ICISS 2008: Difference between revisions

From Openresearch
Jump to navigation Jump to search
Event created
 
XwXVuVHSzsYpKZLTdMt
 
(6 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{Event
This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks!
| Acronym = ICISS 2008
| Title = 4th International Conference on Information Systems Security
| Type = Conference
| Series =
| Field = Computer security and reliability
| Homepage = www.seclab.cs.sunysb.edu/iciss08
| Start date = Dec 16, 2008
| End date =  Dec 20, 2008
| City= Hyderabad
| State =  Andhra Pradesh
| Country =  india
| Abstract deadline =
| Submission deadline = Jul 19, 2008
| Notification = Sep 8, 2008
| Camera ready =
}}
 
<pre>
----------------------------------------------------------------------------
4th International Conference on Information Systems Security (ICISS 2008)
16-20 December 2008, Hyderabad, India
 
http://www.seclab.cs.sunysb.edu/iciss08/
----------------------------------------------------------------------------
 
The conference series ICISS (International Conference on Information
Systems Security), held annually, provides a forum for disseminating
the latest research results in information and systems security. The
acceptance ratio of the first three conferences has averaged less than
30%, and the proceedings have been published as part of the Springer
Verlag series of Lecture Notes in Computer Science. The ICISS 2008
encourages submissions from academia, industry and government
addressing theoretical and practical problems in information and
systems security and related areas. Topics of interest include but are
not limited to:
 
Application Security                                    Authentication and Access Control
Biometric Security                                      Data Security
Digital Forensics and Diagnostics                      Digital Rights Management
Distributed System Security                            Formal Methods in Security
Intrusion Detection, Prevention and Response            Intrusion Tolerance and Recovery
Key Management and Cryptographic Protocols              Language-based Security
Malware Analysis and Mitigation                        Network Security
Operating System Security                              Privacy and Anonymity
Security in P2P, Sensor and Ad Hoc Networks            Software Security
Vulnerability Detection and Mitigation                  Web Security
 
PROGRAM COMMITTEE:
Vijay Atluri, Rutgers University                        Arun K. Majumdar, Indian Institute of Technology, Kharagpur
Aditya Bagchi, Indian Statistical Institute, Kolkata    Anish Mathuria, DA-IICT, Gandhinagar
Kevin Butler, Penn State University                    Chandan Mazumdar, Jadhavpur University, Kolkata
Chakravarthy Bhagvati, University of Hyderabad          Nasir Memon, Polytechnic University
Lorenzo Cavallaro, University of Milan/UCSB            Peng Ning, North Carolina State University
Hao Chen, University of California, Davis              Atul Prakash, University of Michigan
Shuo Chen, Microsoft Research, Redmond                  R. Ramanujam, Institute of Mathematical Sciences, Chennai
Marc Dacier, Symantec Research Labs                    Sanjay Rawat, Infosys Technologies Ltd.
Saumya Debray, University of Arizona                    Pierangela Samarati, University of Milan
Subrat Kumar Dash, University of Hyderabad              Amitabh Saxena, University of Trento
Vinod Ganapathy, Rutgers University                    Radu Sion, Stony Brook University
Jonathon Giffin, Georgia Institute of Technology        Anil Somayaji, Carleton University
S K Gupta, Indian Institute of Technology, Delhi        Robin Sommer, ICSI/LBNL
Sushil Jajodia, George Mason University                Gaurav Tandon, Florida Institute of Technology
Somesh Jha, University of Wisconsin, Madison            Vijay Varadharajan, Macquarie University
Shrikant Ojha, DRDO, Government of India                V.N. Venkatakrishnan, University of Illinois, Chicago
Engin Kirda, Technical University of Vienna            Poorvi Vora, George Washington University
P. Radha Krishna, Infosys Technologies Ltd.            Xiaofeng Wang, Indiana University
G. Vijaya Kumari, JNTU, Hyderabad                      Wei Xu, VMware Inc.
Zhenkai Liang, Carnegie Mellon University
 
ORGANIZING COMMITTEE:
Advisory Committee Chair:  Sushil Jajodia, George Mason University
Program Co-chairs:        Arun K Pujari, LNM IIT
  R. Sekar, Stony Brook University
Submissions/Website Chair: Subrat Kumar Dash, University of Hyderabad
Publicity Chair:          Alok Tongoankar, Stony Brook University
Tutorial Co-chairs:        Vineet P Nair, University of Hyderabad
  V.N. Venkatakrishnan, University of Illinois at Chicago
Organizing Chair:          G. Vijaya Kumari, JNTU, Hyderabad
Finance Chair:            P. Radha Krishnan, Infosys, Hyderabad
 
---------------------------------------------------
IMPORTANT DATES
Manuscript Submission          19 July 2008
Tutorial Proposal Submission    26 July 2008
Notification of Acceptance      08 Sep 2008
Camera-Ready Manuscript        22 Sep 2008
---------------------------------------------------
 
SUBMISSION INSTRUCTIONS:
 
PAPERS:
Papers should be formatted as they would appear in the final LNCS
proceedings. Papers should be at most 15 pages in length, including
the bibliography. Detailed submission instructions can be found at
the conference web site. One of the authors of an accepted paper must
attend the conference to present the paper. ICISS accepts only
electronic submissions in PDF format. Camera-ready manuscripts must be
submitted in LaTex.
 
Submitted papers must not substantially overlap with papers published
or currently submitted to a journal or a conference with proceedings.
 
ONGOING RESEARCH REPORTS:
There will be two sessions to present reports on the current research
projects. One session will be for academic institutions and the other
for industrial establishments. The research reports should be
submitted in the same way as the technical papers. A report should be
maximum of 4 pages.
 
TUTORIAL PROPOSALS:
There will be tutorial program for two days (16-17 December 2008). At
most four three-hour tutorials will be offered.  Proposals are invited
for tutorials of duration three hours on relevant topics of current
interest. A tutorial proposal should include the extended abstract of
the tutorial and a brief biography of the speaker(s). Please mail your
proposal to the Tutorial Chair. The speaker(s) of the accepted
proposals need to submit their final presentation one month before the
conference to the Tutorial Chair.
</pre>This CfP was obtained from [http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=3121&amp;copyownerid=2 WikiCFP]

Latest revision as of 02:51, 29 May 2012

This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks!