-------- Original-Nachricht -------- Betreff: [computational.science] CFP SIS-2006 Datum: Sat, 20 May 2006 00:39:19 +0200 Von: Marcin Paprzycki marcin@a.cs.okstate.edu Organisation: "OptimaNumerics" An: Computational Science Mailing List computational.science@lists.optimanumerics.com
Second Call for Papers
----------------------------------------------------------------- 1st International Workshop on Secure Information Systems (SIS'06) Wisla, Poland, November 6-10, 2006 http://www.sis2006.pti.katowice.pl/ -----------------------------------------------------------------
*****************************************************************
NEW:
Extended versions of selected papers will be published as in a special issue of the Journal of Information Assurance and Security (JIAS) http://www.softcomputing.net/jias/
*******************************************************************
The 1st International Workshop on Secure Information Systems (SIS'06) will be held in Wis³a, Poland on November 6-10, 2006, in conjunction with the First International Multiconference on Computer Science and Information Systems, http://www.FIMCSIT.pti.katowice.pl
The SIS workshop is envisioned as a forum to promote the exchange of ideas and results addressing complex security issues that arise in modern information systems. We aim at bringing together a community of security researchers and practitioners working in such divers areas as networking security, antivirus protection, intrusion detection, cryptography, security protocols, and others. We would like to promote an integrated view at the security of information systems.
As information systems evolve, becoming more complex and ubiquitous, issues relating to security, privacy and dependability become more critical. At the same time, the global and distributed character of modern computing - typically involving interconnected heterogeneous execution environments - introduces many new and challenging engineering and scientific problems. Providing protection against increasingly sophisticated attacks requires strengthening the interaction between different security communities, e.g. antivirus and networking. New technologies lead to the emergence of new threats and attack strategies, involving smart mobile devices, peer-to-peer networks, instant messaging, VoIP, mesh networks or even networked consumer devices, such as house appliances or cars. Furthermore, the increasing openness of the communications infrastructure results in novel threats and can jeopardize critical enterprise and public infrastructure, such as industrial automation and process control systems. Not only it is estimated that half of all Web applications and Internet storefronts still contain some security vulnerabilities, but secure commerce applications are also exposed to increasingly elaborate attacks, including spyware, phishing and other social engineering methods. In order to develop a secure system, security has to be considered in all phases of the lifecycle and adequately addressed in all layers of the system. At the same time, good engineering has to take into account both scientific and economic aspects of every solution: the cost of security has to be carefully measured against its benefits - in particular the expected cost of mitigated risks. Most companies and individuals treat security measures in information system as a necessary, but often uncomfortable, overhead. The increasing penetration of computing in all domains of everyday life means that security of critical business systems is often managed and maintained by personnel who are not knowledgeable in the field. This highlights the importance of usability and ease of configuration of security mechanism and protocols.
Covered topics include (but are not limited to):
* Access control * Adaptive security * Cryptography * Copyright protection * Cyberforensics * Honeypots * Intrusion detection * Network security * Privacy * Secure commerce * Security exploits * Security policies * Security protocols * Security services * Security evaluation and prediction * Software protection * Trusted computing * Threat modeling * Usability and security * Viruses and worms * Zero-configuration security mechanisms
PAPER SUBMISSION AND PUBLICATION
- Authors should submit papers in PDF format before July 3, 2006 (details of electronic submission will be provided in the near future)
- Papers should be formatted according to the LNCS style and not exceed 10 pages.
- Papers will be subject to peer review and accepted on the basis of their scientific merit and relevance to the workshop topics
- Papers presented at the workshop will be included in the conference proceedings and published on a CD (with an ISSN/ISBN number)
- Extended versions of selected papers will be published as in a special issue of the Journal of Information Assurance and Security (JIAS) http://www.softcomputing.net/jias/
DATES
Submission of Papers: July 3, 2006 Notification of Acceptance: September 1, 2006 Camera-Ready Papers: October 1, 2006 Conference: November 6-10, 2006
WORKSHOP CHAIR:
Konrad Wrona, SAP Research, France
LOCAL ORGANIZING COMMMITTEE:
Lukasz Nitschke, Adam Mickiewicz University, Poland Michal Ren, Adam Mickiewicz University, Poland
PROGRAM COMMITTEE:
Hirokazu Aoshima Hitachi Research, Japan Nicolas Courtois Axalto, France Kris Gaj Gorge Mason University, USA Silke Holtmans Nokia Research, Finland Lech Janczewski University of Auckland, New Zealand Stanislaw Jarecki University of California Irvine, USA Eugene Kaspersky Kaspersky Lab, Russia Marka Klonowskiego Wroclaw University of Technology, Poland Ryszard Kossowski Warsaw University of Technology , Poland Refik Molva Eurecom Institute, France Josef Pieprzyk Macquarie University, Australia Andreas Schaad SAP Research, Germany Mike Scott Dublin City University, Ireland Janusz Stoklosa Poznan University of Technology, Poland Johnson Thomas Oklahoma State University Tulsa, USA Thomas Walter DoCoMo Labs Europe, Germany
--------------------------------------------------------------------- To unsubscribe, e-mail: computational.science-unsubscribe@lists.optimanumerics.com For additional commands, e-mail: computational.science-help@lists.optimanumerics.com
Computational Science mailing list hosting is provided by OptimaNumerics (http://www.OptimaNumerics.com) ---------------------------------------------------------------------