Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    WOSIS 2015 - The 12th International Workshop on Security In Information Systems

    View: 637

    Website http://www.iceis.org/wosis.aspx | Want to Edit it Edit Freely

    Category security; information systems; big data; cloud; software engineering

    Deadline: January 20, 2015 | Date: April 27, 2015

    Venue/Country: Barcelona, Spain

    Updated: 2014-12-05 18:55:29 (GMT+9)

    Call For Papers - CFP

    [Apologies if you receive multiple copies of this announcement. Please pass it on to your colleagues and students who might be interested in contributing]

    CALL FOR PAPERS

    The 12th International Workshop on Security In Information Systems WOSIS-2015

    27 April, 2015 - Barcelona, Spain

    http://www.iceis.org/wosis.aspx

    To be held in conjunction with the 17th International Conference on Enterprise

    Information Systems (ICEIS 2015) http://www.iceis.org/

    IMPORTANT DATES

    Regular Paper Submission: January 20, 201

    Authors Notification: February 20, 2015

    Camera Ready Submission: March 7, 2015

    TOPICS

    In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on security in Big Data. Topics of interest include, but are not limited to:

    # Security in Big Data, Databases and Data Warehouses

    -Conceptual modeling approaches (UML, EER, etc.) for Big Data, DBs and DWs including security aspects

    -Security models oriented to NoSQL, DBs or DWs

    -Implementation of security into NoSQL tools (Cassandra, Hadoop, Hive, MongoDB, etc.), DBs or DWs

    -Mapreduce techniques for security

    -Metadata and Security

    -Secure Data Management

    -Data Confidentiality, Data Integrity or Secure Auditing

    # Security in Software Engineering

    -Security in agile software development

    -Secure architecture, design and deployment

    -Aspect-oriented, Model-driven development of secure software and systems

    -Domain-specific modeling languages (DSML) for secure software

    -Modeling privacy for software systems

    -Analysis and management of risks

    -Security requirements and Specification of security and privacy requirements and policies

    -Threats, vulnerability, and trust modeling

    -Testing for security, Security Metrics and Measurement

    -Static and dynamic analysis for security

    -Verification and assurance techniques for security properties

    -Model-based verification techniques for security properties

    -Case studies and experiences of secure software engineering

    # Security in Cloud Computing and Mobile Computing

    -Security Engineering and Security Requirements Engineering for Cloud-Based Systems

    -Risks and threats in Cloud

    -Identity, Access Management , Privacy and Data protection in Cloud

    -Issues and recent approaches in portability, interoperability and secure migration processes to cloud computing

    -Cloud Legal Issues

    -Trust and policy management in Clouds

    -Storage security and Cloud Infrastructure Security

    -Security Governance in the Cloud and Risk management and assessment and third-party risk management

    -Security in SaaS, PaaS, IaaS

    -Security in Cloud applications and case studies

    -Secure Mobile Cloud computing

    -MDA and MDS applied to cloud computing

    -Security for Mobile Computing, sensors networks, multimedia systems

    -Mobile security/privacy policies

    -Secure mobile software architecture and application design

    -Security and privacy issues related to user behavior

    # Rest of topics

    -Security Management and Assessment

    -Security culture, IT Governance and IT Service Continuity

    -Open Security Standards and Security Certification

    -Common practice, legal and regulatory issues

    -Security for SOA, Web Services, Grid computing and Social Network

    -Workflow and Business Process Security

    -Security ontology/taxonomy design

    -Semantic Web Technologies applied to Security

    -Security in Software Product Lines

    -Distributed and Network Security

    -Security & Trust Models

    -Authentication, Authorization and Access Control, Anonymity and Privacy

    -Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)

    -Security for embedded systems, smart cards and RFID

    -Security Issues in Ubiquitous/Pervasive Computing

    -Intellectual Property Protection, Personal Data Protection for Information Systems and Digital Identity management

    -Disaster Recovery and Failure Prevention, Incident Response and Prevention, Intrusion Detection and Fraud Detection

    -Biometric Security, Cryptology: Cryptography and Cryptanalysis, Information hiding: Steganography & Steganalysis and Digital Forensics

    -Cyber terrorism

    CO-CHAIRS

    Dr. David G. Rosado

    University of Castilla-La Mancha, Spain

    David.GRosadoatuclm.es

    General chair

    Dr. Carlos Blanco

    University of Cantabria, Spain

    blancobcatunican.es

    Programme chair

    Dr. Daniel Mellado

    Spanish Tax Agency, Spain

    damefeatesdebian.org

    Programme chair

    Dr. Jan Jurjens

    Technical University of Dortmund, Germany

    jan.jurjensatcs.tu-dortmund.de

    Programme chair

    Dr. Luis Enrique Sanchez

    University of Armed Forces, Ecuador

    luisenriqueatsanchezcrespo.org

    Enterprise security session chair

    Keynote Speaker

    Pending confirmation

    PAPER SUBMISSION

    Prospective authors are invited to submit papers for oral presentation in any of the topics listed above. Submitted papers must present original, non-published work of high quality. Only papers in English will be accepted.

    The paper submission types are as follow:

    - Regular Paper Submission.

    A regular paper presents a work where the research is completed or almost finished. It does not necessary means that the acceptance is as a full paper. It may be accepted as a "full paper" (30 min. oral presentation), or a "short paper" (20 min. oral presentation). The length of the paper should not exceed 10 pages for full papers and 8 pages for short papers (figures and appendices included).

    - Tool Demonstrations.

    The paper must not exceed 4 pages including all text, references and figures. It must contain the problem context, a typical usage scenario, existing tools and their shortcomings, the concepts behind the proposed tool, a graphical overview of the tool's architecture, a short discussion of the technologies used for implementation, a summary of experiments or other experiences with the tool, an outline of missing features and other future work, and the URL of the tool's website (if one exists).

    Instructions for preparing the manuscript (in Word and Latex formats) are available at the conference Paper Templates web page (http://www.iceis.org/GuidelinesTemplates.aspx). Please also check the web page with the Submission Guidelines. Papers should be submitted electronically via the web-based submission system at: http://www.insticc.org/Primoris

    PUBLICATIONS

    All accepted papers (full and short) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPECC, DBLP and EI (Elsevier Index).

    Additionally, the best papers will have the chance to publish extended and revised versions in a special issue of a Journal in the ISI Journal Citation Reports.

    PROGRAM COMMITTEE (tentative)

    Alfonso Rodriguez. University of Bio-Bio. Chile

    Ambrosio Toval. University of Murcia. Spain

    Andreas Bauer, National ICT Australia. Australia

    Antonio Maña. University of Malaga. Spain

    Brajendra Panda. University of Arkansas. USA

    Csilla Farkas. University of South Carolina. USA

    Daniel Mellado. University of Castilla-La Mancha. Spain

    Debasis Giri. Haldia Institute of Technology. India

    Duminda Wijesekera. University George Mason. USA

    Eduardo Fernández-Medina. University of Castilla-La Mancha. Spain

    Eduardo B. Fernández. Florida Atlantic University. USA

    Ernesto Damiani. Università degli Studi di Milano. Italy

    Federica Paci, University of Trento. Italy

    George Yee, Charleton University. Canada

    Günther Pernul, University of Regensburg. Germany

    Haris Mouratidis, University of East London. UK

    Hugo Jonker. University of Luxembourg. Luxembourg

    Indrajit Ray, Colorado State University. USA

    Indrakshi Ray. Colorado State University. USA

    Jaejoon Lee. Lancaster University. UK

    Jaime Delgado. Universitat Politècnica de Catalunya. Spain

    Juan Carlos Trujillo, University of Alicante. Spain

    Ketil Stoelen. Sintef. Norway

    Kevin Butler. University of Oregon. USA

    Komminist Weldemariam. Foundation Bruno Kessler. Italy

    Luigi Lo Iacono, European University of Applied Sciences. Germany

    María Carmen Fernández. Universidad de Málaga. Spain

    Mario Piattini. University of Castilla-La Mancha. Spain

    Mihai Christodorescu. University of Wisconsin. USA

    Paolo Giorgini, University of Trento. Italy

    Pino Caballero-Gil, University of La Laguna. Spain

    Raimundas Matulevicius, University of Tartu. Estonia

    Renato Iannella, Queensland University of Technology. Australia

    Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy

    Sakurai Kouichi, Kyushu University. Japan

    Shareful Islam. University of East London. UK

    Siani Pearson, Hewlett-Packard Laboratories. UK

    Sjouke Mauw, University of Luxembourg. Luxembourg

    Spyros Kokolakis. Athens University of Economics and Business. Greece

    Stamatis Karnouskos. SAP AG. Germany

    Steven Furnell. University of Plymouth. UK

    Thomas Santen, Microsoft Research Advanced Technology Labs Europe. Germany

    Toshihiro Yamauchi. Okayama University. Japan

    Yair Levy. Nova Southeastern University. USA


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.