posted by user: SecurityAB || 6990 views || tracked by 7 users: [display]

WOSIS 2012 : International Workshop on Security in Information Systems

FacebookTwitterLinkedInGoogle


Conference Series : Security in Information Systems
 
Link: http://www.iceis.org/WOSIS.aspx
 
When Jun 28, 2012 - Jun 28, 2012
Where Wrocław, Poland
Submission Deadline Mar 30, 2012
Notification Due Apr 20, 2012
Final Version Due May 4, 2012
Categories    security   information system
 

Call For Papers

In conjunction with the 14th International Conference on Enterprise Information Systems - ICEIS 2012

Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.

There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.

Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.

With the increasing dependence that the information society has on Information and Communication Technology (ICT), the need to protect information is increasingly important for companies. The demand for products, systems and services with which to manage and maintain information is therefore increasing, and the realization of superficial security controls is not sufficient. It is necessary to apply a rigorous approach to the assessing and improvement of the security of products and processes that take place in the context of ICT. This has led to the emergence of Information Security Management Systems (ISMS), which are of great importance to the stability of companies’ information systems.

In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on one of the most important issues and currently considered as it is security in Cloud computing. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption as is security followed by issues regarding compliance, privacy and legal matters. Security is the main obstacle for many organizations in their move to the cloud, related to risk areas such as external data storage, dependency on the “public” internet, multi-tenancy and integration with internal security. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such distributed environments and that its adoption is not any problem for the society, administration and enterprise.
Topics of Interest
Topics of interest include, but are not limited to:

Topics for Cloud Computing
Security Engineering for Cloud-Based Systems
Security Requirements Engineering for Cloud-Based Systems
Risks and threats in Cloud
Privacy and Data protection in Cloud
Cloud Legal Issues
Trust and policy management in Clouds
Issues and recent approaches in portability, interoperability and migration
Secure migration processes to cloud computing
Security in migration models
Systems adapted to the cloud
Storage security
Cloud Infrastructure Security
Security Governance in the Cloud
Risk management and assessment and third-party risk management
Identity & Access Management in the Cloud
Security and Virtualization
Security in SaaS, PaaS and IaaS
Security in Cloud applications
Cloud security models
MDA and MDS applied to cloud computing
Case studies

Rest of topics
Security in Software development Life Cycle
Information Security Management System
Security Management and Assessment
Analysis and management of risks
Security Implementation, Secure programming and Security Deployment
Case studies and experiences of secure software
Security culture
IT Governance
IT Service Continuity
Language-based Security
Open Security Standards and Security Certification
Common practice, legal and regulatory issues
Security for SOA, Web Services, Grid computing
Security for Databases and Data Warehouses
Metadata and Security
Secure Data Management
Workflow and Business Process Security
Security Metrics and Measurement
Security Ontologies
Security in Software Product Lines
Distributed and Network Security
Security & Trust Models
Authentication, Authorization and Access Control
Anonymity and Privacy
Security for Mobile Computing, sensors networks, multimedia systems
Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)
Security in Social Networks
Security for embedded systems, smart cards and RFID
Security Issues in Ubiquitous/Pervasive Computing
Intellectual Property Protection
Digital Rights Management (DRM). Mobile DRM
Personal Data Protection for Information Systems and Digital Identity management
Access Control and Rights Expression Languages
Semantic Web Technologies applied to Security
Security Engineering
Disaster Recovery and Failure Prevention
Incident Response and Prevention
Intrusion Detection and Fraud Detection
Biometric Security
Cryptology: Cryptography and Cryptanalysis
Information hiding: Steganography & Steganalysis
Digital Forensics
Cyber terrorism

CO-CHAIRS
David G. Rosado
University of Castilla-la Mancha
Spain

Luis Enrique Sánchez Crespo
Sicaman Nuevas Tecnologias
Spain

Carlos Blanco
University of Cantabria
Spain

Jan Jürjens
TU Dortmund & Fraunhofer ISST
Germany

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ACM ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)