Subject: | [AISWorld] WOSIS 2013- LAST EXTENSION 23 April. Special issue in The Computer Journal: 0, 785 |
---|---|
Date: | Fri, 19 Apr 2013 13:27:19 +0200 |
From: | DAVID GARCIA ROSADO <David.GRosado@uclm.es> |
To: | <aisworld@lists.aisnet.org> |
[Apologies if you
receive multiple copies of this announcement. Please pass it
on to your colleagues and students who might be interested
in contributing]
================================================================
CALL FOR PAPERS
The Tenth International Workshop on Security
in Information Systems WOSIS-2013
3-7 July, 2013 -
Angers, France
http://www.iceis.org/wosis.aspx <http://www.iceis.org/wosis.aspx>
To be held in
conjunction with the 15th International Conference on
Enterprise Information Systems (ICEIS 2013) http://www.iceis.org/ <http://www.iceis.org/>
The best papers will have the chance to
publish extended and revised versions in a special issue
of The Computer Journal in the ISI Journal Citation
Reports with Impact factor of 0.785.
================================================================
IMPORTANT DATES
----------------------------
Regular Paper
Submission: April 23, 2013 (extended)
Authors Notification:
April 30, 2013
Camera Ready
Submission May 13, 2013
TOPICS
-----------
Topics of interest
include, but are not limited to:
**Security in
Software Engineering
-Security in agile
software development
-Secure architecture,
design and deployment
-Aspect-oriented,
Model-driven development of secure software and systems
-Domain-specific
modeling languages (DSML) for secure software
-Modeling privacy for
software systems
-Analysis and
management of risks
-Security
requirements and Specification of security and privacy
requirements and policies
-Threats,
vulnerability, and trust modeling
-Testing for security
-Security Metrics and
Measurement
-Static and dynamic
analysis for security
-Verification and
assurance techniques for security properties
-Model-based
verification techniques for security properties
-Case studies and
experiences of secure software engineering
**Security in Cloud
Computing
-Security Engineering
for Cloud-Based Systems
-Security
Requirements Engineering for Cloud-Based Systems
-Risks and threats in
Cloud
-Privacy and Data
protection in Cloud
-Cloud Legal Issues
-Trust and policy
management in Clouds
-Issues and recent
approaches in portability, interoperability and secure
migration processes to cloud computing
-Storage security and
Cloud Infrastructure Security
-Security Governance
in the Cloud and Risk management and assessment and
third-party risk management
-Identity &
Access Management in the Cloud
-Security and
Virtualization
-Security in SaaS,
PaaS and IaaS
-Security in Cloud
applications
-MDA and MDS applied
to cloud computing
-Case studies
**Security in BBDD
and Mobile Computing
-Security for
Databases and Data Warehouses
-Metadata and
Security
-Secure Data
Management
-Data
Anonymization/Pseudonymization
-Data Hiding
-Data Integrity
-Secure Auditing
-Security for Mobile
Computing, sensors networks, multimedia systems
-Mobile
security/privacy policies
-Secure mobile
software architecture
-Secure mobile
application design
-Security and privacy
issues related to user behavior
**Rest of topics
-Security Management
and Assessment
-Security culture, IT
Governance and IT Service Continuity
-Open Security
Standards and Security Certification
-Common practice,
legal and regulatory issues
-Security for SOA,
Web Services, Grid computing and Social Network
-Workflow and
Business Process Security
-Security
ontology/taxonomy design
-Semantic Web
Technologies applied to Security
-Security in Software
Product Lines
-Distributed and
Network Security
-Security & Trust
Models
-Authentication,
Authorization and Access Control, Anonymity and Privacy
-Security for
Electronic Commerce, Electronic Business and e-Services
(e-voting, e-banking, e-governement, e-health)
-Security for
embedded systems, smart cards and RFID
-Security Issues in
Ubiquitous/Pervasive Computing
-Intellectual
Property Protection, Personal Data Protection for
Information Systems and Digital Identity management
-Disaster Recovery
and Failure Prevention, Incident Response and Prevention,
Intrusion Detection and Fraud Detection
-Biometric Security,
Cryptology: Cryptography and Cryptanalysis, Information
hiding: Steganography & Steganalysis and Digital
Forensics
-Cyber terrorism
CO-CHAIRS
-----------------
Dr. David G. Rosado
University of
Castilla-La Mancha, Spain
Dr. Carlos Blanco
University of
Cantabria, Spain
Dr. Daniel Mellado
Spanish Tax Agency,
Spain
Dr. Jan Jurjens
Technical University
of Dortmund, Germany
PAPER SUBMISSION
------------------------------
Prospective authors
are invited to submit papers for oral presentation in any of
the topics listed above. Submitted papers must present
original, non-published work of high quality. Only papers in
English will be accepted.
The paper submission
types are as follow:
- Regular Paper
Submission.
A regular paper
presents a work where the research is completed or almost
finished. It does not necessary means that the acceptance is
as a full paper. It may be accepted as a "full paper" (30
min. oral presentation), or a "short paper" (20 min. oral
presentation). The length of the paper should not exceed 10
pages for full papers and 8 pages for short papers (figures
and appendices included).
- Tool Demostrations.
The paper must not
exceed 4 pages including all text, references and figures.
It must contain the problem context, a typical usage
scenario, existing tools and their shortcomings, the
concepts behind the proposed tool, a graphical overview of
the tool's architecture, a short discussion of the
technologies used for implementation, a summary of
experiments or other experiences with the tool, an outline
of missing features and other future work, and the URL of
the tool's website (if one exists).
Instructions for
preparing the manuscript (in Word and Latex formats) are
available at the conference Paper Templates web page (http://www.iceis.org/GuidelinesTemplates.aspx. Please also check the web page with the
Submission Guidelines. Papers should be submitted
electronically via the web-based submission system at: http://www.insticc.org/Primoris
PUBLICATIONS
----------------------
All accepted papers
(full and short) will be published in the conference
proceedings, under an ISBN reference, on paper and on CD-ROM
support.
The proceedings are
submitted for indexation by Thomson Reuters Conference
Proceedings Citation Index (ISI), INSPECC, DBLP and EI
(Elsevier Index).
Additionally, the
best papers will have the chance to publish extended and
revised versions in The Computer Journal in the ISI Journal
Citation Reports.