|
|
Line 1: |
Line 1: |
− | {{Event
| + | ந ங கள எழ த ய பத ல தன மடல ல க ட த தத (intended or by mistake?)பத ல க க நன ற ! |
− | | Acronym = ICISS 2008 | |
− | | Title = 4th International Conference on Information Systems Security | |
− | | Type = Conference | |
− | | Series =
| |
− | | Field = Computer security and reliability
| |
− | | Homepage = www.seclab.cs.sunysb.edu/iciss08
| |
− | | Start date = Dec 16, 2008
| |
− | | End date = Dec 20, 2008
| |
− | | City= Hyderabad
| |
− | | State = Andhra Pradesh
| |
− | | Country = india
| |
− | | Abstract deadline =
| |
− | | Submission deadline = Jul 19, 2008
| |
− | | Notification = Sep 8, 2008
| |
− | | Camera ready =
| |
− | }}
| |
− | | |
− | 4th International Conference on Information Systems Security (ICISS 2008)
| |
− | 16-20 December 2008, Hyderabad, India
| |
− | | |
− | The conference series ICISS (International Conference on Information
| |
− | Systems Security), held annually, provides a forum for disseminating
| |
− | the latest research results in information and systems security. The
| |
− | acceptance ratio of the first three conferences has averaged less than
| |
− | 30%, and the proceedings have been published as part of the Springer
| |
− | Verlag series of Lecture Notes in Computer Science. The ICISS 2008
| |
− | encourages submissions from academia, industry and government
| |
− | addressing theoretical and practical problems in information and
| |
− | systems security and related areas.
| |
− | | |
− | ==Topics==
| |
− | | |
− | Topics of interest include but are not limited to:
| |
− | | |
− | * Application Security
| |
− | * Authentication and Access Control
| |
− | * Biometric Security
| |
− | * Data Security
| |
− | * Digital Forensics and Diagnostics
| |
− | * Digital Rights Management
| |
− | * Distributed System Security
| |
− | * Formal Methods in Security
| |
− | * Intrusion Detection, Prevention and Response
| |
− | * Intrusion Tolerance and Recovery
| |
− | * Key Management and Cryptographic Protocols
| |
− | * Language-based Security
| |
− | * Malware Analysis and Mitigation
| |
− | * Network Security
| |
− | * Operating System Security
| |
− | * Privacy and Anonymity
| |
− | * Security in P2P, Sensor and Ad Hoc Networks
| |
− | * Software Security
| |
− | * Vulnerability Detection and Mitigation
| |
− | * Web Security
| |
− | | |
− | ==Program Committee==
| |
− | | |
− | * [[has PC member::Vijay Atluri]], Rutgers University
| |
− | * [[has PC member::Arun K. Majumdar]], Indian Institute of Technology, Kharagpur
| |
− | * [[has PC member::Aditya Bagchi]], Indian Statistical Institute, Kolkata
| |
− | * [[has PC member::Anish Mathuria]], DA-IICT, Gandhinagar
| |
− | * [[has PC member::Kevin Butler]], Penn State University
| |
− | * [[has PC member::Chandan Mazumdar]], Jadhavpur University, Kolkata
| |
− | * [[has PC member::Chakravarthy Bhagvati]], University of Hyderabad
| |
− | * [[has PC member::Nasir Memon]], Polytechnic University
| |
− | * [[has PC member::Lorenzo Cavallaro]], University of Milan/UCSB
| |
− | * [[has PC member::Peng Ning]], North Carolina State University
| |
− | * [[has PC member::Hao Chen]], University of California, Davis
| |
− | * [[has PC member::Atul Prakash]], University of Michigan
| |
− | * [[has PC member::Shuo Chen]], Microsoft Research, Redmond
| |
− | * [[has PC member::R. Ramanujam]], Institute of Mathematical Sciences, Chennai
| |
− | * [[has PC member::Marc Dacier]], Symantec Research Labs
| |
− | * [[has PC member::Sanjay Rawat]], Infosys Technologies Ltd.
| |
− | * [[has PC member::Saumya Debray]], University of Arizona
| |
− | * [[has PC member::Pierangela Samarati]], University of Milan
| |
− | * [[has PC member::Subrat Kumar Dash]], University of Hyderabad
| |
− | * [[has PC member::Amitabh Saxena]], University of Trento
| |
− | * [[has PC member::Vinod Ganapathy]], Rutgers University
| |
− | * [[has PC member::Radu Sion]], Stony Brook University
| |
− | * [[has PC member::Jonathon Giffin]], Georgia Institute of Technology
| |
− | * [[has PC member::Anil Somayaji]], Carleton University
| |
− | * [[has PC member::S K Gupta]], Indian Institute of Technology, Delhi
| |
− | * [[has PC member::Robin Sommer]], ICSI/LBNL
| |
− | * [[has PC member::Sushil Jajodia]], George Mason University
| |
− | * [[has PC member::Gaurav Tandon]], Florida Institute of Technology
| |
− | * [[has PC member::Somesh Jha]], University of Wisconsin, Madison
| |
− | * [[has PC member::Vijay Varadharajan]], Macquarie University
| |
− | * [[has PC member::Shrikant Ojha]], DRDO, Government of India
| |
− | * [[has PC member::V.N. Venkatakrishnan]], University of Illinois, Chicago
| |
− | * [[has PC member::Engin Kirda]], Technical University of Vienna
| |
− | * [[has PC member::Poorvi Vora]], George Washington University
| |
− | * [[has PC member::P. Radha Krishna]], Infosys Technologies Ltd.
| |
− | * [[has PC member::Xiaofeng Wang]], Indiana University
| |
− | * [[has PC member::G. Vijaya Kumari]], JNTU, Hyderabad
| |
− | * [[has PC member::Wei Xu]], VMware Inc.
| |
− | * [[has PC member::Zhenkai Liang]], Carnegie Mellon University
| |
− | | |
− | I hope the chair is much more comfortable that what you had berofe. I cannot believe that your company makes you buy your own chair if you want a decent one .
| |
− | | |
− | ==SUBMISSION INSTRUCTIONS==
| |
− | | |
− | ive been going on and off for years and actually enjoy the saoicl pariah in the room status i have aquired.someone who i knew when i first went in and is now ten years sober asked me quite seriously why i wasnt dead yet or mad?i never bothered returning the question as i could clearly see she was alive thanks to her personal god and even more clearly mad.why do aa s always state that theyve never seen anyone return to the rooms and say its better out there? it would be one nasty cunt that did!
| |
− | | |
− | ===ONGOING RESEARCH REPORTS===
| |
− | There will be two sessions to present reports on the current research
| |
− | projects. One session will be for academic institutions and the other
| |
− | for industrial establishments. The research reports should be
| |
− | submitted in the same way as the technical papers. A report should be
| |
− | maximum of 4 pages.
| |
− | | |
− | ===TUTORIAL PROPOSALS===
| |
− | There will be tutorial program for two days (16-17 December 2008). At
| |
− | most four three-hour tutorials will be offered. Proposals are invited
| |
− | for tutorials of duration three hours on relevant topics of current
| |
− | interest. A tutorial proposal should include the extended abstract of
| |
− | the tutorial and a brief biography of the speaker(s). Please mail your
| |
− | proposal to the Tutorial Chair. The speaker(s) of the accepted
| |
− | proposals need to submit their final presentation one month before the
| |
− | conference to the Tutorial Chair.
| |