to a journal or a conference with proceedings.
Proceedings: Conference Proceedings will be published in the Springer LNCS series.
Tutorial Proposals
There will be tutorial program for two days (15-16 December 2012). At most four three-hour tutorials will be offered. Proposals are invited for tutorials of duration three hours on relevant topics of current interest. A tutorial proposal should include the extended abstract of the tutorial and a brief biography of the speaker(s). Please mail your proposal to the Program Chairs. The speaker(s) of the accepted proposals need to submit their final presentation one month before the conference to the Tutorial Chairs.
Conference Organizers
• General Co-Chairs : Sukumar Nandi (IIT Guwahati) and R. Sekar (Stony Brook University)
• Program Co-chairs: Venkat Venkatakrishnan (University of Illinois at Chicago, USA) and Diganta Goswami (ITT Guwahati, India)
• Organizing Co-chairs : Santosh Biswas (IIT Guwahati) and Jatindra Kr. Deka (IIT Guwahati)
• Publications Chair : Samit Bhattacharya (IIT Guwahati)
• Submissions/Website Chair : Rigel Gjomemo, (University of Illinois at Chicago)
• Publicity Co-Chairs : Shamik Sural (IIT Kharagpur, India), Claudio A. Ardagna (Universita degli Studi di Milano, Italy), Aryabartta Sahu (IIT Guwahati, India)
• Tutorial Co-Chairs : Rajan Shankaran (Macquarie University, Australia) and Arijit Sur (IIT Guwahati, India)
• Finance Chair : Sanasam Ranbir Singh (IIT Guwahati, India)
• Student Forum Chair : Partha Sarathi Mandal (IIT Guwahati, India)
Program Committee
* Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad, India
* Sandeep Bhatkar Symantec Research Labs, USA
* Prithvi Bisht University of Illinois at Chicago, USA
* Lorenzo Cavallaro Royal Holloway, University of London, UK
* Sanjit Chatterjee Indian Institute of Science, Bangalore, India
* Frédéric Cuppens TELECOM Bretagne, France
* Ashok Kumar Das International Institute of Information Technology, Hyderabad, India
* Anupam Datta Carnegie Mellon University, USA
* Meenakshi Dsouza International Institute of Information Technology, Bangalore, India
* William Enck North Carolina State University, USA
* Vinod Ganapathy Rutgers University, USA
* Kevin Hamlen University of Texas at Dallas, USA
* Sebastian Hunt City University, London, UK
* Sushil Jajodia George Mason University, USA
* Somesh Jha University of Wisconsin at Madison, USA
* Aditya Kanade Indian Institute of Science, Bangalore, India
* Ram Krishnan University of Texas at San Antonio, USA
* Zhichun Li NEC Laboratories America, USA
* Zhenkai Liang National University of Singapore, Singapore
* Anish Mathuria Dhirubhai Ambani Institute of Information and Communication Technology, India
* Phu H. Phung Chalmers Univ. of Technology, Sweden
* Indranil Sengupta Indian Institute of Technology, Kharagpur, India
* Kapil Singh IBM T. J. Watson Research Center, USA
* Scott Stoller Stony Brook University, USA
* Mike Ter-Louw LGS Innovations, Bell Labs , USA
* Alok Tongaonkar The Boeing Company, USA
* Mahesh Tripunitara The University of Waterloo, Canada
* Vinod Yegneswaran SRI International, USA
* Stefano Zanero Politecnico di Milano, Italy