|
|
(5 intermediate revisions by 5 users not shown) |
Line 1: |
Line 1: |
− | {{Event
| + | This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks! |
− | | Acronym = ICISS 2008
| |
− | | Title = 4th International Conference on Information Systems Security
| |
− | | Type = Conference
| |
− | | Series =
| |
− | | Field = Computer security and reliability
| |
− | | Homepage = www.seclab.cs.sunysb.edu/iciss08
| |
− | | Start date = Dec 16, 2008
| |
− | | End date = Dec 20, 2008
| |
− | | City= Hyderabad
| |
− | | State = Andhra Pradesh
| |
− | | Country = india
| |
− | | Abstract deadline =
| |
− | | Submission deadline = Jul 19, 2008
| |
− | | Notification = Sep 8, 2008
| |
− | | Camera ready =
| |
− | }}
| |
− | | |
− | 4th International Conference on Information Systems Security (ICISS 2008)
| |
− | 16-20 December 2008, Hyderabad, India
| |
− | | |
− | The conference series ICISS (International Conference on Information
| |
− | Systems Security), held annually, provides a forum for disseminating
| |
− | the latest research results in information and systems security. The
| |
− | acceptance ratio of the first three conferences has averaged less than
| |
− | 30%, and the proceedings have been published as part of the Springer
| |
− | Verlag series of Lecture Notes in Computer Science. The ICISS 2008
| |
− | encourages submissions from academia, industry and government
| |
− | addressing theoretical and practical problems in information and
| |
− | systems security and related areas. Topics of interest include but are
| |
− | not limited to:
| |
− | | |
− | * Application Security
| |
− | * Authentication and Access Control
| |
− | * Biometric Security
| |
− | * Data Security
| |
− | * Digital Forensics and Diagnostics
| |
− | * Digital Rights Management
| |
− | * Distributed System Security
| |
− | * Formal Methods in Security
| |
− | * Intrusion Detection, Prevention and Response
| |
− | * Intrusion Tolerance and Recovery
| |
− | * Key Management and Cryptographic Protocols
| |
− | * Language-based Security
| |
− | * Malware Analysis and Mitigation
| |
− | * Network Security
| |
− | * Operating System Security
| |
− | * Privacy and Anonymity
| |
− | * Security in P2P, Sensor and Ad Hoc Networks
| |
− | * Software Security
| |
− | * Vulnerability Detection and Mitigation
| |
− | * Web Security
| |
− | | |
− | ==Program Committee==
| |
− | | |
− | * [[has PC member::Vijay Atluri]], Rutgers University
| |
− | * [[has PC member::Arun K. Majumdar]], Indian Institute of Technology, Kharagpur
| |
− | * [[has PC member::Aditya Bagchi]], Indian Statistical Institute, Kolkata
| |
− | * [[has PC member::Anish Mathuria]], DA-IICT, Gandhinagar
| |
− | * [[has PC member::Kevin Butler]], Penn State University
| |
− | * [[has PC member::Chandan Mazumdar]], Jadhavpur University, Kolkata
| |
− | * [[has PC member::Chakravarthy Bhagvati]], University of Hyderabad
| |
− | * [[has PC member::Nasir Memon]], Polytechnic University
| |
− | * [[has PC member::Lorenzo Cavallaro]], University of Milan/UCSB
| |
− | * [[has PC member::Peng Ning]], North Carolina State University
| |
− | * [[has PC member::Hao Chen]], University of California, Davis
| |
− | * [[has PC member::Atul Prakash]], University of Michigan
| |
− | * [[has PC member::Shuo Chen]], Microsoft Research, Redmond
| |
− | * [[has PC member::R. Ramanujam]], Institute of Mathematical Sciences, Chennai
| |
− | * [[has PC member::Marc Dacier]], Symantec Research Labs
| |
− | * [[has PC member::Sanjay Rawat]], Infosys Technologies Ltd.
| |
− | * [[has PC member::Saumya Debray]], University of Arizona
| |
− | * [[has PC member::Pierangela Samarati]], University of Milan
| |
− | * [[has PC member::Subrat Kumar Dash]], University of Hyderabad
| |
− | * [[has PC member::Amitabh Saxena]], University of Trento
| |
− | * [[has PC member::Vinod Ganapathy]], Rutgers University
| |
− | * [[has PC member::Radu Sion]], Stony Brook University
| |
− | * [[has PC member::Jonathon Giffin]], Georgia Institute of Technology
| |
− | * [[has PC member::Anil Somayaji]], Carleton University
| |
− | * [[has PC member::S K Gupta]], Indian Institute of Technology, Delhi
| |
− | * [[has PC member::Robin Sommer]], ICSI/LBNL
| |
− | * [[has PC member::Sushil Jajodia]], George Mason University
| |
− | * [[has PC member::Gaurav Tandon]], Florida Institute of Technology
| |
− | * [[has PC member::Somesh Jha]], University of Wisconsin, Madison
| |
− | * [[has PC member::Vijay Varadharajan]], Macquarie University
| |
− | * [[has PC member::Shrikant Ojha]], DRDO, Government of India
| |
− | * [[has PC member::V.N. Venkatakrishnan]], University of Illinois, Chicago
| |
− | * [[has PC member::Engin Kirda]], Technical University of Vienna
| |
− | * [[has PC member::Poorvi Vora]], George Washington University
| |
− | * [[has PC member::P. Radha Krishna]], Infosys Technologies Ltd.
| |
− | * [[has PC member::Xiaofeng Wang]], Indiana University
| |
− | * [[has PC member::G. Vijaya Kumari]], JNTU, Hyderabad
| |
− | * [[has PC member::Wei Xu]], VMware Inc.
| |
− | * [[has PC member::Zhenkai Liang]], Carnegie Mellon University
| |
− | | |
− | ==ORGANIZING COMMITTEE==
| |
− | * Advisory Committee Chair: [[has OC member::Sushil Jajodia]], George Mason University
| |
− | * Program Co-chairs:
| |
− | ** [[has OC member::Arun K Pujari]], LNM IIT
| |
− | ** [[has OC member::R. Sekar]], Stony Brook University
| |
− | * Submissions/Website Chair: [[has OC member::Subrat Kumar Dash]], University of Hyderabad
| |
− | * Publicity Chair: [[has OC member::Alok Tongoankar]], Stony Brook University
| |
− | * Tutorial Co-chairs:
| |
− | ** [[has OC member::Vineet P Nair]], University of Hyderabad
| |
− | ** [[has OC member::V.N. Venkatakrishnan]], University of Illinois at Chicago
| |
− | * Organizing Chair: [[has OC member::G. Vijaya Kumari]], JNTU, Hyderabad
| |
− | * Finance Chair: [[has OC member::P. Radha Krishnan]], Infosys, Hyderabad
| |
− | | |
− | | |
− | ==IMPORTANT DATES==
| |
− | Manuscript Submission 19 July 2008
| |
− | Tutorial Proposal Submission 26 July 2008
| |
− | Notification of Acceptance 08 Sep 2008
| |
− | Camera-Ready Manuscript 22 Sep 2008
| |
− | | |
− | | |
− | ==SUBMISSION INSTRUCTIONS==
| |
− | | |
− | ===PAPERS===
| |
− | Papers should be formatted as they would appear in the final LNCS
| |
− | proceedings. Papers should be at most 15 pages in length, including
| |
− | the bibliography. Detailed submission instructions can be found at
| |
− | the conference web site. One of the authors of an accepted paper must
| |
− | attend the conference to present the paper. ICISS accepts only
| |
− | electronic submissions in PDF format. Camera-ready manuscripts must be
| |
− | submitted in LaTex.
| |
− | | |
− | Submitted papers must not substantially overlap with papers published
| |
− | or currently submitted to a journal or a conference with proceedings.
| |
− | | |
− | ===ONGOING RESEARCH REPORTS===
| |
− | There will be two sessions to present reports on the current research
| |
− | projects. One session will be for academic institutions and the other
| |
− | for industrial establishments. The research reports should be
| |
− | submitted in the same way as the technical papers. A report should be
| |
− | maximum of 4 pages.
| |
− | | |
− | ===TUTORIAL PROPOSALS===
| |
− | There will be tutorial program for two days (16-17 December 2008). At
| |
− | most four three-hour tutorials will be offered. Proposals are invited
| |
− | for tutorials of duration three hours on relevant topics of current
| |
− | interest. A tutorial proposal should include the extended abstract of
| |
− | the tutorial and a brief biography of the speaker(s). Please mail your
| |
− | proposal to the Tutorial Chair. The speaker(s) of the accepted
| |
− | proposals need to submit their final presentation one month before the
| |
− | conference to the Tutorial Chair.
| |