| |||||||||||||||
ICISS 2012 : Eighth International Conference on Information Systems SecurityConference Series : International Conference on Information Systems Security | |||||||||||||||
Link: http://www.iitg.ernet.in/iciss2012/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
=======================================================================
CALL FOR PAPERS International Conference on Information Systems Security 2012 (ICISS 2012, Guwahati, India) http://www.iitg.ernet.in/iciss2012/ http://www.cs.uic.edu/~iciss12/ ======================================================================== Important Dates Proposal for Tutorials Workshops: May 25, 2012 Full Papers submission: July 13, 2012 Acceptance Notification: September 3, 2012 Camera-Ready Papers due: September 15, 2012 Conference: December 15-19, 2012 For more details please visit the websites: http://www.iitg.ernet.in/iciss2012/ http://www.cs.uic.edu/~iciss12/ ========================================================================= The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating latest research results in information and systems security. ICISS 2012, the Eight conference in this series, will be held under the aegis of the newly formed Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first seven conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. Submissions are encouraged from academia, industry and government addressing theoretical and practical problems in information and systems security and related areas. Research community and academics are invited to submit theoretical and application oriented full and short papers making a significant research contribution on Information Systems Security. We especially like to encourage papers in domains that have not been represented much in the past at the conference, such as database security/privacy, usability aspects of security, and smartphone security. Topics of interest include (but not limited to) * Application Security * Formal Methods in Security * Operating System Security * Authentication and Access Control * Intrusion Detection, Prevention & Response * Privacy and Anonymity * Biometric Security * Intrusion Tolerance and Recovery * Security in P2P, Sensor and Ad Hoc Networks * Smartphone and Mobile Device Security * Data Security * Key Management and Cryptographic Protocols * Software Security * Digital Forensics and Diagnostics * Language-based Security * Vulnerability Detection and Mitigation * Digital Rights Management * Malware Analysis and Mitigation * Web Security * Distributed System Security * Network Security All accepted conference papers will be published in the conference proceedings, published by the Springer Verlag series of Lecture Notes in Computer Science. ========================================================================= Organizers: • General Co-Chairs: Sukumar Nandi (IIT Guwahati) and R. Sekar (Stony Brook University) • Program Co-chairs: Venkat Venkatakrishnan (University of Illinois at Chicago, USA) and Diganta Goswami (ITT Guwahati, India) • Organizing Co-chairs: Santosh Biswas (IIT Guwahati) and Jatindra Kr. Deka (IIT Guwahati) • Publications Chair: Samit Bhattacharya (IIT Guwahati) • Submissions/Website Chair: Rigel Gjomemo, (University of Illinois at Chicago) • Publicity Co-Chairs: Shamik Sural (IIT Kharagpur, India), Claudio A. Ardagna (Universita degli Studi di Milano, Italy), Aryabartta Sahu (IIT Guwahati, India) • Tutorial Co-Chairs: Rajan Shankaran (Macquarie University, Australia) and Arijit Sur (IIT Guwahati, India) • Finance Chair Sanasam: Ranbir Singh (IIT Guwahati, India) • Student Forum Chair: Partha Sarathi Mandal (IIT Guwahati, India) Program Committee: Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad, India Sandeep Bhatkar, Symantec Research Labs, USA Prithvi Bisht University of Illinois at Chicago, USA Lorenzo Cavallaro Royal Holloway, University of London, UK Sanjit Chatterjee Indian Institute of Science, Bangalore, India Frédéric Cuppens TELECOM Bretagne, France Ashok Kumar Das International Institute of Information Technology, Hyderabad, India Anupam Datta Carnegie Mellon University, USA Meenakshi Dsouza International Institute of Information Technology, Bangalore, India William Enck North Carolina State University, USA Vinod Ganapathy Rutgers University, USA Diganta Goswami Indian Institute of Technology, Guwahati, India (Program co-chair) Kevin Hamlen University of Texas at Dallas, USA Sebastian Hunt City University, London, UK Sushil Jajodia George Mason University, USA Somesh Jha University of Wisconsin at Madison, USA Aditya Kanade Indian Institute of Science, Bangalore, India Ram Krishnan University of Texas at San Antonio, USA Zhichun Li NEC Laboratories America, USA Zhenkai Liang National University of Singapore, Singapore Anish Mathuria Dhirubhai Ambani Institute of Information and Communication Technology, India Phu H. Phung Chalmers Univ. of Technology, Sweden Indranil Sengupta Indian Institute of Technology, Kharagpur, India Kapil Singh IBM T. J. Watson Research Center, USA Scott Stoller Stony Brook University, USA Mike Ter-Louw LGS Innovations, Bell Labs , USA Alok Tongaonkar The Boeing Company, USA Mahesh Tripunitara The University of Waterloo, Canada Venkat Venkatakrishnan University of Illinois at Chicago, USA (Program co-chair) Vinod Yegneswaran SRI International, USA Stefano Zanero Politecnico di Milano, Italy ========================================================================= |
|