posted by user: SecurityAB || 5540 views || tracked by 7 users: [display]

WOSIS 2012 : International Workshop on Security in Information Systems


Conference Series : Security in Information Systems
When Jun 28, 2012 - Jun 28, 2012
Where Wrocław, Poland
Submission Deadline Mar 30, 2012
Notification Due Apr 20, 2012
Final Version Due May 4, 2012
Categories    security   information system

Call For Papers

In conjunction with the 14th International Conference on Enterprise Information Systems - ICEIS 2012

Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.

There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.

Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.

With the increasing dependence that the information society has on Information and Communication Technology (ICT), the need to protect information is increasingly important for companies. The demand for products, systems and services with which to manage and maintain information is therefore increasing, and the realization of superficial security controls is not sufficient. It is necessary to apply a rigorous approach to the assessing and improvement of the security of products and processes that take place in the context of ICT. This has led to the emergence of Information Security Management Systems (ISMS), which are of great importance to the stability of companies’ information systems.

In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on one of the most important issues and currently considered as it is security in Cloud computing. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption as is security followed by issues regarding compliance, privacy and legal matters. Security is the main obstacle for many organizations in their move to the cloud, related to risk areas such as external data storage, dependency on the “public” internet, multi-tenancy and integration with internal security. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such distributed environments and that its adoption is not any problem for the society, administration and enterprise.
Topics of Interest
Topics of interest include, but are not limited to:

Topics for Cloud Computing
Security Engineering for Cloud-Based Systems
Security Requirements Engineering for Cloud-Based Systems
Risks and threats in Cloud
Privacy and Data protection in Cloud
Cloud Legal Issues
Trust and policy management in Clouds
Issues and recent approaches in portability, interoperability and migration
Secure migration processes to cloud computing
Security in migration models
Systems adapted to the cloud
Storage security
Cloud Infrastructure Security
Security Governance in the Cloud
Risk management and assessment and third-party risk management
Identity & Access Management in the Cloud
Security and Virtualization
Security in SaaS, PaaS and IaaS
Security in Cloud applications
Cloud security models
MDA and MDS applied to cloud computing
Case studies

Rest of topics
Security in Software development Life Cycle
Information Security Management System
Security Management and Assessment
Analysis and management of risks
Security Implementation, Secure programming and Security Deployment
Case studies and experiences of secure software
Security culture
IT Governance
IT Service Continuity
Language-based Security
Open Security Standards and Security Certification
Common practice, legal and regulatory issues
Security for SOA, Web Services, Grid computing
Security for Databases and Data Warehouses
Metadata and Security
Secure Data Management
Workflow and Business Process Security
Security Metrics and Measurement
Security Ontologies
Security in Software Product Lines
Distributed and Network Security
Security & Trust Models
Authentication, Authorization and Access Control
Anonymity and Privacy
Security for Mobile Computing, sensors networks, multimedia systems
Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)
Security in Social Networks
Security for embedded systems, smart cards and RFID
Security Issues in Ubiquitous/Pervasive Computing
Intellectual Property Protection
Digital Rights Management (DRM). Mobile DRM
Personal Data Protection for Information Systems and Digital Identity management
Access Control and Rights Expression Languages
Semantic Web Technologies applied to Security
Security Engineering
Disaster Recovery and Failure Prevention
Incident Response and Prevention
Intrusion Detection and Fraud Detection
Biometric Security
Cryptology: Cryptography and Cryptanalysis
Information hiding: Steganography & Steganalysis
Digital Forensics
Cyber terrorism

David G. Rosado
University of Castilla-la Mancha

Luis Enrique Sánchez Crespo
Sicaman Nuevas Tecnologias

Carlos Blanco
University of Cantabria

Jan Jürjens
TU Dortmund & Fraunhofer ISST

Related Resources

Elec-SI-IIDS 2021   Special Issue on Design of Intelligent Intrusion Detection Systems
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ICCIS--IEEE, Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2020)--Ei Compendex, Scopus
AIP Journal - Indexed in Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
IEEE--ICCIS--Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2020)--Ei Compendex, Scopus
CISDM 2020   2020 2nd Euro-Asia Conference on Information System and Data Mining (CISDM 2020)
SI: Advanced Technology for IE 2022   Special Issue: Secure and Advanced Technology for Intelligent Environments
CiVEJ 2020   Civil Engineering and Urban Planning: An International Journal
ICRE--EI, Scopus 2021   2021 5th International Conference on Reliability Engineering (ICRE 2021)--EI Compendex, Scopus
IEEE--ICCIS--Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2021)--Ei Compendex, Scopus