posted by user: xgeorgio || 9731 views || tracked by 13 users: [display]

ISSA 2011 : Information Security for South Africa 2011

FacebookTwitterLinkedInGoogle


Conference Series : Information Security for South Africa
 
Link: http://www.infosecsa.co.za
 
When Aug 15, 2011 - Aug 17, 2011
Where Johannesburg
Abstract Registration Due Apr 4, 2011
Submission Deadline Apr 29, 2011
Notification Due Jun 27, 2011
Final Version Due Jul 10, 2011
Categories    security   network security   software security   security management
 

Call For Papers

Information Security for South Africa - ISSA 2011
15 - 17 Aug 2011
Johannesburg, South Africa
http://www.infosecsa.co.za

The 10th Annual ISSA Conference provides an international forum for the presentation of research in information security. We solicit previously unpublished papers offering novel research contributions in any aspect of information security.

ISSA is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section. Full papers will be published in IEEE Explore.

Due dates:
4 April 2011: Abstract submission
27 April 2011: Full paper submission for review


Topics include, but are not limited to:
* Access Control
* Architectures and infrastructures
* Audit
* Authentication
* Anti-Virus
* Awareness and training in Security
* Backup, Storage, Recovery
* Biometrics
* Business Continuity Planning and Management
* Challenges and solutions of managing security
* Communications / network security
* Content Security
* Corporate governance / Enterprise security
* Digital forensics
* Digital Identification and Authentication
* Economy and philosophy of information security
* Evaluation of Information Security in companies and information security surveys
* Future visions for Information Security Management
* Hacking / cracking
* Information right management
* Information security project management
* Legal, ethical and social issues related to Information Security
* Managing Information Security
* Mobile Computing Security
* Mobile phone security
* Phishing
* Practical industry presentations on managing information security
* Privacy
* Information Security Risk Analysis
* Security Policy and Procedures
* Small distribution applications
* Smart Cards
* Standards - Local & International
* Strategic Information Security
* Trust
* Usability issues in information security
* Vulnerability Assessments
* Web Application security
* Web Services
* Wireless security
* Wireless Sensor Network Security


Organising committee:
Hein Venter, Marijke Coetzee & Marianne Loock

Related Resources

Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACIE 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ICCDE 2025   2026 12th International Conference on Computing and Data Engineering (ICCDE 2026)
SECRYPT 2025   22nd International Conference on Security and Cryptography
ICDMIS 2025   International Conference on Data Mining and Information Security
NTIJ 2025   Nanoscience and Technology: An International Journal