-------- Original-Nachricht -------- Betreff: [AISWorld] CFP 1st International Conference on Information Systems Security and Privacy - ICISSP 2015 Datum: Wed, 25 Jun 2014 10:07:43 +0100 Von: Calendar Sites calendarsites@insticc.org An: aisworld@lists.aisnet.org
*CALL FOR PAPERS*
1^st International Conference on Information Systems Security and Privacy-- ICISSP 2015**
*Website:*www.icissp.org http://www.icissp.org__
February 9 -- 11, 2015
ESEO, Angers, Loire Valley, France
**
*Regular Papers*
Paper Submission: *September 9, 2014*
Authors Notification: *November 25, 2014*
Camera Ready and Registration: *December 10, 2014*
*Position Papers*
Paper Submission: *October 28, 2014*
Authors Notification: *November 28, 2014*
Camera Ready and Registration: *December 10, 2014*
*Workshops*
Workshop Proposal: *September 9, 2014*
*Doctoral Consortium*
Paper Submission: *November 27, 2014*
Authors Notification: *December 11, 2014*
Camera Ready and Registration: *December 23, 2014*
**
*Special Sessions*
Special Session Proposal: *September 19, 2014*
*Tutorials, Demos and Panel Proposals*
*November 27, 2014*
*Sponsored by:*
INSTICC -- Institute for Systems and Technologies of Information, Control and Communication
*Co-organized by:*
Groupe ESEO -- Graduate School of Engineering
**
*INSTICC is Member of:*
WfMC -- Workflow Management Coalition
OMG -- Object Management Group
**
*Logistics Partner:*
SCITEVENTS -- Science and Technology Events
**
The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and individuals, thus creating new research opportunities.
*KEYNOTE SPEAKERS*
ICISSP 2015 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.
**
*PUBLICATIONS*
All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper is given a DOI (Digital Object Identifier).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
**
*AWARDS*
The awards will be announced and bestowed at the conference closing session.
Please check the website for further information: www.icissp.org/BestPaperAward.aspx http://www.icissp.org/BestPaperAward.aspx
**
*ICISSP CONFERENCE CHAIR*
Olivier Camp, ESEO, MODESTE, France
*PROGRAM CO-CHAIRS *
Edgar Weippl, Secure Business Austria - Vienn University of Technology, Austria
Christophe Bidan, SUPELEC, France
Esma Aïmeur, Université De Montréal, Canada
*CONFERENCE AREAS:*
Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:
*1.*DATA AND SOFTWARE SECURITY
*2.*TRUST
*3.*PRIVACY AND CONFIDENTIALITY
*4.*MOBILE SYSTEMS SECURITY
*5.*BIOMETRIC AUTHENTICATION
*AREA 1: DATA AND SOFTWARE SECURITY*
·Security Frameworks, Architectures and Protocols
·Cryptographic Algorithms
·Artificial Intelligence and Security
·Information Hiding and Anonymity
·Vulnerability Analysis and Countermeasures
·Data Integrity
·Database Security
·Content Protection and Digital Rights Management
·Data Mining
·Software Security Assurance
·Security Architecture and Design Analysis
·Security Testing
·Middleware Security
·Data Fraud and Data Fabrication
*AREA 2: TRUST*
·Computational Models of Trust
·Risk and Reputation Management
·Phishing
·Security and Trust in Pervasive Information Systems
·E-Commerce and Contract Management Tools
·Trusted Platforms
·P2P Transactions and Scenarios
·Common Practice, Legal and Regulatory Issues
·Trust in Social Networks
·Identity and Trust Management
·Intrusion Detection
·Smartcard Technology
·Trustworthy Embedded Devices
·Electronic Payment Fraud
*AREA 3: PRIVACY AND CONFIDENTIALITY*
·Privacy-Enhancing Models and Technologies
·Network Deployment and Management
·Web Applications and Services
·Privacy In Cloud and Pervasive Computing
·Authentication, Privacy and Security Models
·Privacy Compliance in Organizations
·Social Media Privacy
·User Profiling in E-Commerce Systems
·E-Voting and Privacy
·Privacy Metrics and Control
·Malware Detection
·Electronic Abuse Protection
·Ethics
*AREA 4: MOBILE SYSTEMS SECURITY*
·Location-based Services
·GPS-based security
·Mobile Sensing and Sensor Networks
·Bluetooth and RFID Security
·Privacy in Wireless Communications
·Mobile Applications Control
·Privacy-Preserving Protocols
·Vehicular Systems and Networks
·Secure Routing
·Software Vulnerabilities
·Access Control
·Threat Awareness
**
*AREA 5: BIOMETRIC AUTHENTICATION*
·Identification and Access Control
·Feature Detection, Selection and Extraction
·Biosignals in Biometrics
·Physiological Signal Processing
·Fingerprint, Face or Iris Recognition
·Hand Geometry
·Gait Analysis
·Speaker Recognition and Voice Analysis
·Behavioral Patterns
·Keystroke Dynamics
·Surveillance
·Privacy Concerns with Biometrics
·Multimodal Biometrics Systems
·Knowledge Discovery in Biometric Databases
**
*PROGRAM COMMITTEE*
http://www.icissp.org/ProgramCommittee.aspx
Please check further details at the conference website http://www.icissp.org