what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ICISSP 2015 Call For Papers

ICISSP 2015 Call For Papers
Posted Jun 27, 2014
Site icissp.org

The International Conference on Information Systems Security and Privacy (ICISSP) 2015 has announced its call for papers. It will take place in Loire Valley, France February 9th through the 11th, 2015.

tags | paper, conference
SHA-256 | 8322efe361013b279e0f833cfde2680b2947455298e6bd5cf805ffc9527c91b8

ICISSP 2015 Call For Papers

Change Mirror Download
Dear Sir/Madam,
I would like to know if it is possible to post in your website the following event:
Conference name:
1st International Conference on Information Systems Security and Privacy - ICISSP 2015

Venue:
ESEO, Angers, Loire Valley, France

Event date:
9 – 11 February, 2015

Regular Papers
Paper Submission: September 9, 2014
Authors Notification: November 25, 2014
Camera Ready and Registration: December 10, 2014

Position Papers
Paper Submission: October 28, 2014
Authors Notification: November 28, 2014
Camera Ready and Registration: December 10, 2014

Workshops
Workshop Proposal: September 9, 2014

Doctoral Consortium
Paper Submission: November 27, 2014
Authors Notification: December 11, 2014
Camera Ready and Registration: December 23, 2014

Special Sessions
Special Session Proposal: September 19, 2014

Tutorials, Demos and Panel Proposals
November 27, 2014


Scope:
The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and
individuals, thus creating new research opportunities.
Conference Areas:
Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:
1. DATA AND SOFTWARE SECURITY
2. TRUST
3. PRIVACY AND CONFIDENTIALITY
4. MOBILE SYSTEMS SECURITY
5. BIOMETRIC AUTHENTICATION

AREA 1: DATA AND SOFTWARE SECURITY


• Security Frameworks, Architectures and Protocols
• Cryptographic Algorithms
• Artificial Intelligence and Security
• Information Hiding and Anonymity
• Vulnerability Analysis and Countermeasures
• Data Integrity
• Database Security
• Content Protection and Digital Rights Management
• Data Mining
• Software Security Assurance
• Security Architecture and Design Analysis
• Security Testing
• Middleware Security
• Data Fraud and Data Fabrication


AREA 2: TRUST

• Computational Models of Trust
• Risk and Reputation Management
• Phishing
• Security and Trust in Pervasive Information Systems
• E-Commerce and Contract Management Tools
• Trusted Platforms
• P2P Transactions and Scenarios
• Common Practice, Legal and Regulatory Issues
• Trust in Social Networks
• Identity and Trust Management
• Intrusion Detection
• Smartcard Technology
• Trustworthy Embedded Devices
• Electronic Payment Fraud


AREA 3: PRIVACY AND CONFIDENTIALITY

• Privacy-Enhancing Models and Technologies
• Network Deployment and Management
• Web Applications and Services
• Privacy In Cloud and Pervasive Computing
• Authentication, Privacy and Security Models
• Privacy Compliance in Organizations
• Social Media Privacy
• User Profiling in E-Commerce Systems
• E-Voting and Privacy
• Privacy Metrics and Control
• Malware Detection
• Electronic Abuse Protection
• Ethics


AREA 4: MOBILE SYSTEMS SECURITY

• Location-based Services
• GPS-based security
• Mobile Sensing and Sensor Networks
• Bluetooth and RFID Security
• Privacy in Wireless Communications
• Mobile Applications Control
• Privacy-Preserving Protocols
• Vehicular Systems and Networks
• Secure Routing
• Software Vulnerabilities
• Access Control
• Threat Awareness


AREA 5: BIOMETRIC AUTHENTICATION

• Identification and Access Control
• Feature Detection, Selection and Extraction
• Biosignals in Biometrics
• Physiological Signal Processing
• Fingerprint, Face or Iris Recognition
• Hand Geometry
• Gait Analysis
• Speaker Recognition and Voice Analysis
• Behavioral Patterns
• Keystroke Dynamics
• Surveillance
• Privacy Concerns with Biometrics
• Multimodal Biometrics Systems
• Knowledge Discovery in Biometric Databases

Keynote Lecture
Rafael Accorsi, University of Freiburg, Germany

ICISSP Conference Chair
Olivier Camp, ESEO, MODESTE, France

Program Co-Chairs
Edgar Weippl, Secure Business Austria - Vienn University of Technology, Austria
Christophe Bidan, SUPELEC, France
Esma Aïmeur, Université De Montréal, Canada

PROGRAM COMMITTEE
http://www.icissp.org/ProgramCommittee.aspx

ICISSP Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
2910-595 Setúbal - Portugal
Tel.: +351 265 100 033
Fax: +44 203 014 8813
e-mail: icissp.secretariat@insticc.org
Web: http://www.icissp.org

Thanking you in advance for your collaboration,
On behalf of ICISSP Secretariat

Margarida Sorribas
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close