posted by user: ardagna || 7325 views || tracked by 6 users: [display]

ICISS 2012 : Eighth International Conference on Information Systems Security


Conference Series : International Conference on Information Systems Security
When Dec 15, 2012 - Dec 19, 2012
Where Guwahati, India
Submission Deadline Jul 13, 2012
Notification Due Sep 3, 2012
Final Version Due Sep 15, 2012
Categories    security   information systems

Call For Papers


International Conference on Information Systems Security 2012
(ICISS 2012, Guwahati, India)

Important Dates
Proposal for Tutorials Workshops: May 25, 2012
Full Papers submission: July 13, 2012
Acceptance Notification: September 3, 2012
Camera-Ready Papers due: September 15, 2012
Conference: December 15-19, 2012

For more details please visit the websites:

The conference series ICISS (International Conference on Information
Systems Security), held annually, provides a forum for disseminating
latest research results in information and systems security. ICISS
2012, the Eight conference in this series, will be held under the aegis
of the newly formed Society for Research in Information Security and
Privacy (SRISP). The acceptance ratio of the first seven conferences
has averaged less than 30%, and the proceedings have been published as
part of the Springer Verlag series of Lecture Notes in Computer Science.
Submissions are encouraged from academia, industry and government
addressing theoretical and practical problems in information and systems
security and related areas.

Research community and academics are invited to submit theoretical and
application oriented full and short papers making a significant research
contribution on Information Systems Security. We especially like to
encourage papers in domains that have not been represented much in the
past at the conference, such as database security/privacy, usability aspects
of security, and smartphone security.

Topics of interest include (but not limited to)
* Application Security
* Formal Methods in Security
* Operating System Security
* Authentication and Access Control
* Intrusion Detection, Prevention & Response
* Privacy and Anonymity
* Biometric Security
* Intrusion Tolerance and Recovery
* Security in P2P, Sensor and Ad Hoc Networks
* Smartphone and Mobile Device Security
* Data Security
* Key Management and Cryptographic Protocols
* Software Security
* Digital Forensics and Diagnostics
* Language-based Security
* Vulnerability Detection and Mitigation
* Digital Rights Management
* Malware Analysis and Mitigation
* Web Security
* Distributed System Security
* Network Security

All accepted conference papers will be published in the conference
proceedings, published by the Springer Verlag series of Lecture Notes in
Computer Science.

• General Co-Chairs: Sukumar Nandi (IIT Guwahati) and R. Sekar (Stony Brook University)
• Program Co-chairs: Venkat Venkatakrishnan (University of Illinois at Chicago, USA) and Diganta Goswami (ITT Guwahati, India)
• Organizing Co-chairs: Santosh Biswas (IIT Guwahati) and Jatindra Kr. Deka (IIT Guwahati)
• Publications Chair: Samit Bhattacharya (IIT Guwahati)
• Submissions/Website Chair: Rigel Gjomemo, (University of Illinois at Chicago)
• Publicity Co-Chairs: Shamik Sural (IIT Kharagpur, India), Claudio A. Ardagna (Universita degli Studi di Milano, Italy), Aryabartta Sahu (IIT Guwahati, India)
• Tutorial Co-Chairs: Rajan Shankaran (Macquarie University, Australia) and Arijit Sur (IIT Guwahati, India)
• Finance Chair Sanasam: Ranbir Singh (IIT Guwahati, India)
• Student Forum Chair: Partha Sarathi Mandal (IIT Guwahati, India)

Program Committee:

Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad, India
Sandeep Bhatkar, Symantec Research Labs, USA
Prithvi Bisht University of Illinois at Chicago, USA
Lorenzo Cavallaro Royal Holloway, University of London, UK
Sanjit Chatterjee Indian Institute of Science, Bangalore, India
Frédéric Cuppens TELECOM Bretagne, France
Ashok Kumar Das International Institute of Information Technology, Hyderabad, India
Anupam Datta Carnegie Mellon University, USA
Meenakshi Dsouza International Institute of Information Technology, Bangalore, India
William Enck North Carolina State University, USA
Vinod Ganapathy Rutgers University, USA
Diganta Goswami Indian Institute of Technology, Guwahati, India (Program co-chair)
Kevin Hamlen University of Texas at Dallas, USA
Sebastian Hunt City University, London, UK
Sushil Jajodia George Mason University, USA
Somesh Jha University of Wisconsin at Madison, USA
Aditya Kanade Indian Institute of Science, Bangalore, India
Ram Krishnan University of Texas at San Antonio, USA
Zhichun Li NEC Laboratories America, USA
Zhenkai Liang National University of Singapore, Singapore
Anish Mathuria Dhirubhai Ambani Institute of Information and Communication Technology, India
Phu H. Phung Chalmers Univ. of Technology, Sweden
Indranil Sengupta Indian Institute of Technology, Kharagpur, India
Kapil Singh IBM T. J. Watson Research Center, USA
Scott Stoller Stony Brook University, USA
Mike Ter-Louw LGS Innovations, Bell Labs , USA
Alok Tongaonkar The Boeing Company, USA
Mahesh Tripunitara The University of Waterloo, Canada
Venkat Venkatakrishnan University of Illinois at Chicago, USA (Program co-chair)
Vinod Yegneswaran SRI International, USA
Stefano Zanero Politecnico di Milano, Italy

Related Resources

NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
ICISS 2022   5th International Conference on Intelligent Sustainable Systems (ICISS 2022)
ICCSEA 2021   11th International Conference on Computer Science, Engineering and Applications
IPMU 2022   19th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems
MDPI Mathematics InSysModGraph 2021   Special Issue Information Systems Modeling Based on Graph Theory
Baltic DB&IS 2022   15th International Baltic Conference on Digital Business and Intelligent Systems