9th International Conference on Enterprise Information Systems
12-16, June 2007            Funchal, Madeira - Portugal
  Full Paper Submission: deadline expired
Authors Notification: deadline expired
Final Paper Submission and Registration: deadline expired
 
    

Home
Call For Papers
Doctoral Consortium
Program Committee
Keynote Lectures
Special Sessions
Workshops

 
 
 
 

                                            

 
Workshops
 
The 5th International Workshop on
Security in Information Systems (WOSIS 2007)
 
12-13 June, 2007 - Funchal, Madeira - Portugal
 
 

Workshop Program

 
In conjunction with the 9th International Conference on Enterprise Information Systems (ICEIS 2007)
 

Co-Chairs
Dr. Mariemma Yagüe
University of Málaga
Spain
yague@lcc.uma.es

Dr. Eduardo Fernández-Medina

University of Castilla-La Mancha
Spain
Eduardo.FdezMedina@uclm.es

Background and Goals
Information Systems Security is one of the most pressing challenges facing all kind of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in keeping their information safe, in avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.
Nowadays, rapid technological advances are stimulating a greater use of information systems in organizations world-wide, which handle large quantities of data, managed by huge databases and datawarehouses. In addition, information systems quite frequently manage information that can be considered sensitive, since it is related to certain intimate or personal aspects of persons (beliefs, medical data, sexual tendencies, etc.) and which must be specially protected.
Many organizations, including not only companies but also governments of several countries, are now realizing how security problems can affect both business success and citizen rights, and they are proposing security policies, security planning, personal data protection laws, etc.
All of these, including technological, legislative, ethical and political factors, justifies the importance of secure information systems, and encourage us to research in new techniques, models and methodologies, which could aid designers developing and implanting safe information systems which both protect information and keep within the law.
In some sense, standards are always present in many security areas: Cryptographic protocols are standardized, and web services security are based on standard specifications; Biometric security needs different standards, and risk management can be performed following standards. In fact, there are many people working in security standards development, and many other people are working in using, adapting, extending and redefining these standards.
In this new edition of WOSIS, the traditional information systems security will be maintained but taking into account standards in the field and we will add some general topics concerning the standardisation process, or their impact on the marketplace. Our objective is WOSIS 2007 will present new developments, lessons learned from real world cases, and would provide the exchange of ideas and discussion on all the expert areas CS&I.

Topics of interest
Topics of interest include, but are not restricted to:

• Standards for Security
• Security for Grid computing
• Web Services Security
• Security for Mobile Computing
• Security for Electronic Commerce and Electronic Business
• Security for Databases and Data Warehouses
• Business Process Security
• Metrics for Security
• Biometric Security
• Network Security
• Security Requirements Engineering
• Digital Rights Management (DRM). Mobile DRM.
• Access Control and Rights Expression Languages.
• Security & Trust Models
• Semantic Web Technologies applied to Security.
• Authentication and Authorization.
• E-Commerce
• E-Health, E-Voting, E-government
• Cyber terrorism
• Intellectual Property Protection
• Anonymity and Privacy
• Cryptology: Cryptography and Cryptanalysis
• Information hiding: Steganography & Steganalysis

Submission of Papers
We encourage submission of high quality papers to this new edition of the Security in Information Systems Workshop. Authors of accepted papers must guarantee that their works will be presented at the Workshop by one of the co-authors. Only full papers in English will be accepted. The length of the paper should not exceed 10 pages (5000 words). Instructions for preparing the manuscript (in Word and Latex format) are available at the ICEIS web site. Postscript/RTF versions of the manuscript should be submitted through ICEIS web-based paper submission procedure. The proceedings of the workshop will be published in the form of a book (with ISBN) by ICEIS.
Additionally, best works will have the chance to publish extended and revised versions in the internationally refereed Computer Standards & Interfaces Journal, which is well ranked in the ISI Journal Citation Reports.

Computer Standards & Interfaces Journal, an ISI ranked Publication
The Workshop interest is on high quality, innovative and unpublished research on Security in Information Systems. A selection of best works will be made in order to include extended and revised versions of these works in this journal, which is published by Elsevier and listed in ISI (impact factor of 0.62 in 2005).
The journal provides information about activities and progress on the definition of computer standards, software quality, interfaces and methods, at national, European and international levels, it publishes critical comments on standards and standards activities, it disseminates user's experiences and case studies in the application and exploitation of established or emerging standards, interfaces and methods, it offers a forum for discussion on actual projects, standards, interfaces and methods by recognized experts, and it stimulates relevant research by providing a specialized refereed medium.

COMPUTER STANDARDS & INTERFACES is concerned with the specification, development and application of standards and with high-level publications of developments and methods in the following areas:
• Standards, Information Management, Formal Methods
• Software Quality, Software Process
• Distributed Systems, Open Systems, E-Topics
• Data Acquisition
• Digital Instruments Standardisation
For more information about this journal please visit http://www.elsevier.com/wps/find/journaldescription.cws_home/505607/description#description

Keynote Speakers
Ruth Breu - University at Innsbruck, Austria

Brief Bio
Ruth Breu is head of the research group Quality Engineering at the University of Innsbruck since 2002. QE works on the foundation of innovative application scenarios of models with a focus on security engineering, IT-governance and model-driven software development. With SECTET Ruth Breu and her team developed a high-level security infrastructure for B2B-workflows in the context of web service technology. ProSecO is a framework for business oriented assessment of security risks. The group works in close cooperation with industrial partners like Telekom Austria, Swiss Re and Siemens and has generated two spin-off companies in the field of information security
Talk: Model-Driven Approaches to Security
Managing and enforcing security requirements in the large are the predominant challenges to the upcoming generation of networked open applications. While research on information security in the past has mainly produced sophisticated techniques, protocols and standards at technical level, the establishment of security engineering as a discipline of systematically developing secure solutions now requires increased attention.
Security engineering includes aspects like the elicitation of security requirements in early phases of software development, the development of secure solutions at high level of abstraction and systematic security testing. The talk gives an overview of aspects of security engineering and focuses on the effective use of models within the development of security-critical distributed applications.

Important Dates
Paper Submission: March 5, 2007
Author Notification: April 10, 2007
Final Camera-Ready and Registration: April 20, 2007

Workshop Program Committee
Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy
Ernesto Damiani. Università degli Studi di Milano. Italy
Csilla Farkas. University of South Carolina. USA
Eduardo B. Fernández. Florida Atlantic University. USA
Steven Furnell. University of Plymouth. UK
Christian Geuer-Pollmann. European Microsoft Innovation Center. Germany
Paolo Giorgini. University of Trento. Italy
Ehud Gudes. Ben-Gurion Univerity. Israel
Haralambos Mouratidis. University of East London, Dagenham, England
Jan Jürjens. TU Munich. Germany
Stamatis Karnouskos. SAP AG. Germany
Antonio Maña. University of Malaga. Spain.
Martin Olivier. University of Pretoria. South Africa
Brajendra Panda. University of Arkansas. USA
Günther Pernul. University of Regensburg. Germany
Mario Piattini. University of Castilla-La Mancha. Spain
Joachim Posegga. University of Hamburg.
Indrajit Ray. Colorado State University. USA
Indrakshi Ray. Colorado State University. USA
Damian Sauveron. University of Limoges. France
Ambrosio Toval. University of Murcia. Spain
Duminda Wijesekera. University George Mason. USA

Workshop Location
The workshop will take place in conjunction with the 9th International Conference on Enterprise Information Systems (ICEIS 2007) in Funchal, Madeira - Portugal.

Registration Information
At least one author of an accepted paper must register for the workshop. If the registration fees are not received by April 9, 2007, the paper will not be published in the proceedings. For registering go to http://www.iceis.org

Secretariat
ICEIS 2007 Secretariat - The Fifth International Workshop on Security In Information Systems (WOSIS -2007)
E-mail: workshops@iceis.org
Web site: http://www.iceis.org

   
 
Page Updated on 18-05-2007

Copyright © INSTICC