posted by user: vchang001 || 4691 views || tracked by 3 users: [display]

ESSB 2016 : Enterprise Security Springer Book 2016 (ESSB 2016)

FacebookTwitterLinkedInGoogle

Link: https://easychair.org/conferences/?conf=essb2016
 
When Jan 18, 2016 - Dec 1, 2016
Where Anyway on the Earth
Submission Deadline Mar 31, 2016
Notification Due May 2, 2016
Final Version Due May 31, 2016
Categories    security   privacy   risk   information and data security
 

Call For Papers

Enterprise Security Springer Book 2016 (ESSB 2016)

Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. There are instances whereby security breaches and privacy concerns have been the main factors preventing organizations from putting their resources in public and community domains. Even in private domains, there is no escape from the threats to cyber security, privacy, trust and risk. We live in an information age whereby there is a massive and rapid dissemination of
information. Protecting our data, privacy and rights has become increasingly important regardless where we are based and in which organization we work. Challenges such as data ownership, trust, unauthorized access and big data management should be resolved by using innovative methods, models, frameworks, case studies and analysis to reduce risks imposed by data leakage, hacking, breach of privacy and abuse use of data. To adopt the best practices, papers that can fully address security, privacy and risk concerns are welcome. We seek papers from both
technical security (theory, prototype, experiments, simulations, proofs-of-concept and product development) and information system security (review, frameworks, best practices, statistical analysis based on surveys and recommendations) that provide good recommendations and research contributions to enterprise security. Topics are
the same as the ES 2015 workshop. Anyone can submit, with or without attending ES 2015. Please ensure the quality of your submission is excellent. Important dates:

Submission deadline: March 31, 2016
Result of the first round returned: May 2, 2016 or as soon as possible
Submission deadline of the 2nd round: May 31, 2016
Notification of results: June 15, 2016 or as soon as possible
Final version of book chapter: July 8, 2016 or as early as possible
Submission: https://easychair.org/conferences/?conf=essb2016

Editors: Dr Victor Chang, Leeds Beckett University, UK (corresponding editor, email:
ic.victor.chang@gmail.com with the email title: Enterprise Security Springer Book 2016)
Dr Muthu Ramachandran, Leeds Beckett University, UK
Dr Robert Walters and Dr Gary Wills, University of Southampton, UK
Recommended reading:
http://www.sciencedirect.com/science/article/pii/S0167739X15003118
http://www.sciencedirect.com/science/article/pii/S026840121500095X
http://www.sciencedirect.com/science/article/pii/S0167739X13002926
Related event: http://cipsijoomla.ux.uis.no/cloudcom2015/index.php/enterprise-security
Topics of interest include (but are not limited to):
* Algorithms, software engineering and development
* System design and implementation
* Testing (software engineering; penetration; product development)
* Encryption (all aspects)
* Firewall, access control, identity management
* Experiments of using security solutions and proof-of-concepts
* Large-scale simulations in the Cloud, Big Data and Internet of Things
* Intrusion and detection techniques
* Social engineering and ethical hacking: techniques and case studies
* Risk Modeling, business process modeling and analytics
* Trust and privacy
* Data security, data recovery, disaster recovery
* Data center management
* Adoption challenges and recommendation
* Risk management and control
* Business and economic models
* Change management and continuous service improvement
* Information systems related issues
* Conceptual frameworks and models
* Emerging issues and recommendations for organizational security
* E-Commerce and online banking
* Social network analysis, emerging issues in social networks
* Education and e-Learning
* Surveys and their quantitative analysis
* Architecture (technical or organizational)
* Case studies

The focus of this book project is to present new techniques, demonstrations, innovative approaches and case studies related to Enterprise Security. The impacts of research contributions are as follows.
- Explain how to implement enterprise security and their added values.
- Demonstrate how enterprise security can be used in different case studies.
- Describe how to resolve challenges in each adoption scenario.
- Provide reproducible steps for anyone to follow, and support reproducibility, an important aspect in computer
science.
- Explain how their IT services can work effectively in production and real-time
- Present how their services can make contributions to users involved in the use of Cloud/IT services and adoption.
- Sum up and disseminate all the lessons learned and recommendation to play an influential role in academia and
industry.

Related Resources

CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Call for Book Chapter 2024   Call for Chapters for Four Books of the Springer Edited Book Series “Decision Sciences and Data Analytics for Operations and Business Excellence”
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Computational Response Control 2024   Computational Response Control in Structures: Theory, Optimization and AI Applications
JoL 2024   International Journal of Law
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
Springer ISPR'2024   The 4'th International Conference on Intelligent Systems and Pattern Recognition