ICISS 2009 : International Conference on Information Systems Security
Conference Series : International Conference on Information Systems Security
Call For Papers
The conference series ICISS (International Conference on Information Systems Security), held annually,
provides a forum for disseminating the latest research results in information and systems security.
The acceptance ratio of the first four conferences has averaged less than 30%, and the proceedings have
been published as part of the Springer Verlag series of Lecture Notes in Computer Science. The ICISS 2009
encourages submissions addressing theoretical and practical problems in information and systems security
and related areas. We especially like to encourage papers in domains that have not been represented much
in the past at the conference, such as database security/privacy, usability aspects of security, operating
systems security, and sensor networks security. Papers that introduce and address unique security challenges
or present thought-provoking ideas are also welcome. For details please refer to conference website at:
Manuscript Submission (Full Paper): 15 July 2009
Tutorial Proposal Submission: 03 August 2009
Notification of Acceptance: 04th Sep 2009
Submission of Camera-Ready Manuscript: 21 Sep 2009
Submissions must be made to the submission web site. Papers should be formatted as they would appear in the
final LNCS proceedings. Papers should be at most 15 pages in length, including the bibliography. One of the
authors of an accepted paper must attend the conference to present the paper. Conference papers will be presented
between Dec. 16th and 18th, 2009. ICISS accepts only electronic submissions in PDF format. Note that our publisher,
Springer LNCS series, strongly prefers camera-ready manuscripts to be submitted in LaTeX2e (or LaTeX) format using
the llncs.cls LaTeX template provided by Springer Verlag. See detailed manuscript preparation instructions and options
at Information for LNCS Authors.
Dual Submission Policy: Submitted papers must not substantially overlap with papers published or currently submitted
to a journal or a conference with proceedings.
Proceedings: Conference Proceedings will be published in the Springer LNCS series.
There will be a poster/demo session for researchers to present new ideas and latest preliminary research. Ideas that
provoke, intrigue, or inspire information security audience are specially encouraged. These can be submitted closer
to the conference date. The submission can be just a poster, just a demo, or a combination of the two. Further details
on submission deadlines to be provided later.
Contact Poster/Demo Session Chair: Prof. Raja Datta: rajadatta at ece.iitkgp.ernet.in.
There will be tutorial program for two days (14-15 December 2009). At most four three-hour tutorials will be offered.
Proposals are invited for tutorials of duration three hours on relevant topics of current interest. A tutorial proposal
should include the extended abstract of the tutorial and a brief biography of the speaker(s). Please mail your proposal
to A.K. Pujari or Indrakshi Ray (reachable via iciss09-tutorials at umich.edu) by 3rd Aug 2009. The speaker(s) of the
accepted proposals need to submit their final presentation one month before the conference to the Tutorial Chairs.
Conference Website: http://www.eecs.umich.edu/iciss09/