Difference between revisions of "ICISS 2008"

From Openresearch
Jump to: navigation, search
(ORGANIZING COMMITTEE)
(Mosheton)
Line 1: Line 1:
{{Event
+
ந ங கள எழ த ய பத ல தன மடல ல க ட த தத (intended or by mistake?)பத ல க க நன ற !
  | Acronym = ICISS 2008
 
  | Title = 4th International Conference on Information Systems Security
 
  | Type = Conference
 
| Series =
 
| Field = Computer security and reliability
 
| Homepage = www.seclab.cs.sunysb.edu/iciss08
 
| Start date = Dec 16, 2008
 
| End date =  Dec 20, 2008
 
| City= Hyderabad
 
| State =  Andhra Pradesh
 
| Country =  india
 
| Abstract deadline =
 
| Submission deadline = Jul 19, 2008
 
| Notification = Sep 8, 2008
 
| Camera ready =
 
}}
 
 
 
4th International Conference on Information Systems Security (ICISS 2008)
 
16-20 December 2008, Hyderabad, India
 
 
 
The conference series ICISS (International Conference on Information
 
Systems Security), held annually, provides a forum for disseminating
 
the latest research results in information and systems security. The
 
acceptance ratio of the first three conferences has averaged less than
 
30%, and the proceedings have been published as part of the Springer
 
Verlag series of Lecture Notes in Computer Science. The ICISS 2008
 
encourages submissions from academia, industry and government
 
addressing theoretical and practical problems in information and
 
systems security and related areas.
 
 
 
==Topics==
 
 
 
Topics of interest include but are not limited to:
 
 
 
* Application Security
 
* Authentication and Access Control
 
* Biometric Security
 
* Data Security
 
* Digital Forensics and Diagnostics
 
* Digital Rights Management
 
* Distributed System Security
 
* Formal Methods in Security
 
* Intrusion Detection, Prevention and Response
 
* Intrusion Tolerance and Recovery
 
* Key Management and Cryptographic Protocols
 
* Language-based Security
 
* Malware Analysis and Mitigation
 
* Network Security
 
* Operating System Security
 
* Privacy and Anonymity
 
* Security in P2P, Sensor and Ad Hoc Networks
 
* Software Security
 
* Vulnerability Detection and Mitigation
 
* Web Security
 
 
 
==Program Committee==
 
 
 
* [[has PC member::Vijay Atluri]], Rutgers University
 
* [[has PC member::Arun K. Majumdar]], Indian Institute of Technology, Kharagpur
 
* [[has PC member::Aditya Bagchi]], Indian Statistical Institute, Kolkata
 
* [[has PC member::Anish Mathuria]], DA-IICT, Gandhinagar
 
* [[has PC member::Kevin Butler]], Penn State University
 
* [[has PC member::Chandan Mazumdar]], Jadhavpur University, Kolkata
 
* [[has PC member::Chakravarthy Bhagvati]], University of Hyderabad
 
* [[has PC member::Nasir Memon]], Polytechnic University
 
* [[has PC member::Lorenzo Cavallaro]], University of Milan/UCSB
 
* [[has PC member::Peng Ning]], North Carolina State University
 
* [[has PC member::Hao Chen]], University of California, Davis
 
* [[has PC member::Atul Prakash]], University of Michigan
 
* [[has PC member::Shuo Chen]], Microsoft Research, Redmond
 
* [[has PC member::R. Ramanujam]], Institute of Mathematical Sciences, Chennai
 
* [[has PC member::Marc Dacier]], Symantec Research Labs
 
* [[has PC member::Sanjay Rawat]], Infosys Technologies Ltd.
 
* [[has PC member::Saumya Debray]], University of Arizona
 
* [[has PC member::Pierangela Samarati]], University of Milan
 
* [[has PC member::Subrat Kumar Dash]], University of Hyderabad
 
* [[has PC member::Amitabh Saxena]], University of Trento
 
* [[has PC member::Vinod Ganapathy]], Rutgers University
 
* [[has PC member::Radu Sion]], Stony Brook University
 
* [[has PC member::Jonathon Giffin]], Georgia Institute of Technology
 
* [[has PC member::Anil Somayaji]], Carleton University
 
* [[has PC member::S K Gupta]], Indian Institute of Technology, Delhi
 
* [[has PC member::Robin Sommer]], ICSI/LBNL
 
* [[has PC member::Sushil Jajodia]], George Mason University
 
* [[has PC member::Gaurav Tandon]], Florida Institute of Technology
 
* [[has PC member::Somesh Jha]], University of Wisconsin, Madison
 
* [[has PC member::Vijay Varadharajan]], Macquarie University
 
* [[has PC member::Shrikant Ojha]], DRDO, Government of India
 
* [[has PC member::V.N. Venkatakrishnan]], University of Illinois, Chicago
 
* [[has PC member::Engin Kirda]], Technical University of Vienna
 
* [[has PC member::Poorvi Vora]], George Washington University
 
* [[has PC member::P. Radha Krishna]], Infosys Technologies Ltd.
 
* [[has PC member::Xiaofeng Wang]], Indiana University
 
* [[has PC member::G. Vijaya Kumari]], JNTU, Hyderabad
 
* [[has PC member::Wei Xu]], VMware Inc.
 
* [[has PC member::Zhenkai Liang]], Carnegie Mellon University
 
 
 
I hope the chair is much more comfortable that what you had berofe.    I cannot believe that your company makes you buy your own chair if you want a decent one  .
 
 
 
==SUBMISSION INSTRUCTIONS==
 
 
 
ive been going on and off for years and actually enjoy the saoicl pariah in the room status i have aquired.someone who i knew when i first went in and is now ten years sober asked me quite seriously why  i wasnt dead yet or mad?i never bothered returning the question as i could clearly see she was alive thanks to her personal god and even more clearly mad.why do aa s always state that theyve never seen anyone return to the rooms and say its better out there? it would be one nasty cunt that did!
 
 
 
===ONGOING RESEARCH REPORTS===
 
There will be two sessions to present reports on the current research
 
projects. One session will be for academic institutions and the other
 
for industrial establishments. The research reports should be
 
submitted in the same way as the technical papers. A report should be
 
maximum of 4 pages.
 
 
 
===TUTORIAL PROPOSALS===
 
There will be tutorial program for two days (16-17 December 2008). At
 
most four three-hour tutorials will be offered. Proposals are invited
 
for tutorials of duration three hours on relevant topics of current
 
interest. A tutorial proposal should include the extended abstract of
 
the tutorial and a brief biography of the speaker(s). Please mail your
 
proposal to the Tutorial Chair. The speaker(s) of the accepted
 
proposals need to submit their final presentation one month before the
 
conference to the Tutorial Chair.
 

Revision as of 22:55, 26 May 2012

ந ங கள எழ த ய பத ல தன மடல ல க ட த தத (intended or by mistake?)பத ல க க நன ற !