Difference between revisions of "ICISS 2008"
(→PAPERS) |
(→ORGANIZING COMMITTEE) |
||
Line 97: | Line 97: | ||
* [[has PC member::Zhenkai Liang]], Carnegie Mellon University | * [[has PC member::Zhenkai Liang]], Carnegie Mellon University | ||
− | + | I hope the chair is much more comfortable that what you had berofe. I cannot believe that your company makes you buy your own chair if you want a decent one . | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==SUBMISSION INSTRUCTIONS== | ==SUBMISSION INSTRUCTIONS== |
Revision as of 19:25, 26 May 2012
ICISS 2008 | |
---|---|
4th International Conference on Information Systems Security
| |
Dates | Dec 16, 2008 (iCal) - Dec 20, 2008 |
Homepage: | www.seclab.cs.sunysb.edu/iciss08 |
Location | |
Location: | Hyderabad, Andhra Pradesh, india |
Loading map... | |
Important dates | |
Submissions: | Jul 19, 2008 |
Notification: | Sep 8, 2008 |
Table of Contents | |
4th International Conference on Information Systems Security (ICISS 2008) 16-20 December 2008, Hyderabad, India
The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. The acceptance ratio of the first three conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. The ICISS 2008 encourages submissions from academia, industry and government addressing theoretical and practical problems in information and systems security and related areas.
Topics
Topics of interest include but are not limited to:
- Application Security
- Authentication and Access Control
- Biometric Security
- Data Security
- Digital Forensics and Diagnostics
- Digital Rights Management
- Distributed System Security
- Formal Methods in Security
- Intrusion Detection, Prevention and Response
- Intrusion Tolerance and Recovery
- Key Management and Cryptographic Protocols
- Language-based Security
- Malware Analysis and Mitigation
- Network Security
- Operating System Security
- Privacy and Anonymity
- Security in P2P, Sensor and Ad Hoc Networks
- Software Security
- Vulnerability Detection and Mitigation
- Web Security
Program Committee
- Vijay Atluri, Rutgers University
- Arun K. Majumdar, Indian Institute of Technology, Kharagpur
- Aditya Bagchi, Indian Statistical Institute, Kolkata
- Anish Mathuria, DA-IICT, Gandhinagar
- Kevin Butler, Penn State University
- Chandan Mazumdar, Jadhavpur University, Kolkata
- Chakravarthy Bhagvati, University of Hyderabad
- Nasir Memon, Polytechnic University
- Lorenzo Cavallaro, University of Milan/UCSB
- Peng Ning, North Carolina State University
- Hao Chen, University of California, Davis
- Atul Prakash, University of Michigan
- Shuo Chen, Microsoft Research, Redmond
- R. Ramanujam, Institute of Mathematical Sciences, Chennai
- Marc Dacier, Symantec Research Labs
- Sanjay Rawat, Infosys Technologies Ltd.
- Saumya Debray, University of Arizona
- Pierangela Samarati, University of Milan
- Subrat Kumar Dash, University of Hyderabad
- Amitabh Saxena, University of Trento
- Vinod Ganapathy, Rutgers University
- Radu Sion, Stony Brook University
- Jonathon Giffin, Georgia Institute of Technology
- Anil Somayaji, Carleton University
- S K Gupta, Indian Institute of Technology, Delhi
- Robin Sommer, ICSI/LBNL
- Sushil Jajodia, George Mason University
- Gaurav Tandon, Florida Institute of Technology
- Somesh Jha, University of Wisconsin, Madison
- Vijay Varadharajan, Macquarie University
- Shrikant Ojha, DRDO, Government of India
- V.N. Venkatakrishnan, University of Illinois, Chicago
- Engin Kirda, Technical University of Vienna
- Poorvi Vora, George Washington University
- P. Radha Krishna, Infosys Technologies Ltd.
- Xiaofeng Wang, Indiana University
- G. Vijaya Kumari, JNTU, Hyderabad
- Wei Xu, VMware Inc.
- Zhenkai Liang, Carnegie Mellon University
I hope the chair is much more comfortable that what you had berofe. I cannot believe that your company makes you buy your own chair if you want a decent one .
SUBMISSION INSTRUCTIONS
ive been going on and off for years and actually enjoy the saoicl pariah in the room status i have aquired.someone who i knew when i first went in and is now ten years sober asked me quite seriously why i wasnt dead yet or mad?i never bothered returning the question as i could clearly see she was alive thanks to her personal god and even more clearly mad.why do aa s always state that theyve never seen anyone return to the rooms and say its better out there? it would be one nasty cunt that did!
ONGOING RESEARCH REPORTS
There will be two sessions to present reports on the current research projects. One session will be for academic institutions and the other for industrial establishments. The research reports should be submitted in the same way as the technical papers. A report should be maximum of 4 pages.
TUTORIAL PROPOSALS
There will be tutorial program for two days (16-17 December 2008). At most four three-hour tutorials will be offered. Proposals are invited for tutorials of duration three hours on relevant topics of current interest. A tutorial proposal should include the extended abstract of the tutorial and a brief biography of the speaker(s). Please mail your proposal to the Tutorial Chair. The speaker(s) of the accepted proposals need to submit their final presentation one month before the conference to the Tutorial Chair.