| |||||||||||||||||
ISSA 2011 : Information Security for South Africa 2011Conference Series : Information Security for South Africa | |||||||||||||||||
Link: http://www.infosecsa.co.za | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Information Security for South Africa - ISSA 2011
15 - 17 Aug 2011 Johannesburg, South Africa http://www.infosecsa.co.za The 10th Annual ISSA Conference provides an international forum for the presentation of research in information security. We solicit previously unpublished papers offering novel research contributions in any aspect of information security. ISSA is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section. Full papers will be published in IEEE Explore. Due dates: 4 April 2011: Abstract submission 27 April 2011: Full paper submission for review Topics include, but are not limited to: * Access Control * Architectures and infrastructures * Audit * Authentication * Anti-Virus * Awareness and training in Security * Backup, Storage, Recovery * Biometrics * Business Continuity Planning and Management * Challenges and solutions of managing security * Communications / network security * Content Security * Corporate governance / Enterprise security * Digital forensics * Digital Identification and Authentication * Economy and philosophy of information security * Evaluation of Information Security in companies and information security surveys * Future visions for Information Security Management * Hacking / cracking * Information right management * Information security project management * Legal, ethical and social issues related to Information Security * Managing Information Security * Mobile Computing Security * Mobile phone security * Phishing * Practical industry presentations on managing information security * Privacy * Information Security Risk Analysis * Security Policy and Procedures * Small distribution applications * Smart Cards * Standards - Local & International * Strategic Information Security * Trust * Usability issues in information security * Vulnerability Assessments * Web Application security * Web Services * Wireless security * Wireless Sensor Network Security Organising committee: Hein Venter, Marijke Coetzee & Marianne Loock |
|