Betreff: | [AISWorld] WOSIS 2011: The Eighth International Workshop on Security In Information Systems |
---|---|
Datum: | Thu, 18 Nov 2010 19:40:33 +0100 |
Von: | DAVID GARCIA ROSADO <David.GRosado@uclm.es> |
An: | <aisworld@lists.aisnet.org> |
**** CALL FOR PAPERS ****
The Eighth International Workshop on Security In
Information Systems WOSIS-2011
8-11 June, 2011 - Beijing, China
To be held in conjunction with the 13th
International Conference on Enterprise Information Systems
(ICEIS 2011) http://www.iceis.org/
Co-chairs:
Dr. David G. Rosado
University of Castilla-La Mancha, Spain
Dr. Luis
Enrique Sánchez
University of Castilla-La Mancha, Spain
Dr. Jan Jürjens
Technical University of Dortmund, Germany
Workshop Background
and Goals
Information Systems Security is one of the most
pressing challenges facing all kinds of organizations today.
Although many companies have discovered how critical
information is to the success of their business or operations,
very few have managed to be effective in maintaining their
information secure, avoiding unauthorized access, preventing
intrusions, stopping secret information disclosure, etc.
There are various definitions of security, but
all of them basically agree on the same components. Security
in information systems considers the protection of information
and of the systems that manage it, against a wide range of
threats in order to ensure business continuity, minimize risks
and maximize the return on investment and business
opportunities.
Security is, therefore, currently a widespread
and growing concern that covers all areas of society:
business, domestic, financial, government, and so on. In fact,
the so-called information society is increasingly dependent on
a wide range of software systems whose mission is critical,
such as air traffic control systems, financial systems, or
public health systems. The potential losses that are faced by
businesses and organizations that rely on all these systems,
both hardware and software, therefore signify that it is
crucial for information systems to be properly secured from
the outset.
With the increasing dependence that the
information society has on Information and Communication
Technology (ICT), the need to protect information is
increasingly important for companies. The demand for products,
systems and services with which to manage and maintain
information is therefore increasing, and the realization of
superficial security controls is not sufficient. It is
necessary to apply a rigorous approach to the assessing and
improvement of the security of products and processes that
take place in the context of ICT. This has led to the
emergence of Information Security Management Systems (ISMS),
which are of great importance to the stability of companies’
information systems.
In this new edition of WOSIS, the traditional
information systems security will be maintained but that area
of security engineering which is oriented towards developing
secure software, security aspects in new applications and
technologies, and security management will also be considered.
Topics such as model driven security approaches, security
requirements elicitations, security in Cloud and Mobile
computing, e-services, analysis and management of risks,
and/or security assessment are therefore welcome in the WOSIS
2011 edition.
Topics of interest include, but are not limited
to:
- Secure Software Development Methodologies and
Security for Agile Software Development
- Information Security Management System
- Security Requirements (threats, vulnerabilities,
risk, etc.)
- Security Information Systems Architecture and
Design
- Model Driven Security, MDA and automated
development
- Security Patterns
- Security Management and Assessment
- Analysis and management of risks
- Security Implementation, Secure programming and
Security Deployment
- Security Verification and Validation
- Case studies and experiences of secure software
- Security and secure testing
- Security culture
- Applications and extensions of UMLSec
- Security in Object-oriented, Component-based,
Aspect-oriented, Service-oriented software Engineering
- Open Security Standards and Security
Certification
- Security for SOA, Web Services, Grid computing
and Cloud Computing
- Security for Databases and Data Warehouses
- Workflow and Business Process Security
- Security Metrics and Measurement
- Security Ontologies
- Security in Software Product Lines
- Distributed and Network Security
- Security & Trust Models
- Authentication, Authorization and Access Control
- Anonymity and Privacy
- Security for Mobile Computing, sensors networks,
multimedia systems
- Security for Electronic Commerce, Electronic
Business and e-Services (e-voting, e-banking, e-governement)
- Security for embedded systems, smart cards and
RFID
- Security Issues in Ubiquitous/Pervasive Computing
- Intellectual Property Protection
- Digital Rights Management (DRM). Mobile DRM
- Personal Data Protection for Information Systems
and Digital Identity management
- Access Control and Rights Expression Languages
- Semantic Web Technologies applied to Security
- Security Engineering
- Prevention and Detection of intrusions
- Biometric Security
- Cryptology: Cryptography and Cryptanalysis
- Information hiding: Steganography &
Steganalysis
- Digital Forensics
- Cyber terrorism
Important Dates
Regular Paper Submission: 28 February, 2011
Authors Notification: 21 March, 2011
Camera Ready Submission Deadline: 31 March, 2011
Paper Submission
Prospective authors are invited to submit papers
for oral presentation in any of the topics listed above.
Submitted papers must present original, non-published work of
high quality. Only papers in English will be accepted, and the
length of the paper should not exceed 10 pages for full papers
and 6 pages for short papers (figures and appendices
included).
Instructions for preparing the manuscript (in
Word and Latex formats) are available at the conference Paper
Templates web page. Please also check the web page with the
Submission Guidelines. Papers should be submitted
electronically via the web-based submission system at: http://www.insticc.org/Primoris
Publications
All accepted papers will be published in the
workshop proceedings book, under an ISBN reference, and in
CD-ROM support. Additionally, the best papers will have the
chance to publish extended and revised versions in a special
issue of a Journal (to be confirmed) in the ISI Journal
Citation Reports.
Conference Location
The workshop will be held at Beijing, China
Registration Information
To attend the workshop you need to register at http://www.iceis.org ICEIS 2011 Secretariat - The Eighth
International Workshop on Security In Information Systems
WOSIS 2011
E-mail: iceis.secretariat@insticc.org
Web site: http://www.iceis.org