CFP The 2nd International Conference on Information Systems- Security and Privacy ICISSP 2016

From: icissp.secretariat@insticc.org
To: bugtraq@securityfocus.com
Cc:
Subject: CFP The 2nd International Conference on Information Systems- Security and Privacy ICISSP 2016
Date:


Conference name: 
The 2nd International Conference on Information Systems Security and Privacy \u2013 ICISSP 2016

Venue:
Rome, Italy

Event date:
19 - 21 February, 2016

Regular Papers
Paper Submission: September 8, 2015
Authors Notification: November 26, 2015
Camera Ready and Registration: December 14, 2015 

Position Papers
Paper Submission: October 29, 2015
Authors Notification: December 4, 2015
Camera Ready and Registration: December 18, 2015

Workshops
Workshop Proposal: September 9, 2015

Doctoral Consortium
Paper Submission: December 3, 2015
Authors Notification: December 11, 2015
Camera Ready and Registration: December 22, 2015

Special Sessions
Special Session Proposal: September 21, 2015

Tutorials, Demos and Panel Proposals
October 14, 2015

Scope:
The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, that concerns to organizations and individuals, thus creating new research opportunities.

CONFERENCE TOPICS:
\u2022       Security Frameworks, Architectures and Protocols
\u2022     Cryptographic Algorithms
\u2022     Information Hiding and Anonymity
\u2022     Vulnerability Analysis and Countermeasures
\u2022   Database Security
\u2022    Content Protection and Digital Rights Management
\u2022     Software Security Assurance
\u2022  Security Architecture and Design Analysis
\u2022    Security Testing
\u2022     Risk and Reputation Management
\u2022       Phishing
\u2022     Security and Trust in Pervasive Information Systems
\u2022  Legal and Regulatory Issues
\u2022  Security Professionalism and Practice
\u2022        Trust in Social Networks
\u2022     Identity and Trust Management
\u2022        Intrusion Detection and Response
\u2022     Smartcard Technology
\u2022 Privacy-Enhancing Models and Technologies
\u2022    Privacy In Cloud and Pervasive Computing
\u2022     Authentication, Privacy and Security Models
\u2022  Social Media Privacy
\u2022 E-Voting and Privacy
\u2022 Privacy Metrics and Control
\u2022  Malware Detection
\u2022    Vehicular Systems and Networks
\u2022       Threat Awareness
\u2022     Identification and Access Control
\u2022    Mobile Systems Security
\u2022      Biometric Technologies and Applications
\u2022      Security Awareness and Education
\u2022     Data and Software Security
\u2022   Data Mining and Knowledge Discovery
\u2022  Web Applications and Services
KEYNOTE LECTURES
Jason Hong, Carnegie Mellon University, United States
Hans-J. Lenz, Freie Universitat Berlin, Germany
Edgar Weippl, SBA Research / TU Wien, Austria

ICISSP CONFERENCE CHAIR
Olivier Camp, MODESTE/ESEO, France

PROGRAM CO-CHAIRS
Steven Furnell, Plymouth University, United Kingdom
Paolo Mori, Consiglio Nazionale delle Ricerche, Italy

PROGRAM COMMITTEE
http://www.icissp.org/ProgramCommittee.aspx

ICISSP Secretariat
Address: Av. D. Manuel I, 27A, 2 esq. 
2910-595 Setbal - Portugal 
Tel.: +351 265 100 033 
Fax: +44 203 014 8813
e-mail: icissp.secretariat@insticc.org
Web: http://www.icissp.org/





Copyright © 1995-2018 LinuxRocket.net. All rights reserved.