Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents
Workshop
12th Special Session on
Security in Information Systems
 - WOSIS 2015

27 April, 2015 - Barcelona, Spain

Within the 17th International Conference on Enterprise Information Systems - ICEIS 2015


CO-CHAIRS

David G. Rosado
University of Castilla-la Mancha
Spain

 
Brief Bio
David G. Rosado holds a Ph.D. in Computer Science from University of Castilla-La Mancha and has an MSc in Computer Science from the University of Málaga (Spain). His research activities are focused on security for Information systems and Cloud Computing. He has published several papers in national and international conferences on these subjects. He is a member of the GSYA research group of the Information Systems and Technologies Department at the University of Castilla-La Mancha, in Ciudad Real, Spain.
Carlos Blanco
University of Cantabria
Spain

 
Brief Bio
Carlos Blanco has an MSc and PhD in Computer Science from the University of Castilla-La Mancha (Spain). He is working as a lecturer at the Science Faculty at the University of Cantabria (Spain) and is a member of the GSyA Research Group at the School of Computer Science at the University of Castilla-La Mancha (Spain). His research activity is in the field of Security for Information Systems and its specially focused on Data Warehouses, OLAP tools, MDD and Ontologies. He has published several communications, papers and book chapters related with these topics. He is author of several papers in international journals such as DSS, CSI, JUCS, JRPIT, IJBIDM. He is involved in the organization of several international workshop (WOSIS, WISSE, MoDiC) and has served as reviewer for international journals, conferences and workshops (CSI, ASE, IJITDM, JUCS, JITSE, JWE, ARES, DaWaK, SECRYPT, EssOs, etc.).
Daniel Mellado
Spanish Tax Agency & GSyA Research Group
Spain

 

SCOPE

Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.

There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.

Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.

In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the event on security in Big Data. The enormous amount of external and unstructured data (referred as Big Data) has been increasing, and thus database systems and processing need to evolve to accommodate them to this new situation. Therefore, this new conception requires new models and methods that deal with the specific security issues related to Big Data. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such Big Data environments and that its adoption is not any problem for the society, administration and enterprise.

The novelty in this edition is the call for regular papers and tool demonstrations oriented and focused on Security applied to businesses and enterprises which is an opportunity for researchers, practitioners, security architects and designers to present and discuss the most recent advances, experiences, developments, applications, tools and challenges in the field of security in software engineering applied to businesses and enterprises.

IMPORTANT DATES

Paper Submission: February 9, 2015 (expired)
Authors Notification: March 2, 2015 (expired)
Camera Ready and Registration: March 9, 2015 (expired)

SPECIAL SESSION PROGRAM COMMITTEE

Andreas Bauer, Independent Researcher, Australia
Kevin Butler, University of Oregon, United States
Pino Caballero-Gil, Universidad de La Laguna, Spain
Juan Manuel Carrillo-de-Gea, Informatics and Systems, University of Murcia, Spain
Mihai Christodorescu, , United States
Ernesto Damiani, Information Security Research center, , United Arab Emirates
Sabrina De Capitani Di Vimercati, Università degli Studi di Milano, Italy
Jaime Delgado, Universitat Politècnica de Catalunya, Spain
Csilla Farkas, University of South Carolina, United States
Eduardo B. Fernandez, Florida Atlantic University, United States
Maria Carmen Fernández, University of Málaga, Spain
Eduardo Fernández-Medina, University of Castilla-La Mancha, Spain
Steven Furnell, University of Plymouth, United Kingdom
Paolo Giorgini, University of Trento, Italy
Debasis Giri, Independent Researcher, India
Renato Iannella, Semantic Identity, Australia
Shareeful Islam, University of East London, United Kingdom
Hugo Jonker, Faculty of Sciences, Technology and Communication, , Luxembourg
Jan Jürjens, Fraunhofer ISST and TU Dortmund , Germany
Stamatis Karnouskos, SAP, Germany
Spyridon Kokolakis, University of the Aegean, Greece
Yair Levy, Nova Southeastern University (NSU), United States
Luigi Lo Iacono, Cologne University of Applied Sciences, Germany
Antonio Maña, University of Malaga, Spain
Raimundas Matulevicius, University of Tartu, Estonia
Sjouke Mauw, University of Luxembourg, Luxembourg
Haralambos Mouratidis, University of Brighton, United Kingdom
Federica Paci, University of Trento , Italy
Brajendra Panda, University of Arkansas, United States
Siani Pearson, Cloud and Security Research Lab, , United Kingdom
Günther Pernul, University of Regensburg, Germany
Mario Piattini, Alarcos Research Group, University of Castilla-La Mancha, Spain
Indrakshi Ray, Colorado State University, United States
Indrajit Ray, Colorado State University, United States
Alfonso Rodriguez, University of Bio-Bio, Chile
Kouichi Sakurai, Kyushu university, Japan
Luis Enrique Sánchez, Universidad de Castilla-La Mancha, Spain
Luis Enrique Sánchez Crespo, University of Castilla-La Mancha, Spain
Thomas Santen, Microsoft Research Advanced Technology Labs Europe, Germany
Ketil Stoelen, Sintef, Norway
Ambrosio Toval, University of Murcia, Spain
Juan Trujillo, University of Alicante, Spain
Komminist Weldemariam, Queen's University, Canada
Duminda Wijesekera, George Mason University, United States
Toshihiro Yamauchi, Okayama University, Japan
George Yee, Carleton University, Canada

PAPER SUBMISSION

Prospective authors are invited to submit papers in any of the topics listed above.
Instructions for preparing the manuscript (in Word and Latex formats) are available at: Paper Templates
Please also check the Guidelines.
Papers must be submitted electronically via the web-based submission system using the appropriated button on this page.

SECRETARIAT CONTACTS

ICEIS Special Sessions - WOSIS 2015
e-mail: iceis.workshops.secretariat@insticc.org
footer