posted by user: lammari || 8022 views || tracked by 9 users: [display]

WISSE 2015 : Fifth International Workshop on Information Systems Security Engineering

FacebookTwitterLinkedInGoogle

Link: http://gsya.esi.uclm.es/WISSE2015/index.htm
 
When Jun 8, 2015 - Jun 8, 2015
Where Stockholm, Sweden
Submission Deadline Mar 8, 2015
Notification Due Mar 18, 2015
Final Version Due Mar 24, 2015
Categories    security   information system   privacy
 

Call For Papers

CALL FOR PAPERS

Fifth International Workshop on Information Systems Security Engineering - WISSE’15

http://gsya.esi.uclm.es/WISSE2015/index.htm

In conjunction with the
27th International Conference on Advanced Information Systems Engineering (CAiSE'15)
Stockholm, Sweden, 8 – 12 June 2015
http://caise2015.dsv.su.se/

Important Dates
Regular Research and Experience Paper Submission: February 15, 2015
Demo/poster papers: March 1, 2015
Authors Notification: March 13, 2015
Camera Ready Submission: March 21, 2015
Workshop Date: June 8, 2015

Workshop Description
Information systems security problems are currently a widespread and growing concern that covers most of the areas of society, such as business, domestic, financial, government, healthcare, and so on. The scientific community has realized the importance of aligning information systems engineering and security engineering in order to develop more secure information systems. Nevertheless, there is lack of an appropriate event that will promote information systems security within the context of information systems engineering. The proposed workshop fulfils this gap.
The workshop aims to provide a forum for researchers and practitioners to present, discuss and debate on one hand the latest research work on methods, models, practices and tools for secure information systems engineering, and on the other hand relevant industrial applications, recurring challenges, problems and industrial led solutions at the area of secure information systems engineering.


Topics of particular interest include (but are not limited to)
* Security and privacy analysis methods and models
* Security and privacy design methods and models
* Security and privacy testing methods and models
* Security and privacy modelling Support Tools
* Integrating functional, security and privacy requirements
* Threat-driven and Model-driven security
* Secure IS interoperability modelling
* Security and process modelling
* Modelling Security and Trust
* Managing Secure Software development
* Security in Agile Software Development Methods
* Methodologies and models for evaluating IS security and privacy aspects
* Formal methods for modelling security
* Models and approaches for the verification of security and privacy properties
* Approaches for managing security changes in IS
* Component-based, Aspect-oriented, Agent-based, Pattern-based, agile-based Information system Security development and evolution methods
* Methods, models and tools for workflow and Business Process Security
* Case studies in modelling secure IS
* Security Architectures and Patterns for Information Systems
* Semantic Web Technologies applied to Security
* Ontologies for IS security
* Security Engineering for specific Information Systems (e-Services, databases, mobile, internet, social networks, cloud, etc.)
* Security Engineering for SOA Systems
* Methods for security reengineering
* Software Security Knowledge
* Enterprise Software Security
* Cloud Forensics Requirements and Tools
* Methods, models and techniques for data anonymization
* Open Data and security
* Security and product lines
* Security of externalized IS

Submission
Prospective authors are invited to submit papers in any of the topics of the workshop. The results described must be unpublished and must not be under review elsewhere. Only papers in English will be accepted. Manuscripts must comply with the Springer LNCS formatting rules. Prepare your manuscript as a PDF file and submit it to the workshop organizers via the EasyChair system.
We accept three types of submissions: Regular Research Papers, Experience Papers and Demo/Poster Papers.

Regular Research Papers describe original solutions (theoretical, methodological or conceptual) in the field of secure information systems engineering. A regular research paper should describe the context of the work, the problem tackled, the relevant state of the art, the position or solution suggested and the benefits of the contribution. The length of regular research papers should not exceed 12 pages (including all text, figures, references and appendices.). Three to five keywords characterising the paper should be indicated at the end of the abstract.

Experience papers present application of work to case studies and industrial practice. Such papers should provide a detail description of the application setting, describe lessons learned, and discuss best practice. Experience papers should not exceed 12 pages (including all text, figures, references and appendices.). Three to five keywords characterising the paper should be indicated at the end of the abstract.

Demo/Poster papers should briefly discuss academic and/or industrial efforts on software tools and systems for secure information systems engineering. Demo/Poster papers should not exceed 1 page and they should provide a brief description of the research and software/system to be demonstrated. Poster papers are also ideal to explain a new idea and get feedback from the community. It is expected that accepted papers will be presented in the form of a live demonstration or a poster.
Submissions not conforming to the LNCS format and the above page limitations or being obviously out of the scope of the workshop will be rejected without review.

Registration
For each accepted submission, at least one author is expected to register for the workshop and attend the workshop in order to present the paper. Registration is through the CAiSE’15 web site.
Workshop Structure
The workshop will combine paper presentations, poster/demonstration session, and a keynote. Moreover, accepted papers apart from presentation time, will be assigned with one or two discussants with responsibility to initiate the discussion on the paper. We are confident that such structure will support a workshop environment that will be based on discussion, debate and will therefore provide an important contribution to the relevant research community.

List of PC members
Antonio Maña. University of Malaga. Spain
Akram Idani. University of Grenoble. France
Benjamin Nguyen. SMIS, INRIA-Rocquencourt, France
Brajendra Panda. University of Arkansas. USA
Bruno Defude. Télécom SudParis, France
Carlos Blanco. University of Cantabria. Spain
Christos Kalloniatis. University of the Aegean, Greece
Csilla Farkas. University of South Carolina. USA
Daniel Mellado. Spanish Tax Agency. Spain
Djamel Benslimane. University of Lyon 1, France
Eduardo B. Fernández. Florida Atlantic University. USA
Eduardo Fernández-Medina. University of Castilla-La Mancha. Spain
El-Bay Bourennane. University of Bourgogne, Dijon, France
Eric Dubois. CRP Henri Tudor. Luxembourg
Ernesto Damiani. Università degli Studi di Milano. Italy
Frédéric Cuppens. Telecom Bretagne. France
Günther Pernul. University of Regensburg. Germany
Guttorm Sindre. NTNU, Norway
Hanifa Boucheneb. Ecole polytechnique de Montréal, Quebec, Canada
Isabelle Comyn-Wattiau. CNAM. Paris, France
Jacky Akoka. CNAM. France
Jan Jürjens. Technical University of Dortmund, Germany
Javier López. University of Málaga. Spain
Ludovic Apvrille. Telecom ParisTech, France
Luis Enrique Sánchez. University of Castilla-La Mancha. Spain
Marc Frappier. University of Sherbrooke. Québec. Canada
Marc Chaumont. University of Montpellier, France
Matt Bishop. University of California. USA
Mohammad Zulkernine. Queen's University. Canada
Oliver Popov. Stockholm University, Sweden
Paolo Giorgini. University of Trento. Italy
Régine Laleau. Université Paris-Est Créteil. France
Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy
Shareeful Islam, University of East London, UK.
Stefanos Gritzalis, University of the Aegean, Greece
Steven Furnell. Plymouth University. UK
Tristan Allard. University of Montpellier 2, France
Vincent Nicomette. INSA de Toulouse, France
Yves Ledru. University of Grenoble. France

Workshop organization

General Chair:

Dr Nadira Lammari
CEDRIC-CNAM. 292 Rue Saint Martin
75141 Paris Cedex 03, France
lammari@cnam.fr

Programme Chairs:

Dr David G. Rosado
University of Castilla-La Mancha. Paseo de la Universidad, 4
13071 Ciudad Real, Spain
David.GRosado@uclm.es

Dr Christos Kalloniatis
University of the Aegean
Department of Cultural Technology and Communication
University Hill, Mytilene
Gr 81100, Lesvos, Greece
chkallon@aegean.gr

Steering Committee

Dr Nadira Lammari
CEDRIC-CNAM. 292 Rue Saint Martin
75141 Paris Cedex 03, France
lammari@cnam.fr

Dr Jan Jürjens
TU Dortmund & Fraunhofer ISST
Otto-Hahn-Str. 12 44221 Dortmund, Germany
jan.jurjens@cs.tu-dortmund.de

Dr Haris Mouratidis
School of Computing, Engineering and Mathematics,
University of Brighton, Brighton, BN2 4GJ, UK
H.Mouratidis@brighton.ac.uk

Dr David G. Rosado
University of Castilla-La Mancha. Paseo de la Universidad, 4
13071 Ciudad Real, Spain
David.GRosado@uclm.es

Dr Carlos Blanco
Department of Mathematics, Statistical and Computation.
Facultad de Ciencias. University of Cantabria.
Av. De los Castros, s/n — 39071, Santander, Spain
carlos.blanco@unican.es

Dr Christos Kalloniatis
University of the Aegean
Department of Cultural Technology and Communication
University Hill, Mytilene
Gr 81100, Lesvos, Greece
chkallon@aegean.gr

Publicity chairs:
Dr Shareeful Islam
School of Architecture, Computing and Engineering.
University of East London. Docklands Campus.
4/6 University Way, E16 2RD, London
shareeful@uel.ac.uk

Dr Luis Enrique Sánchez
University of Armed Forces, Ecuador
LuisEnrique@SanchezCrespo.org

Dr Akram Idani
LIG, University of Grenoble
681 rue de la Passerelle, 38402 Saint Martin d'Hères Cedex
Akram.Idani@imag.fr

Related Resources

ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications
ISKE--SCI 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
IJCACS 2024   International Journal of Control, Automation, Communication and Systems
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
CSITEC 2025   11th International Conference on Computer Science, Information Technology