posted by user: xgeorgio || 6302 views || tracked by 12 users: [display]

ISSA 2012 : INFORMATION SECURITY FOR SOUTH AFRICA

FacebookTwitterLinkedInGoogle


Conference Series : Information Security for South Africa
 
Link: http://www.infosecsa.co.za/
 
When Aug 15, 2012 - Aug 15, 2012
Where Johannesburg, South Africa
Abstract Registration Due Apr 8, 2012
Submission Deadline Apr 20, 2012
Notification Due Jun 20, 2012
Final Version Due Jul 10, 2012
Categories    information security   network security   computer security   digital forensics
 

Call For Papers

ISSA 2012 is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section. All accepted papers will be published in IEEE Xplore.

The objectives of the 11th ISSA 2012 conference is to bring together national and international researchers and practitioners in Information Security to provide a platform to present latest developments. We solicit previously unpublished papers offering novel research contributions in all aspects of information security. The conference will also include invited presentations by experts from academia and industry, a tutorial session, workshops and special sessions.

Topics include, but are not limited to:
Access Control, Architectures and infrastructures, Audit, Authentication, Anti-Virus, Awareness and training in Security, Backup, Storage, Recovery, Biometrics, Business Continuity Planning and Management, Challenges and solutions of managing security, Communications / network security, Content Security, Corporate governance / Enterprise security, Digital forensics, Digital Identification and Authentication, Economy and philosophy of information security, Evaluation of Information Security in companies and information security surveys, Future visions for Information Security Management, Hacking / cracking, Information right management, Information security project management, Legal, ethical and social issues related to Information Security, Managing Information Security, Mobile Computing Security, Mobile phone security, Phishing, Practical industry presentations on managing information security, Privacy, Information Security Risk Analysis, Security Policy and Procedures, Small distribution applications, Smart Cards, Standards - Local & International, Strategic Information Security, Trust, Usability issues in information security, Vulnerability Assessments

IMPORTANT DATES
---------------------------
Abstracts: from 6 to 18 April 2012 (1 page)
Full papers: 20 April 2012
Conference: 15-17 August 2012


SUBMISSION DETAILS
--------------------------
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal.

Please visit http://www.infosecsa.co.za for more details on the topics, guidelines and other information.


ORGANISING COMMITTEE
Hein Venter (hventer@cs.up.ac.za) Department of Computer Science, University of Pretoria
Marijke Coetzee (marijkec@uj.ac.za) Academy of Computer Science and Software Engineering, University of Johannesburg
Marianne Loock (loockm@unisa.ac.za) School of Computing, University of South Africa

Related Resources

Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
ACIE 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ICCDE 2025   2026 12th International Conference on Computing and Data Engineering (ICCDE 2026)
NTIJ 2025   Nanoscience and Technology: An International Journal
ICDMIS 2025   International Conference on Data Mining and Information Security
ISDFS 2025   13th International Symposium on Digital Forensics and Security