Betreff: | [AISWorld] CFP 1st International Conference on Information Systems Security and Privacy - ICISSP 2015 |
---|---|
Datum: | Wed, 25 Jun 2014 10:07:43 +0100 |
Von: | Calendar Sites <calendarsites@insticc.org> |
An: | <aisworld@lists.aisnet.org> |
CALL FOR PAPERS
1st
International Conference on Information Systems Security and
Privacy – ICISSP 2015
Website: www.icissp.org
February
9 – 11, 2015
ESEO,
Angers, Loire Valley, France
Regular
Papers
Paper
Submission: September 9, 2014
Authors
Notification: November 25, 2014
Camera
Ready and Registration: December 10, 2014
Position
Papers
Paper
Submission: October 28, 2014
Authors
Notification: November 28, 2014
Camera
Ready and Registration: December 10, 2014
Workshops
Workshop
Proposal: September 9, 2014
Doctoral
Consortium
Paper
Submission: November 27, 2014
Authors
Notification: December 11, 2014
Camera
Ready and Registration: December 23, 2014
Special
Sessions
Special
Session Proposal: September 19, 2014
Tutorials,
Demos and Panel Proposals
November
27, 2014
Sponsored
by:
INSTICC
– Institute for Systems and Technologies of Information,
Control and Communication
Co-organized
by:
Groupe
ESEO – Graduate School of Engineering
INSTICC
is Member of:
WfMC –
Workflow Management Coalition
OMG –
Object Management Group
Logistics Partner:
SCITEVENTS – Science
and Technology Events
The International
Conference on Information Systems Security and Privacy aims
at creating a meeting point of researchers and practitioners
that address security and privacy challenges that concern
information systems, especially in organizations, including
not only technological issues but also social issues. The
conference welcomes papers of either practical or
theoretical nature, presenting research or applications
addressing all aspects of security and privacy, such as
methods to improve the accuracy of data, encryption
techniques to conceal information in transit and avoid data
breaches, identity protection, biometrics, access control
policies, location information and mobile systems privacy,
transactional security, social media privacy control, web
and email vulnerabilities, trust management, compliance
violations in organizations, security auditing, and so on.
Cloud computing, big data, and other IT advances raise added
security and privacy concerns to organizations and
individuals, thus creating new research opportunities.
KEYNOTE SPEAKERS
ICISSP 2015 will have
several invited keynote speakers, who are internationally
recognized experts in their areas. Their names are not yet
confirmed.
PUBLICATIONS
All accepted papers
will be published in the conference proceedings, under an
ISBN reference, on paper and on CD-ROM support.
SCITEPRESS is a member
of CrossRef (http://www.crossref.org/)
and every paper is given a DOI (Digital Object Identifier).
All papers presented at
the conference venue will be available at the SCITEPRESS
Digital Library.
The proceedings will be
submitted for indexation by Thomson Reuters Conference
Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier
Index) and Scopus.
AWARDS
The awards will be announced and bestowed at
the conference closing session.
Please check the website for further
information: www.icissp.org/BestPaperAward.aspx
ICISSP CONFERENCE CHAIR
Olivier
Camp, ESEO, MODESTE, France
Edgar
Weippl, Secure Business Austria - Vienn University of
Technology, Austria
Christophe
Bidan, SUPELEC, France
Esma
Aïmeur, Université De Montréal, Canada
CONFERENCE
AREAS:
Each of these topic areas is expanded below but
the sub-topics list is not exhaustive. Papers may address
one or more of the listed sub-topics, although authors
should not feel limited by them. Unlisted but related
sub-topics are also acceptable, provided they fit in one of
the following main topic areas:
1. DATA AND SOFTWARE SECURITY
2. TRUST
3. PRIVACY AND CONFIDENTIALITY
4. MOBILE SYSTEMS SECURITY
5. BIOMETRIC AUTHENTICATION
AREA 1: DATA AND SOFTWARE SECURITY
·
Security Frameworks, Architectures and
Protocols
·
Cryptographic Algorithms
·
Artificial Intelligence and Security
·
Information Hiding and Anonymity
·
Vulnerability Analysis and Countermeasures
·
Data Integrity
·
Database Security
·
Content Protection and Digital Rights
Management
·
Data Mining
·
Software Security Assurance
·
Security Architecture and Design Analysis
·
Security Testing
·
Middleware Security
·
Data Fraud and Data Fabrication
AREA 2: TRUST
·
Computational Models of Trust
·
Risk and Reputation Management
·
Phishing
·
Security and Trust in Pervasive Information
Systems
·
E-Commerce and Contract Management Tools
·
Trusted Platforms
·
P2P Transactions and Scenarios
·
Common Practice, Legal and Regulatory Issues
·
Trust in Social Networks
·
Identity and Trust Management
·
Intrusion Detection
·
Smartcard Technology
·
Trustworthy Embedded Devices
·
Electronic Payment Fraud
AREA 3: PRIVACY AND CONFIDENTIALITY
·
Privacy-Enhancing Models and Technologies
·
Network Deployment and Management
·
Web Applications and Services
·
Privacy In Cloud and Pervasive Computing
·
Authentication, Privacy and Security Models
·
Privacy Compliance in Organizations
·
Social Media Privacy
·
User Profiling in E-Commerce Systems
·
E-Voting and Privacy
·
Privacy Metrics and Control
·
Malware Detection
·
Electronic Abuse Protection
·
Ethics
AREA 4: MOBILE SYSTEMS SECURITY
·
Location-based Services
·
GPS-based security
·
Mobile Sensing and Sensor Networks
·
Bluetooth and RFID Security
·
Privacy in Wireless Communications
·
Mobile Applications Control
·
Privacy-Preserving Protocols
·
Vehicular Systems and Networks
·
Secure Routing
·
Software Vulnerabilities
·
Access Control
·
Threat Awareness
AREA 5: BIOMETRIC AUTHENTICATION
·
Identification and Access Control
·
Feature Detection, Selection and Extraction
·
Biosignals in Biometrics
·
Physiological Signal Processing
·
Fingerprint, Face or Iris Recognition
·
Hand Geometry
·
Gait Analysis
·
Speaker Recognition and Voice Analysis
·
Behavioral Patterns
·
Keystroke Dynamics
·
Surveillance
·
Privacy Concerns with Biometrics
·
Multimodal Biometrics Systems
·
Knowledge Discovery in Biometric Databases
PROGRAM COMMITTEE
http://www.icissp.org/ProgramCommittee.aspx
Please
check further details at the conference website http://www.icissp.org