| |||||||||||
| |||||||||||
All CFPs on WikiCFP | |||||||||||
| |||||||||||
Present CFP : 2010 | |||||||||||
**** CALL FOR PAPER – VISM 2010 ****
First International Workshop on Visualization and Information Security Management To be held in conjunction with the 21st DEXA conference (http://www.dexa.org) Bilbao, Spain University of Deusto August 30th - September 3rd 2010 In today's global economy, where conditions change often and rapidly, the efficient, effective as well as continuous management of information security has become a central issue.Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security techniques will fail, if there is no adequate management attentionenablingproper planning, design and implementation of these techniques. At this point, visualization plays a fundamental role in mining, aggregating and presenting relevant information. The purpose of this conference is to act as an interdisciplinary platform for decision-makers, academics, and professionals interested in the development and application of concepts as well as technology in ensuring the sustainable use and management of information. Several orientations of research can be imagined, and we welcome submissions coming from various disciplinary or methodological horizons. We are keen to encourage practitioners to contribute as well as academics and we would like to encourage proposals dealing in particular with one of the following aspects. **** Topics of interest **** Topics of interest include, but are not limited to: Auditing Business Continuity Cost/Benefit Analysis Data Hiding Techniques Data Recovery Digital Evidence Digital Evidence Extraction Techniques Digital Evidence Search Techniques Digital Forensic Information Visualization Digital Forensics Disaster Recovery Identity Management Information Assurance Information Security Management Information Security Metrics and Measurement Insider Threats IT Governance and Compliance IT Service Continuity Management and Virtualization Tools Risk Management Security Awareness and Education Security Culture Security Requirements Engineering Standards, Best Practices and Certification **** Deadlines **** Submission Deadline: April 16th, 2010 Author Notification: May 01st, 2010 Author Registration: May 17th, 2010 Proceedings Version: May 17th, 2010 Conference/Workshop: August 29th – September 03rd, 2010 **** Workshop Organizers **** Stefan Jakoubi, Secure Business Austria, Austria Simon Tjoa, St. Pölten University of Applied Sciences, Austria **** Program Committee **** Markus Aleksy, University of Mannheim, Germany, confirmed Jocelyn Aubert, Public Research Centre Henri Tudor, Luxembourg Maximilian Bielecki, University of Vienna, Austria, confirmed Ludwig Fuchs, University of Regensburg, Germany, confirmed Grant Osborne, University of South Australia, Australia, confirmed Rainer Poisel, St. Pölten University of Applied Sciences, Austria, confirmed Torsten Priebe, Terradata, confirmed Gerald Quirchmayr, University of Vienna, Austria, confirmed Stefan Sackmann, University of Freiburg, Germany, confirmed Christian Schläger, E&Y, Germany, confirmed Matt Simon, University of South Australia, Australia, confirmed A Min Tjoa, Vienna University of Technology, Austria, confirmed Benjamin Turnbull, University of South Australia, Australia Edgar Weippl, Secure Business Austria, confirmed **** Paper Submission **** Authors are invited to submit original, unpublished research and application papers that are not being considered in another forum. Manuscripts will be limited to 5 two-column pages (IEEE Proceeding style) including figures and references. Please follow the IEEE Computer Society's Conference Publishing Services Author Guidelines to prepare your papers. Authors of accepted papers are requested to sign the IEEE copyright form. The author guidelines can be found at http://www.computer.org/portal/web/cscps/formatting. Papers have to be electronically (PDF, DOC) submitted via the DEXA submission system (http://confdriver.ifs.tuwien.ac.at/dexa2010/). At least one author of each accepted paper is required to attend the conference and present the paper. Papers accepted for presentation will be published by IEEE Computer Society Press as proceedings of the DEXA 2010 workshops. **** Contact **** Stefan Jakoubi Secure Business Austria sjakoubi[-at-]sba-research.org Simon Tjoa St. Pölten University of Applied Sciences simon.tjoa[-at-]fhstp.ac.at | |||||||||||
|