Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Workshops

The purpose of workshops is to provide a more interactive and focused platform for presenting and discussing new and emerging ideas. The format of paper presentations may include oral presentations and poster presentations. Workshops can be scheduled for 1 day or 2 days.

All accepted papers will be published on the workshop proceedings book, under an ISBN reference, and on CD-ROM support.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/).
SCITEPRESS is a member of CrossRef (http://www.crossref.org/).
The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.



WORKSHOPS LIST

WOSIS 201411th International Workshop on Security in Information Systems
Chair(s): David G. Rosado, Carlos Blanco, Daniel Mellado, Jan Jürjens and Luis Enrique Sánchez

11th International Workshop on
Security in Information Systems
 - WOSIS 2014

Co-chairs

David G. Rosado
GSyA Research Group, University of Castilla-la Mancha
Spain
 
Carlos Blanco
Ingeniería Informática y Electrónica, University of Cantabria
Spain
 
Daniel Mellado
Spanish Tax Agency & GSyA Research Group
Spain
 
Jan Jürjens
Fraunhofer ISST and TU Dortmund
Germany
 
Luis Enrique Sánchez
Paseo de la Universidad, 4, 13071 Ciudad Real, Cdad. Real, Universidad de Castilla-La Mancha
Spain
 
Co-chairs

General Chair
David G. Rosado
University of Castilla-la Mancha
Spain
 
Program Co-Chairs
Carlos Blanco
University of Cantabria
Spain
 
Daniel Mellado
Spanish Tax Agency
Spain
 
Jan Jürjens
Technical University of Dortmund
Germany
 
Enterprice Security Session Chair
Luis Enrique Sánchez
University of Armed Forces
Ecuador
 
Scope

Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.





footer