7th International Conference on
Enterprise Information Systems

Workshops   

Workshops Paper Submission: deadline passed
Workshops Author Notification:
deadline passed
Workshops Camera-Ready Submission and Registration:
deadline passed

 
 

Home
Call For Papers
Doctoral Consortium
Program Committee
Keynote Lectures
Tutorials
Special Sessions
Workshops

Paper Submission
Paper Templates
Reviewers Only
Registration

Conference Program
Local Information
Accommodation
Social Events

Organizing Committee
Sponsors
Journals
Hall of Fame
Links

Organized by:

INSTICC

Co-organized by:







The Third International Workshop on

Security In Information Systems WOSIS-2005

May 24-25, 2005 Miami, USA

  First Announcement and Call for Papers 

 

Presentation Schedule

 

To be held in conjunction with ICEIS 2005 www.iceis.org 7th International Conference on Enterprise Information Systems.

 

PDF Version

 

Chairs:

Dr. Eduardo Fernández-Medina [Eduardo.FdezMedina@uclm.es
University of Castilla-La Mancha, Spain

Dr. Julio César Hernández Castro [jcesar@inf.uc3m.es
Carlos III University, Madrid, Spain

Dr. Luis Javier García Villalba [javiergv@sip.ucm.es
Complutense University, Madrid, Spain

Workshop Background and Goals

Information Systems Security is one of the most pressing challenges facing all kind of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in keeping their information safe, in avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.

Nowadays, rapid technological advances are stimulating a greater use of information systems in organizations world-wide, which handle large quantities of data, managed by huge databases and datawarehouses. In addition, information systems quite frequently manage information that can be considered sensitive, since it is related to certain intimate or personal aspects of persons (beliefs, medical data, sexual tendencies, etc.) and which must be specially protected. Many organizations, including not only companies but also governments of several countries, are now realizing how security problems can affect both business success and citizen rights, and they are proposing security policies, security planning, personal data protection laws, etc. All of these, including technological, legislative, ethical and political factors, justifies the importance of secure information systems, and encourage us to research in new techniques, models and methodologies, which could aid designers developing and implanting safe information systems which both protect information and keep within the law. This workshop will serve as a forum to gather academics, researchers, practitioners and students in the field of security in information systems. The workshop will present new developments, lessons learned from real world cases, and would provide the exchange of ideas and discussion on specific areas.

Topics of interest include, but are not limited to

- Methodologies for the development of security information system
- Access control techniques
- Personal data protection
- Information systems risk management and analysis
- Security in databases, datawarehouses and web information systems
- Secure information systems architectures
- Standards for information systems security
- Metadata for Web and multimedia security
- XML and RDF based metadata for security
- Security Engineering
- Assessment of security software/hardware
- Study, validation and attacks on security protocols
- Real world applications analysis
- Cryptology: Cryptography and Cryptanalysis
- Information hiding: Steganography & Steganalysis
- Peer-to-Peer systems
- Analysis and design of cryptographic algorithms
- Electronic commerce
- Wireless communications
- RFID privacy and security implications
- Anti-Spam techniques
- Open source secure development
- Emission security
- Attacks on copyright marking systems
- Reliability of security systems
- Disaster recovery
- Security of clinical information systems
- Cyberterrorism
- E-Laws and e-government
- PKI technology
- VPNs, IPSEC, IPv6
- Economics aspects of security
- Electronic Voting
- Computer Forensics
- Incident response
- Privacy and freedom issues
- Privacy-preserving Web-mining
- Legal aspects of cyber security

Format of the Workshop

The workshop will consist of oral presentations. The proceedings of the workshop will be published in the form of a book (with ISBN) by ICEIS.

Journal Special Issue

A number of papers, selected by its high quality, after an additional review phase, will be published in the *Security in Information Systems Special Collection* of the prestigious *Journal of Research and Practice in information Technology* (JRPIT).

Keynote speakers

Pierangela Samarati is a Professor at the Department of Information Technology of the University of Milan. Her main research interests are access control policies, models and systems, data security and privacy, information system security, and information protection in general. She has participated in several projects involving different aspects of information protection. On these topics she has published more than 80 refereed technical papers in international journals and conferences. She is co-author of the book "Database Security," Addison-Wesley, 1995. She is a member of the Steering Committees of ACM SIGSAC -- Special Interest Group on Security, Audit, and Control; the European Symposium on Research in Computer Security (ESORICS); ACM Conference on Computer and Communications Security (ACM-CCS); the European Symposium on Research in Computer Security (ESORICS); the International Conference on Information and Communications Security (ICICS). She is a member of the Editorial Board of "The Journal of Computer Security" and of the International Review Board of the journal "Computers and Security," Elsevier. She is a member of the IEEE and IEEE Computer Society.

Submission of Papers

Prospective authors are invited to submit papers for oral presentation in any of the areas listed above. Only full papers in English will be accepted, and the length of the paper should not exceed 10 pages (5000 words). Instructions for preparing the manuscript (in Word and Latex format) are available at the ICEIS web site. Postscript/RTF versions of the manuscript should be submitted thru ICEIS web-based paper submission procedure.

Important Dates

Full paper submission: February 15, 2005
Author notification: March 10, 2005
Camera-ready paper submission: March 18, 2005

Workshop Program Committee

Ambrosio Toval. University of Murcia. Spain
Brajendra Panda. University of Arkansas. USA
Christian Geuer-Pollmann. European Microsoft Innovation Center. Germany
Claudia Barenco. University of Brazilia, Brazil
Csilla Farkas. University of South Carolina. USA
Duminda Wijesekera. University George Mason. USA
Ed Dawson. Information Security Research Center, Queensland, Australia
Eduardo B. Fernández. Florida Atlantic University. USA
Ehud Gudes. Ben-Gurion Univerity. Israel
Ernesto Damiani. Universitŕ degli Studi di Milano. Italy
Günther Pernul. University of Regensburg. Germany
Haralambos Mouratidis, University of East London, Dagenham, England
Ian Brown. FIRP & University College London, UK
Indrajit Ray. Colorado State University. USA
Indrakshi Ray. Colorado State University. USA
Jacques Stern. Ecole Normale Supérieure, Paris, France
Jan Jürjens. TU Munich, Germany
Jean-Jacques Quisquater. Université Catholique de Louvain, Belgium
Mario Piattini. University of Castilla-La Mancha. Spain
Mariagrazia Fugini. Politecnico di Milano. Italy
Markus Dichtl. Siemens AG, München, Germany
Martin Olivier. University of Pretoria. South Africa
Narayana Jayaram. North London University, London, UK
Paolo Giorgini. University of Trento. Italy
Ravi Mukkamala. Old Dominion University. USA
Robert Tolksdorf. Freie Universität Berlin. Germany
Sabrina De Capitani di Vimercati. Universitŕ degli Studi di Milano. Italy
Serge Vaudenay. Ecole Polytechnique Federale de Lausanne, Swizertland
Simon Shepherd. Bradford University, Bradford, UK
Sujeet Shenoi. University of Tulsa. USA
Sushil Jajodia. George Mason University. USA
Sylvia Osborn. University of Western Ontario. Canada
T.C. Ting. University of Connecticut. USA
Vijay Atluri. Rutgers University. USA
Willem Jonker. University of Twente. The Netherlands

Venue

The workshop will be held at Deauville Beach Resort in Miami, USA.

Registration Information

To attend the workshop you need to register at http://www.iceis.org

Secretariat

ICEIS 2005 Secretariat - The Third International Workshop on Security In Information Systems
E-mail: workshops@iceis.org
Web site: 
http://www.iceis.org

 


Page Updated on 28-04-2005

Copyright © INSTICC