posted by user: ardagna || 7902 views || tracked by 6 users: [display]

ICISS 2012 : Eighth International Conference on Information Systems Security


Conference Series : International Conference on Information Systems Security
When Dec 15, 2012 - Dec 19, 2012
Where Guwahati, India
Submission Deadline Jul 13, 2012
Notification Due Sep 3, 2012
Final Version Due Sep 15, 2012
Categories    security   information systems

Call For Papers


International Conference on Information Systems Security 2012
(ICISS 2012, Guwahati, India)

Important Dates
Proposal for Tutorials Workshops: May 25, 2012
Full Papers submission: July 13, 2012
Acceptance Notification: September 3, 2012
Camera-Ready Papers due: September 15, 2012
Conference: December 15-19, 2012

For more details please visit the websites:

The conference series ICISS (International Conference on Information
Systems Security), held annually, provides a forum for disseminating
latest research results in information and systems security. ICISS
2012, the Eight conference in this series, will be held under the aegis
of the newly formed Society for Research in Information Security and
Privacy (SRISP). The acceptance ratio of the first seven conferences
has averaged less than 30%, and the proceedings have been published as
part of the Springer Verlag series of Lecture Notes in Computer Science.
Submissions are encouraged from academia, industry and government
addressing theoretical and practical problems in information and systems
security and related areas.

Research community and academics are invited to submit theoretical and
application oriented full and short papers making a significant research
contribution on Information Systems Security. We especially like to
encourage papers in domains that have not been represented much in the
past at the conference, such as database security/privacy, usability aspects
of security, and smartphone security.

Topics of interest include (but not limited to)
* Application Security
* Formal Methods in Security
* Operating System Security
* Authentication and Access Control
* Intrusion Detection, Prevention & Response
* Privacy and Anonymity
* Biometric Security
* Intrusion Tolerance and Recovery
* Security in P2P, Sensor and Ad Hoc Networks
* Smartphone and Mobile Device Security
* Data Security
* Key Management and Cryptographic Protocols
* Software Security
* Digital Forensics and Diagnostics
* Language-based Security
* Vulnerability Detection and Mitigation
* Digital Rights Management
* Malware Analysis and Mitigation
* Web Security
* Distributed System Security
* Network Security

All accepted conference papers will be published in the conference
proceedings, published by the Springer Verlag series of Lecture Notes in
Computer Science.

• General Co-Chairs: Sukumar Nandi (IIT Guwahati) and R. Sekar (Stony Brook University)
• Program Co-chairs: Venkat Venkatakrishnan (University of Illinois at Chicago, USA) and Diganta Goswami (ITT Guwahati, India)
• Organizing Co-chairs: Santosh Biswas (IIT Guwahati) and Jatindra Kr. Deka (IIT Guwahati)
• Publications Chair: Samit Bhattacharya (IIT Guwahati)
• Submissions/Website Chair: Rigel Gjomemo, (University of Illinois at Chicago)
• Publicity Co-Chairs: Shamik Sural (IIT Kharagpur, India), Claudio A. Ardagna (Universita degli Studi di Milano, Italy), Aryabartta Sahu (IIT Guwahati, India)
• Tutorial Co-Chairs: Rajan Shankaran (Macquarie University, Australia) and Arijit Sur (IIT Guwahati, India)
• Finance Chair Sanasam: Ranbir Singh (IIT Guwahati, India)
• Student Forum Chair: Partha Sarathi Mandal (IIT Guwahati, India)

Program Committee:

Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad, India
Sandeep Bhatkar, Symantec Research Labs, USA
Prithvi Bisht University of Illinois at Chicago, USA
Lorenzo Cavallaro Royal Holloway, University of London, UK
Sanjit Chatterjee Indian Institute of Science, Bangalore, India
Frédéric Cuppens TELECOM Bretagne, France
Ashok Kumar Das International Institute of Information Technology, Hyderabad, India
Anupam Datta Carnegie Mellon University, USA
Meenakshi Dsouza International Institute of Information Technology, Bangalore, India
William Enck North Carolina State University, USA
Vinod Ganapathy Rutgers University, USA
Diganta Goswami Indian Institute of Technology, Guwahati, India (Program co-chair)
Kevin Hamlen University of Texas at Dallas, USA
Sebastian Hunt City University, London, UK
Sushil Jajodia George Mason University, USA
Somesh Jha University of Wisconsin at Madison, USA
Aditya Kanade Indian Institute of Science, Bangalore, India
Ram Krishnan University of Texas at San Antonio, USA
Zhichun Li NEC Laboratories America, USA
Zhenkai Liang National University of Singapore, Singapore
Anish Mathuria Dhirubhai Ambani Institute of Information and Communication Technology, India
Phu H. Phung Chalmers Univ. of Technology, Sweden
Indranil Sengupta Indian Institute of Technology, Kharagpur, India
Kapil Singh IBM T. J. Watson Research Center, USA
Scott Stoller Stony Brook University, USA
Mike Ter-Louw LGS Innovations, Bell Labs , USA
Alok Tongaonkar The Boeing Company, USA
Mahesh Tripunitara The University of Waterloo, Canada
Venkat Venkatakrishnan University of Illinois at Chicago, USA (Program co-chair)
Vinod Yegneswaran SRI International, USA
Stefano Zanero Politecnico di Milano, Italy

Related Resources

ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
EAI ICECI 2023   4th International Conference on Edge Computing and IoT: Systems, Management and Security
NeTCoM 2023   15th International Conference on Networks & Communications
ER 2023   42nd International Conference on Conceptual Modeling
IJASUC 2023   International Journal of Ad hoc, Sensor & Ubiquitous Computing
MVSCIT 2023   International Conference on Managing Value, Supply Chains and Public Sector Information Technology
AMA 2023   7th International Conference on Applied Mathematics and Sciences
DT4CS 2023   Special Issue on Digital Twins for Complex Systems in Big Data and Cognitive Computing Journal
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI