WOSIS: Security in Information Systems



Past:   Proceedings on DBLP

Future:  Post a CFP for 2015 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
WOSIS 2014 International Workshop on Security In Information Systems
Apr 27, 2014 - Apr 27, 2014 Lisbon, Portugal Jan 31, 2014
WOSIS 2013 The Tenth International Workshop on Security In Information Systems
Jul 3, 2013 - Jul 7, 2013 Angers, France Apr 9, 2013
WOSIS 2012 International Workshop on Security in Information Systems
Jun 28, 2012 - Jun 28, 2012 Wrocław, Poland Mar 30, 2012
WOSIS 2011 International Workshop on Security in Information Systems
Jun 8, 2011 - Jun 11, 2011 Beijing, China Mar 7, 2011
WOSIS 2008 The Sixth International Workshop on Security In Information Systems
Jun 12, 2008 - Jun 13, 2008 Barcelona, Spain Mar 3, 2008

Present CFP : 2014

[Apologies if you receive multiple copies of this announcement. Please pass it on to your colleagues and students who might be interested in contributing]


The 11th International Workshop on Security In Information Systems WOSIS-2014
27 April, 2014 - Lisbon, Portugal

To be held in conjunction with the 16th International Conference on Enterprise
Information Systems (ICEIS 2014) http://www.iceis.org/

Regular Paper Submission: January 31, 2014
Authors Notification: February 17, 2014
Camera Ready Submission: March 3, 2014

In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on security in Big Data.

Topics of interest include, but are not limited to:

Security in Big Data, Databases and Data Warehouses
- Conceptual modeling approaches (UML, EER, etc.) for Big Data, DBs and DWs including security aspects
-Security models oriented to NoSQL, DBs or DWs
-Implementation of security into NoSQL tools (Cassandra, Hadoop, Hive, MongoDB, etc.), DBs or DWs
-Mapreduce techniques for security
-Metadata and Security
-Secure Data Management
-Data Confidentiality, Data Integrity or Secure Auditing

Security in Software Engineering
-Security in agile software development
-Secure architecture, design and deployment
-Aspect-oriented, Model-driven development of secure software and systems
-Domain-specific modeling languages (DSML) for secure software
-Modeling privacy for software systems
-Analysis and management of risks
-Security requirements and Specification of security and privacy requirements and policies
-Threats, vulnerability, and trust modeling
-Testing for security, Security Metrics and Measurement
-Static and dynamic analysis for security
-Verification and assurance techniques for security properties
-Model-based verification techniques for security properties
-Case studies and experiences of secure software engineering

Security in Cloud Computing and Mobile Computing
-Security Engineering and Security Requirements Engineering for Cloud-Based Systems
-Risks and threats in Cloud
-Identity, Access Management , Privacy and Data protection in Cloud
-Issues and recent approaches in portability, interoperability and secure migration processes to cloud computing
-Cloud Legal Issues
-Trust and policy management in Clouds
-Storage security and Cloud Infrastructure Security
-Security Governance in the Cloud and Risk management and assessment and third-party risk management
-Security in SaaS, PaaS, IaaS
-Security in Cloud applications and case studies
-Secure Mobile Cloud computing
-MDA and MDS applied to cloud computing
-Security for Mobile Computing, sensors networks, multimedia systems
-Mobile security/privacy policies
-Secure mobile software architecture and application design
-Security and privacy issues related to user behavior

Rest of topics
-Security Management and Assessment
-Security culture, IT Governance and IT Service Continuity
-Open Security Standards and Security Certification
-Common practice, legal and regulatory issues
-Security for SOA, Web Services, Grid computing and Social Network
-Workflow and Business Process Security
-Security ontology/taxonomy design
-Semantic Web Technologies applied to Security
-Security in Software Product Lines
-Distributed and Network Security
-Security & Trust Models
-Authentication, Authorization and Access Control, Anonymity and Privacy
-Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)
-Security for embedded systems, smart cards and RFID
-Security Issues in Ubiquitous/Pervasive Computing
-Intellectual Property Protection, Personal Data Protection for Information Systems and Digital Identity management
-Disaster Recovery and Failure Prevention, Incident Response and Prevention, Intrusion Detection and Fraud Detection
-Biometric Security, Cryptology: Cryptography and Cryptanalysis, Information hiding: Steganography & Steganalysis and Digital Forensics
-Cyber terrorism

Dr. David G. Rosado
University of Castilla-La Mancha, Spain

Dr. Carlos Blanco
University of Cantabria, Spain

Dr. Daniel Mellado
Spanish Tax Agency, Spain

Dr. Jan Jurjens
Technical University of Dortmund, Germany

Enterprise Security Session CHAIR
Dr. Luis Enrique Sanchez
University of Armed Forces, Ecuador

Prospective authors are invited to submit papers for oral presentation in any of the topics listed above. Submitted papers must present original, non-published work of high quality. Only papers in English will be accepted.

The paper submission types are as follow:

- Regular Paper Submission.
A regular paper presents a work where the research is completed or almost finished. It does not necessary means that the acceptance is as a full paper. It may be accepted as a "full paper" (30 min. oral presentation), or a "short paper" (20 min. oral presentation). The length of the paper should not exceed 10 pages for full papers and 8 pages for short papers (figures and appendices included).

- Tool Demostrations.
The paper must not exceed 4 pages including all text, references and figures. It must contain the problem context, a typical usage scenario, existing tools and their shortcomings, the concepts behind the proposed tool, a graphical overview of the tool's architecture, a short discussion of the technologies used for implementation, a summary of experiments or other experiences with the tool, an outline of missing features and other future work, and the URL of the tool's website (if one exists).

Instructions for preparing the manuscript (in Word and Latex formats) are available at the conference Paper Templates web page (http://www.iceis.org/GuidelinesTemplates.aspx). Please also check the web page with the Submission Guidelines. Papers should be submitted electronically via the web-based submission system at: http://www.insticc.org/Primoris

All accepted papers (full and short) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPECC, DBLP and EI (Elsevier Index). All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is member of CrossRef (http://www.crossref.org/).

Additionally, the best papers will have the chance to publish extended and revised versions in a special issue of a Journal in the ISI Journal Citation Reports.

Related Resources

LAJC 2024   Latin-American Journal of Computing
Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
InCIT 2024   The 8th International Conference on Information Technology
ICoSR 2024   2024 3rd International Conference on Service Robotics
CCCIS--EI 2025   2025 5th International Conference on Computer Communication and Information Systems (CCCIS 2025)
WiMoA 2024   16th International Conference on Wireless, Mobile Network & Applications
CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
IEEE Big Data - MMAI 2024   IEEE Big Data 2024 Workshop on Multimodal AI (Hybrid)
NordSec 2024   The 29th Nordic Conference on Secure IT systems (NordSec) 2024
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex