posted by user: xgeorgio || 7258 views || tracked by 12 users: [display]

ISSA 2012 : INFORMATION SECURITY FOR SOUTH AFRICA

FacebookTwitterLinkedInGoogle


Conference Series : Information Security for South Africa
 
Link: http://www.infosecsa.co.za/
 
When Aug 15, 2012 - Aug 15, 2012
Where Johannesburg, South Africa
Abstract Registration Due Apr 8, 2012
Submission Deadline Apr 20, 2012
Notification Due Jun 20, 2012
Final Version Due Jul 10, 2012
Categories    information security   network security   computer security   digital forensics
 

Call For Papers

ISSA 2012 is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section. All accepted papers will be published in IEEE Xplore.

The objectives of the 11th ISSA 2012 conference is to bring together national and international researchers and practitioners in Information Security to provide a platform to present latest developments. We solicit previously unpublished papers offering novel research contributions in all aspects of information security. The conference will also include invited presentations by experts from academia and industry, a tutorial session, workshops and special sessions.

Topics include, but are not limited to:
Access Control, Architectures and infrastructures, Audit, Authentication, Anti-Virus, Awareness and training in Security, Backup, Storage, Recovery, Biometrics, Business Continuity Planning and Management, Challenges and solutions of managing security, Communications / network security, Content Security, Corporate governance / Enterprise security, Digital forensics, Digital Identification and Authentication, Economy and philosophy of information security, Evaluation of Information Security in companies and information security surveys, Future visions for Information Security Management, Hacking / cracking, Information right management, Information security project management, Legal, ethical and social issues related to Information Security, Managing Information Security, Mobile Computing Security, Mobile phone security, Phishing, Practical industry presentations on managing information security, Privacy, Information Security Risk Analysis, Security Policy and Procedures, Small distribution applications, Smart Cards, Standards - Local & International, Strategic Information Security, Trust, Usability issues in information security, Vulnerability Assessments

IMPORTANT DATES
---------------------------
Abstracts: from 6 to 18 April 2012 (1 page)
Full papers: 20 April 2012
Conference: 15-17 August 2012


SUBMISSION DETAILS
--------------------------
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal.

Please visit http://www.infosecsa.co.za for more details on the topics, guidelines and other information.


ORGANISING COMMITTEE
Hein Venter (hventer@cs.up.ac.za) Department of Computer Science, University of Pretoria
Marijke Coetzee (marijkec@uj.ac.za) Academy of Computer Science and Software Engineering, University of Johannesburg
Marianne Loock (loockm@unisa.ac.za) School of Computing, University of South Africa

Related Resources

CITDS 2026   2026 IEEE 4th Conference on Information Technology and Data Science
CRIS 2026   12th International Conference on Cryptography and Information Security
IJNSA 2026   International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52
RegCom 2026   RegCom 2026 : The Pilot Task for Regulatory Compliance of ESG Reports
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
EI/Scopus-CSQIT 2026   2026 International Conference on Computer Science and Quantum Information Technology-EI/Scopus
ICRE--EI 2026   2026 10th International Conference on Reliability Engineering (ICRE 2026)
IJDPS 2026   International Journal of Distributed and Parallel systems
EDUR 2026   4th International Conference on Educational Research
CTADS 2026   2026 2nd International Conference on Communication Technology and Data Security-EI/Scopus