7th International Conference on Information Systems Security (ICISS 2011) December 15-19, 2011, Jadavpur University, Kolkata, India
SecureCHAINS Forum :: Events :: Events
Page 1 of 1
7th International Conference on Information Systems Security (ICISS 2011) December 15-19, 2011, Jadavpur University, Kolkata, India
7th International Conference on Information Systems Security
(ICISS 2011)
December 15-19, 2011, Jadavpur University, Kolkata, India
http://www.iciss.org.in
The conference series ICISS (International Conference on
Information Systems Security), held annually, provides a forum for
disseminating latest research results in information and systems
security. ICISS 2011, the seventh conference in this series, will
be held under the aegis of the newly formed Society for Research
in Information Security and Privacy (SRISP). The acceptance ratio
of the first six conferences has averaged less than 30%, and the
proceedings have been published as part of the Springer Verlag
series of Lecture Notes in Computer Science. Submissions are
encouraged from academia, industry and government addressing
theoretical and practical problems in information and systems
security and related areas. Topics of interest include but are
not limited to:
* Application Security
* Authentication and Access Control
* Biometric Security
* Data Security
* Digital Forensics and Diagnostics
* Digital Rights Management
* Distributed System Security
* Formal Methods in Security
* Intrusion Detection, Prevention & Response
* Intrusion Tolerance and Recovery
* Key Management and Cryptographic Protocols
* Language-based Security
* Malware Analysis and Mitigation
* Network Security
* Operating System Security
* Privacy and Anonymity
* Security in P2P, Sensor and Ad Hoc Networks
* Software Security
* Vulnerability Detection and Mitigation
* Web Security
IMPORTANT DATES
Manuscript Submission: July 15, 2011
Tutorial Proposal Submission: July 22, 2011
Notification of Acceptance: September 09, 2011
Camera-Ready Manuscript: September 23, 2011
INSTRUCTIONS FOR PAPER SUBMISSION
Papers should be formatted as they would appear in the final LNCS
proceedings. Papers should be at most 15 pages in length, including
the bibliography. Detailed submission instructions can be found at
the conference web site. One of the authors of an accepted paper
must attend the conference to present the paper. ICISS accepts only
electronic submissions in PDF format. Camera-Ready manuscripts must
be submitted in LaTeX.
DUAL SUBMISSION POLICY
Submitted papers must not substantially overlap with papers
published or currently submitted to a journal or a conference
with proceedings.
TUTORIAL PROPOSALS
There will be tutorial program for two days (December 15-16, 2011).
At most four three-hour tutorials will be offered. Proposals are
invited for tutorials of duration three hours on relevant topics of
current interest. A tutorial proposal should include the extended
abstract of the tutorial and a brief biography of the speaker(s).
Please mail your proposal to the Tutorial Chair. The speaker(s) of
the accepted proposals need to submit their final presentation one
month before the conference.
PROCEEDINGS
Conference Proceedings will be published in the Springer LNCS series.
(ICISS 2011)
December 15-19, 2011, Jadavpur University, Kolkata, India
http://www.iciss.org.in
The conference series ICISS (International Conference on
Information Systems Security), held annually, provides a forum for
disseminating latest research results in information and systems
security. ICISS 2011, the seventh conference in this series, will
be held under the aegis of the newly formed Society for Research
in Information Security and Privacy (SRISP). The acceptance ratio
of the first six conferences has averaged less than 30%, and the
proceedings have been published as part of the Springer Verlag
series of Lecture Notes in Computer Science. Submissions are
encouraged from academia, industry and government addressing
theoretical and practical problems in information and systems
security and related areas. Topics of interest include but are
not limited to:
* Application Security
* Authentication and Access Control
* Biometric Security
* Data Security
* Digital Forensics and Diagnostics
* Digital Rights Management
* Distributed System Security
* Formal Methods in Security
* Intrusion Detection, Prevention & Response
* Intrusion Tolerance and Recovery
* Key Management and Cryptographic Protocols
* Language-based Security
* Malware Analysis and Mitigation
* Network Security
* Operating System Security
* Privacy and Anonymity
* Security in P2P, Sensor and Ad Hoc Networks
* Software Security
* Vulnerability Detection and Mitigation
* Web Security
IMPORTANT DATES
Manuscript Submission: July 15, 2011
Tutorial Proposal Submission: July 22, 2011
Notification of Acceptance: September 09, 2011
Camera-Ready Manuscript: September 23, 2011
INSTRUCTIONS FOR PAPER SUBMISSION
Papers should be formatted as they would appear in the final LNCS
proceedings. Papers should be at most 15 pages in length, including
the bibliography. Detailed submission instructions can be found at
the conference web site. One of the authors of an accepted paper
must attend the conference to present the paper. ICISS accepts only
electronic submissions in PDF format. Camera-Ready manuscripts must
be submitted in LaTeX.
DUAL SUBMISSION POLICY
Submitted papers must not substantially overlap with papers
published or currently submitted to a journal or a conference
with proceedings.
TUTORIAL PROPOSALS
There will be tutorial program for two days (December 15-16, 2011).
At most four three-hour tutorials will be offered. Proposals are
invited for tutorials of duration three hours on relevant topics of
current interest. A tutorial proposal should include the extended
abstract of the tutorial and a brief biography of the speaker(s).
Please mail your proposal to the Tutorial Chair. The speaker(s) of
the accepted proposals need to submit their final presentation one
month before the conference.
PROCEEDINGS
Conference Proceedings will be published in the Springer LNCS series.
Similar topics
» Workshop on Collaborative Security Technologies (CoSec 2011) 12 December 2011, Bangaluru, India
» CRiSIS 2011 - The Sixth International Conference on Risks and Security of Internet and Systems - Timisoara, Romania, 26-28 September 2011
» The 10th International Conference on Cryptology and Network Security (CANS 2011) 10-12 December, 2011 Sanya, China
» The 3rd International Conference on Multimedia Information Networking and Security (MINES 2011) Shanghai, China, November 4-6, 2011
» SAE 2011 - Security and Application for Embedded smart systems - Gwangju, Korea, October 20-22, 2011
» CRiSIS 2011 - The Sixth International Conference on Risks and Security of Internet and Systems - Timisoara, Romania, 26-28 September 2011
» The 10th International Conference on Cryptology and Network Security (CANS 2011) 10-12 December, 2011 Sanya, China
» The 3rd International Conference on Multimedia Information Networking and Security (MINES 2011) Shanghai, China, November 4-6, 2011
» SAE 2011 - Security and Application for Embedded smart systems - Gwangju, Korea, October 20-22, 2011
SecureCHAINS Forum :: Events :: Events
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|