what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New


Posted Dec 28, 2005
Authored by Jeimy J. Cano

The Sixth National Computer and Information Security Conference ACIS 2006 (NCIS 2006) invites all researchers and practitioners to submit research papers in security topics.

tags | paper, conference
SHA-256 | efe65068a2349fc067722f77d14d981df8bb5f8f4710a60e59e89628705c15f7


Change Mirror Download
Dear professionals,

I apologize cross posting announcement.

******** CALL FOR PAPERS ******************
VI National Computer and Information Security Conference ACIS 2006 - COLOMBIA

The Sixth National Computer and Information Security Conference ACIS 2006 (NCIS
2006) as a scenario to develop and promote academic research and share
experiences in computer and information security, invite all researchers and
practitioners to submit research papers in security topics, in order to share
new ideas, findings and experience to open new horizon in our countries. Topics
for submission include but are not
limited to:

* Computer and information security models
* Computer and information security standards
* Wireless security
* Authentication and access control
* Computer and information security policies
* Best practices in Computer and Information security
* Cryptography, VPN and PKI
* Disaster recovery and business continuity planning
* Vulnerabilities Analysis and Hacking techniques
* Perimetral Security
* Database Security
* OS security
* Computer and digital forensics
* Incident Handling
* Digital Evidence
* Risk management
* Ethical and legal issues in Computer and Information Security
* Biometrics
* VoIP Security
* Telecommunications Security

All papers selected for this conference are peer-reviewed and will be
published in CD proceedings by Colombian Computer Science Engineer Association
(ACIS in Spanish).

Program Committee

Walter Baluja, M.Sc.
Instituto Superior Politécnico Jose A. Echeverría

Mirela Sechi Moreti, Ph.D
Barddal University

Computer Security Expert
Bernardo Quintero, M.Sc

Jorge Ramio, Ph.D
Universidad Politécnica de Madrid

Amparo Fúster, Ph.D

Pino Caballero Gil, Ph.D
Universidad de la Laguna

Arturo Ribagorda G., Ph.D
Universidad Carlos III de Madrid

Juan Guillermo Lalinde, Ph.D
Universidad EAFIT

Nelson Remolina, LL.M
Universidad de los Andes

Aurora Sánchez, Ph.D
Universidad Católica del Norte

Angela Cristina Carrillo, Ph.D(c)
Laboratorio LSR-IMAG
Equipo SIGMA, Grenoble.

Jeimy J. Cano, Ph.D
Conference Chair VI NCIS

Papers specifications:

- 15 pages, without graphics and references.
- Separate page: title, author(s),
Filiation:(university/company), e-mail, phone, fax, physical address.
- First page: all sugested in IEEE Transactions
format, except authors and filiations.
- Times New Roman 12 point
- Single space
- File format: Word 97 or RTF

Questions about sponsors, discounts, register and commercial issues about
conference, please contact Ms. Beatriz Caicedo, Executive Director - Colombian
Computer Science Engineer Association to bcaicedo@acis.org.co

Questions about academic issues please contact Jeimy J. Cano, Ph.D Conference
Chair. jcano@uniandes.edu.co

All papers received have been considered as authors intellectual property.

Important Dates:

March 24/2006 - Papers submit deadline
May 8 to May 12/2006 - Paper Acceptance or rejection notification
June 2/2006 - Papers Camera ready (including reviewers suggestions)
June 14, 15 and 16/2006 - National Computer and Information Security
Conference ACIS 2006

Note: Updated article arrived after camera ready date, will not included in CD
Conference Proceedings.

All papers must be submitted to Conference Chair, Jeimy J. Cano, Ph.D to
jcano@uniandes.edu.co with subject: Paper-VI NCIS

Jeimy J. Cano, Ph.D
Conference Chair
VI National Computer and Information Security Conference ACIS 2006
Colombian Computer Science Engineer Association -(ACIS in Spanish)

Editor of "Critical Reflections on Information Systems. A systemic approach"

Este correo y su contenido son confidenciales y exclusivos para su
destinatario. Si usted recibe este mensaje por error o no es el destinatario
del mismo, por favor sírvase eliminarlo y notificarle a su originador. Así
mismo, todas las ideas y reflexiones expresadas en esta comunicación
corresponden al originador del correo y NO representa la posición oficial de su
This email is intended only for the addressee(s) and contains information which
may be confidential, legally privileged. If you are not intended recipient
please do not save, forward, disclose or copy the content of this email. Please
delete it completely from your system and notify originator.Finally, all
ideas expressed in this communication are personal comments and NOT represent
official position of his employer.
Login or Register to add favorites

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    16 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By