posted by user: INSTICC_conferences || 6919 views || tracked by 16 users: [display]

WOSIS 2012 : Security in Information Systems - WOSIS@ICEIS 2012


When Jun 28, 2012 - Jul 1, 2012
Where Wroclaw, Poland
Submission Deadline Mar 30, 2012
Notification Due Apr 20, 2012
Final Version Due May 4, 2012
Categories    security   communications   information technology

Call For Papers

Workshop International Workshop on
Security in Information Systems - WOSIS 2012

28 - 01 July, 2012 - Wroclaw, Poland

In conjunction with the 14th International Conference on Enterprise Information Systems - ICEIS 2012
David G. Rosado
University of Castilla-la Mancha

Luis Enrique Sánchez Crespo
Sicaman Nuevas Tecnologias

Carlos Blanco
University of Cantabria

Jan Jürjens
TU Dortmund & Fraunhofer ISST


Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.

There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.

Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.

With the increasing dependence that the information society has on Information and Communication Technology (ICT), the need to protect information is increasingly important for companies. The demand for products, systems and services with which to manage and maintain information is therefore increasing, and the realization of superficial security controls is not sufficient. It is necessary to apply a rigorous approach to the assessing and improvement of the security of products and processes that take place in the context of ICT. This has led to the emergence of Information Security Management Systems (ISMS), which are of great importance to the stability of companies’ information systems.

In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on one of the most important issues and currently considered as it is security in Cloud computing. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption as is security followed by issues regarding compliance, privacy and legal matters. Security is the main obstacle for many organizations in their move to the cloud, related to risk areas such as external data storage, dependency on the “public” internet, multi-tenancy and integration with internal security. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such distributed environments and that its adoption is not any problem for the society, administration and enterprise.

Topics of Interest

Topics of interest include, but are not limited to:

Topics for Cloud Computing
Security Engineering for Cloud-Based Systems
Security Requirements Engineering for Cloud-Based Systems
Risks and threats in Cloud
Privacy and Data protection in Cloud
Cloud Legal Issues
Trust and policy management in Clouds
Issues and recent approaches in portability, interoperability and migration
Secure migration processes to cloud computing
Security in migration models
Systems adapted to the cloud
Storage security
Cloud Infrastructure Security
Security Governance in the Cloud
Risk management and assessment and third-party risk management
Identity & Access Management in the Cloud
Security and Virtualization
Security in SaaS, PaaS and IaaS
Security in Cloud applications
Cloud security models
MDA and MDS applied to cloud computing
Case studies

Rest of topics
Security in Software development Life Cycle
Information Security Management System
Security Management and Assessment
Analysis and management of risks
Security Implementation, Secure programming and Security Deployment
Case studies and experiences of secure software
Security culture
IT Governance
IT Service Continuity
Language-based Security
Open Security Standards and Security Certification
Common practice, legal and regulatory issues
Security for SOA, Web Services, Grid computing
Security for Databases and Data Warehouses
Metadata and Security
Secure Data Management
Workflow and Business Process Security
Security Metrics and Measurement
Security Ontologies
Security in Software Product Lines
Distributed and Network Security
Security & Trust Models
Authentication, Authorization and Access Control
Anonymity and Privacy
Security for Mobile Computing, sensors networks, multimedia systems
Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)
Security in Social Networks
Security for embedded systems, smart cards and RFID
Security Issues in Ubiquitous/Pervasive Computing
Intellectual Property Protection
Digital Rights Management (DRM). Mobile DRM
Personal Data Protection for Information Systems and Digital Identity management
Access Control and Rights Expression Languages
Semantic Web Technologies applied to Security
Security Engineering
Disaster Recovery and Failure Prevention
Incident Response and Prevention
Intrusion Detection and Fraud Detection
Biometric Security
Cryptology: Cryptography and Cryptanalysis
Information hiding: Steganography & Steganalysis
Digital Forensics
Cyber terrorism

Important Dates

Paper Submission: March 30, 2012
Authors Notification: April 20, 2012
Final Paper Submission and Registration: May 4, 2012

Paper Submission

Prospective authors are invited to submit papers in any of the topics listed above.
Instructions for preparing the manuscript (in Word and Latex formats) are available at: Paper Templates
Please also check the Submission Guidelines.
Papers should be submitted electronically via the web-based submission system at:


All accepted papers (full, short and posters) will be published in a special section of the conference proceedings book - under an ISBN reference and on CD-ROM support - and submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SciTePress Digital Library ( SciTePress is member of CrossRef (

Secretariat Contacts

ICEIS Workshops - WOSIS 2012

Related Resources

ITTCS 2021   Information Technologies, Telecommunications and Control Systems
IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
SI: Advanced Technology for IE 2022   Special Issue: Secure and Advanced Technology for Intelligent Environments
CST 2021   8th International Conference on Foundations of Computer Science & Technology
ICSRS--Scopus & EI 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
IJAIT 2021   International Journal of Advanced Information Technology
IoTSP 2021   Internet of Things Security and Privacy: Practical and Management Perspectives
JEDT 2021   International Journal of Electronic Design and Test
EMERGING 2021   The Thirteenth International Conference on Emerging Networks and Systems Intelligence
ICRE--EI, Scopus 2021   2021 5th International Conference on Reliability Engineering (ICRE 2021)--EI Compendex, Scopus