posted by user: VISM2010 || 3941 views || tracked by 11 users: [display]

VISM 2010 : International Workshop on Visualization and Information Security Management

FacebookTwitterLinkedInGoogle


Conference Series : Visualization and Information Security Management
 
Link: http://www.security-conference.eu/VISM
 
When Aug 30, 2010 - Sep 3, 2010
Where Bilbao, Spain
Abstract Registration Due May 17, 2010
Submission Deadline Apr 16, 2010
Notification Due May 1, 2010
Final Version Due May 17, 2010
Categories    information security   security   digital forensics   governance, risk and complianc
 

Call For Papers

**** CALL FOR PAPER – VISM 2010 ****
First International Workshop on Visualization and Information Security Management

To be held in conjunction with the 21st DEXA conference (http://www.dexa.org)

Bilbao, Spain
University of Deusto
August 30th - September 3rd 2010

In today's global economy, where conditions change often and rapidly, the efficient, effective as well as continuous management of information security has become a central issue.Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security techniques will fail, if there is no adequate management attentionenablingproper planning, design and implementation of these techniques. At this point, visualization plays a fundamental role in mining, aggregating and presenting relevant information.
The purpose of this conference is to act as an interdisciplinary platform for decision-makers, academics, and professionals interested in the development and application of concepts as well as technology in ensuring the sustainable use and management of information. Several orientations of research can be imagined, and we welcome submissions coming from various disciplinary or methodological horizons. We are keen to encourage practitioners to contribute as well as academics and we would like to encourage proposals dealing in particular with one of the following aspects.

**** Topics of interest ****

Topics of interest include, but are not limited to:

Auditing
Business Continuity
Cost/Benefit Analysis
Data Hiding Techniques
Data Recovery
Digital Evidence
Digital Evidence Extraction Techniques
Digital Evidence Search Techniques
Digital Forensic Information Visualization
Digital Forensics
Disaster Recovery
Identity Management Information Assurance
Information Security Management
Information Security Metrics and Measurement
Insider Threats
IT Governance and Compliance
IT Service Continuity
Management and Virtualization Tools
Risk Management
Security Awareness and Education
Security Culture
Security Requirements Engineering
Standards, Best Practices and Certification

**** Deadlines ****

Submission Deadline: April 16th, 2010
Author Notification: May 01st, 2010
Author Registration: May 17th, 2010
Proceedings Version: May 17th, 2010
Conference/Workshop: August 29th – September 03rd, 2010

**** Workshop Organizers ****

Stefan Jakoubi, Secure Business Austria, Austria
Simon Tjoa, St. Pölten University of Applied Sciences, Austria

**** Program Committee ****

Markus Aleksy, University of Mannheim, Germany, confirmed
Jocelyn Aubert, Public Research Centre Henri Tudor, Luxembourg
Maximilian Bielecki, University of Vienna, Austria, confirmed
Ludwig Fuchs, University of Regensburg, Germany, confirmed
Grant Osborne, University of South Australia, Australia, confirmed
Rainer Poisel, St. Pölten University of Applied Sciences, Austria, confirmed
Torsten Priebe, Terradata, confirmed
Gerald Quirchmayr, University of Vienna, Austria, confirmed
Stefan Sackmann, University of Freiburg, Germany, confirmed
Christian Schläger, E&Y, Germany, confirmed
Matt Simon, University of South Australia, Australia, confirmed
A Min Tjoa, Vienna University of Technology, Austria, confirmed
Benjamin Turnbull, University of South Australia, Australia
Edgar Weippl, Secure Business Austria, confirmed

**** Paper Submission ****

Authors are invited to submit original, unpublished research and application papers that are not being considered in another forum. Manuscripts will be limited to 5 two-column pages (IEEE Proceeding style) including figures and references. Please follow the IEEE Computer Society's Conference Publishing Services Author Guidelines to prepare your papers. Authors of accepted papers are requested to sign the IEEE copyright form. The author guidelines can be found at http://www.computer.org/portal/web/cscps/formatting.

Papers have to be electronically (PDF, DOC) submitted via the DEXA submission system (http://confdriver.ifs.tuwien.ac.at/dexa2010/).

At least one author of each accepted paper is required to attend the conference and present the paper. Papers accepted for presentation will be published by IEEE Computer Society Press as proceedings of the DEXA 2010 workshops.

**** Contact ****

Stefan Jakoubi
Secure Business Austria
sjakoubi[-at-]sba-research.org

Simon Tjoa
St. Pölten University of Applied Sciences
simon.tjoa[-at-]fhstp.ac.at

Related Resources

ICEMI 2018   2018 3rd International Conference on Economics and Management Innovations
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
ICISA 2018   9th iCatse Conference on Information Science and Applications
eCrime 2018   13th Symposium on Electronic Crime Research
ICSS 2017   3rd International Conference on Software Security
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
ICKEA--IEEE, Ei Compendex & Scopus 2018   2018 3rd International Conference on Knowledge Engineering and Applications (ICKEA 2018)--IEEE, Ei Compendex & Scopus
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy