|
|
(6 intermediate revisions by 5 users not shown) |
Line 1: |
Line 1: |
− | {{Event
| + | This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks! |
− | | Acronym = ICISS 2008
| |
− | | Title = 4th International Conference on Information Systems Security
| |
− | | Type = Conference
| |
− | | Series =
| |
− | | Field = Computer security and reliability
| |
− | | Homepage = www.seclab.cs.sunysb.edu/iciss08
| |
− | | Start date = Dec 16, 2008
| |
− | | End date = Dec 20, 2008
| |
− | | City= Hyderabad
| |
− | | State = Andhra Pradesh
| |
− | | Country = india
| |
− | | Abstract deadline =
| |
− | | Submission deadline = Jul 19, 2008
| |
− | | Notification = Sep 8, 2008
| |
− | | Camera ready =
| |
− | }}
| |
− | | |
− | <pre>
| |
− | ----------------------------------------------------------------------------
| |
− | 4th International Conference on Information Systems Security (ICISS 2008)
| |
− | 16-20 December 2008, Hyderabad, India
| |
− | | |
− | http://www.seclab.cs.sunysb.edu/iciss08/
| |
− | ----------------------------------------------------------------------------
| |
− | | |
− | The conference series ICISS (International Conference on Information
| |
− | Systems Security), held annually, provides a forum for disseminating
| |
− | the latest research results in information and systems security. The
| |
− | acceptance ratio of the first three conferences has averaged less than
| |
− | 30%, and the proceedings have been published as part of the Springer
| |
− | Verlag series of Lecture Notes in Computer Science. The ICISS 2008
| |
− | encourages submissions from academia, industry and government
| |
− | addressing theoretical and practical problems in information and
| |
− | systems security and related areas. Topics of interest include but are
| |
− | not limited to:
| |
− | | |
− | Application Security Authentication and Access Control
| |
− | Biometric Security Data Security
| |
− | Digital Forensics and Diagnostics Digital Rights Management
| |
− | Distributed System Security Formal Methods in Security
| |
− | Intrusion Detection, Prevention and Response Intrusion Tolerance and Recovery
| |
− | Key Management and Cryptographic Protocols Language-based Security
| |
− | Malware Analysis and Mitigation Network Security
| |
− | Operating System Security Privacy and Anonymity
| |
− | Security in P2P, Sensor and Ad Hoc Networks Software Security
| |
− | Vulnerability Detection and Mitigation Web Security
| |
− | | |
− | PROGRAM COMMITTEE:
| |
− | Vijay Atluri, Rutgers University Arun K. Majumdar, Indian Institute of Technology, Kharagpur
| |
− | Aditya Bagchi, Indian Statistical Institute, Kolkata Anish Mathuria, DA-IICT, Gandhinagar
| |
− | Kevin Butler, Penn State University Chandan Mazumdar, Jadhavpur University, Kolkata
| |
− | Chakravarthy Bhagvati, University of Hyderabad Nasir Memon, Polytechnic University
| |
− | Lorenzo Cavallaro, University of Milan/UCSB Peng Ning, North Carolina State University
| |
− | Hao Chen, University of California, Davis Atul Prakash, University of Michigan
| |
− | Shuo Chen, Microsoft Research, Redmond R. Ramanujam, Institute of Mathematical Sciences, Chennai
| |
− | Marc Dacier, Symantec Research Labs Sanjay Rawat, Infosys Technologies Ltd.
| |
− | Saumya Debray, University of Arizona Pierangela Samarati, University of Milan
| |
− | Subrat Kumar Dash, University of Hyderabad Amitabh Saxena, University of Trento
| |
− | Vinod Ganapathy, Rutgers University Radu Sion, Stony Brook University
| |
− | Jonathon Giffin, Georgia Institute of Technology Anil Somayaji, Carleton University
| |
− | S K Gupta, Indian Institute of Technology, Delhi Robin Sommer, ICSI/LBNL
| |
− | Sushil Jajodia, George Mason University Gaurav Tandon, Florida Institute of Technology
| |
− | Somesh Jha, University of Wisconsin, Madison Vijay Varadharajan, Macquarie University
| |
− | Shrikant Ojha, DRDO, Government of India V.N. Venkatakrishnan, University of Illinois, Chicago
| |
− | Engin Kirda, Technical University of Vienna Poorvi Vora, George Washington University
| |
− | P. Radha Krishna, Infosys Technologies Ltd. Xiaofeng Wang, Indiana University
| |
− | G. Vijaya Kumari, JNTU, Hyderabad Wei Xu, VMware Inc.
| |
− | Zhenkai Liang, Carnegie Mellon University
| |
− | | |
− | ORGANIZING COMMITTEE:
| |
− | Advisory Committee Chair: Sushil Jajodia, George Mason University
| |
− | Program Co-chairs: Arun K Pujari, LNM IIT
| |
− | R. Sekar, Stony Brook University
| |
− | Submissions/Website Chair: Subrat Kumar Dash, University of Hyderabad
| |
− | Publicity Chair: Alok Tongoankar, Stony Brook University
| |
− | Tutorial Co-chairs: Vineet P Nair, University of Hyderabad
| |
− | V.N. Venkatakrishnan, University of Illinois at Chicago
| |
− | Organizing Chair: G. Vijaya Kumari, JNTU, Hyderabad
| |
− | Finance Chair: P. Radha Krishnan, Infosys, Hyderabad
| |
− | | |
− | ---------------------------------------------------
| |
− | IMPORTANT DATES
| |
− | Manuscript Submission 19 July 2008
| |
− | Tutorial Proposal Submission 26 July 2008
| |
− | Notification of Acceptance 08 Sep 2008
| |
− | Camera-Ready Manuscript 22 Sep 2008
| |
− | ---------------------------------------------------
| |
− | | |
− | SUBMISSION INSTRUCTIONS:
| |
− | | |
− | PAPERS:
| |
− | Papers should be formatted as they would appear in the final LNCS
| |
− | proceedings. Papers should be at most 15 pages in length, including
| |
− | the bibliography. Detailed submission instructions can be found at
| |
− | the conference web site. One of the authors of an accepted paper must
| |
− | attend the conference to present the paper. ICISS accepts only
| |
− | electronic submissions in PDF format. Camera-ready manuscripts must be
| |
− | submitted in LaTex.
| |
− | | |
− | Submitted papers must not substantially overlap with papers published
| |
− | or currently submitted to a journal or a conference with proceedings.
| |
− | | |
− | ONGOING RESEARCH REPORTS:
| |
− | There will be two sessions to present reports on the current research
| |
− | projects. One session will be for academic institutions and the other
| |
− | for industrial establishments. The research reports should be
| |
− | submitted in the same way as the technical papers. A report should be
| |
− | maximum of 4 pages.
| |
− | | |
− | TUTORIAL PROPOSALS:
| |
− | There will be tutorial program for two days (16-17 December 2008). At
| |
− | most four three-hour tutorials will be offered. Proposals are invited
| |
− | for tutorials of duration three hours on relevant topics of current
| |
− | interest. A tutorial proposal should include the extended abstract of
| |
− | the tutorial and a brief biography of the speaker(s). Please mail your
| |
− | proposal to the Tutorial Chair. The speaker(s) of the accepted
| |
− | proposals need to submit their final presentation one month before the
| |
− | conference to the Tutorial Chair.
| |
− | </pre>This CfP was obtained from [http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=3121&copyownerid=2 WikiCFP]
| |