Security In Information Systems WOSIS-2005



Similar documents
Lecture Notes in Computer Science 3654

18th IEEE Conference on Business Informatics Call for Papers

Incorporating database systems into a secure software development methodology

SUPPLEMENTAL INFORMATION 4.10 STUDENTS PARTICIPATING OF INTERNATIONAL ACADEMIC EXCHANGE PROGRAMS

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

C U R R I C U L U M V I T A E T R I V A N L E

CESG Certification of Cyber Security Training Courses

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Development and. Web Services Security. Architecture: Theoretical and Practical Issues REFERENCE. f7 CT5nTfJ3niT5J>Sl Hershey

SMART InTeRneT OF ThIngS

Design & Technology HUB to Europe International education Culture & history Finance Art & Fashion World Exposition centre - Expo 2015 Engine of

UNIVERSITY TOP 50 BY SUBJECTS a) Arts and Humanities Universities

Data-Driven Process Discovery and Analysis SIMPDA 2013

SPONSORSHIP th ANNUAL WORLD CONGRESS REGIONAL NETWORKING EVENTS. The world s premier networking event for Cyber Security leaders

Introduction to Cyber Security / Information Security

Bachelor of Information Technology (Network Security)

SPONSORSHIP2015. Annual World Congress. Regional Networking Events. The World s No 1 networking event for Cyber Security leaders November, USA

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

How To Become A Computer Scientist

EMBA Council Network how to take advantage?

CS 464/564 Networked Systems Security SYLLABUS

Page 1/.. USA / Canada - South Africa Schedule No. 4 / 2011-Jan-24

Bellevue University Cybersecurity Programs & Courses

CALL FOR REGISTRATION

EIT ICT Labs MASTER SCHOOL. Specialisations

Westpac Travelling Scholarship University of Otago Business School Established in 1953 by the Trustees of the Dunedin Savings Bank (now Westpac).

Newsletter of the Bachelier Finance Society Volume 6, Number 2 April

Laurea Degree (M.Sc. equivalent) in Computer Science 25 July 2002

Secure Database Development

She has spent several visits at SRI International and George Mason University. In particular:

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment

UNIVERSITIES AND COLLEGES TO WHICH THE CLASS OF 2013 HAS BEEN ADMITTED

Business Intelligence meets Big Data: An Overview on Security and Privacy

ARC Call for Papers

The PhD Programme in Mechanical Engineering

Professor Jane Fountain conferences

SCIS Pudong High School

International Symposium on. Enterococci in Foods. Functional and Safety Aspects. 2nd Announcement and Call for Papers

The Value of Information Security Certifications

ANYI LIU. 125M, 2101 E. Coliseum Blvd. Tel: 1-(260) Indiana Univ. Purdue Univ. Fort Wayne Web:


State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Information Security Curriculum Creation: A Case Study

Curriculum Vitae February 20, 2016

An Object Oriented Role-based Access Control Model for Secure Domain Environments

Certified Information Systems Auditor (CISA)

Proceedings of the International Workshop on Semantic Technologies meet Recommender Systems & Big Data SeRSy 2012

Indian Institute of Technology Guwahati

Contact Centre Integration Assessment

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise

Sustainable Management as a New Business Paradigm

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

How the wealthy have been educated (article)

A Governance Framework for Building Secure IT Systems *

Security Transcends Technology

MANDATORY PROVIDENT FUND SCHEMES AUTHORITY

What is PIM? among its students, faculty and administrations. PIM was founded in 1973 with the objective of building international understanding.

IT Networking and Security

Call for Papers InstSIS-Las Vegas International Multidisciplinary Academic Conference 2015 IAABR- Las Vegas International Academic Conference

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Last Call for Papers. New Abstracts Submission Deadline: March 31st, 2010

Lecture Notes in Computer Science 7482

John Amore CEO General Insurance Zurich Financial Services

Emerging Trends and The Role of Standards in Future Health Systems. Nation-wide Healthcare Standards Adoption: Working Groups and Localization

14 October 2010 Bergamo Italy Entrepreneurship beyond Company Crisis: Value Creation through Corporate Restructuring

Governance, Risk and Compliance Assessment

PHD STUDENTS RESEARCH GRANT PROGRAMME 2016 AWARD IOC OLYMPIC STUDIES CENTRE OBJECTIVES, RULES AND GUIDELINES

World University Ranking - Times Higher Education ( )

Certified Cyber Security Analyst VS-1160

Transcription:

The Third International Workshop on Security In Information Systems WOSIS-2005 http://www.iceis.org/workshops/wosis/wosis2005-cfp.html May 24-25, 2005 Miami, USA First Announcement and Call for Papers To be held in conjunction with ICEIS 2005 www.iceis.org 7th International Conference on Enterprise Information Systems. Chairs: Dr. Eduardo Fernández-Medina [Eduardo.FdezMedina@uclm.es] University of Castilla-La Mancha, Spain Dr. Julio César Hernández Castro [jcesar@inf.uc3m.es] Carlos III University, Madrid, Spain Dr. Luis Javier García Villalba [javiergv@sip.ucm.es] Complutense University, Madrid, Spain Workshop Background and Goals Information Systems Security is one of the most pressing challenges facing all kind of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in keeping their information safe, in avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc. Nowadays, rapid technological advances are stimulating a greater use of information systems in organizations world-wide, which handle large quantities of data, managed by huge databases and datawarehouses. In

addition, information systems quite frequently manage information that can be considered sensitive, since it is related to certain intimate or personal aspects of persons (beliefs, medical data, sexual tendencies, etc.) and which must be specially protected. Many organizations, including not only companies but also governments of several countries, are now realizing how security problems can affect both business success and citizen rights, and they are proposing security policies, security planning, personal data protection laws, etc. All of these, including technological, legislative, ethical and political factors, justifies the importance of secure information systems, and encourage us to research in new techniques, models and methodologies, which could aid designers developing and implanting safe information systems which both protect information and keep within the law. This workshop will serve as a forum to gather academics, researchers, practitioners and students in the field of security in information systems. The workshop will present new developments, lessons learned from real world cases, and would provide the exchange of ideas and discussion on specific areas. Topics of interest include, but are not limited to - Methodologies for the development of security information system - Access control techniques - Personal data protection - Information systems risk management and analysis - Security in databases, datawarehouses and web information systems - Secure information systems architectures - Standards for information systems security - Metadata for Web and multimedia security - XML and RDF based metadata for security - Security Engineering - Assessment of security software/hardware - Study, validation and attacks on security protocols - Real world applications analysis - Cryptology: Cryptography and Cryptanalysis - Information hiding: Steganography & Steganalysis - Peer-to-Peer systems - Analysis and design of cryptographic algorithms - Electronic commerce - Wireless communications - RFID privacy and security implications - Anti-Spam techniques - Open source secure development - Emission security - Attacks on copyright marking systems

- Reliability of security systems - Disaster recovery - Security of clinical information systems - Cyberterrorism - E-Laws and e-government - PKI technology - VPNs, IPSEC, IPv6 - Economics aspects of security - Electronic Voting - Computer Forensics - Incident response - Privacy and freedom issues - Privacy-preserving Web-mining - Legal aspects of cyber security Format of the Workshop The workshop will consist of oral presentations. The proceedings of the workshop will be published in the form of a book (with ISBN) by ICEIS. Journal Special Issue A number of papers, selected by its high quality, after an additional review phase, will be published in the *Security in Information Systems Special Collection* of the prestigious *Journal of Research and Practice in information Technology* (JRPIT). Keynote speakers Pierangela Samarati is a Professor at the Department of Information Technology of the University of Milan. Her main research interests are access control policies, models and systems, data security and privacy, information system security, and information protection in general. She has participated in several projects involving different aspects of information protection. On these topics she has published more than 80 refereed technical papers in international journals and conferences. She is co-author of the book "Database Security," Addison-Wesley, 1995. She is a member of the Steering Committees of ACM SIGSAC -- Special Interest Group on Security, Audit, and Control; the European Symposium on Research in Computer Security (ESORICS); ACM Conference on Computer and Communications Security (ACM-CCS); the European Symposium on Research in Computer Security (ESORICS); the International Conference on Information and Communications Security (ICICS). She is a member of the Editorial Board of "The Journal of Computer Security" and of the International Review Board of the journal "Computers and Security," Elsevier. She is a member of the IEEE and IEEE Computer Society.

Submission of Papers Prospective authors are invited to submit papers for oral presentation in any of the areas listed above. Only full papers in English will be accepted. The length of the paper should not exceed 10 pages (5000 words). Instructions for preparing the manuscript (in Word and Latex format) are available at the ICEIS web site. Postscript/RTF versions of the manuscript should be submitted thru ICEIS web-based paper submission procedure. Important Dates Full paper submission: February 15, 2005 Author notification: March 10, 2005 Camera-ready paper submission: March 18, 2005 Workshop Program Committee Ambrosio Toval. University of Murcia. Spain Brajendra Panda. University of Arkansas. USA Christian Geuer-Pollmann. European Microsoft Innovation Center. Germany Claudia Barenco. University of Brazilia, Brazil Csilla Farkas. University of South Carolina. USA Duminda Wijesekera. University George Mason. USA Ed Dawson. Information Security Research Center, Queensland, Australia Eduardo B. Fernández. Florida Atlantic University. USA Ehud Gudes. Ben-Gurion Univerity. Israel Ernesto Damiani. Università degli Studi di Milano. Italy Günther Pernul. University of Regensburg. Germany Haralambos Mouratidis, University of East London, Dagenham, England Ian Brown. FIRP & University College London, UK Indrajit Ray. Colorado State University. USA Indrakshi Ray. Colorado State University. USA Jacques Stern. Ecole Normale Supérieure, Paris, France Jan Jürjens. TU Munich, Germany Jean-Jacques Quisquater. Université Catholique de Louvain, Belgium Mario Piattini. University of Castilla-La Mancha. Spain Mariagrazia Fugini. Politecnico di Milano. Italy Markus Dichtl. Siemens AG, München, Germany Martin Olivier. University of Pretoria. South Africa Narayana Jayaram. North London University, London, UK Paolo Giorgini. University of Trento. Italy Ravi Mukkamala. Old Dominion University. USA Robert Tolksdorf. Freie Universität Berlin. Germany Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy Serge Vaudenay. Ecole Polytechnique Federale de Lausanne, Swizertland Simon Shepherd. Bradford University, Bradford, UK Sujeet Shenoi. University of Tulsa. USA Sushil Jajodia. George Mason University. USA Sylvia Osborn. University of Western Ontario. Canada

T.C. Ting. University of Connecticut. USA Vijay Atluri. Rutgers University. USA Willem Jonker. University of Twente. The Netherlands Conference Location The workshop will be held at Deauville Beach Resort in Miami, USA. Registration Information To attend the workshop you need to register at http://www.iceis.org Secretariat ICEIS 2005 Secretariat - The Third International Workshop on Security In Information Systems E-mail: workshops@iceis.org Web site: http://www.iceis.org