posted by user: xgeorgio || 9969 views || tracked by 13 users: [display]

ISSA 2011 : Information Security for South Africa 2011

FacebookTwitterLinkedInGoogle


Conference Series : Information Security for South Africa
 
Link: http://www.infosecsa.co.za
 
When Aug 15, 2011 - Aug 17, 2011
Where Johannesburg
Abstract Registration Due Apr 4, 2011
Submission Deadline Apr 29, 2011
Notification Due Jun 27, 2011
Final Version Due Jul 10, 2011
Categories    security   network security   software security   security management
 

Call For Papers

Information Security for South Africa - ISSA 2011
15 - 17 Aug 2011
Johannesburg, South Africa
http://www.infosecsa.co.za

The 10th Annual ISSA Conference provides an international forum for the presentation of research in information security. We solicit previously unpublished papers offering novel research contributions in any aspect of information security.

ISSA is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section. Full papers will be published in IEEE Explore.

Due dates:
4 April 2011: Abstract submission
27 April 2011: Full paper submission for review


Topics include, but are not limited to:
* Access Control
* Architectures and infrastructures
* Audit
* Authentication
* Anti-Virus
* Awareness and training in Security
* Backup, Storage, Recovery
* Biometrics
* Business Continuity Planning and Management
* Challenges and solutions of managing security
* Communications / network security
* Content Security
* Corporate governance / Enterprise security
* Digital forensics
* Digital Identification and Authentication
* Economy and philosophy of information security
* Evaluation of Information Security in companies and information security surveys
* Future visions for Information Security Management
* Hacking / cracking
* Information right management
* Information security project management
* Legal, ethical and social issues related to Information Security
* Managing Information Security
* Mobile Computing Security
* Mobile phone security
* Phishing
* Practical industry presentations on managing information security
* Privacy
* Information Security Risk Analysis
* Security Policy and Procedures
* Small distribution applications
* Smart Cards
* Standards - Local & International
* Strategic Information Security
* Trust
* Usability issues in information security
* Vulnerability Assessments
* Web Application security
* Web Services
* Wireless security
* Wireless Sensor Network Security


Organising committee:
Hein Venter, Marijke Coetzee & Marianne Loock

Related Resources

ICIIT--EI 2026   2026 11th International Conference on Intelligent Information Technology (ICIIT 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICIEE--EI 2026   2026 15th International Conference on Information and Electronics Engineering (ICIEE 2026)
ITCCMA 2025   12th International Conference on Information Technology, Control, Chaos, Modeling and Applications
ICIIT 2026   2026 11th International Conference on Intelligent Information Technology (ICIIT 2026)
MLNLP 2025   6th International Conference on Machine Learning Techniques and NLP
Springer ICIM 2026   Springer--2026 the 12th International Conference on Information Management (ICIM 2026)
CSEITT 2025   3rd International Conference on Computer Science, Engineering and Information Technology Trends
IVSP 2026   2026 8th International Conference on Image, Video and Signal Processing (IVSP 2026)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications