posted by user: INSTICC_conferences || 6374 views || tracked by 16 users: [display]

WOSIS 2012 : Security in Information Systems - WOSIS@ICEIS 2012

FacebookTwitterLinkedInGoogle

Link: http://www.iceis.org/WOSIS.aspx
 
When Jun 28, 2012 - Jul 1, 2012
Where Wroclaw, Poland
Submission Deadline Mar 30, 2012
Notification Due Apr 20, 2012
Final Version Due May 4, 2012
Categories    security   communications   information technology
 

Call For Papers

Workshop International Workshop on
Security in Information Systems - WOSIS 2012

28 - 01 July, 2012 - Wroclaw, Poland

In conjunction with the 14th International Conference on Enterprise Information Systems - ICEIS 2012
Chair
David G. Rosado
University of Castilla-la Mancha
Spain


Luis Enrique Sánchez Crespo
Sicaman Nuevas Tecnologias
Spain

Carlos Blanco
University of Cantabria
Spain

Jan Jürjens
TU Dortmund & Fraunhofer ISST
Germany


Scope

Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.

There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.

Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.

With the increasing dependence that the information society has on Information and Communication Technology (ICT), the need to protect information is increasingly important for companies. The demand for products, systems and services with which to manage and maintain information is therefore increasing, and the realization of superficial security controls is not sufficient. It is necessary to apply a rigorous approach to the assessing and improvement of the security of products and processes that take place in the context of ICT. This has led to the emergence of Information Security Management Systems (ISMS), which are of great importance to the stability of companies’ information systems.

In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on one of the most important issues and currently considered as it is security in Cloud computing. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption as is security followed by issues regarding compliance, privacy and legal matters. Security is the main obstacle for many organizations in their move to the cloud, related to risk areas such as external data storage, dependency on the “public” internet, multi-tenancy and integration with internal security. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such distributed environments and that its adoption is not any problem for the society, administration and enterprise.

Topics of Interest

Topics of interest include, but are not limited to:

Topics for Cloud Computing
Security Engineering for Cloud-Based Systems
Security Requirements Engineering for Cloud-Based Systems
Risks and threats in Cloud
Privacy and Data protection in Cloud
Cloud Legal Issues
Trust and policy management in Clouds
Issues and recent approaches in portability, interoperability and migration
Secure migration processes to cloud computing
Security in migration models
Systems adapted to the cloud
Storage security
Cloud Infrastructure Security
Security Governance in the Cloud
Risk management and assessment and third-party risk management
Identity & Access Management in the Cloud
Security and Virtualization
Security in SaaS, PaaS and IaaS
Security in Cloud applications
Cloud security models
MDA and MDS applied to cloud computing
Case studies

Rest of topics
Security in Software development Life Cycle
Information Security Management System
Security Management and Assessment
Analysis and management of risks
Security Implementation, Secure programming and Security Deployment
Case studies and experiences of secure software
Security culture
IT Governance
IT Service Continuity
Language-based Security
Open Security Standards and Security Certification
Common practice, legal and regulatory issues
Security for SOA, Web Services, Grid computing
Security for Databases and Data Warehouses
Metadata and Security
Secure Data Management
Workflow and Business Process Security
Security Metrics and Measurement
Security Ontologies
Security in Software Product Lines
Distributed and Network Security
Security & Trust Models
Authentication, Authorization and Access Control
Anonymity and Privacy
Security for Mobile Computing, sensors networks, multimedia systems
Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)
Security in Social Networks
Security for embedded systems, smart cards and RFID
Security Issues in Ubiquitous/Pervasive Computing
Intellectual Property Protection
Digital Rights Management (DRM). Mobile DRM
Personal Data Protection for Information Systems and Digital Identity management
Access Control and Rights Expression Languages
Semantic Web Technologies applied to Security
Security Engineering
Disaster Recovery and Failure Prevention
Incident Response and Prevention
Intrusion Detection and Fraud Detection
Biometric Security
Cryptology: Cryptography and Cryptanalysis
Information hiding: Steganography & Steganalysis
Digital Forensics
Cyber terrorism

Important Dates

Paper Submission: March 30, 2012
Authors Notification: April 20, 2012
Final Paper Submission and Registration: May 4, 2012

Paper Submission

Prospective authors are invited to submit papers in any of the topics listed above.
Instructions for preparing the manuscript (in Word and Latex formats) are available at: Paper Templates
Please also check the Submission Guidelines.
Papers should be submitted electronically via the web-based submission system at: http://www.insticc.org/Primoris

Publications

All accepted papers (full, short and posters) will be published in a special section of the conference proceedings book - under an ISBN reference and on CD-ROM support - and submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Secretariat Contacts

ICEIS Workshops - WOSIS 2012
e-mail: iceis.secretariat@insticc.org
Weblink: http://www.iceis.org/workshops.aspx#WOSIS

Related Resources

WTDSI-SBSI 2019   Workshop de Teses e Dissertações em Sistemas de Informação
ATN 2019   Acta Technica Napocensis- Electronics and Telecommunications 4/2019
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
ICCSEA 2019   9th International Conference on Computer Science, Engineering and Applications
SIGSPATIAL 2020   28th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
SP 2020   IEEE Symposium on Security and Privacy
IJMNCT 2019   International Journal of Mobile Network Communications & Telematics
ICIIP 2020   2020 9th International Conference on Intelligent Information Processing (ICIIP 2020)
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
SIPRO 2020   6th International Conference on Signal and Image Processing